Hae
Aineistot 11-20 / 25
On the State of Information Security in Public Sector Organizations in Ethiopia
(2020-06-05)
Information and communication technology (ICT) has become a vital part of the developing countries economy. As the use of ICT is increasing in day to day work of the organizations, there is a need to implement measures for ...
Achieving ISO 27001 Certification by implementing an Information Security Management System
(2018-12-04)
Information security is intended to protect the confidentiality, integrity and availability of information assets within an organisation. In recent times, there has been a significant trend in increasing cyber-attacks, ...
2.4GHz RF Front-end Module Based on 0.18μm CMOS Process
(2020-05-06)
With the increasing number of wireless communication applications, the demand for low-power and low-cost radio frequency (RF) wireless transceiver chips is increasing. Therefore, the idea of using complementary metal oxide ...
Structured software development with the IPIDDDT method - A lean method for small agile organizations
(Turun yliopisto, 2010-11-04)
A software development process is a predetermined sequence of steps to create a piece of software. A software development process is used, so that an implementing organization could gain significant benefits. The benefits ...
Google dorks: Use cases and adoption study
(2020-10-13)
The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets ...
Formation Control Algorithms With Limited or No Communication
(2020-07-10)
Formation control refers to a collective behaviour of multi-agent systems where individual agents come together to form a pattern, often geometric. These formations can enable multi-agent systems to function more effectively ...
Antecedents of Continued Use Intention in the Era of Data Breaches: An Empirical Study of Pakistani Online Banking Users
(2020-04-14)
Data breaches are a rising threat to the banking sector in which the customer’s information is accessed by unauthorized persons leading to reduced trust and reputation. The reduction in trust and satisfaction may result ...
Path Planning of Autonomous Agricultural Vehicles
(2020-04-28)
Autonomy in the automotive industry is not a new concept. Advanced changes in technology have made it possible. With this trend, bringing autonomy to industrial agricultural fields in this era is also possible. With the ...
Välimuistitietoisuuden vaikutus k-aristen puiden suorituskykyyn
(2017-11-22)
Tietokoneiden keskusmuisti ei ole nopeutunut samaa tahtia prosessorien kanssa. Tämän vuoksi tehokkailla prosessorisiruilla on nykyään nopeaa välimuistia. Välimuistin tehokkaalla hyödyntämisellä voi olla suurempi vaikutus ...
Security Assessment of LoRaWAN Based IoT Asset Tracking System
(2020-06-24)
Asset tracking solutions has a wide range of use including supply chain and logistics, and private property tracking. In the supply chain and logistics industry, asset tracking can increase savings, either it be monetary ...