Essays about: "it artifacts"

Showing result 11 - 15 of 253 essays containing the words it artifacts.

  1. 11. Augmented Reality for Immersive Video Conference Presentations : Enhancing Video Presentation Experiences with Visual Aid Through Augmented Reality

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Rosenberg; [2023]
    Keywords : Extended Reality; Augmented Reality; Video Conferencing; Computer Vision; Natural Interaction; Natural User Interfaces; Förstärkt verklighet; videokonferenser; datorseende; naturlig interaktion; naturliga gränssnitt;

    Abstract : As 3D models are increasingly used in a variety of contexts, both for entertainment in games and movies, as well as professional visualization and CAD models, there is an increased demand for collaborative tools which can be used to show these virtual artifacts efficiently. Interaction with digital 3D artifacts has long since been enabled through the use of specialized software, like CAD modeling applications and 3D rendering software; which often are extensive and require time to master and use efficiently. READ MORE

  2. 12. An Ontology and Guidelines for Cybersecurity Risk Assessment in the Automotive Domain

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Karim Khalil; [2023]
    Keywords : ISO SAE 21434; Threat Analysis and Risk Assessment; Ontology; Cybersecurity Concept;

    Abstract : This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assessment activities in the automotive domain. The focus of the paper is to model how the standard views the tasks of Threat Analysis and Risk Assessment (TARA) and cybersecurity concept. READ MORE

  3. 13. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  4. 14. Boundaries in a Software Service Organization : Identification and Explanation of Boundaries During Product Development in a Large Enterprise Context

    University essay from Jönköping University/Tekniska Högskolan

    Author : Albin Sandberg; [2023]
    Keywords : Boundaries; Boundary Objects; Knowledge Integration; Product Development; Software Services;

    Abstract : Introduction: The development of complex products requires specialized departments to handle the demands and to be competitive in the market. To handle the knowledge integration between the specialized departments, the boundaries need to be identified. READ MORE

  5. 15. Stop. Record From Taxi Park to Film Park

    University essay from KTH/Arkitektur

    Author : Gabriele Lipskyte; [2023]
    Keywords : Adaptive reuse; totalitarian regime; cultural heritage;

    Abstract : This project explores strategies to effectively address the challenges surrounding the ‘dissonant’ heritage of totalitarian regimes. The difficulties associated with this heritage rises from multiple factors, such as the characteristics of materials and objects involved, historical and cultural contexts, political influences, ethical considerations, religious aspects, and personal beliefs of individuals involved. READ MORE