Essays about: "core of Information System"
Showing result 1 - 5 of 180 essays containing the words core of Information System.
-
1. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE
-
2. Digitally Controlled Oscillator Topologies for mm-Wave Pulsed Coherent Radar
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The advancement of future generations of wireless communication and radar sensing warrants the need for mm-wave digitally controlled oscillators (DCOs) with high-frequency trade-offs in consideration. The purpose of this project is to investigate DCO topologies inspired from scientific literature. READ MORE
-
3. Deep Neural Networks as SurrogateModels for Fuel Performance Codes
University essay from Uppsala universitet/Tillämpad kärnfysikAbstract : The core component of a nuclear power plant is the reactor and the fuel rods that supply it with fission fuel. Efficient and safe energy extraction is thus highly dependent on the reactor design and the conditions of the fuel rods. To anticipate high-quality operation and potential risks in advance, one must perform simulations on the fuel rods. READ MORE
-
4. Flight dynamics multi-mission software development for optical link planning and execution
University essay from KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanikAbstract : The Generic Planning Tool (GPT) is a new software package being developed by the Flight Dynamics team at DLR. In an era where laser communications are becoming more and more relevant to data transmission for space missions, the GPT’s purpose is to compute highly accurate visibility windows and provide a wide variety of support information for both satellite-to-ground and inter-satellite links. READ MORE
-
5. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE