Essays about: "INFORMATION TECHNOLOGY device"

Showing result 6 - 10 of 384 essays containing the words INFORMATION TECHNOLOGY device.

  1. 6. Real-time Autofocus Algorithm in Laser Speckle Contrast Imaging

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Giovanni Russo; [2023]
    Keywords : Laser speckle contrast imaging; Autofocus; Blind image sharpness assessment; Speckle noise; Perimed’s Perfusion Speckle Imager;

    Abstract : Microcirculation is defined as the blood flow in the smallest blood vessels. Laser speckle contrast imaging (LSCI) is a full field imaging technique that provides instantaneous 2-D perfusion maps of illuminated tissues based on speckle contrast. READ MORE

  2. 7. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  3. 8. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE

  4. 9. Dynamic container orchestration for a device-cloud continuum

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Camilo Alfonso Rodriguez Garzon; [2023]
    Keywords : Edge computing; kubernetes operator; dynamic scheduling; Edge computing; Kubernetes-operatör; dynamisk schemaläggning;

    Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE

  5. 10. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE