Hae
Aineistot 61-70 / 264
Scalable Tree Structure Blockchain System and Consensus for Consortium Chain
(2021-10-01)
The blockchain technology has gradually attracted the attention of researchers and various industries and has been used to build a network for trust due to its data traceability and difficult to tamper with since the birth ...
A Study of Familiar Strangers in Temporal Interaction Networks
(2021-01-20)
There are rich and varied social ties between people in our daily lives. The familiar stranger is one of those social ties, and has attracted a lot of attention since the concept was proposed. Using knowledge of network ...
Design and Testing Games with Children
(2021-02-18)
This thesis aims to introduce the different phases of preparation and testing games with children as players, and how the test results affect the game design. Children can play different roles in the user-centered design ...
Selection, screening and testing of recombinant Fabs against mutated amyloidogenic gelsolin peptide : the causative agent of hereditary gelsolin amyloidosis
(2021-05-06)
Extracellular gelsolin is an actin modulating plasma protein that is abnormally digested, due to an amino acid substitution, into amyloidogenic 8 kDa peptides (AGel), the causative agents of hereditary gelsolin ...
A Review of the Current Methods and Challenges of Facial EMG Based Gesture Recognition
(2021-03-15)
Advances in technology related to the Internet-of-Things and wearable health
technology has lead new research in the field of surface EMG based gesture
recognition in different fields of study such as medical rehabilitation, ...
Ligaatiopohjaisen Geno1-menetelmän kehitys ja optimointi puhdistamattomille näytteille
(2021-03-04)
Joka kuudes maailmassa tapahtuva kuolema on syövän aiheuttama ja syövän varhaisella havaitsemisella on huomattu olevan merkittävä vaikutus taudista selviytymiseen. Syöpäsoluista vapautuu DNA:ta nekroosin, erityksen ja ...
Password authentication security and strength analysis of Finnish passwords
(2021-04-16)
Password authentication security is a two-sided problem. On the other side are the providers of certain services. These providers have to be able to mitigate the possibility of security breaches happening and handle the ...
A Software Re-engineering Perspective of a Development Process : Case Korpi ForRest
(2021-06-17)
Software re-engineering is about taking an existing system and examining it or making changes to it in order to improve it. User experience is about a user’s observable and measurable interaction with a system. Usability ...
Preparation and characterization of hybrid nanoflowers of cobalt phosphate and mutant cellobiose 2-epimerase
(2021-06-16)
Lactulose, a prebiotic, can be used as a functional food additive and a clinical drug for the treatment of hepatic encephalopathy, chronic constipation and other diseases. It has been widely used in food and medicine ...
Next Generation Sequencing Based Cancer Diagnostics
(2021-04-09)
Ovarian cancer is the most lethal gynecologic cancer. The diagnosis of ovarian cancer is hard due to nonspecific symptoms and possibly asymptomatic early stage of the disease. Current diagnostics methods for ovarian cancer ...