Essays about: "bth thesis"

Showing result 1 - 5 of 2334 essays containing the words bth thesis.

  1. 1. Wireless Sensor Network for Controlling the Varroasis Spread within Bee colonies across a Geographical Region

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkat Sai Akhil Dasyam; Saketh Pokuri; [2024]
    Keywords : Wireless Sensor Networks; Monitoring and Control; Precision Beekeeping; Disease spread; Internet of Things.;

    Abstract : Background: With the global decline of honey bee populations, safeguarding these vital pollinators has become crucial. Varroa destructor mites are a primary threat, weakening bees and facilitating the spread of diseases, which can decimate colonies and disrupt ecosystems. READ MORE

  2. 2. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  3. 3. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  4. 4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  5. 5. Analyzing the Impact of Tempo-changing Music for user Performance and Risk-taking Behavior in Video Games

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Åkesson; [2024]
    Keywords : Performance; Risk-taking behavior; Tempo-changing music;

    Abstract :  Background. In real life humans have been proven to be affected in different ways by music. In sports, music can be shown to be useful for better performance. Taking this into thought while playing video games could help players perform better as well as in real life. READ MORE