Essays about: "Security visualization"

Showing result 1 - 5 of 31 essays containing the words Security visualization.

  1. 1. Code Review Application : Simplifying code review through data flow visualization

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Viktor Möllerström; Jesper Roos; [2023]
    Keywords : data flow; visualization; code review; security;

    Abstract : From a security standpoint, manual code review is widely regarded as a dependable practice, particularly in systems with heightened security needs. However, it is also a time-consuming and laborious task that requires careful consideration. READ MORE

  2. 2. Enhancing human-robot interaction using mixed reality

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Santiago Molina Morillas; [2023]
    Keywords : Human-robot interaction; mixed reality; autonomous mobile robots; safety;

    Abstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE

  3. 3. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Mehdi Bel Fdhila; [2023]
    Keywords : ;

    Abstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE

  4. 4. Soviet intelligence in Stockholm during World War II: A social network analysis

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Björn Lundberg; [2022]
    Keywords : Social network theory; social network analysis; Venona; KGB; NetDraw; Usinet; World War two; Intelligence; dark networks; criminal networks; Mercyhurst College; National security agency; NSA; cables; Law and Political Science;

    Abstract : In this thesis social network analysis is applied on the Venona project KGB cables between Stockholm and Moscow during the World War two. The method is quantitative where words are extracted according to two different coding sheets and structured in tables. Software is then used for calculations and visualization. READ MORE

  5. 5. Security lighting in horse riding halls: Development of a simulation-led testing methodology in VR

    University essay from Lunds universitet/Avdelningen för Energi och byggnadsdesign; Lunds universitet/Institutionen för arkitektur och byggd miljö

    Author : Sheikh Rishad Ahmmad; [2022]
    Keywords : Security lighting; horse riding halls; mesopic vision; Virtual Reality; object tracking; Technology and Engineering;

    Abstract : Security lighting plays a vital role for safe evacuation during an emergency such as power outage or a fire related incidence. Installing a security lighting system properly is more crucial for a horse riding facility for two reasons. READ MORE