Essays about: "security mobile"

Showing result 11 - 15 of 294 essays containing the words security mobile.

  1. 11. Home automation using the Internet of Things

    University essay from Uppsala universitet/Signaler och system

    Author : Ronghan Wu; [2023]
    Keywords : ;

    Abstract : This bachelor’s thesis project is intended to study IoT (Internet of Things) and apply it to an application in home automation. To this purpose, a prototype has been implemented that can measure indoor temperature and humidity, display the measurement data on an LCD display, and then send the measurement data to a cloud server for users to read online. READ MORE

  2. 12. Cell Tower Localization using crowdsourced measurments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Escandón Álvarez; [2023]
    Keywords : Cell Tower Geolocation; Crowdsourced Measurements; Positioning; Machine Learning; Neural Networks;

    Abstract : This thesis explores the application of a neural network approach to cell tower localization using crowdsourced measurements. The deployment of cell tower infrastructure has been increasing exponentially in recent times as it is a crucial element of mobile communications. READ MORE

  3. 13. An Evaluation of WebAssembly Pre-Initialization for Faster Startup Times

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : William Stackenäs; [2023]
    Keywords : WebAssembly; Wasm; pre-execution; pre-initialization; execution time; Wizer; WebAssembly; Wasm; förexekvering; förinitialisering; exekveringstid; Wizer;

    Abstract : WebAssembly (Wasm) has emerged as a new technology for the web that enables complex and interactive web applications, while utilizing a compact and platform-independent bytecode format. Due to its flexibility, portability, and built-in security, it has since evolved to be used in many other embeddings, such as internet-of-things, server applications, and even mobile applications. READ MORE

  4. 14. Efficient Memory Encryption for Neural Network Accelerators

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : George-Alexandru Stoian; [2023]
    Keywords : ;

    Abstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE

  5. 15. Critical Factors that Affect the Adoption of Mobile Payment Services in Developed and Developing Countries

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Ehtasham Naeem Qadri; [2023]
    Keywords : Mobile Payment Services; Technology Adoption; Critical factors; Developed Countries; Developing Countries; TAM; UTAUT2; Sweden; Estonia; Germany; Pakistan; Sri Lanka;

    Abstract : The financial services division has been significantly impacted by the emergence of mobile payments, which can be attributed to the fast progressions in mobile technology and the widespread adoption of smartphones. The present research investigates critical factors prompting the adoption of mobile payment services in developed and developing countries, namely Sweden, Estonia, Germany, Pakistan, and Sri Lanka. READ MORE