Essays about: "project on information technology security"
Showing result 1 - 5 of 110 essays containing the words project on information technology security.
-
1. Health Data Exchange during Transfer of Multi-morbid Elderly
University essay from KTH/Medicinteknik och hälsosystemAbstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE
-
2. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE
-
3. PTZ Handover: Tracking an object across multiple surveillance cameras
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Tracking objects in a scene is a crucial task in accomplishing surveillance that enhances security and provides valuable information about the events happening at the site. For this task, the PTZ (pan-tilt-zoom) cameras can be utilized to achieve fluid tracking as they provide all-around surveillance with zoom capabilities. READ MORE
-
4. Confidential Federated Learning with Homomorphic Encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE
-
5. Detection of suicidal ideation in written communication
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Suicide remains a global cause of mortality, presenting challenges in detection and prevention despite known warning signs. This work aimed to improve personal security management by leveraging machine learning advancements to identify suicidal ideation in written communications. READ MORE