Essays about: "Information leak"
Showing result 1 - 5 of 37 essays containing the words Information leak.
-
1. Status Mapping of tank to grave management of Low-GWP refrigerants.
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Refrigeration plays a vital role today in various residential, commercial, and industrial processes, requiring refrigerants to facilitate the cooling or heating processes. Over time, refrigerants have undergone significant changes to meet technological, social, environmental, and economic needs. READ MORE
-
2. Mitralisregurgitation hos australian kelpie : myxomatös mitralisklaffsjukdom eller annan orsak?
University essay from SLU/Dept. of Clinical SciencesAbstract : Myxomatös mitralisklaffsjukdom (MMVD) är en förvärvad hjärtsjukdom som är vanlig bland hundar, särskilt hos mindre raser såsom cavalier king charles spaniel, taxar och toyraser. Sjukdomen leder till en förtjockning och prolaps av klaffarna, vanligtvis mitralisklaffen, som börjar läcka blod från kammaren till förmaket (mitralisregurgitation). READ MORE
-
3. 2D or not 2D: Assessing environmental awareness and cognitive load in mixed reality data visualizations : Visualizing gas leak data visualizations for an industrial surveying setting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Increasing the environmental awareness of invisible data, such as a city’s air pollution or a household’s energy consumption, has been an ongoing information visualization challenge that has entered the fields of immersive technologies like augmented (AR) and mixed reality (MR). In order to understand how form and dimensional affect this understanding for MR environments, this research investigated what the difference between statistical, iconographic 2D and physical 3D visualizations is with regards to minimizing cognitive load and fostering environmental awareness. READ MORE
-
4. Exposing memory accesses and branches in machine code to symbolic execution : Tracking instructions through binary raising
University essay from Linköpings universitet/Programvara och systemAbstract : In 2018, a new security vulnerability was discovered that existed in billions of processors from different manufacturers, using various architectures. A so-called spectre attack can be launched to exploit the vulnerability and cause cryptographic information to leak through side-channels of the targeted system. READ MORE
-
5. Developing a Geographical Information System for a water and sewer network, for monitoring, identification and leak repair - Case study: Municipal Water Company of Naoussa, Greece
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : This thesis presents the design and implementation of a Geographic Information System (GIS) for the Naoussa Municipality Water and Sewer Company for better water utility management. The methodology contained field data collection like the valves, sewer manholes, hydrometers, and hydrants in two ways, UAV photogrammetry, and traditional surveying, the georeferencing process, photogrammetric processing, the digitization of old paper maps and the geodatabase design. READ MORE