Hae
Aineistot 1-10 / 212
Hollow-core anti-resonant double-ring nested negative-curvature fiber for 0.3THz-0.5THz transmission
(2021-10-01)
The terahertz (THz) domain is an electromagnetic wave with a frequency in the range of 0.1THz to 10THz lying between microwave and infrared spectra, which have great potential in public security and communication. Although ...
Improving Authentication Security by Using an Authentication Level System Model
(2022-02-25)
The importance of the security of authentication is becoming more apparent day by day, which is why understanding different authentication methods' benefits and drawbacks is crucial when creating software. Plenty of ...
GUI infused IoT Architecture design and implementation
(2022-02-16)
In this thesis a system architecture that can facilitate graphical user interfaces (GUIs) in in IoT framework is designed. The desired result is the above with remote management, remote controllability, flexibility and ...
Positioning and Sensing System Based on Impulse Radio Ultra-Wideband Technology
(2022-09-13)
Impulse Radio Ultra-Wideband (IR-UWB) is a wireless carrier communication technology using nanosecond non-sinusoidal narrow pulses to transmit data. Therefore, the IR-UWB signal has a high resolution in the time domain and ...
Security Analysis of Android Applications
(2022-09-20)
Nowadays, people can easily jump into learning programming on any platform they are interested in. It is the same with Android application development. However, security aspects during development are usually not considered ...
Electromagnetic Scattering Characteristics of Composite Targets and Software Development Based on PO Algorithm
(2022-06-28)
Physical optics (PO) algorithm is a high-frequency electromagnetic (EM) algorithm, which is widely used to solve the EM scattering problems of electrically large composite targets. Due to the PO algorithm only considers ...
BMS software reliability prediction as a function of residual defect density using SIL dynamic metrics
(2022-03-19)
The continuously increasing complexity and computerization of automotive systems
correlate directly to increased expectations from customers on the reliability of the
system. Especially for battery management systems, ...
Design and implementation of data ingestion extensions for threat intelligence platforms
(2022-05-18)
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The extensions were created for ingestion of contextualized indicators of compromise (IoCs) from an external data source, to ...
Design and implementation of a web application for practising internet reading skills
(2022-05-25)
Being able to critically evaluate the reliability of sources is an important skill, and a part of digital literacy competences and internet reading. Conducting research on the matter and teaching the skills related to ...
Tag recognition from panoramic scans of industrial facilities
(2022-06-22)
CAD-based digital twins are commonly used by operators of process industry facilities to combine 3D models with external information and documentation. However, often a suitable model does not exist, and the plant operators ...