Essays about: "computer monitoring"

Showing result 1 - 5 of 139 essays containing the words computer monitoring.

  1. 1. Challenges in Specifying Safety-Critical Systems with AI-Components

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Iswarya Malleswaran; Shruthi Dinakaran; [2023-09-26]
    Keywords : Software engineering; Requirement engineering; Specification; Safety; Computer Science; Engineering; Machine learning; Deep learning; Runtime monitor; Data Selection; Data Collection;

    Abstract : Safety is an important feature in automotive industry. Safety critical system such as Advanced Driver Assistance System (ADAS) and Autonomous Driving (AD) follows certain processes and procedures in order to perform the desired function safely. READ MORE

  2. 2. Streamlining UAV Communication : Investigating and implementing an accessible communication interface between a ground control station and a companion computer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Johan Gustafsson; Daniel Mogensen; [2023]
    Keywords : UAV; communication protocol; design science; UAV security; software architecture; programming; Mavlink; UAV protocols;

    Abstract : In the future, the usage of UAVs (Unmanned Aerial Vehicles) will be applied in many different areas. Continued research in UAVs can benefit through its applications in disaster response, humanitarian aid, environmental monitoring, infrastructure inspection, improved transportation and delivery systems, and scientific research. READ MORE

  3. 3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  4. 4. Near-Real Time Forest Fire Monitoring System From an UAV

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : August Näsman; Daniel Nedlich; [2023]
    Keywords : ;

    Abstract : The purpose of this thesis is to implement a payload system on a drone to help fire towers in near-realtime survey forests for wildfires. The payload system should be able to communicate with a groundstation through a mobile network and the survey should be tagged with relevant metadata. READ MORE

  5. 5. Development of a Complete Minuscule Microscope: Embedding Data Pipeline and Machine Learning Segmentation

    University essay from KTH/Tillämpad fysik

    Author : Kenan Zec; [2023]
    Keywords : Incubation-microscope; Machine Learning Segmentation; ESP32-Cam; Deep Learning; Inkubationsmikroskop; Maskininlärnings-segmentering; ESP32-Cam; Deep Learning;

    Abstract : Cell culture is a fundamental procedure in many laboratories and precedes much research performed under the microscope. Despite the significance of this procedural stage, the monitoring of cells throughout growth is impossible due to the absence of equipment and methodological approaches. READ MORE