Hae
Aineistot 21-30 / 58
Raising Cybersecurity Awareness on Employees Through Serious Games
(2019-12-04)
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage of computers, smartphones and other smart devices has become the norm. More specifically, businesses need to pay additional ...
Deep Learning Based Abnormal Gait Classification System Study with Heterogeneous Sensor Network
(2020-01-20)
Gait is one of the important biological characteristics of the human body. Abnormal gait is mostly related to the lesion site and has been demonstrated to play a guiding role in clinical research such as medical diagnosis ...
Improving a New Digital Content Creation Line of Study in Adult Education College
(2020-06-16)
The topic of the research is digitalization and digital competence frameworks and
competence in the digitalized world and programming. Research methods in the
thesis are the qualitative research, the review of literature ...
Building business driven IaaS services with third party software components
(2020-05-28)
The current cloud landscape is dominated by the major cloud service providers, such as
Google Cloud, Amazon Web Services and Microsoft Azure. When the company wants to
build its own cloud, there are some matters one needs ...
Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security
(2020-06-04)
Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard ...
Secure Messaging with in-app user defined schemes
(2020-06-08)
Cryptography has been the culmination of human trials and mistrials in an attempt to
keep information safe from unintended access. We have learned from our mistakes in
the past, and today with the help of both academician ...
Assessing performance overhead of Virtual Machine Introspection and its suitability for malware analysis
(2020-06-25)
Virtual Machine Introspection is the process of introspecting guest VM’s memory and reconstructing the state of the guest operating system. Due to its isolation, stealth and full visibility of the monitored target, VMI ...
Autonomous object mapping using UAV-based remote sensing
(2020-05-28)
Safety plays a huge role in our world. As technology advances, we can harness it to negate risks in our everyday life. This thesis is made for a project by Työtehoseura, who are responsible for Finland's yearly warehouse ...
Achieving native-like experience on the web with progressive web apps
(2020-08-19)
For long developing applications for mobile has required developing a separate app for each platform that the developer wants the app to support. Apple has App store, Google has Play store and Microsoft has Microsoft store. ...
Enhancing and integration of security testing in the development of a microservices environment
(2020-10-28)
In the last decade, web application development is moving toward the adoption of Service-Oriented Architecture (SOA). Accordingly to this trend, Software as a Service (SaaS) and Serverless providers are embracing DevOps ...