Essays about: "Network Access Control"

Showing result 21 - 25 of 189 essays containing the words Network Access Control.

  1. 21. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control

    University essay from Uppsala universitet/Avdelningen för visuell information och interaktion

    Author : Gustav Norvik; [2022]
    Keywords : facial recognition; deep learning; machine learning; computer vision; image processing; artificial intelligence;

    Abstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE

  2. 22. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Huang; [2022]
    Keywords : Ciphertext-Policy Attribute-based encryption; Dynamic Attributes; Network Security; Vehicular Ad Hoc Networks; Ciphertext-Policy Attributbaserad kryptering; dynamiska attribut; nätverkssäkerhet; fordonsbaserade ad hoc-nätverk;

    Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE

  3. 23. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE

  4. 24. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Otabek Sobirov; [2022]
    Keywords : TSCH; 6TiSCH; RPL; scheduling; energy consumption; COOJA; autonomous scheduling; distributed scheduling; reinforcement learning; RL-based scheduling; Q-Learning;

    Abstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE

  5. 25. An Empirical Study on AI Workflow Automation for Positioning

    University essay from Linköpings universitet/Programvara och system

    Author : Hannes Jämtner; Stefan Brynielsson; [2022]
    Keywords : MLOps; ML; AI; Machine Learning; Artificial Intelligence; Radio Antenna Positioning; MLOps Maturity Levels; Radio Access Network; RAN; Kubeflow; KServe; DVC; Data Version Control; MinIO; Kubernetes; Kind; Docker;

    Abstract : The maturing capabilities of Artificial Intelligence (AI) and Machine Learning (ML) have resulted in increased attention in research and development on adopting AI and ML in 5G and future networks. With the increased maturity, the usage of AI/ML models in production is becoming more widespread, and maintaining these systems is more complex and likely to incur technical debt when compared to standard software. READ MORE