Selaus laitoksen mukaan kokoelmassa Pro gradu -tutkielmat ja diplomityöt sekä syventävien opintojen opinnäytetyöt (rajattu näkyvyys) Tulevaisuuden teknologioiden laitos
Aineistot 21-40 / 96
-
Channel Scattering and System Implementation of Underwater Wireless Optical Communication
(28.04.2020)In recent years, Underwater Wireless Optical Communication (UWOC) has made great progress and become one of the hotspots of wireless communication research. However, the channel characteristics of underwater optical ...suljettu -
Comparison of de novo metagenomic assembly tools
(24.05.2019)The field of metagenomics involves studying the composition and function of microbial communities via isolated DNA from a variety of environments like soil, water and the human gut. Since the current generation sequencing ...suljettu -
Consent Management Options for Patients Sharing Wellness Data in Health Village
(10.08.2020)In Health Village patients can connect their Internet of Things devices to the digitalized care paths. Data from these devices can be shown to the healthcare professionals only with the consent of the patient. There are ...suljettu -
COPE network coding based on broadband Ad hoc network
(18.06.2020)In the traditional communication network, the transmission of data is realized by the storage and forwarding of the node. Since the node can only send one packet at a time, the remaining packets must be queued, resulting ...suljettu -
Cybersecurity in Smart Cities: Challenges and Solutions
(28.12.2020)Smart cities are the cities of the future. Smart cities encourage the use of technology, information, and data to boost and upgrade their infrastructure and services. The main goal of a smart city is the well-being of the ...suljettu -
Datankeruu sekä -prosessointi kasvihuoneautomaatiojärjestelmässä
(09.01.2020)Teollisuuden ja teknologian kehitys kuluvalla vuosituhannella on saanut aikaan uuden neljänneksi teollisuuden vallankumoukseksi kutsutun ilmiön, joka on mahdollistanut myös automaatiojärjestelmien yleistymisen useissa ...suljettu -
Deceiving Attackers using Record and Play based Honeypots
(22.05.2018)Firewalls, intrusion detection systems and other security measures are used to control unwanted access to various IT systems. Usually these technologies are used to block, redirect or detect intruders. Honeypots on the ...suljettu -
Design and Implementation of a Wearable Sensor Node for Monitoring Mechanocardiographic Phenomena
(12.06.2019)Cardiovascular diseases are the most common cause of death in the world, fortunately most of which could be prevented. As the population ages, these conditions get even more frequent leading to millions of deaths every ...suljettu -
Design and implementation of UHF RFID smart readers
(17.12.2019)The traditional process of integrating RFID technology into business processes can be very costly and tedious. The readers were only capable of doing a single task which is listen for requests from a client application, ...suljettu -
Design of a strike-back attack against cyber threat actors
(20.11.2020)With critical infrastructure becoming more complex and interconnected, and criminals making billions via malware, cyber security is more important than ever. Nation states have also recognized cyber warfare as a very cost ...suljettu -
Detecting inconsistencies in Big Data extraction : a heuristic approach
(26.06.2019)In the era of Big Data, cloud-based analysis services have become a popular support function for enterprises to invest in. By exploiting the data that business functions generate, one might be able to fine-tune their ...suljettu -
Developing information technology & operational technology configuration management in pharmaceutical industry
(29.05.2020)Complex information systems and different types of hardware create the need for proper configuration management in various manufacturing companies. Along with the other IT service management processes, configuration ...suljettu -
Developing Network Security in Small and Medium-sized SaaS Industry Enterprise
(11.06.2019)Network security’s mission is to secure data and hosts in a network environment by ensuring confidentiality, integrity, non-repudiation, availability, access control, and authentication. A Software as a Service (SaaS) ...suljettu -
Development of in-house best practices for network documentation
(21.05.2019)Every network requires some form of documentation for planning and administering the network. Typically, in smaller companies, the designers find out the methods to document by themselves. This means figuring out the ...suljettu -
Development of the simulation of the 5G New Radio Uplink Channels for testing the layer one of a 5G New Radio modem chip
(12.12.2018)The 5G technology is a step forward in the telecommunication industry, and it will provide improvements and new features to the current 4G standard such as higher speed in data transmissions, energy efficiency, massive ...suljettu -
Does culture matter? Organizational culture effect on employee turnover in IT consultant companies
(11.10.2019)Organizational culture is term which has many interpretations and levels and it has been studied widely during the last few decades. IT consultant companies have a special kind of culture which usually includes ...suljettu -
Electromagnetic Imaging Mechanism And Algorithm Research Based on Volume Holographic Grating
(21.01.2020)At present, the spatial target monitoring method is mainly ground-based observation mode, and the ground-based observation mode is divided into two types: radar scattering imaging and photoelectric system imaging. In the ...suljettu -
EM Data Simulation System Based on GPU Acceleration
(19.12.2019)In recent years, with the development of human beings to the ocean, the detection and identification of the sea surface and the target on it have become increasingly important. Therefore, studying the EM scattering ...suljettu -
Embedded AI and Human-Sensing Techniques in Intelligent Buildings
(12.09.2019)There is a rising demand for occupancy detection and people counting innovations for intelligent buildings. Occupancy detection capability is a promising reliable real-time solution for lighting control. People counting ...suljettu -
EMG Based Motion Intension Recognition and Force Estimation
(07.01.2020)Hands are the most dexterous organs of human beings. People communicate with each other with various hand gestures. However, it is difficult for stroke survivors and transradial or forearm amputees to perform gestures in ...suljettu