• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 815
  • 226
  • 1
  • Tagged with
  • 1042
  • 1026
  • 1024
  • 150
  • 124
  • 104
  • 101
  • 90
  • 88
  • 80
  • 79
  • 62
  • 60
  • 59
  • 56
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Styrning av vakuumpumpsystem i analyslaboratorie

Backman, John January 2023 (has links)
Denna rapport presenterar ett projekt som syftar till att skapa en applikation med tillhörande hårdvara för att styra en vakuumpump i ett analyslaboratorie som ligger i anslutning till Bolidenägda Aitikgruvan i Gällivare. Vakuumpumpen används för att generera sugkraft till dragskåp, slangar och robotutrustning där giftiga ångor sugs bort när analyseringen av gråberg inträffar. Innan implementeringen av applikationen var pumphaverier ett faktum på grund av för lång tomgångskörning och Boliden beslutade därför att starta pump efter behov istället. Först skrevs en funktionsbeskrivning som vidare applicerades programmeringsmässigt i styrsystemet 800xA tillsammans med nödvändig hårdvara som exempelvis PAC, FRO och I/O-enheter. När applikationen innehöll samtliga funktioner testades den med en simulationscontroller som även kopplade samman applikation och konstruerad processbild. Efter felfri testkörning implementerades den essentiella hårdvaran för att genomföra ett slutgiltigt test på site med alla komponenter inkopplade. Detta test var framgångsrikt och en applikation enligt funktionsbeskrivning hade således konstruerats. Slutsatsen av arbetet är att det går att bygga en applikation för att styra en vakuumpump enligt kravspecifikationen med de applikationskomponenter som använts.
102

Amplifying heap overflow vulnerability detection with reinforcement learning

Thomasson, Erik, Wideskär, Ludwig January 2023 (has links)
The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. Most methods need to be specific to have goodperformance. The tool we use in our paper specializes in detecting vulnerabilities inexecutable programs, specifically heap buffer overflow vulnerabilities.In this master thesis, we focus on the problem of detecting heap buffer overflowvulnerabilities in executable programs. We conducted two experiments to answertwo research questions related to this problem. The first research question aims toevaluate the performance of a unit-based symbolic execution method for detectingsuch vulnerabilities in terms of accuracy and execution time. The second researchquestion investigates whether the performance of the method from the first questioncan be improved through the use of the machine learning method Q-learning.In the first experiment, we used the 90 included test programs to evaluate theoriginal version of the tool. For our second experiment, we used 100 other testprograms that we selected from the NIST database, together with the original versionof the tool and our modified version with integrated Q-learning functionality. Thefindings from our experiments show that unit-based symbolic execution tools arecomplex, and the accuracy of these tools can be improved through the use of machinelearning algorithms. However, the use of these algorithms comes at the cost ofexecution time.Overall, this thesis contributes to the field of software security by providing in-sights into the performance and potential improvements of symbolic execution meth-ods for detecting heap buffer overflow vulnerabilities. Our findings suggest that theuse of machine learning algorithms can enhance the accuracy of unit-based symbolicexecution tools, which can be useful for detecting security vulnerabilities in software.
103

A Decision Support System for Evaluating Kernel And Operating System Security in Embedded Systems

Olsson, Jonathan January 2023 (has links)
No description available.
104

P-cores and E-cores in virtual machines

Andersson, Philip January 2023 (has links)
In 2021, Intel released a new generation of consumer processors that had two different types of cores; they called them the efficiency-cores and the performance-cores, or for short, the E-cores and the P-cores. The release of these processors sparked interest in the potential impact if they were introduced into the enterprise market. Therefore tests were made on the I5-13600k on its power consumption and how it performs in virtual machines. Since the architecture is so new, there have not been any tests on the power usage in different configurations, which is a hot topic with today's power prices. The first question to be answered was: "How can one get the new architecture to function in virtual machines without mixing the various types of cores?" To solve that, the command “virsh edit” was used and then the name of the virtual machine to choose which threads to use for the virtual machine. The second question was: “how different is the power consumption between different configurations?” And to answer that, a power meter was used to measure the power consumption, which resulted in the Linux virtual machines drawing less power than the Windows 10 virtual machines. The third question was: “what is the performance of the processor in virtual machines?” To answer that, a benchmarking tool called Geekbench was used, which showed that the P-core only machine performed best as expected. The fourth and last question was: "What is the use case for having different types of cores?" From the tests, these processors shouldn’t be produced for the enterprise market, but small companies and enthusiasts can use them for servers when they need more cores
105

Procedures of investigation around online child sexual abuse : Comparison between Belgian and Swedish Police

de Wilde d'Estmael, Marine January 2023 (has links)
The primary aim of this master's thesis is to explore the differences between the methods usedby the Belgian and Swedish Police in their investigations of online child sexual abuse in orderto answer my research question “What could those specialised teams improve?” The first partof this work is theoretical and provides information on the structure of the Belgian and SwedishPolice. This will be followed by a brief discussion of the role of Europol and Interpol in thefight against child sexual abuse, as well as a short chapter on cryptography to understand howinternational communications are conducted.The second part is about the practical part of this work. To collect the necessary information,the Belgian Police opened their doors, specifically to the Child Abuse section, for three days.They introduced their teams, equipment, current and closed investigations, and answered a pre-prepared list of questions.It was not possible to meet with the Swedish Police in person. Therefore, it was decided togather the necessary information through interviews. The questions were based on the timespent with the Belgian team.Once the information was gathered, it was compared, and a score was assigned to each responseprovided by Belgium and Sweden to give an idea of their accuracy and completeness.Subsequently, a list of recommendations was formulated with the aim of proposing areas forimprovement.The statistics presented at the end of this thesis allow for a visualization of the evolution of thenumber of assaults and investigations opened and resolved.
106

Utvärdering av nyckelordsbaserad textkategoriseringsalgoritmer

Karlsson, Vide January 2016 (has links)
Supervised learning algorithms have been used for automatic text categoriza- tion with very good results. But supervised learning requires a large amount of manually labeled training data and this is a serious limitation for many practical applications. Keyword-based text categorization does not require manually la- beled training data and has therefore been presented as an attractive alternative to supervised learning. The aim of this study is to explore if there are other li- mitations for using keyword-based text categorization in industrial applications. This study also tests if a new lexical resource, based on the paradigmatic rela- tions between words, could be used to improve existing keyword-based text ca- tegorization algorithms. An industry motivated use case was created to measure practical applicability. The results showed that none of five examined algorithms was able to meet the requirements in the industrial motivated use case. But it was possible to modify one algorithm proposed by Liebeskind et.al. (2015) to meet the requirements. The new lexical resource produced relevant keywords for text categorization but there was still a large variance in the algorithm’s capaci- ty to correctly categorize different text categories. The categorization capacity was also generally too low to meet the requirements in many practical applica- tions. Further studies are needed to explore how the algorithm’s categorization capacity could be improved.
107

Environmental comparison of LiDAR and Camera in a simulated CARLA environment / Miljö-baserad jämförelse av LiDAR och Kamera i en simulerad CARLA miljö

Sokcic Hedin, Philip January 2022 (has links)
Computer vision for autonomous vehicles is a widely studied and quickly evolving field of research. It can be difficult to know when one technology is performs better or worse, and in which scenario it's worth it to spend the additional resources on LiDAR. This paper defines criteria for comparison between the two technologies, compares the criteria in different environments designed to test each of the technologies' weaknesses and finally evaluates the performances. After evaluating the performances of the defined criteria the paper concludes that despite the smaller price tag of the camera, they can be a very viable choice overall with an above average performance in the selected environments, as well as maintaining some benefits that LiDAR can't handle. However overall, if the budget allows, LiDAR performs generally better in all environments.
108

DESCRIBING FIVE LEVELS OFCOMPETENCE USING A PRE-TRAINEDLANGUAGE MODEL

Lindgren, Victor January 2023 (has links)
No description available.
109

An evaluation of the reliability and usability in Cambio Cosmics journal system

Holmström, Mathilda, Gustafsson, Stina January 2023 (has links)
The main focus of this thesis is to research the usability and reliability of the patient-focused journal system Cosmic that is created by the company Cambio. The system is widely used in Sweden, increasing the pressure on the system to perform well and meet the needs of the healthcare personnel. This thesis identifies potential areas of improvement in the electronic journal system. The study is based on a literature and an empirical study, which is based on a thematic and content analysis of focus group interview results and a User Experience (UX) case study. The study found that participants reported numerous usability flaws, such as extensive clicking, imprecise warnings, and a design that was difficult to understand, making finding vital parameters difficult. It was also discovered that there was a need for more customized and personalized solutions, particularly in the patient overview. Poor response times and frequent forced log out were also mentioned as reliability issues. Through the data collected from the interviews and literature study, a new design of the patient view is made and presented via a survey to the users, in which the users give their ratings on the new design. The result from this survey suggests that features that improve usability, customization, and accessibility are valued by the users, which may seem obvious. However, it is crucial to acknowledge that the current system lacks these essential elements. The thesis underlines the importance of reliability in making sure healthcare workers have immediate and unrestricted access to patient information. These concerns with usability and reliability highlight the need for an updated design that increases the effectiveness and efficiency of healthcare systems. These issues have been identified in previous research and still persist, underlining their severity and the need for action to address them.
110

Optimeringsalgoritm för geografiskt sökuppdrag

Alkamha, Sarmad, Alnuaim, Zaid January 2022 (has links)
Sökproblem förekommer i många olika områden. I denna rapport har vi tacklat problemet med atthitta en person som gått vilse. Vi har utvecklat en sökalgoritm vars uppgift är att hitta personengenom att använda erfarenheter från tidigare sökuppdrag. Sökalgoritmen baserar sig på A*sökalgoritmen och sannolikheter. A* sökalgoritmen använder sig av heuristik som vägledersökningen och heuristiken bygger på erfarenhet. Vi har implementerat ett antal sökalgoritmer, treolika A* och två oinformerade sökalgoritmer för att utvärdera och jämföra deras söktid. Vi haräven utvärderat hur snabbt personen hittas med flera sökare och hur användningen av ledtråd somhittas under sökningen förbättrar sökalgoritmen. Vi använder en simulator som förser oss medvärdena som behövs för A* versionerna, vi kör ett stort antal tester med olika sökningsområdenoch mäter hur lång tid det tar att hitta personen för att skapa ett genomsnittligt resultat för de olikasökalgoritmerna. De två oinformerade sökalgoritmerna som vi implementerade söker på breddenrespektive djupet först. De har använts som benchmarking för att jämföra med de olika A*algoritmerna och analysera resultatet. Alla A* versioner var snabbare med att hitta barnet jämförtmed bredden och djupet först sökningsalgoritmerna. Användningen av fler sökare gjorde att tidensom behövdes för ett vanligt sökuppdrag med de övriga A* sökalgoritmerna reducerades avsevärt.I vårt fall med 3 sökare reducerades tiden till en tredjedel. Användningen av en ledtråd förbättradede två första A* algoritmerna med mer än 5%.

Page generated in 0.4427 seconds