Advanced search

Showing result 1 - 5 of 249 essays matching the above criteria.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fawad Ahmad; [2024]
    Keywords : ;

    Abstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE

  2. 2. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  3. 3. Remote Control - Redefining Leadership in the Age of Hybrid Work

    University essay from Göteborgs universitet/Graduate School

    Author : Clara Sjögren Nyberg; [2023-07-20]
    Keywords : Hybrid work; Hybrid teams; Leadership; Hybrid leadership; Remote leadership; Transformational leadership;

    Abstract : The pandemic, rather than strategy, has led to organizations’ most apparent digital transformation in the last years due to unprecedented changes in the business environment and society (De Smet et al., 2021; McKinsey, 2020). READ MORE

  4. 4. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers

    University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteori

    Author : Filip Fornmark; [2023-01-19]
    Keywords : statistical language models; cryptanalysis; historical cryptology; homophonic substitution;

    Abstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE

  5. 5. Ranging Error Correction in a Narrowband, Sub-GHz, RF Localization System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Silvia Barrett; [2023]
    Keywords : Localization; Narrowband; Sub-GHz; Radio Frequency; RSSI; Time-of-Flight; Error mitigation; Machine Learning; Linear Regression; LeastSquares Support Vector Machine Regression; Gaussian Process Regression; Loalisering; Narrowband; Sub-GHz; Radiofrekvens; RSSI; Time-of-Flight; Felkorrigering; Machine Learning; Linear Regression; LeastSquares Support Vector Machine Regression; Gaussian Process Regression;

    Abstract : Being able to keep track of ones assets is a very useful thing, from avoiding losing ones keys or phone to being able to find the needed equipment in a busy hospital or on a construction site. The area of localization is actively evolving to find the best ways to accurately track objects and devices in an energy efficient manner, at any range, and in any type of environment. READ MORE