Essays about: "Distributed application"
Showing result 1 - 5 of 393 essays containing the words Distributed application.
-
1. Battery Degradation and Health Monitoring in Lithium-Ion Batteries: An Evaluation of Parameterization and Sensor Fusion Strategies
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : The purpose of this project was to perform model-based diagnosis on Li-ion batteries using real-world data and sensor fusion algorithms. The data used in this project was collected and distributed by NASA and mainly consists of voltage and current measurements collected on numerous batteries that were repeatedly charged and discharged from their beginning of life, and until surpassing their end of life. READ MORE
-
2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
3. Performance comparison of distributed MySQL andMongoDB in a cloud environment
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Context: Comparing MongoDB and MySQL performance in the cloud is useful for developerswhen deciding which database to use based on cost, performance, workload size, and composition.As cloud computing becomes more popular, developers must consider the scalability, availability,and ease of use of these platforms when selecting a database. READ MORE
-
4. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE
-
5. Distributed Artificial Intelligence Based on Edge Computing
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The future Internet is expected to be driven by the prevalence of the Internet of Things (IoT), where it is envisioned that anything can be connected. In the last decade, there has been a paradigm shift in IoT from centralized cloud computing to so-called edge computing in order to compute tasks closer to the source of data generation. READ MORE