Essays about: "system engineering thesis open source"
Showing result 1 - 5 of 57 essays containing the words system engineering thesis open source.
-
1. Compression Selection for Columnar Data using Machine-Learning and Feature Engineering
University essay from Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)Abstract : There is a continuously growing demand for improved solutions that provide both efficient storage and efficient retrieval of big data for analytical purposes. This thesis researches the use of machine-learning together with feature engineering to recommend the most cost-effective compression algorithm and encoding combination for columns in a columnar database management system (DBMS). READ MORE
-
2. Simulations and modeling of light propagation in biological tissue
University essay from Lunds universitet/Förbränningsfysik; Lunds universitet/Fysiska institutionen; Lunds universitet/Lunds Tekniska HögskolaAbstract : The GASMAS technique has previously proven useful for examining and measuring the oxygen concentration in the lungs of preterm infants. GASMAS can distinguish absorption by one gas from the bulk absorption of the surrounding media, and can provide an instant, non-invasive and non-destructive way of examining lungs, and diagnosing dangerous conditions such as pneumothorax. READ MORE
-
3. Optimizing the generation of Java JMH Benchmarks
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The evolution of the software system during its development is a complex process, which is both very important and difficult to track. One of the methods that offers such functionality is microbenchmarking, which is a type of regression testing. READ MORE
-
4. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
5. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE