Hae
Aineistot 101-110 / 555
EMG Based Motion Intension Recognition and Force Estimation
(2020-01-07)
Hands are the most dexterous organs of human beings. People communicate with each other with various hand gestures. However, it is difficult for stroke survivors and transradial or forearm amputees to perform gestures in ...
Electromagnetic Imaging Mechanism And Algorithm Research Based on Volume Holographic Grating
(2020-01-21)
At present, the spatial target monitoring method is mainly ground-based observation mode, and the ground-based observation mode is divided into two types: radar scattering imaging and photoelectric system imaging. In the ...
Development of in-house best practices for network documentation
(2019-05-21)
Every network requires some form of documentation for planning and administering the network. Typically, in smaller companies, the designers find out the methods to document by themselves. This means figuring out the ...
Nopean nukleiinihappojen eristysmenetelmän kehittäminen osaksi zikavirus PCR -testiä
(2020-03-23)
Zikavirustartunta raskaana olevalla naisella voi aiheuttaa sikiön mikrokefaliaa eli pienipäisyyttä. Flaviviruksiin kuuluva zikavirus leviää pääosin Aedes suvun hyttysten toimesta sekä seksuaalikontaktissa. Äidillä ...
Striving for Better Rest API Development : Exploring the assistance of Artificial Intelligence
(2020-02-09)
RESTful was originally explained by Roy Fielding in his Ph.D. dissertation in 2000 and today, nearly 20 years later almost every business has one or several REST APIs. Not all of these APIs are equal and most of them are ...
AT-CNN-LSTM Facial Micro-expression Recognition and its Application in Educational Scene
(2020-01-07)
Humans can convey a lot of important information through facial expressions, and the differentiation of facial expressions can promote the understanding of people’s psychological state. Compared with ordinary facial ...
Virtual environments for penetration testing of IoT devices
(2020-03-11)
The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University ...
A SystemC Simulator for Secure Data Transfer in Healthcare Internet of Things
(2019-06-20)
In this thesis, a simulator for secure data transfer between medical sensors and end-users is developed using smart e-health gateways in medical environments like hospitals, healthcare centers and old-age homes. The rate ...
LEVERAGING USERS TO BREAK CYBER KILL CHAIN
(2019-12-20)
Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders ...
Implementation and Optimization for Deep Compressed Learning
(2019-10-22)
In recent years, Machine Learning (ML), especially deep learning, has developed rapidly and been widely applied. This trend has brought deep learning to face the problems of large data explosion and model complexity more ...