Hae
Aineistot 41-50 / 124
Improving a New Digital Content Creation Line of Study in Adult Education College
(2020-06-16)
The topic of the research is digitalization and digital competence frameworks and
competence in the digitalized world and programming. Research methods in the
thesis are the qualitative research, the review of literature ...
Isojen ohjelmistojen vaatimusten ja ratkaisujen vanheneminen : Case: Aineistonhallintajärjestelmä HANSABASE
(2018-06-26)
Tässä tutkielmassa tutkin isojen ohjelmistojen vanhenemiseen johtavia syitä, sekä keinoja vanhenemisen hidastamiseksi, tai peräti estämiseksi. Mallitapauksena käytin Hansaprintin aineistonhallintajärjestelmää HANSABASE ...
Trusting the Big Friendly Giants : large-scale evaluation of dependencies on Finnish websites
(2018-06-18)
Software development companies compete with each other in cost effectiveness, quality and speed of delivery like any other businesses operating on the free market. To keep up with the competition companies reuse code and ...
Ohjelmoinnin opetus ja sähköinen tentti yliopiston ensimmäisillä ohjelmointikursseilla
(2018-06-18)
Ohjelmoinnin opetuksen yliopistotasolla on todettu olevan vaikeaa. Ensimmäiset ohjelmointikurssit kärsivät maailmanlaajuisesti suurista keskeytysprosenteista ja huonoista tuloksista. Miesvaltaisella alalla naiset ovat ...
Building business driven IaaS services with third party software components
(2020-05-28)
The current cloud landscape is dominated by the major cloud service providers, such as
Google Cloud, Amazon Web Services and Microsoft Azure. When the company wants to
build its own cloud, there are some matters one needs ...
Introducing deep learning -based methods into the variant calling analysis pipeline
(2019-05-24)
Biological interpretation of the genetic variation enhances our understanding of normal and pathological phenotypes, and may lead to the development of new therapeutics.
However, it is heavily dependent on the genomic ...
Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security
(2020-06-04)
Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard ...
Secure Messaging with in-app user defined schemes
(2020-06-08)
Cryptography has been the culmination of human trials and mistrials in an attempt to
keep information safe from unintended access. We have learned from our mistakes in
the past, and today with the help of both academician ...
Assessing performance overhead of Virtual Machine Introspection and its suitability for malware analysis
(2020-06-25)
Virtual Machine Introspection is the process of introspecting guest VM’s memory and reconstructing the state of the guest operating system. Due to its isolation, stealth and full visibility of the monitored target, VMI ...
Autonomous object mapping using UAV-based remote sensing
(2020-05-28)
Safety plays a huge role in our world. As technology advances, we can harness it to negate risks in our everyday life. This thesis is made for a project by Työtehoseura, who are responsible for Finland's yearly warehouse ...