Essays about: "Version control systems"

Showing result 1 - 5 of 106 essays containing the words Version control systems.

  1. 1. Virtual power lines in the future Swedish power system

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Simon Hessman; Frida Lundberg; [2023]
    Keywords : VPL Virtual Power Line Nordic44 Nordic46 BESS Energy Storage; Technology and Engineering;

    Abstract : The transition towards renewable energy and electrification is expected to accelerate in the coming decades. This change is being studied by several actors, in Sweden most notably by Svenska kraft- nät, the Swedish TSO. READ MORE

  2. 2. Coordinate­Free Spacecraft Formation Control with Global Shape Convergence under Vision­Based Sensing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Omid Mirzaeedodangeh; [2023]
    Keywords : Bispherical Coordinates; 3D Formation Control; Spacecraft Formation Flying; Multiagent Systems; Prescribed Performance Control; Vision-Based Sensing; Bisfäriska Koordinater; 3D Formationskontroll; Rymdfarkostformationsflygning; Multiagentsystem; Föreskriven Prestandakontroll; Synbaserad Avkänning;

    Abstract : Formation control in multi-agent systems represents a groundbreaking intersection of various research fields with lots of emerging applications in various technologies. The realm of space exploration also can benefit significantly from formation control, facilitating a wide range of functions from astronomical observations, and climate monitoring to enhancing telecommunications, and on-orbit servicing and assembly. READ MORE

  3. 3. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE

  4. 4. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  5. 5. Robust Graph SLAM in Challenging GNSS Environments Using Lidar Odometry

    University essay from Linköpings universitet/Reglerteknik

    Author : Jesper Sundström; Alfred Åström; [2023]
    Keywords : graphslam; graph slam; graph; slam; automatic; control; robust; DCS; RRR; lidar odometry; gnss;

    Abstract : Localization is a fundamental part of achieving fully autonomous vehicles. A localization system needs to constantly provide accurate information about the position of the vehicle and failure could lead to catastrophic consequences. READ MORE