Selaus laitoksen mukaan kokoelmassa Pro gradu -tutkielmat ja diplomityöt sekä syventävien opintojen opinnäytetyöt (kokotekstit) Tulevaisuuden teknologioiden laitos
Aineistot 1-20 / 164
-
A Machine Learning Approach to Indoor Localization Data Mining
(25.11.2020)Indoor positioning systems are increasingly commonplace in various environments and produce large quantities of data. They are used in industrial applications, robotics, asset and employee tracking just to name a few use ...avoin -
A Study on UWB-Aided Localization for Multi-UAV Systems in GNSS-Denied Environments
(23.08.2020)Unmanned Aerial Vehicles (UAVs) have seen an increased penetration in industrial applications in recent years. Some of those applications have to be carried out in GNSS-denied environments. For this reason, several ...avoin -
A SystemC Simulator for Secure Data Transfer in Healthcare Internet of Things
(20.06.2019)In this thesis, a simulator for secure data transfer between medical sensors and end-users is developed using smart e-health gateways in medical environments like hospitals, healthcare centers and old-age homes. The rate ...avoin -
A tentative argument for regional quality targets in assimilating schwa
(Turun yliopisto, 15.08.2016)Amerikanenglannin redusoitunut švaa-vokaali tuotetaan puheessa laadultaan huomattavan monimuotoisena. Kirjallisuudessa ei kuitenkaan vallitse selkeää käsitystä siitä, mitkä tekijät ehdollistavat ...avoin -
A User-Centric Access Control Framework for Cloud Computing
(18.02.2019)A huge amount of data is generated due to the growth of advanced information technology, online availability and easy access to cloud computing. In cloud computing, user can easily store and share their information across ...avoin -
A Web Component for Real-Time Collaborative Text Editing
(03.05.2019)Real-time collaborative software allows physically distinct people to co-operate by working on a shared application state, receiving updates from each other in real-time. The goal of this thesis was to create a developer ...avoin -
A*-algoritmin variantit
(23.12.2020)Yksittäistä agenttia käsitteleviä paras ensin -hakualgoritmeja on käytetty vuosikymmenien ajan ratkaisuina hyvin monentyyppisiin ja monia aloja koskettaviin ongelmiin. Yksi tärkeimmistä on jo vuonna 1968 esitelty A*-algoritmi ...avoin -
Access Control Process for a SaaS Provider
(17.06.2019)Access control is a process of limiting access to systems and services. It is a way by which the users are granted access and privileges to information and resources of an organization. The process involves controlling, ...avoin -
Achieving native-like experience on the web with progressive web apps
(19.08.2020)For long developing applications for mobile has required developing a separate app for each platform that the developer wants the app to support. Apple has App store, Google has Play store and Microsoft has Microsoft store. ...avoin -
Acoustic data transmission for embedded software platforms: an empirical study
(08.10.2019)As microcontrollers become increasingly powerful at a lower cost, they continue to expand to new fields of applications, in particular those under the process of a digital transformation. These systems are often packed ...avoin -
An anti-malware product test orchestration solution for multiple pluggable environments
(03.12.2018)The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, ...avoin -
An Assessment of DevOps Maturity in a Software Project
(09.11.2017)DevOps is a software development method, which aims at decreasing conflict between software developers and system operators. Conflicts can occur because the developers’ goal is to release the new features of the software ...avoin -
An Assessment of DevOps Maturity in a Software Project
(09.11.2017)DevOps is a software development method, which aims at decreasing conflict between software developers and system operators. Conflicts can occur because the developers’ goal is to release the new features of the software ...avoin -
An Intelligent Circular Economy Upstream Monitoring & Optimization System Based on Industrial Internet of Things
(24.11.2019)Industrial Internet of Things (IIoT) has many beneficial applications upon the industry of Oil and Gas (O&G) and renewable energy production. Renewable energy production is already growing faster than traditional fossil ...avoin -
Analysis of Black hole Attack in Ad hoc On-Demand Distance Vector (AODV) Routing Protocol : Vehicular Ad-hoc Networks (VANET) Context
(01.07.2019)In past years, popularity of Mobile Ad hoc Networks has led to the conception of Vehicular Ad hoc Networks. These networks must be highly secure before their implementation in real world. One of the vital aspects of these ...avoin -
ANALYSIS OF BOTNET CLASSIFICATION AND DETECTION BASED ON C&C CHANNEL
(22.11.2018)Botnet is a serious threat to cyber-security. Botnet is a robot that can enter the computer and perform DDoS attacks through attacker’s command. Botnets are designed to extract confidential information from network channels ...avoin -
Applying Augmented Reality to Outdoors Industrial Use
(Turun yliopisto, 30.05.2016)Augmented Reality (AR) is currently gaining popularity in multiple different fields. However, the technology for AR still requires development in both hardware and software when considering industrial use. In order to ...avoin -
Applying data protection part of ISO 27001 to patient and user data produced by medical devices – Case: disease specific quality registers
(07.05.2020)Data protection may be considered a subset of information security, consisting of the rules that define who may have access to what data and under what conditions. Rules concerning the handling of personally identifiable ...avoin -
Assessing performance overhead of Virtual Machine Introspection and its suitability for malware analysis
(25.06.2020)Virtual Machine Introspection is the process of introspecting guest VM’s memory and reconstructing the state of the guest operating system. Due to its isolation, stealth and full visibility of the monitored target, VMI ...avoin -
Automated classification of receipts and invoices along with document extraction
(24.11.2020)Companies might receive dozens or even hundreds of receipts and invoices per day. It consumes a lot of working hours to keep them all organized – invoices must be paid on time and receipts must be archived properly. This ...avoin