Essays about: "access memory"

Showing result 1 - 5 of 225 essays containing the words access memory.

  1. 1. Data streaming provenance in advanced metering infrastructures

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Zozk Mohamed; [2023-11-24]
    Keywords : Advanced Metering Infrastructure; Ananke; Apache Flink; Göteborg Energi; Provenance; Stream processing; Stream Processing Engine;

    Abstract : Increasing volumes of data in digital systems have made the traditional approach of gathering and storing all the data while analyzing it in bulks at periodic intervals challenging and costly. One such field is the electric grid market, which has started modernizing its aging grids into smart grids where Advanced Metering Infrastructures (AMIs) play a vital role. READ MORE

  2. 2. Does my smartphone remember everything I need to remember? : A quantitative study on distributed cognition and how memory is affected by technical artifacts.

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Linn Gustafsson; [2023]
    Keywords : Memory; distributed cognition; technical artifacts; cognitive artifacts; transactive memory;

    Abstract : Technical artifacts, such as smartphones, computers, search engines and computer programs are extensively used by the modern human. It seems like people use these artifacts to remember important information and become better at finding information effectively with them as a constant available aid. READ MORE

  3. 3. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE

  4. 4. Comparing machine learning algorithms for detecting behavioural anomalies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Fredrik Jansson; [2023]
    Keywords : Anomaly Detection; Machine Learning; Behavioural Anomalies;

    Abstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE

  5. 5. A comparative performance analysis of Fast Fourier Transformation and Gerstner waves

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Morgan Westerberg; Oliver Olguin Jönsson; [2023]
    Keywords : Water simulation; Procedural methods; Ocean waves; Fast Fourier Transformation; Gerstner waves;

    Abstract : Background:  As time moves on hardware is able to tackle heavier and more complex computations in real-time systems. This means that more realistic and stylistic environments can be computed. One of these environments is the ocean. READ MORE