Essays about: "Network Access Control"

Showing result 6 - 10 of 189 essays containing the words Network Access Control.

  1. 6. Product Solutions for Occupational Health and Safety Risks – A Digital Tool

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Julia Gårdestam; Sarah Nordh; [2023]
    Keywords : Work Environment; Risk Assessment; Product Proposal; Manual Handling; Digital Tool.; Arbetsmiljö; Riskbedömning; Produktförslag; Manuell hantering; Digitalt verktyg.;

    Abstract : Today, there are clearly defined directives and laws that regulate the work environment in Sweden, but despite this, there are still deficiencies in the work environment for companies. Physical work has a particularly high risk of developing occupational injuries, with heavy lifting being one of the contributing factors. READ MORE

  2. 7. AI Based Methods for Matrix Multiplication in High Resolution Simulations of Radio Access Networks

    University essay from KTH/Matematisk statistik

    Author : Marcus Johnson; Herman Forslund; [2023]
    Keywords : Product-Quantization; MADDNESS; Radio Access Networks; Channel Estimation; MIMO; Approximate Matrix Multiplication; Pruduktkvantisering; MADDNESS; RAN; MIMO; Approximativa matrismultiplikation;

    Abstract : The increasing demand for mobile data has placed significant strain on radio access networks (RANs), leading to a continuous need for increased network capacity. In keeping with that, a significant advancement in modern RANs is the ability to utilize several receivers and transmitters, to allow for beamforming. READ MORE

  3. 8. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  4. 9. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  5. 10. Prediction of 5G system latency contribution for 5GC network functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyu Cheng; [2023]
    Keywords : Network model; End-to-end delay; 5GC; Prediction model; CPU load; Nätverksmodell; Slutanvändare; latens; 5GC; Modell för prediktering; CPU-last;

    Abstract : End-to-end delay measurement is deemed crucial for network models at all times as it acts as a pivotal metric of the model’s effectiveness, assists in delineating its performance ceiling, and stimulates further refinement and enhancement. This premise holds true for 5G Core Network (5GC) models as well. READ MORE