Essays about: "project complexity"

Showing result 36 - 40 of 755 essays containing the words project complexity.

  1. 36. Design and implementation of an energy harvesting system in a prosthetic limb

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ódinn K. Rúnarsson; [2023]
    Keywords : Energy harvesting; Prosthetic limbs; Supercapacitors; Printed circuit boards; 3D printing; Energiinsamling; Lemmproteser; Superkondensatorer; Tryckta kretskort; 3D Utskrivning; Orkuöflun; Gervilimir; Ofurþéttar; Prentaðar rafrásir; Þrívíddarprentun;

    Abstract : Energy Harvesting, also known as power harvesting or ambient power, is the process of obtaining small amounts of power from secondary sources, such as vibrations, light, temperature variations and even radio-frequency emissions. These systems have been uncommon in personal and wearable electronics in the past, however they are slowly gaining traction. READ MORE

  2. 37. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  3. 38. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Burak Ünver; [2023]
    Keywords : Microservices; Security; Kubernetes; Security Scanning Tools;

    Abstract : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. READ MORE

  4. 39. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  5. 40. Increased system sensitivity using fluorescent based immunoassays on the Gyrolab® platform

    University essay from Uppsala universitet/Institutionen för farmaci

    Author : Gabriel Lisra; [2023]
    Keywords : Gyrolab; fluorescence; sensitivity; immunoassays;

    Abstract : Immunoassays have become an essential tool in several fields of bioanalytics with tremendous advances in sensitivity and formats seen through the last three decades. Many diseases are today diagnosed solely based on biomarker concentrations evaluated through immunoassays. READ MORE