Essays about: "INFORMATION TECHNOLOGY device"
Showing result 6 - 10 of 384 essays containing the words INFORMATION TECHNOLOGY device.
-
6. Real-time Autofocus Algorithm in Laser Speckle Contrast Imaging
University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)Abstract : Microcirculation is defined as the blood flow in the smallest blood vessels. Laser speckle contrast imaging (LSCI) is a full field imaging technique that provides instantaneous 2-D perfusion maps of illuminated tissues based on speckle contrast. READ MORE
-
7. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE
-
8. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE
-
9. Dynamic container orchestration for a device-cloud continuum
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE
-
10. Anomaly Detection for Network Traffic in a Resource Constrained Environment
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE