Essays about: "network configuration"

Showing result 11 - 15 of 293 essays containing the words network configuration.

  1. 11. Development and Implementation Strategies Towards a Comprehensive YANG Model-Based Configuration Data Generation Tool

    University essay from KTH/Hälsoinformatik och logistik

    Author : Alma Garpenfeldt; Linus Silfver Shahparastan; [2023]
    Keywords : YANG modeling language; Configuration management; Network management; Template-based configuration; NETCONF protocol; YANG-modelleringsspråk; Konfigurationshantering; Nätverkshantering; Mall-baserad konfiguration; NETCONF-protokoll;

    Abstract : Effective management and operation of modern networks heavily rely on efficient network configuration management and infrastructure. Manual configuration management has been proven inefficient, and there is a need to automatize it. READ MORE

  2. 12. Comparing energy efficiency of Leaky integrate-and-fire and Spike response neuron models in Spiking Neural Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Majd Dawli; Imran Bahed Diva; [2023]
    Keywords : ;

    Abstract : Spiking Neural Networks (SNNs) are a type of neural network that is designed to mimic the way neurons function in our brains. While there have been notable advancements in developing SNNs, energy consumption hasn't been studied to the same extent. This gets especially relevant with steadily increasing network sizes. READ MORE

  3. 13. Developing an Automated Drivability Index for Swedish Roadways

    University essay from KTH/Transportplanering

    Author : ANDREI DAVID RADU; [2023]
    Keywords : ;

    Abstract : The masters thesis aims to determine a method to understand which road segments could pose safety risks or where Level 4 autonomous vehicles would operate poorly in the Swedish road context. This vehicle’s ability to operate adequately can be defined as ‘drivable’. READ MORE

  4. 14. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 15. Machine Learning Clustering andClassification of Network DeploymentScenarios in a Telecom Networksetting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Chayan Shrang Raj; [2023]
    Keywords : Telecommunications; Statistics; Machine Learning; Masters; PySpark; Python; Data Visualization; LTE; eNodeB; Data analysis; Data Science; AI; Jupyter; HDFS;

    Abstract : Cellular network deployment scenarios refer to how cellular networks are implementedand deployed by network operators to provide wireless connectivity to end users.These scenarios can vary based on capacity requirements, type of geographical area, populationdensity, and specific use cases. READ MORE