Essays about: "protocol for research"

Showing result 1 - 5 of 453 essays containing the words protocol for research.

  1. 1. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements

    University essay from KTH/Hälsoinformatik och logistik

    Author : Jemma Touma; Simon Hejdenberg; [2024]
    Keywords : Internet of Things; time synchronization; wireless sensor networks; network time protocol; Android; Bluetooth; WiFi Direct;

    Abstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE

  2. 2. Effective soil organic carbon monitoring in perennial agriculture systems - Sampling protocol development and evaluation

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Maja Holm; [2024]
    Keywords : Physical geography; ecosystem science; soil organic carbon; soil sampling; perennial crops; carbon sequestration; carbon farming; Kernza™; soil organic carbon stock; Earth and Environmental Sciences;

    Abstract : Perennial agriculture systems are gaining ground as a more sustainable alternative to conventional annual agriculture, partly for their potential to increase the soil organic carbon (SOC) content. Carbon farming is another hot topic for SOC sequestration, as it creates economic incentives for farmers. READ MORE

  3. 3. Human Trafficking in Gauteng, South Africa : How do socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa?

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Linnéa Lundqvist; [2024]
    Keywords : Human Trafficking; exploitation; socio-economic; GBV; corruption;

    Abstract : This research aims to investigate how socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa. This province is South Africa’s most prosperous one with an enormous flow of migrants and is therefore of interest to investigate. READ MORE

  4. 4. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  5. 5. LP_MQTT - A Low-Power IoT Messaging Protocol Based on MQTT Standard

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Anchu Antony; Deepthi Myladi Kelambath; [2024]
    Keywords : ;

    Abstract : In the Internet of Things (IoT) era, the MQTT Protocol played a bigpart in increasing the flow of uninterrupted communication betweenconnected devices. With its functioning being on the publish/subscribe messaging system and having a central broker framework, MQTTconsidering its lightweight functionality, played a very vital role inIoT connectivity. READ MORE