Essays about: "building security system"
Showing result 1 - 5 of 90 essays containing the words building security system.
-
1. Compact Radar System
University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskapAbstract : Context: Radar was developed in secret during world war II to detectobstacles or any incoming threat. The term radar was coined in 1940by United States Military as an acronym for "Radio Detection andRanging". Using radio waves a radar detects any incoming threat orobstacle [10]. The basic purpose of radar is for monitoring and security. READ MORE
-
2. Next Generation Access Control as a support core system in the Arrowhead Framework
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE
-
3. Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review
University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskapAbstract : Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). READ MORE
-
4. Performance of Digital Currency and Improvements : An analysis of current implementations and the future of digital currency
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Currency has changed a lot, and the introduction of the Internet sped up the evolution of the currency. Digital currency introduced many benefits compared to physical currencies. Ideas such as cryptocurrencies work as an option for other means of payment. READ MORE
-
5. Automating security processing of Integration flows : Automating input processing for Attack Simulations using Meta Attack Language and Common Vulnerability and Exposures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In our ever evolving society security becomes more and more important as a lot of our lives move online. Performing security analysis of IT-systems is a cumbersome process requiring extensive domain knowledge and tailored analysis per system. Research shows that manual tasks are error prone. READ MORE
