Sökning: "it och dator i skolan"

Visar resultat 1 - 5 av 144 uppsatser innehållade orden it och dator i skolan.

  1. 1. aiLangu - Real-time Transcription and Translation to Reduce Language Barriers : An Engineering Project to Develop an Application for Enhancing Human Verbal Communication

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Vincent Ringström1; Iley Alvarez Funcke; [2023]
    Nyckelord :Sound transcription; Sound translation; AI; Deep learning; Real-time; Language barrier; Concurrency; Ljud transkription; Ljud översättning; AI; Djupinlärning; Real-tid; Språkbarriär; Samtidighet;

    Sammanfattning : The research area this report relates to is real-time automatic transcription and translation. The purpose of the work done for the report is to reduce the perceived language barriers online and to make a user-friendly application to make use of the latest deep learning technology to transcribe and translate in real-time. LÄS MER

  2. 2. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Glenn Olsson; [2023]
    Nyckelord :Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Sammanfattning : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. LÄS MER

  3. 3. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sinan Sakaoglu; [2023]
    Nyckelord :Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Sammanfattning : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. LÄS MER

  4. 4. Optimizing Consensus Protocols with Machine Learning Models : A cache-based approach

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Kun Wu; [2023]
    Nyckelord :Distributed Systems; Consensus Algorithms; Machine Learning; Caching; Distribuerade system; Konsensusalgoritmer; Maskininlärning; Cachning;

    Sammanfattning : Distributed systems offer a reliable and scalable solution for tackling massive and complex tasks that cannot be handled by a single computer. However, standard consensus protocols used in such systems often replicate data without considering the workload, leading to unnecessary retransmissions. LÄS MER

  5. 5. Edge Compute Offloading Strategies using Heuristic and Reinforcement Learning Techniques.

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chrysoula Dikonimaki; [2023]
    Nyckelord :Computation offloading; Edge Computing; Heuristics; Multi-armed bandit; Beräkningsavlastning; Heuristics; Kantberäkning; Flerarmad bandit-algoritm;

    Sammanfattning : The emergence of 5G alongside the distributed computing paradigm called Edge computing has prompted a tremendous change in the industry through the opportunity for reducing network latency and energy consumption and providing scalability. Edge computing extends the capabilities of users’ resource-constrained devices by placing data centers at the edge of the network. LÄS MER