Essays about: "G phone"

Showing result 16 - 20 of 47 essays containing the words G phone.

  1. 16. Extended Bluetooth Profiles on CCpilot displays

    University essay from Uppsala universitet/Signaler och System

    Author : Alexander Johnson; [2017]
    Keywords : Bluetooth; IVI; Infotainment; Linux; HFP; PBAP; MAP; PAN; A2DP; AVRCP; Handsfree; Bluez; oFono; Connman; ALSA; PulseAudio; Obexd; CCpilot; CrossControl; maximatecc; Qt; DBus;

    Abstract : Bluetooth is used in modern cars to connect smartphones to stream music, to access internet and for phone services such as phone book contacts and making calls. Similar features are now requested by customers of maximatecc's products, e.g. display computers, for offroad vehicles. READ MORE

  2. 17. Evaluation of Bluetooth Low Energy in Agriculture Environments

    University essay from Malmö högskola/Fakulteten för teknik och samhälle (TS)

    Author : Jonathan Bjarnason; [2017]
    Keywords : WSN; Bluetooth low energy; Precision agriculture;

    Abstract : The Internet of Things (IoT) is an umbrella term for smart things connected to the Internet.Precision agriculture is a related concept where connected sensors can be used to facilitate, e.g. more effective farming. READ MORE

  3. 18. Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Meera Aravind; [2017]
    Keywords : ;

    Abstract : Internet of Things (IoT) has revolutionized transportation systems by connecting vehicles consequently enabling their tracking, as well as monitoring of driver activities. The IoT platform for most vehicles typically consists of 1) an on-board system consisting of the communication unit, sensors and a set of ECU’s that are interconnected using a CAN network, 2) an off-board system consisting of the applications deployed on the servers (e. READ MORE

  4. 19. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE

  5. 20. External Auditor’s Trust in Internal Auditors : The Cultural Effect - A Study Between Greece and Sweden

    University essay from Karlstads universitet/Avdelningen för företagsekonomi

    Author : Nicklas Paulsson; Sofia Oikonomidi; [2016]
    Keywords : Auditor; trust; culture; internal auditor; external auditor; cultural effect; Sweden; Greece;

    Abstract : Nowadays, the importance of the external auditing is demonstrated by the highly risky business environments, that fertilize the fraud and irregularities, which lead businesses to provide mistaken financial statements and misleading financial information. The uncertainty that occurs in the decision process in businesses, enhance the risks and requires the attention of the employees. READ MORE