Essays about: "Software architecture for an existing system"

Showing result 1 - 5 of 62 essays containing the words Software architecture for an existing system.

  1. 1. Modeling, Simulation, and Injection of Camera Images/Video to Automotive Embedded ECU : Image Injection Solution for Hardware-in-the-Loop Testing

    University essay from Uppsala universitet/Signaler och system

    Author : Anton Lind; [2023]
    Keywords : ADAS; AD; ADS; HIL; Hardware in the loop; Hardware-in-the-loop; ECU; VCU; Automotive; Embedded; System; Systems; Camera; Image; Video; Injection; FPGA; MPSoC; Vivado; Vitis; VHDL; Volvo; Cars; FMC; HPC; LPC; MIPI CSI2; GMSL2; AMBA AXI4; Xilinx; RTL; Implementation; Synthesis; Intelectual Property; IP; Vehicle computing unit; Electronic control unit; TEB0911; TEF0007; TEF0010; CSI2 Tx; CSI2 Tx Subsystem; Zynq; SerDes; AXI4; AXI4-Lite; Programmable Logic; PL; Processor System; PS; C; C ; Video test pattern generator; VTPG; Axi traffic generator; ATG; Ultrascale ; Virtual input output; VIO; Integrated logic analyzer; ILA; Interface Unit;

    Abstract : Testing, verification and validation of sensors, components and systems is vital in the early-stage development of new cars with computer-in-the-car architecture. This can be done with the help of the existing technique, hardware-in-the-loop (HIL) testing which, in the close loop testing case, consists of four main parts: Real-Time Simulation Platform, Sensor Simulation PC, Interface Unit (IU), and unit under test which is, for instance, a Vehicle Computing Unit (VCU). READ MORE

  2. 2. Enhancing an Existing Attack Projection System with Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mikael Kolanowski; [2023]
    Keywords : Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Abstract : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. READ MORE

  3. 3. Migrating monolithic system to domain-driven microservices : Developing a generalized migration strategy for an architecture built on microservices

    University essay from KTH/Hälsoinformatik och logistik

    Author : Milan Languric; Leo Zaki; [2022]
    Keywords : Domain-Driven Design; monolithic architecture; microservices; serverless; cloud; Domän driven; monolitisk arkitektur; mikrotjänster; serverlös; moln;

    Abstract : As monolithic software grows in complexity, they tend to reach a point where further improvements and maintenance become a significant burden. Therefore, Many organizations consider moving components of their systems into separate microservices. READ MORE

  4. 4. Security lighting in horse riding halls: Development of a simulation-led testing methodology in VR

    University essay from Lunds universitet/Avdelningen för Energi och byggnadsdesign; Lunds universitet/Institutionen för arkitektur och byggd miljö

    Author : Sheikh Rishad Ahmmad; [2022]
    Keywords : Security lighting; horse riding halls; mesopic vision; Virtual Reality; object tracking; Technology and Engineering;

    Abstract : Security lighting plays a vital role for safe evacuation during an emergency such as power outage or a fire related incidence. Installing a security lighting system properly is more crucial for a horse riding facility for two reasons. READ MORE

  5. 5. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE