Hae
Aineistot 171-177 / 177
Large-scale integration of sequence and structure data in the study of carbonic anhydrase enzymes
(2023-12-30)
In this discovery of carbonic anhydrases, several computational techniques have been used to examine different facets of these enzymes. Methods produced in this work aid for instance in the evaluation of the accuracy of ...
Datan mallinnus mikropalveluissa : suunnittelun vaiheet siirryttäessä monoliittisestä sovelluksesta mikropalveluarkkitehtuuriin
(2024-03-12)
Edelleen voimakkaana jatkuva digitalisaation kasvaminen on nopeuttanut teknologioiden kehitystä, sekä tuonut uusia innovaatioita informaatioteknologian saralla muiden alojen yritysten ulottuville. Digitalisaation avulla ...
On-die CMOS temperature sensors
(2023-12-07)
Temperature changes can have an impact on the reliability and functioning of sensitive integrated circuits. In this thesis an analog DTMOS transistor temperature
was designed and laid out in 22 nm CMOS fabrication process ...
Access Management in Lightweight IoT: A Comprehensive review of ACE-OAuth framework
(2023-12-21)
With the expansion of Internet of Things (IoT), the need for secure and scalable authentication and
authorization mechanism for resource-constrained devices is becoming increasingly important. This
thesis reviews the ...
Gamification for future workforce studies: cyber-security and efficiency
(2023-12-20)
In this era, organisations' workforce dynamics are ever-changing, triggering the need to conduct frequent workforce studies. Performing workforce studies allows the management to measure employee engagement, well-being, ...
Compliance study of EBIOS Risk Manager against ISO 27005 guidance
(2023-12-18)
EBIOS Risk Manager is a French method promoted by ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information) and recognized by ENISA (European Union Agency for Cybersecurity) for assessing and managing risks in ...
A Fuzz Testing Approach for Embedded Avionic Software
(2023-12-20)
Fuzz testing is a technique that can be used to test software in order to discover
potential flaws and vulnerabilities. This particular approach is receiving a quick
widespread adoption to test also embedded software ...