Essays about: "information and technology security"
Showing result 16 - 20 of 723 essays containing the words information and technology security.
-
16. Runtime of WebAssembly : A study into WebAssembly runtime
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : WebAssembly is Assembly-like code that is created by compiling other languages into Wasm. The Wasm file can then be run on the web at near native speed. The objective of this study is to find how WebAssemblys runtime compares to JavaScript and native. The study will also see if different browsers impact WebAssembly runtime. READ MORE
-
17. Health Data Exchange during Transfer of Multi-morbid Elderly
University essay from KTH/Medicinteknik och hälsosystemAbstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE
-
18. Beneath the Surface: Exploring the Dark Web and its Societal Impacts
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Dark Web is a hidden part of the Internet that has gained attention due to its illegal activities and potential impact on society. This thesis aims to explore the structure of the Dark Web and its actors. Moreover, this thesis covers the effects the Dark Web has had onindividuals and society. READ MORE
-
19. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE
-
20. PTZ Handover: Tracking an object across multiple surveillance cameras
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Tracking objects in a scene is a crucial task in accomplishing surveillance that enhances security and provides valuable information about the events happening at the site. For this task, the PTZ (pan-tilt-zoom) cameras can be utilized to achieve fluid tracking as they provide all-around surveillance with zoom capabilities. READ MORE