Essays about: "software Security"

Showing result 6 - 10 of 577 essays containing the words software Security.

  1. 6. Natural Language Processing on the Balance of theSwedish Software Industry and Higher VocationalEducation

    University essay from Mittuniversitetet/Institutionen för kommunikation, kvalitetsteknik och informationssystem (2023-)

    Author : Emil Bäckstrand; Rasmus Djupedal; [2023]
    Keywords : Swedish Software Industry; Higher Vocational Education; Software Engineering; Latent Dirichlet Allocation; Document Frequency Analysis;

    Abstract : The Swedish software industry is fast-growing and in needof competent personnel, the education system is on the frontline of producing qualified graduates to meet the job marketdemand. Reports and studies show there exists a gapbetween industry needs and what is taught in highereducation, and that there is an undefined skills shortageleading to recruitment failures. READ MORE

  2. 7. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Javier Ferre Martin; [2023]
    Keywords : Space Situational Awareness; Deep Learning; Convolutional Neural Networks; FieldProgrammable Gate Arrays; System-On-Chip; Computer Vision; Dynamic Partial Reconfiguration; High-Level Synthesis; Rymdsituationstänksamhet; Djupinlärning; Konvolutionsnätverk; Omkonfigurerbara Field-Programmable Gate Arrays FPGAs ; System-On-Chip SoC ; Datorseende; Dynamisk partiell omkonfigurering; Högnivåsyntes.;

    Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE

  3. 8. Streamlining UAV Communication : Investigating and implementing an accessible communication interface between a ground control station and a companion computer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Johan Gustafsson; Daniel Mogensen; [2023]
    Keywords : UAV; communication protocol; design science; UAV security; software architecture; programming; Mavlink; UAV protocols;

    Abstract : In the future, the usage of UAVs (Unmanned Aerial Vehicles) will be applied in many different areas. Continued research in UAVs can benefit through its applications in disaster response, humanitarian aid, environmental monitoring, infrastructure inspection, improved transportation and delivery systems, and scientific research. READ MORE

  4. 9. Quantum Espionage

    University essay from KTH/Tillämpad fysik

    Author : Carlo Ninic Svensson; [2023]
    Keywords : Quantum Nano Photonics; SNSPD; OTDR; Nano Kvantfotonik; SNSPD; OTDR;

    Abstract : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. READ MORE

  5. 10. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE