Essays about: "Library Management System"
Showing result 1 - 5 of 51 essays containing the words Library Management System.
-
1. EcoBot : study design and development of a persuasive FSM-free Chatbot for energy saving
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study presents the development and evaluation of a conversational agent, EcoBot, designed to inform users about their energy habits and persuade them to save more energy when at home, to help fight climate change and energy waste. To reach this goal, three persuasion strategies were first identified: Feedback, to give users personalized suggestions based on their habits, Goal Setting, to set and track consumption goals for the user’s domestic appliances, and Social Comparison, to compare the user’s consumption with that of others. READ MORE
-
2. Java Auto Grader
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The process of grading code submissions in programming courses is time-consuming and error-prone. To address this issue, we propose a project that automates the testing and grading process for Java code submissions at Halmstad University. READ MORE
-
3. Automating End Station Configuration: An Agile Approach to Time-Sensitive Networking
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Industries such as automotive and industrial automation are pushing the limits of networking technology. The Time-Sensitive Networking (TSN) standards offer a promising solution that can meet the demands of high-bandwidth applications with strict timing constraints, allowing time-critical traffic to coexist with other traffic. READ MORE
-
4. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
5. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE