Essays about: "network storage"

Showing result 11 - 15 of 282 essays containing the words network storage.

  1. 11. Distributed Artificial Intelligence Based on Edge Computing

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Rebecca Fagerström; Simon Neüman; [2023]
    Keywords : Internet of Things; IoT; Edge Computing; Distributed Intelligence; Artificial Intelligence; AI;

    Abstract : The future Internet is expected to be driven by the prevalence of the Internet of Things (IoT), where it is envisioned that anything can be connected. In the last decade, there has been a paradigm shift in IoT from centralized cloud computing to so-called edge computing in order to compute tasks closer to the source of data generation. READ MORE

  2. 12. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Juan Basaez Serey; [2023]
    Keywords : DRIP; Drone Remote ID; Hyperledger-Fabric; IPFS;

    Abstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE

  3. 13. Comparative Analysis of the Performance of ARCore and WebXR APIs for AR Applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Abu Bakr Rahman Shaik; Venkata Sai Yakkshit Reddy Asodi; [2023]
    Keywords : ARCore; Augmented Reality; Object Visualisation; WebXR;

    Abstract : Background: Augmented Reality has become a popular technology in recent years. Two of the most prominent AR APIs are ARCore, developed by Google, and We- bXR, an open standard for AR and Virtual Reality (VR) experiences on the web. READ MORE

  4. 14. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 15. High-Performing Cloud Native SW Using Key-Value Storage or Database for Externalized States

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Ahmed Sikh; Joel Axén; [2023]
    Keywords : cloud-native; externalized states; latency; simulator; Redis; PostgreSQL; moln-nativ; externaliserade tillstånd; latens; simulator; Redis; PostgreSQL;

    Abstract : To meet the demands of 5G and what comes after, telecommunications companies will need to replace their old embedded systems with new technology. One such solution could be to develop cloud-native applications that offer many benefits but are less reliable than embedded systems. READ MORE