Essays about: "kod"

Showing result 1 - 5 of 356 essays containing the word kod.

  1. 1. FPGA Based Control of Multiple Electric Machines for Marine Propulsion Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Simon Weideskog; [2024]
    Keywords : FPGA; Field Oriented Control; BLDC; SVPWM; SMO; Electric Drives; Electric Machines; Sliding Mode Observer; Marine Propulsion; Multiple Machines; Boat Motor; Fältorienterad styrning; marin framdrivning; elektriska drivsystem; elmaskiner; flertal maskiner; båtmotor;

    Abstract : This master thesis addresses the control of electric propulsion motors in a marine context. The focus lies mainly on the implementation of field oriented control (FOC) in a field programmable gate array (FPGA). The hypothesis is that FPGAs provide performance advantages over microcontroller-based control solutions by enabling parallel processing. READ MORE

  2. 2. Implementations and evaluation of machine learning algorithms on a microcontroller unit for myoelectric prosthesis control

    University essay from Lunds universitet/Avdelningen för Biomedicinsk teknik

    Author : Jonathan Benitez; [2023]
    Keywords : microcontroller; deep learning; artificial neural network; electromyography; myoelectric prosthesis; Technology and Engineering;

    Abstract : Using a microcontroller unit to implement different machine learning algorithms for myoelectric prosthesis control is currently feasible. Still there are hardware and timing constraints that need to be accounted for. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. UCov : A Static Analysis Tool for API Usage Coverage Validation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Thomas Couturou; [2023]
    Keywords : Compatibility coverage; Static analysis; API; Usage pattern; Breaking changes; Kompatibilitetstäckning; Statisk analys; API; Användningsmönster; Förändringar;

    Abstract : Nowadays, all software projects are based on a large number of libraries, so they do not have to start from scratch. These libraries evolve over time, whether to add functionality or to simplify their use. These updates are necessary to improve their libraries, but can lead to errors in their clients’ code. READ MORE

  5. 5. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE