Essays about: "bth SYSTEM"

Showing result 1 - 5 of 1312 essays containing the words bth SYSTEM.

  1. 1. Wireless Sensor Network for Controlling the Varroasis Spread within Bee colonies across a Geographical Region

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkat Sai Akhil Dasyam; Saketh Pokuri; [2024]
    Keywords : Wireless Sensor Networks; Monitoring and Control; Precision Beekeeping; Disease spread; Internet of Things.;

    Abstract : Background: With the global decline of honey bee populations, safeguarding these vital pollinators has become crucial. Varroa destructor mites are a primary threat, weakening bees and facilitating the spread of diseases, which can decimate colonies and disrupt ecosystems. READ MORE

  2. 2. Integration of Service-Oriented Embedded Systems with External Systems in Software Product Lines

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Nils Johansson; [2024]
    Keywords : software architecture; software product lines; integration of systems;

    Abstract : Developing software for complicated systems is often done by collaboration and consists of deliverables by a multitude of organisations. The deliverables can range from smaller devices and commercial-off-the-shelf software components, to larger systems. READ MORE

  3. 3. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  4. 4. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  5. 5. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE