Selaus laitoksen mukaan kokoelmassa 1. Kirjat ja opinnäytteetTietotekniikan laitos
Aineistot 1-20 / 634
-
3D-tulostettavien sarveiskalvojen biomateriaalit ja niiden soveltuvuus kudoskorjaukseen
(05.05.2025)3D-biotulostus tarjoaa uuden, lupaavan menetelmän keinotekoisten elinten ja kudosten, kuten sarveiskalvojen, valmistamiseen. Keinotekoisten vaihtoehtojen kehittäminen on keskeinen tutkimuskohde, koska luovutettujen ...avoin -
5G standalone network's reliability, one-way latency and packet loss rate analysis for URLLC implementation
(11.08.2022)5G is the fifth generation technology standard for cellular networks. It has three main application demands, which are Enhanced Mobile Broadband (EMBB), Massive Machine-Type Communications (MMTC) and Ultra-Reliable Low-Latency ...avoin -
A Case Study on Cloud Migration and Improvement of Twelve-Factor App
(28.06.2021)The Twelve-Factor app methodology was introduced in 2011, intending to raise awareness, provide shared vocabulary and offer broad conceptual solutions. In this thesis, a case study was done on two software implementations ...avoin -
A case study on low-code integration platforms
(20.12.2023)The low-code approach has been gaining popularity among integration platforms. Low-code aims to make software development so intuitive that regular citizens could build applications. However, there is little research on ...avoin -
A comprehensive Security Testing Framework for PLC-based Industrial Automation and Control Systems
(24.06.2024)The thesis focuses on developing a comprehensive security testing framework for Industrial Automation and Control Systems (IACS) based on Programmable Logic Controllers (PLCs). This framework aims to evaluate the security ...avoin -
A Comprehensive View on MFA Fatigue : Techniques and Mitigation Strategies
(27.07.2023)Multi-Factor Authentication (MFA) can be bypassed by overwhelming users with fraudulent MFA prompts until they accept. This tactic is called MFA fatigue. Several renowned organizations have been compromised with this attack ...suljettu -
A Cost-Effective Zero-Trust Approach for Cloud Computing: Experimental Evaluation on AWS Platform
(30.06.2024)As the volume of data continues to expand and the intricacy of managing conventional on-premise data centers becomes increasingly burdensome, numerous organizations are transitioning their infrastructure to cloud-based ...avoin -
A Deep Learning Approach to Maritime Vessel Detection
(15.04.2024)The detection of maritime vessels is a fundamental task in maritime surveillance, and it is essential for various applications such as maritime traffic monitoring, search and rescue, and maritime security. Modern maritime ...avoin -
A Dive in Incident Handling and Digital Forensics: Using Automation to improve Response to APT Incidents
(25.09.2023)Over the last few years, companies have grown enormously in terms of IT; their structure has expanded, and consequently, they have been facing cybersecurity incidents more frequently. The entry of governments into so-called ...suljettu -
A Dual-Modality Emotion Recognition System of EEG and Facial Images and its Application in Educational Scene
(22.12.2022)With the development of computer science, people's interactions with computers or through computers have become more frequent. Some human-computer interactions or human-to-human interactions that are often seen in daily ...avoin -
A Framework of DevSecOps for Software Development Teams
(05.07.2023)This master's thesis explores a broad evaluation of automated security testing in the context of DevOps practices. The primary objective of this study is to propose a framework that facilitates the seamless integration of ...avoin -
A Fuzz Testing Approach for Embedded Avionic Software
(20.12.2023)Fuzz testing is a technique that can be used to test software in order to discover potential flaws and vulnerabilities. This particular approach is receiving a quick widespread adoption to test also embedded software ...avoin -
A methodology for assessing cyber security in Zigbee-based IoT
(04.06.2024)More and more devices are connected to the internet every year. The different communication protocols involved in this transition are numerous, and the rapidly evolving internet landscape forces these protocols to evolve ...avoin -
A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM)
(19.10.2021)This Thesis researches the effect of adding security tools into CI pipelines. The thesis is based on "security by design" within the software development cycle. The CI pipeline is based on a relatively new topic area ...suljettu -
A modern approach for Threat Modelling in agile environments: redesigning the process in a SaaS company
(09.10.2023)Dealing with security aspects has become one of the priorities for companies operating in every sector. In the software industry building security requires being proactive and preventive by incorporating requirements right ...avoin -
A multifunctional nerve stimulator used for nerve localization and muscle relaxant monitoring
(04.06.2023)The use of a peripheral nerve stimulator (PNS) can help an anesthesiologist accurately locate the nerve, reduce risks of accidents, and the dose of anesthesia. The muscle relaxation monitor (MRM) can monitor the residual ...suljettu -
A Novel Dynamically Truncating Object Pool for Game Loops and Other Use Cases in Rust
(26.02.2025)Rust programming language, introduced in 2012, presents a new model of memory management called ownership: each value has an exclusive owner, and values are automatically destroyed when their owner leaves the scope. As ...avoin -
A Rapid Approach To Web Application Security
(10.06.2022)After using and developing a web application tool at a company, it is now time for this tool to be productised and made available for use to external customers. Initially, as this was the company’s R&D internal tool, the ...suljettu -
A reduced precision hardware accelerated convolution engine
(24.05.2021)Technological solutions are used in increasing manner in automating production and supporting everyday life. These solutions often require specialized devices that are controlled by microprocessors. The size and energy ...suljettu -
A Review of the Current Methods and Challenges of Facial EMG Based Gesture Recognition
(15.03.2021)Advances in technology related to the Internet-of-Things and wearable health technology has lead new research in the field of surface EMG based gesture recognition in different fields of study such as medical rehabilitation, ...suljettu