Essays about: "Conclusion of computer system"

Showing result 16 - 20 of 99 essays containing the words Conclusion of computer system.

  1. 16. Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Daniella Nordgren; [2018]
    Keywords : Phishing; Ransomware; Social engineering; Hospital;

    Abstract : Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. READ MORE

  2. 17. Accelerated Simulation of Modelica Models Using an FPGA-Based Approach

    University essay from Linköpings universitet/Datorteknik; Linköpings universitet/Datorteknik

    Author : Herman Lundkvist; Alexander Yngve; [2018]
    Keywords : FPGA; Modelica; VHDL; MBSE; model simulation; ODE; HLS; hardware acceleration; PCIe; ZYNQ;

    Abstract : This thesis presents Monza, a system for accelerating the simulation of modelsof physical systems described by ordinary differential equations, using a generalpurpose computer with a PCIe FPGA expansion card. The system allows bothautomatic generation of an FPGA implementation from a model described in theModelica programming language, and simulation of said system. READ MORE

  3. 18. Centralized log management for complex computer networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Hanikat; [2018]
    Keywords : Logging ; Log management ; Computer networks ; Centralization ; Security; Loggning ; Log hantering; Datornätverk ; Centralisering ; Säkerhet;

    Abstract : In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. READ MORE

  4. 19. Developing Data Extraction and Dynamic Data Visualization (Styling) Modules for Web GIS Risk Assessment System (WGRAS)

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Daniel Assefa; [2018]
    Keywords : Geographical Information Systems; GIS; Disaster Risk Management; web GIS; Volunteered Geographic Information VGI ; Map Visualization and styling; Geo-spatial data extraction; OpenStreetMap OSM ; Earth and Environmental Sciences;

    Abstract : Interactive web-GIS tools play an important role in determining disaster risk assessment which ultimately result in reduction of unexpected damages, cost and saves millions of lives. Disaster management practitioners largely benefited information at their disposal about location where possible incidents are eminent, anticipate the impact and project possible outcomes to help mitigate and organize proper response. READ MORE

  5. 20. Wrinkling in packaging material: Experiments and thermo-mechanical stochastic modeling

    University essay from Lunds universitet/Hållfasthetslära

    Author : Linus Dahlström; David Johansson; [2018]
    Keywords : Stochastic; modeling; XCT; thermo-mechanical; Technology and Engineering;

    Abstract : As one of the world leaders in food packaging, it is in the interest of Tetra Pak⃝R to increase the understanding of packaging material and how it can better be virtually modeled, using finite element (FE) simulations. The aim of this thesis is to evaluate whether a stochastic approach can be taken to generate a more realistic response than a purely deterministic one, in the aforementioned models. READ MORE