Essays about: "gateways"
Showing result 1 - 5 of 66 essays containing the word gateways.
-
1. Integration of Service-Oriented Embedded Systems with External Systems in Software Product Lines
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Developing software for complicated systems is often done by collaboration and consists of deliverables by a multitude of organisations. The deliverables can range from smaller devices and commercial-off-the-shelf software components, to larger systems. READ MORE
-
2. Federated Machine Learning for Resource Allocation in Multi-domain Fog Ecosystems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The proliferation of the Internet of Things (IoT) has increasingly demanded intimacy between cloud services and end-users. This has incentivised extending cloud resources to the edge in what is deemed fog computing. The latter is manifesting as an ecosystem of connected clouds, geo-dispersed and of diverse capacities. READ MORE
-
3. Roadblocks and gateways in the human domain : A cognitive interoperability framework for allies and partners
University essay from FörsvarshögskolanAbstract : This thesis contributes to our understanding of cognitive interoperability by explor-ing barriers, facilitators, and contextual factors to create a framework. With the ad-vent of the cognitive domain in warfighting, the adversary pursuit of military strate-gic advantage through cognitive science demands that we seize the initiative and seek cognitive superiority with allies and partners. READ MORE
-
4. Edge Computing Security for IoT : A Systematic Literature Review
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE
-
5. Kubernetes Automatic Geographical Failover Techniques
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. READ MORE