Essays about: "Hardware access"
Showing result 6 - 10 of 237 essays containing the words Hardware access.
-
6. Machine Learning Clustering andClassification of Network DeploymentScenarios in a Telecom Networksetting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Cellular network deployment scenarios refer to how cellular networks are implementedand deployed by network operators to provide wireless connectivity to end users.These scenarios can vary based on capacity requirements, type of geographical area, populationdensity, and specific use cases. READ MORE
-
7. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
8. Green Room : A climate controlling grow-box for growing mushrooms and greens.
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report covers a project on a partially automated aeroponic and fungi growing system. The purpose is to evaluate if an enclosed space system can be automated to produce healthy crops of greens and fungi, and investigate how well the system can switch between these two growth modes. READ MORE
-
9. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE
-
10. A General Purpose Near Data Processing Architecture Optimized for Data-intensive Applications
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In recent years, as Internet of Things (IoT) and machine learning technologies have advanced, there has been increasing interest in the study of energy-efficient and flexible architectures for embedded systems. To bridge the performance gap between microprocessors and memory systems, Near-Data Processing (NDP) was introduced. READ MORE