Essays about: "system verification"

Showing result 1 - 5 of 529 essays containing the words system verification.

  1. 1. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification

    University essay from Mälardalens universitet/Inbyggda system

    Author : Selam Fitsum Andemariam; [2024]
    Keywords : ;

    Abstract : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. READ MORE

  2. 2. Inductive fast charging of IoT devices : An in-depth analysis of short-range wireless charging technologies based on induction

    University essay from Umeå universitet/Institutionen för fysik

    Author : Franz Wikner; [2024]
    Keywords : Electromagnetic power transfer; Inductive power transfer; Short distance WPT;

    Abstract : In the era of Internet of things (IoT), sensor-equipped devices exchange data over networks. In battery powered IoT devices, the lifespan of the devices is often much longer than the battery life, leading to multiple costly and environmentally hazardous battery replacements during the operational life of the devices. READ MORE

  3. 3. Detection and Analysis of Anomalies in Tactical Sensor Systems through Structured Hypothesis Testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Ohlson; [2023]
    Keywords : Tactical sensor systems; Sensor fusion; Model based diagnostics; Hypothesis testing; Taktiska sensor system; Sensor fusion; Modellbaserad diagnostisering; Hypotesprövning;

    Abstract : The project explores the domain of tactical sensor systems, focusing on SAAB Gripen’s sensor technologies such as radar, RWR (Radar Warning Receiver), and IRST (InfraRed Search and Track). The study employs structured hypothesis testing and model based diagnostics to examine the effectiveness of identifying and isolating deviations within these systems. READ MORE

  4. 4. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  5. 5. Parabolic equation models simulating LoS MIMO conditions

    University essay from Karlstads universitet/Institutionen för ingenjörsvetenskap och fysik (from 2013)

    Author : Zarafshan Carneil; [2023]
    Keywords : MIMO; channel capacity; phase difference; MIMO phase;

    Abstract : This thesis explores and develops a simulation model for Line of Sight(LoS) Multiple-Input Multiple-Output (MIMO) systems in complex environments. The focus will be on implementing a 2 × 2-MIMO system in order to study phase differences of the received signals. READ MORE