Essays about: "thesis on computer monitoring system"

Showing result 1 - 5 of 43 essays containing the words thesis on computer monitoring system.

  1. 1. Near-Real Time Forest Fire Monitoring System From an UAV

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : August Näsman; Daniel Nedlich; [2023]
    Keywords : ;

    Abstract : The purpose of this thesis is to implement a payload system on a drone to help fire towers in near-realtime survey forests for wildfires. The payload system should be able to communicate with a groundstation through a mobile network and the survey should be tagged with relevant metadata. READ MORE

  2. 2. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  3. 3. Process monitoring of turbine blades : Monitoring of blade tip clearance using eddy current sensors

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Hampus Andersson; [2022]
    Keywords : Blade tip clearance; Blade tip timing; Eddy current sensor; Turbine monitoring; Maintenance.; Bladtoppspel; Bladvibrationer; Eddy current sensorer; Turbinövervakning; Underhåll.;

    Abstract : This thesis has been a collaboration between the Royal Institute of Technology (KTH) and Siemens Energy which invest in the research facility at KTH. The objective was to investigate the use of eddy current sensors in real-time monitoring of turbine blades. READ MORE

  4. 4. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE

  5. 5. Calculating Minimum Detectable Activity for a moving scintillator detector using real-time speed measurement : Implementing a monitoring system to improve accuracy of surface contamination measurement systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Artur Amcoff; Oscar Persson; [2021]
    Keywords : Minimum Detectable Activity MDA ; Surface contamination; ISO 11929; Alpha α radiation; Beta β radiation; Detection limit; Counting efficiency; Minsta detekterbara aktivitet; Ytkontaminering; ISO 11929; Alfa α strålning; Beta β strålning; Detektionsgräns; Radioaktiv mäteffektivitet;

    Abstract : Surface contamination occurs in nuclear facilities, something that is important to detect easily and efficiently. Using today’s methods to detect nuclear surface contamination may cause certain inconsistencies as the human operator is solely trusted to keep the detector at the correct distance and move it at the correct speed. READ MORE