Essays about: "legacy system characteristics"
Showing result 1 - 5 of 8 essays containing the words legacy system characteristics.
-
1. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
2. Development of AI/ML Methods for Advanced Device Localization in Beyond 5G Systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This master thesis aims to investigate the positioning accuracy improvements of device localization by the implementation of AI/ML functionalities. In this project, we use the fifth-generation(5G) New Radio (NR) system and focus on indoor factories. READ MORE
-
3. Increasing process reconfigurability and quality in HMLV assembly lines using Industry 4.0 : A case study in the automotive industry
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The automotive industry is responsible for substantial emissions and is therefore transitioning to the new market of electromobility. With changing market conditions and uncertain demand, frequent product launches and customization are increasingly common. READ MORE
-
4. Functional Programming and Legacy Software Using PureScript to Extend a Legacy JavaScript System
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Legacy systems are everywhere. Immense resources are placed on fixing problems caused by them, and on legacy system maintenance and reverse engineering. After decades of research, a solution has yet to be found. READ MORE
-
5. Defining and Identifying Legacy Code in Software, A case study developing 3D visual camera surveillance software
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : Legacykod är något som är svårt för utvecklare att förhindra. Medan det finns mycket forskning kring att motarbeta legacykod och förnya legacysystem som använder utdaterade teknologier och designer, så har inte mycket fokus lagts på hur legacykod kan identifieras i sitt tidigaste skede. READ MORE