Essays about: "Software Networks"

Showing result 1 - 5 of 464 essays containing the words Software Networks.

  1. 1. Integrating Waste Heat from Hydrogen Production Into District Heating

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Fawzi Kayali; [2023]
    Keywords : Hydrogen; Electrolysis; Waste Heat Recovery; Combined Heat and Power Plant; District Heating; Simulation; Sustainable Heating Systems; Technology and Engineering;

    Abstract : The aim of this research is to explore the feasibility of the integration of waste heat from electrolyzers within a Combined Heat and Power (CHP) plant and district heating (DH) network and suggest a practical setup for integration. With the escalating emphasis on the development of green hydrogen through electrolysis powered by renewable energy, a substantial amount of waste heat is generated, typically left unused. READ MORE

  2. 2. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Javier Ferre Martin; [2023]
    Keywords : Space Situational Awareness; Deep Learning; Convolutional Neural Networks; FieldProgrammable Gate Arrays; System-On-Chip; Computer Vision; Dynamic Partial Reconfiguration; High-Level Synthesis; Rymdsituationstänksamhet; Djupinlärning; Konvolutionsnätverk; Omkonfigurerbara Field-Programmable Gate Arrays FPGAs ; System-On-Chip SoC ; Datorseende; Dynamisk partiell omkonfigurering; Högnivåsyntes.;

    Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE

  3. 3. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  4. 4. Emulation of Network Device Behaviour for Robot Controller Testing

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Muhamed Opacin; [2023]
    Keywords : emulation; software testing; robotics; industrial robots; computer networks; network protocols; i o devices; network traffic; network traffic replay;

    Abstract : The testing of software for robot controllers has become increasingly difficult as robotic systems become more complex. As the complexity of the systems increases, the number of hardware systems that the robot relies on also grows. READ MORE

  5. 5. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE