Essays about: "Bluetooth"

Showing result 21 - 25 of 385 essays containing the word Bluetooth.

  1. 21. Assessment of Lower Limb Muscle Strength: Feasibility and Implementation on Exxentric’s SingleExx Machines

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Maximilian Geisler; [2023]
    Keywords : Force measurement; Lower limb strength; Symmetry assessment; Flywheel-based leg extension machine; Prototype development; Isokinetic dynamometer; Kraftmätning; Styrka i nedre extremiteterna; Symmetribedömning; Flywheel- baserad benförlängningsmaskin; Prototyputveckling; Isokinetisk dynamometer;

    Abstract : Measuring lower limb strength and symmetry is a common practice in elite sports to determine the return to sports point in time during rehabilitation, and this information could be useful for amateur athletes too. However, the devices used for this are highly sophisticated and hardly accessible. READ MORE

  2. 22. Analysis of effective energy consumption of Bluetooth Low Energy versus Bluetooth Classic

    University essay from Jönköping University/JTH, Avdelningen för datavetenskap

    Author : Carl Tåqvist; Jonathan Luks; [2022]
    Keywords : Bluetooth Classic; Bluetooth Low Energy; Energy efficiency; Internet of Things; Throughput; Wireless technologies;

    Abstract : Wireless technology is used daily across the globe. A very common wireless technology is Bluetooth. The Bluetooth technology exists everywhere, from cars to mobile phones and even kitchen appliances. Recently, Bluetooth Low Energy has added support for another physical layer, LE 2M PHY. READ MORE

  3. 23. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  4. 24. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE

  5. 25. Dynamic configuration of Bluetooth mesh : A master thesis in electrical engineering

    University essay from Uppsala universitet/Signaler och system

    Author : August Fricking; [2022]
    Keywords : Bluetooth; Bluetooth mesh; BLE; BLE mesh; mesh networks; nRF52840; nRF52832; Dynamic configuration; adoptive configuration; mesh automation;

    Abstract : When choosing what IoT protocol to use today, there are lots of choices. If a mesh type network is chosen, Bluetooth mesh might be a possible candidate. Bluetooth mesh without correctly configured parameters can however suffer from congestion and packet loss if the network is very dense or consists of many nodes. READ MORE