Hae
Aineistot 21-30 / 296
Design and implementation of UHF RFID smart readers
(2019-12-17)
The traditional process of integrating RFID technology into business processes can be very costly and tedious. The readers were only capable of doing a single task which is listen for requests from a client application, ...
Rectenna Array Design for Wireless Power Transmission
(Turun yliopisto, 2018-10-01)
With the growing concern about the Earth’s energy problems, the discovery of new en-
ergy sources and new energy transmission methods to collect inexhaustible solar energy
has become a key research field for future energy ...
Evaluation of image matching search engines
(2019-12-18)
Corner detection and feature detecting are essential parts of image matching. This master of science thesis goes through theory of image matching and how it can be used in different applications. The thesis introduces ...
Design for energy-efficient and reliable fog-assisted healthcare IoT systems
(Turku Centre for Computer Science, 2018-12-10)
Cardiovascular disease and diabetes are two of the most dangerous diseases as they are the leading causes of death in all ages. Unfortunately, they cannot be completely cured with the current knowledge and existing ...
Strain modulation on 2D materials and their heterostructures
(2020-03-19)
Strain modulation is a direct and effective method to tune the lattice structure of the 2D materials. Studying the band structure, photoluminescence (PL) and other physical properties of 2D materials under strain is important ...
Architecture for Service Integration and Management: Case Telia as Service Integrator and Service Provider
(2019-12-18)
Service integration as a concept is growing more popular and companies providing
different services are implementing capabilities to enable these services to be consumed
via interfaces by customers. This study focuses ...
Systematic approach towards Analysis and Mitigation of Advanced Evasion Techniques
(2019-12-18)
Advanced Evasion Techniques (AETs) can successfully evade most network security devices and execute attack on target system. This is still an occurring problem, even after 20 years since the disclosure of evasion techniques ...
Ensuring the integrity of nodes under the context of container live migration in a secure network
(2019-12-17)
The amount of data generated in our hyper-connected networks is rising exponentially. More and more consumer electronic devices rely on the internet to provide users with seamless access to services. Cloud computing has ...
Autoregressiiviset mallit sähkön kulutuksen ennustamisessa
(2019-09-15)
Sähkön kulutuksen tarkka ennustaminen on tärkeää, jotta voidaan turvata sähköverkon
toimivuus ja kuluttajille halpa sähkön hinta. Lyhyen aikavälin ennusteet ovat energia-
alalle tärkeimpiä päivittäisessä operatiivisessa ...
Adaptive Knobs for Resource Efficient Computing
(Turku Centre for Computer Science, 2018-12-13)
Performance demands of emerging domains such as artificial intelligence, machine learning and vision, Internet-of-things etc., continue to grow. Meeting such requirements on modern multi/many core ...