Aineistot 1-10 / 65
JPS Algorithm Adaptation and Optimization to Three-dimensional Space
The aim of this thesis is to research the principles of the Jump Point Search (JPS) pathfinding algorithm and study the possibilities of adapting JPS to three-dimensional environment. JPS is partly based on A* algorithm ...
Työntekijäkokemuksen ja asiakaskokemuksen kehittäminen asiantuntijaorganisaatiossa
Työntekijäkokemus on aihealue, johon etenkin ohjelmisto- ja teknologia-alan yritykset ovat alkaneet kiinnittää entistä enemmän huomiota viime aikoina. Työntekijäkokemukseen panostamalla on pyritty ratkaisemaan haasteita ...
Firmware Development of a LoRaWAN Multi-Sensor Generic Node : an Industrial IoT Empirical Study
Connectivity is the defining property of the Internet of Things (IoT). Multiple technologies and techniques allow embedded devices to transmit and receive data. The intersection between connectivity demands, physical and ...
Smartphone-based Indoor Positioning Using Wi-Fi Fine Timing Measurement Protocol
Location-based services have grown popular since GPS and other satellite navigation systems became available for consumers. However, because satellite signals are absent inside buildings, other means of positioning need ...
(Turun yliopisto, 2010-05-25)
LEVERAGING USERS TO BREAK CYBER KILL CHAIN
Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders ...
High Precision Small Current Amplifier with Automatic Gain Control in Integrated Semiconductor Parameter Analyzer
Semiconductor is widely used in integrated circuits, power and lighting devices; precise measuring of electric facilities of electronic devices such as diode, triode, MOS transistor and optoelectronic devices is very ...
Systematic approach towards Analysis and Mitigation of Advanced Evasion Techniques
Advanced Evasion Techniques (AETs) can successfully evade most network security devices and execute attack on target system. This is still an occurring problem, even after 20 years since the disclosure of evasion techniques ...
On the Effects of Forced Trust on Implementations of Small Smart Cities
As an increasing number of cities pursue the idea of becoming smart cities, the variety in different approaches to reach this goal also grows. They cover the use of a spectrum of implementations for, inter alia, information ...
Virtual environments for penetration testing of IoT devices
The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University ...