Essays about: "equipment security"

Showing result 1 - 5 of 122 essays containing the words equipment security.

  1. 1. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification

    University essay from Mälardalens universitet/Inbyggda system

    Author : Selam Fitsum Andemariam; [2024]
    Keywords : ;

    Abstract : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. READ MORE

  2. 2. The road to an accurate cost estimation in engineer-to-order manufacturing - A case study of cost estimation accuracy within advanced technology development in a defence and security company

    University essay from Göteborgs universitet/Graduate School

    Author : Lawin Anwar; Sandra Barría Colliander; [2023-07-03]
    Keywords : Engineer-to-order; new product development; cost management; cost engineering; cost estimation error; cost overruns; cost estimation accuracy; project management;

    Abstract : Estimating the costs of a project is a vital part of manufacturing organisations as estimations are what set the basis for the price of the products. Precise estimates allow for effective planning and resource allocation, ensuring that the necessary materials, equipment, and personnel are available to complete the project on time and within budget. READ MORE

  3. 3. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  4. 4. Behind Closed Doors : Analysing the Ethical Dilemma of Swedish Arms Export to Saudi Arabia

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Anna Wikner; [2023]
    Keywords : Swedish arms trade; Saudi Arabia; international ethics; Swedish foreign policy; security policy; military equipment; human rights; democracy;

    Abstract : This study aims to shed light on the ethical implications of Sweden’s arms export to Saudi Arabia. It compares the compatibility of such exports with fundamental human rights standards and analyses the Swedish Government's justification of arms trade to Saudi Arabia in relation to international and local ethics, considering the principles of human rights, conflict resolution, states’ responsibility in promoting peace and conflict resolution and the recognition of people’s shared responsibility for the well-being of all people. READ MORE

  5. 5. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Swaroop Divya Sai Prem Nambala; Dexin Kong; [2023]
    Keywords : Reconfigurable intelligent surface; RIS; optimization; Ray-tracing; Mixed integer linear programming MILP ; Complex impulse response; Wireless Insite.; Technology and Engineering;

    Abstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE