Essays about: "Hardware access"

Showing result 6 - 10 of 237 essays containing the words Hardware access.

  1. 6. Machine Learning Clustering andClassification of Network DeploymentScenarios in a Telecom Networksetting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Chayan Shrang Raj; [2023]
    Keywords : Telecommunications; Statistics; Machine Learning; Masters; PySpark; Python; Data Visualization; LTE; eNodeB; Data analysis; Data Science; AI; Jupyter; HDFS;

    Abstract : Cellular network deployment scenarios refer to how cellular networks are implementedand deployed by network operators to provide wireless connectivity to end users.These scenarios can vary based on capacity requirements, type of geographical area, populationdensity, and specific use cases. READ MORE

  2. 7. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 8. Green Room : A climate controlling grow-box for growing mushrooms and greens.

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Bill Skullman; Gabriella Herlin; [2023]
    Keywords : Mechatronics; Aeroponic farming; Mushroom farming; Photosynthesizing plants - Greens; Ultrasonic atomizer; Mekatronik; Aeroponisk odling; Svampodling; Fotosyntetiserande växter; Ultraljudsluftfuktare;

    Abstract : This report covers a project on a partially automated aeroponic and fungi growing system. The purpose is to evaluate if an enclosed space system can be automated to produce healthy crops of greens and fungi, and investigate how well the system can switch between these two growth modes. READ MORE

  4. 9. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  5. 10. A General Purpose Near Data Processing Architecture Optimized for Data-intensive Applications

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Xingda Li; Haidi Hu; [2023]
    Keywords : Technology and Engineering;

    Abstract : In recent years, as Internet of Things (IoT) and machine learning technologies have advanced, there has been increasing interest in the study of energy-efficient and flexible architectures for embedded systems. To bridge the performance gap between microprocessors and memory systems, Near-Data Processing (NDP) was introduced. READ MORE