Hae
Aineistot 11-20 / 263
Manufacture and Analysis of N-type Semiconductor Layer and Perovskite Layer in Hybrid Perovskite Solar Cell
(2019-09-27)
This thesis work describes the experiments about building the first two layers of MethylAmmonium Lead Iodide perovskite solar cell and the conclusions made upon it. Different methods were used to get the optimized results. ...
Effectiveness of protected areas in the deforestation fronts of Acre, Brazil
(Turun yliopisto, 2018-11-02)
Deforestation in Amazonia is a high priority issue as it is intimately connected to global environmental problems, such as biodiversity loss and climate change. Contemporary threat from deforestation is concentrated on ...
An Intelligent Circular Economy Upstream Monitoring & Optimization System Based on Industrial Internet of Things
(2019-11-24)
Industrial Internet of Things (IIoT) has many beneficial applications upon the industry of
Oil and Gas (O&G) and renewable energy production. Renewable energy production is
already growing faster than traditional fossil ...
On the Effects of Forced Trust on Implementations of Small Smart Cities
(2020-03-14)
As an increasing number of cities pursue the idea of becoming smart cities, the variety in different approaches to reach this goal also grows. They cover the use of a spectrum of implementations for, inter alia, information ...
Virtual environments for penetration testing of IoT devices
(2020-03-11)
The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University ...
A SystemC Simulator for Secure Data Transfer in Healthcare Internet of Things
(2019-06-20)
In this thesis, a simulator for secure data transfer between medical sensors and end-users is developed using smart e-health gateways in medical environments like hospitals, healthcare centers and old-age homes. The rate ...
LEVERAGING USERS TO BREAK CYBER KILL CHAIN
(2019-12-20)
Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders ...
Data Integrity and Privacy in an Electronic Case Report Form
(2018-12-02)
Health records are used to map the overall health of a patient and most information related
to their current status such as existing diseases and medication are usually entered into
these records. These records are ...
Developing Best Practices for Securing VoIP Communication for a non-profit Organization
(2018-12-13)
Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding ...
Ohjelmistorobotiikan testauksen hyödylliset menetelmät
(2019-11-06)
Ohjelmistorobotiikka on muutaman vuoden aikana kehittynyt huomattavasti ja se on otettu osaksi monen yrityksen toimintaa. Ohjelmistorobotiikalla tarkoitetaan ohjelmaa, joka käyttää toista ohjelmaa sen käyttöliittymän ...