Essays about: "YANG"
Showing result 11 - 15 of 454 essays containing the word YANG.
-
11. An analysis of achievement completion rate of open world role-playing games through a new taxonomic method
University essay from Uppsala universitet/Institutionen för speldesignAbstract : Previous research has studied game achievement with focus on their forming elements, the taxonomic method based on design perspective, studying the relationship between their completion rate with factors including their name and average play time. This research focuses on creating a new taxonomic method on game achievements based on how they get triggered and using it to study the relationship between their completion rate and other factors with the help of data analysis. READ MORE
-
12. Meme marketing’s effect on brand recall and sharing intention
University essay from Karlstads universitet/Handelshögskolan (from 2013)Abstract : Memes are a popular phenomenon in internet culture, despite this fact, meme marketing has not received a lot of attention within the field of marketing research. Therefore, this thesis studies the effect meme marketing has on brand recall and sharing intention using a meme template with an unknown brand. READ MORE
-
13. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
14. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
15. An analytical method for quickly evaluating the performances of refractory alloys in sCO2 Brayton cycle applications
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : A rapid and effective analytical method has been developed to assess the performance of structural materials in sCO2 power cycle applications. This method combines a conjugate heat transfer model, considering constant heat flux boundary conditions, with a corresponding mechanical model. READ MORE