Advanced search

Showing result 1 - 5 of 34 essays matching the above criteria.

  1. 1. Studies on future Mine Countermeasure Vessels (MCMV)

    University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskap

    Author : Philip Somehagen; [2023]
    Keywords : Concept development; Mine countermeasure vessels; ROV; Sonar; Konceptutveckling; Minjaktsfartyg; ROV; Sonar;

    Abstract : Background Maritime transportation is vital for international trade, and any disruption to this flow can have severe financial and environmental consequences. Ship mines, both old and new, present significant risks as man-made obstacles. READ MORE

  2. 2. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  3. 3. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  4. 4. Secure Joint Radar Communications and Risk Assessment for Autonomous Driving

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : John Sandell; Qingyun Gu; [2022-05-04]
    Keywords : Automotive radars; Autonomous driving; V2V; Risk assessment; Joint radar communication; DSRC; FMCW; Automotive security; RadCom;

    Abstract : Both radar and Vehicle-to-Vehicle (V2V) communication systems in autonomous vehicles are vulnerable to security threats. However, combining radar and V2V communication systems has the potential to overcome the threats to both systems. READ MORE

  5. 5. Efficient and robust reduction of bounding boxes of a multi-class neural network’s output for vehicular radar-systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elazab Gasser; [2022]
    Keywords : Non-maximum suppression; Deep Learning; Machine Learning; Autonomous Vehicles; Determinantal Point Process; Icke-maximal undertryckning; Djupinlärning; Maskininlärning; Autonoma fordon; Determinant punktprocess;

    Abstract : Object detection has been a fundamental part of many emerging technologies, such as autonomous vehicles, robotics, and security. As deep learning is the main reason behind the leap of performance in object detection, it has mostly been associated with a post-processing step of non-maximum suppression (NMS) to reduce the number of resulting bounding boxes output from the network to, ideally, one box per object. READ MORE