Essays about: "MAC"

Showing result 11 - 15 of 176 essays containing the word MAC.

  1. 11. Implementation of LPWAN protocols for Water Sense : Integration of LoRa and Contiki OS with the Rime stack

    University essay from Uppsala universitet/Signaler och system

    Author : Barry Dyi; [2022]
    Keywords : Contiki; LoRa; Telecommunications; Embedded Systems; WSN; IoT;

    Abstract : The purpose of this thesis rose from tackling a specific project led by Cybercom Group. Water Sense was proposed after municipalities expressed the need to conveniently conduct measurements on water in Swedish lakes, and remotely get access to these data. READ MORE

  2. 12. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Otabek Sobirov; [2022]
    Keywords : TSCH; 6TiSCH; RPL; scheduling; energy consumption; COOJA; autonomous scheduling; distributed scheduling; reinforcement learning; RL-based scheduling; Q-Learning;

    Abstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE

  3. 13. Study of the Non-Thermal Escape ofDeuterium on Mars : Collisions between Suprathermal Oxygen and Deuterium

    University essay from Luleå tekniska universitet/Rymdteknik

    Author : Sorcha Mac Manamon; [2022]
    Keywords : Atmospheric Escape; Mars; Deuterium; Modelling; Non-thermal Escape; suprathermal oxygen;

    Abstract : Mars’ climate has undergone many massive changes over the course of it’s lifetime. In order toestablish how Mars lost the vast majority of its water, we must be able to understand how Marsis losing its atmosphere today. READ MORE

  4. 14. Integrating Jamming Detection into Low-power Mesh Networks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Wenbo Xiao; [2022]
    Keywords : ;

    Abstract : In the field of the Internet of Things (IoT), jamming attacks and anti-jamming countermeasures have always been a very important research directions. Jamming attacks are aimed at disturbing routine wireless communications by sending out intentional radio interference, which leads to packet loss, higher energy consumption, and even disruption of the whole network. READ MORE

  5. 15. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE