Essays about: "memory control"
Showing result 11 - 15 of 240 essays containing the words memory control.
-
11. Total Monte Carlo of the fission model in GEF and its influence on the nuclear evaporation in TALYS
University essay from Uppsala universitet/Tillämpad kärnfysikAbstract : Features recently added to the nuclear reaction software TALYS allow the use of the GEF model as a fission fragment generator. GEF generates data for fission fragment yields, total excitation energy (TXE), total kinetic energy (TKE) and individual fragment excitation energies (E*) with their standard deviations through Monte Carlo simulations for TALYS. READ MORE
-
12. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
13. A comparative analysis of log management solutions: ELK stack versus PLG stack
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Managing and analyzing large volumes of logs can be challenging, and a log management solution can effectively address this issue. However, selecting the right log management solution can be a daunting task, considering various factors such as desired features and the solution's efficiency in terms of storage and resource usage. READ MORE
-
14. Body patterning and cognition in cephalopods - a literature review
University essay from SLU/Dept. of Animal Environment and HealthAbstract : Cephalopods are a valuable model for studying the evolution of cognition due to their distinctive brain structure, organisation, and connectivity patterns compared to vertebrates. The development of large brains and behavioural complexities are believed to be triggered by evolutionary pressures stemming from factors like heightened predation, more demanding foraging conditions, and intense mating competition. READ MORE
-
15. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE