Hae
Aineistot 71-80 / 116
Mobility Handover Support in Bluetooth Low Energy Piconets Using Fog Computing Approach
(2021-11-22)
IoT solutions have become ubiquitous as a consequence of new applications and research. The market for IoT solutions is expected to have formidable growth as the adoption of IoT continues, which will constitute a massive ...
A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM)
(2021-10-19)
This Thesis researches the effect of adding security tools into CI pipelines. The thesis is based on "security by design" within the software development cycle. The CI pipeline is based on a relatively new topic area ...
Scalable Tree Structure Blockchain System and Consensus for Consortium Chain
(2021-10-01)
The blockchain technology has gradually attracted the attention of researchers and various industries and has been used to build a network for trust due to its data traceability and difficult to tamper with since the birth ...
Security Assessment of LoRaWAN Based IoT Asset Tracking System
(2020-06-24)
Asset tracking solutions has a wide range of use including supply chain and logistics, and private property tracking. In the supply chain and logistics industry, asset tracking can increase savings, either it be monetary ...
Atrial Fibrillation Detection Based on Ballistocardiogram
(2020-06-05)
Atrial fibrillation (AF) is one of the most common arrhythmia, and the prevalence increases with age. If AF is not treated in time, it will lead to the occurrence of many other cardiovascular diseases and strokes, which ...
Implementing Frontend Architecture with a Usability Approach
(2020-06-25)
Modern web applications are often complex software systems offering a large set of features. To provide these features to the user, the system requires a layer of interaction – the user interface. The user interface is ...
Best practices of designing user interfaces for children
(2020-06-16)
When developing software interfaces for children, there are some considerations to be made to the software development, since children think and act different from adults and compared to adults, children have physical and ...
COPE network coding based on broadband Ad hoc network
(2020-06-18)
In the traditional communication network, the transmission of data is realized by the storage and forwarding of the node. Since the node can only send one packet at a time, the remaining packets must be queued, resulting ...
Solution concentration sensor based on organicsemiconductor and its potential applications
(2020-08-16)
From the emerging of the semiconductor industry to the present, mainly inorganic elements are used to make semiconductor devices. These materials have advantages in performance and lifetime, but their fabrication processes ...
A Study of Familiar Strangers in Temporal Interaction Networks
(2021-01-20)
There are rich and varied social ties between people in our daily lives. The familiar stranger is one of those social ties, and has attracted a lot of attention since the concept was proposed. Using knowledge of network ...