Essays about: "software database development"
Showing result 1 - 5 of 131 essays containing the words software database development.
-
1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE
-
2. A User-Centric Monitoring System to Enhance the Development of Web-Based Products
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Many websites and products rely heavily on consumers’ usage habits to maximize profit. Therefore, this project aims to aid product development by analyzing server traffic logs. The proposed solution is a monitoring system focusing on user analytics. READ MORE
-
3. Implementering av Skogliga Grunddata i hprGallring vid andragallring
University essay from SLU/School for Forest ManagementAbstract : Gallring är en av de skogsvårdsåtgärder som utförs i våra skogar för att bemöta de olika skogliga mål som skogsägarna har för sin skog. I Sveriges skogar så utförs gallringsåtgärder på ca 400 000 hektar årligen. READ MORE
-
4. System support for maintenance of production equipment and advanced test environment : Proposal for Saab’s Maintenance Operation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today’s industry, where manufacturing is fast and efficient, uptime for manufacturing machines plays a key role for companies to stay relevant with their competitors. Although manufacturing equipment today is very advanced and sometimes automated, they may still run into problems and wear out. READ MORE
-
5. Amplifying heap overflow vulnerability detection with reinforcement learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE