Essays about: "Open Access Order"
Showing result 16 - 20 of 126 essays containing the words Open Access Order.
-
16. Life cycle analysis and comparison of climate impact for two alternative floor systems for increased weight in high-rise timber buildings
University essay from KTH/ByggnadsmaterialAbstract : The aim of this Master Thesis is to investigate and quantify the climate impact for two floor system alternatives for the Cederhusen project, that is the 8 floors timber-based buildings located at Sankt Eriksplan in Stockholm. The overall motivation for this study is the fact that the construction industry is a major contributor to the total amount of the global greenhouse gas emissions. READ MORE
-
17. The Competitive Conditions for Vendors in the Open RAN Ecosystem : A Study Informed by Expert Interviews
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Mobile communication technology has become crucial in shaping the way modern society functions. The evolution of cellular networks has created an increasingly interconnected world, supporting various heterogeneous infrastructures. READ MORE
-
18. Assessing the Security of Internal Automotive Networks
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE
-
19. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE
-
20. Immigrant entrepreneurship challenges in Sweden. : Their obstacles, strategies, and proposed solutions.
University essay from Linnéuniversitetet/Institutionen för organisation och entreprenörskap (OE)Abstract : The wars in some Middle Eastern countries have played an essential role in increasingthe number of immigrants to Sweden in recent years. Some of these immigrants hadean entrepreneurial background in their home country. As former entrepreneurs, theyhave been seeking for opportunities since their arrival in Sweden in order to open theirown business. READ MORE