Viimeksi syötetyt Pro gradu -tutkielmat ja diplomityöt sekä syventävien opintojen opinnäytetyöt (kokotekstit)
Aineistot 461-480 / 10075
-
Optimizing Laser Powder Bed Fusion (L-PBF) for Improved Performance: A Reinforcement Learning Approach for Choosing Process Parameters
(29.07.2025)Laser Powder Bed Fusion (L-PBF) is a high-performance manufacturing process for parts with complex geometries. However, a poor choice of process parameters induces the formation of defects, suggesting the need for an ...avoin -
Suomen metsien ja metsätalouden tulevaisuusnäkymät : Asiantuntijahaastatteluihin perustuva tarkastelu
(18.06.2025)Metsät ovat keskeinen osa suomalaista yhteiskuntaa, ne tarjoavat paitsi ekologisia ja kulttuurisia arvoja, myös merkittäviä taloudellisia hyötyjä ja ekosysteemipalveluita. Viime vuosina metsien rooli on noussut entistä ...avoin -
Subjektiivisen hyvinvoinnin muutokset 2020-luvun kriiseissä Suomessa : Tutkimus koetun taloudellisen toimeentulon yhteyksistä onnellisuuteen ja elämään tyytyväisyyteen
(23.05.2025)Tutkielma käsittelee subjektiivisen hyvinvoinnin muutoksia 2020-luvun kriiseissä Suomessa. Kiinnostuksen kohteena on koetun taloudellisen toimeentulon yhteys onnellisuuden tunteen kokemuksiin ja elämään tyytyväisyyteen. ...avoin -
The Fundamental Right to Healthcare in the Age of Predictive Health AI systems : Legality and Protections under EU Law
(06.08.2025)Predictive AI systems are increasingly being adopted by healthcare providers in the European Union (EU) to assess patient’s eligibility for healthcare services. These systems typically identify “risk profiles” from large ...avoin -
A Taxonomy and Multi-Layered Defense Framework for Generative AI-Powered Phishing Campaigns on Social Media Platforms
(07.08.2025)This research aims to analyze the increasing threat of generative AI-powered phishing campaigns on social media platforms. Social media platforms are the prime targets for attackers because it has a huge amount of user ...avoin -
Zero Trust Threat Modeling: STRIDE-ZTA
(31.07.2025)The concept of perimeterless security has gained popularity, today known as zero trust. Zero trust architecture is complicated, consisting of complex logical components that change the security posture of a system. This ...avoin -
Effect of Gating Design on Melt Flow Velocity in Gravity Sand casting using AM-Enabled Molds
(19.06.2025)This research thesis deals with the effect of gating design on melt flow characteristics in sand casting. Different gating designs have been studied by varying the number of ingates and prospective benefits of AM-enabled ...avoin -
Enhancing Explainability and Performance in Intrusion Detection Systems using Deep Learning Models and LLMs
(31.07.2025)The evolving landscape of cyber security highlights the importance of the effectiveness and transparency of Intrusion Detection Systems (IDS), which play a critical role in protecting computer networks from malicious ...avoin -
Android Malware Detection using LLM
(31.07.2025)Android’s widespread adoption has made it a prime target for mobile malware, posing significant threats to user privacy, financial security and device security. Traditional malware detection approaches, such as signature-based ...avoin -
Anomaly Detection and Prevention in IoT Using AI
(31.07.2025)The rapid expansion of the Internet of Things (IoT) has led to environments rich in interconnected sensors, devices, and communication protocols across critical domains such as smart homes, healthcare, industrial automation, ...avoin -
Multi Robot Coordination for Efficient Search and Rescue through Deep Image Processing and Communication
(29.07.2025)This thesis leveraging the capabilities of Robot Operating System (ROS 2 Humble) and Gazebo Fortress presents the design, implementation, and evaluation of decentralized multi-robot coordination in autonomous search and ...avoin -
Exploring the Role of Generative AI for Improving and Optimizing Sprint Planning in Agile Development
(29.07.2025)Generative AI is transforming how software teams approach project management. This thesis investigates the application of large language models, such as ChatGPT, in Agile sprint planning. It begins with a review of current ...avoin -
Design of Directional Antennas for IoT Physical Layer Security in Ambient Backscatter Communication (AmBC)
(31.07.2025)This thesis investigates a novel antenna system designed to enhance physical-layer security for Internet of Things (IoT) communications using Ambient Backscatter Communication (AmBC). Ambient backscatter leverages existing ...avoin -
Finnish berry juice as a DNA stain: the search for active DNA binding compounds capable of staining nucleic acids
(23.07.2025)Many berries grown in Finland contain anthocyanins in high amounts, providing the berry juice a bright colour and capability to stain a variety of materials. On the basis of earlier studies on Finnish berry juice, it was ...avoin -
Detecting malware capabilities in superblocks using static binary analysis
(31.07.2025)Malware, or malicious software, is a central piece to the success of most cyber attacks since often times it is the element that is programmed and used to carry out the objectives of the threat actors once they gain access ...avoin -
Automated Classification of Iron Accumulation in Patients with Alzheimer's Disease
(30.07.2025)Alzheimer's disease (AD) is becoming one of the deadliest diseases for elderly people. Although considerable research is being conducted to gain a deeper understanding of AD, many questions about the pathology of the disease ...avoin -
Electrospun Hollow Nanofiber Surfaces as Dielectric Mediums for Highly Sensitive Flexible Capacitive Pressure Sensors in Low pressure Regimes
(16.07.2025)Flexible capacitive pressure sensors have gained importance in the electronics industry with varying structural designs for monitoring, soft robotics and sensing needs. However, achieving high sensitivity at low-pressures ...avoin -
Preventing IoT Malware Exploits: Enforcing Network Restrictions with MUD Profiles
(23.07.2025)The importance of IoT devices and their relationship to network security is examined in this thesis, with particular focus placed on how Manufacturer Usage Description (MUD) profiles can be used to enhance cybersecurity. ...avoin -
N, N-dimethoxy-aminals as dynamic pH-responsive ligations for oligonucleotides
(24.07.2025)Dynamic covalent chemistry harnesses the reversible formation of chemical bonds, offering a powerful strategy for designing stimuli-responsive biomolecular systems. This thesis focuses on the development of a novel ...avoin -
Design and Evaluation of an AI-Driven Workflow for Technical Debt Remediation in Software Systems
(08.07.2025)Technical debt (TD) is a persistent challenge in software engineering. It impacts long-term maintenance, reliability and security of the software as well as developer productivity. Many static analysis tools can identify ...avoin



















