Essays about: "Leverantörer"
Showing result 1 - 5 of 283 essays containing the word Leverantörer.
-
1. Method Development & Analysis of Seals using FEM
University essay from KTH/MaskinkonstruktionAbstract : Hyperelasticity is a significant property of rubber, taken advantage of in engineering applications. A common application is the use of seals to prevent fluid transfer (liquid or gas) between solid regions. Volvo CE is often depending on external supplier when developing seals. READ MORE
-
2. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
3. Product Structures with Attribute Management for future PLM systems : A study for Ericsson BOM Management
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Information Management in the database system for the Product Development process demands continuous evolution and digital transformation investigations with the PLM systems to explore the latest functionalities. Ericsson today has a main frame PDM system PRIM with various connected sub-systems to store the Product related data which serves limited functionality and does not fully track the complete lifecycle in the IT system landscape. READ MORE
-
4. Digitalization of Management Maturity Model M3 : A case study about a company’s maturity levelin respect of compliance management
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The constant rise of stronger technical standards along with expectations for openness from stakeholders have left businesses in a vulnerable position that threatens their reputation and viability. There is a need for management standards in order for companies to have guidelines to follow and know how to work correctly.. READ MORE
-
5. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE
