Essays about: "bth SYSTEM"
Showing result 1 - 5 of 1312 essays containing the words bth SYSTEM.
-
1. Wireless Sensor Network for Controlling the Varroasis Spread within Bee colonies across a Geographical Region
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: With the global decline of honey bee populations, safeguarding these vital pollinators has become crucial. Varroa destructor mites are a primary threat, weakening bees and facilitating the spread of diseases, which can decimate colonies and disrupt ecosystems. READ MORE
-
2. Integration of Service-Oriented Embedded Systems with External Systems in Software Product Lines
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Developing software for complicated systems is often done by collaboration and consists of deliverables by a multitude of organisations. The deliverables can range from smaller devices and commercial-off-the-shelf software components, to larger systems. READ MORE
-
3. Physical Layer Security for MIMOTransmission of Short PacketCommunications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE
-
4. Android Malware Detection Using Machine Learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE
-
5. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE