Essays about: "Leverantörer"

Showing result 1 - 5 of 283 essays containing the word Leverantörer.

  1. 1. Method Development & Analysis of Seals using FEM

    University essay from KTH/Maskinkonstruktion

    Author : Lovisa Svanborg Östlin; [2023]
    Keywords : FEM; guidelines; hyperelastic materials; hyperelastic material models; method development; seals; FEM; riktlinjer; hyperelastiska material; hyperelastiska materialmodeller; metodutveckling; tätningar;

    Abstract : Hyperelasticity is a significant property of rubber, taken advantage of in engineering applications. A common application is the use of seals to prevent fluid transfer (liquid or gas) between solid regions. Volvo CE is often depending on external supplier when developing seals. READ MORE

  2. 2. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  3. 3. Product Structures with Attribute Management for future PLM systems : A study for Ericsson BOM Management

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : PAWAN RAJ SINGH; [2023]
    Keywords : PLM; BOM; PRIM; 3DX; Attribute; Widget; Product Structure; WoW; OOTB; PLM; BOM; PRIM; 3DX; Attribute; Widget; Product Structure; WoW; OOTB;

    Abstract : Information Management in the database system for the Product Development process demands continuous evolution and digital transformation investigations with the PLM systems to explore the latest functionalities. Ericsson today has a main frame PDM system PRIM with various connected sub-systems to store the Product related data which serves limited functionality and does not fully track the complete lifecycle in the IT system landscape. READ MORE

  4. 4. Digitalization of Management Maturity Model M3 : A case study about a company’s maturity levelin respect of compliance management

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Rebecka Tottmar Virsand; Therése Sjöstedt; [2023]
    Keywords : maturity; digitalization; compliance management; competitive advantage; mognadsmodell; digitalisering; compliance management; konkurrensfördel;

    Abstract : The constant rise of stronger technical standards along with expectations for openness  from stakeholders have left businesses in a vulnerable position that threatens their  reputation and viability. There is a need for management standards in order for  companies to have guidelines to follow and know how to work correctly.. READ MORE

  5. 5. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE