Essays about: "control and security system"
Showing result 21 - 25 of 319 essays containing the words control and security system.
-
21. Challenges in implementation of new CAD software in the manufacturing industry: a case study : Ongoing Implementation of CADMATIC Electrical for Valmet Tissue Mills
University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)Abstract : The rapid advancement of computer software in the digital revolution has created a diverse range of powerful tools for various industries. Even though there is such a broad selection, there is no software that fits every individual or organization because of the different criterias. This is no exception for designing tools. READ MORE
-
22. Quality Control: Detect Visual Defects on Products Using Image Processing and Deep Learning
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : Computer vision, a prominent subfield of artificial intelligence, has gained widespread util-ization in diverse domains such as surveillance, security, and robotics. This research en-deavors to develop an semi-automated defect detection system serving as a quality controlassurance mechanism for Nolato MediTor, a manufacturing company within the medicaldevice industries engaged in the production of anesthesia breathing bags. READ MORE
-
23. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE
-
24. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
25. Fault Tolerant Stabilizability in Multihop Control Networks
University essay from Uppsala universitet/Avdelningen för systemteknikAbstract : The integration of control systems with wireless communication networks has gainedsignificant popularity, leading to the emergence of wireless networked control systems(WNCS). WNCS comprises wireless devices such as sensors, actuators, andcontrollers that work together to ensure system stabilizability. READ MORE