Advanced search

Showing result 1 - 5 of 65 essays matching the above criteria.

  1. 1. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weiran Wang; [2023]
    Keywords : Network Calculus; Flow Prolongation; Graph Neural Network; Fast Gradient Sign Method; Delay Bound; Nätverkskalkyl; Flödesförlängning; Graph Neural Network; Fast Gradient Sign Method; Fördröjningsgräns;

    Abstract : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. READ MORE

  2. 2. Extending the Kubernetes operator Kubegres to handle database restoration from dump files

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Rickard Bemm; [2023]
    Keywords : Kubernetes; Kubernetes Operator; Cloud Computing; Cloud-Native Architectures; PostgreSQL;

    Abstract : The use of cloud-native technologies has grown in popularity in recent years. With its ability to take advantage of the full benefits of cloud computing, cloud-native architecture has become a hot topic among developers and IT professionals. READ MORE

  3. 3. The Impact of Free and Open Source Software(FOSS) on Developers’ Productivity

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Maimuna Badjie; [2022]
    Keywords : Free and Open Source Software;

    Abstract : Despite the abundance of literature on free and open source software (FOSS), its impact on individual developers’ productivity is a topic that is under explored. Moreover, the traditional measures of developers’ productivity are based on objective measures (lines of code) instead of subjective measures (self-rated productivity). READ MORE

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 5. Automatic Point Cloud Modelling for BIM in AEC Sector

    University essay from KTH/Geodesi och satellitpositionering

    Author : Mohamed Salih Abaker Ishag; [2022]
    Keywords : Point cloud; Laser scanning; BIM; Automatic modeling; Clash analysis; Punktmoln; Laserskanning; BIM; Automatisk modellering; Krockanalys;

    Abstract : In this research, automatic point cloud modeling strategies have been tested to find the best strategies to model walls, floors and ceilings classes in terms of processing time and accuracy. The modeling was applied on a point cloud data related to the Architecture, Engineering, and Construction field which is a point cloud of a building collected by Sweco company in Sweden. READ MORE