Essays about: "remote identification"
Showing result 1 - 5 of 69 essays containing the words remote identification.
-
1. LEARNING AND COLLABORATION VIA DIGITAL COMMUNICATION TECHNOLOGIES IN ECOVILLAGES A Study on Learning in Ecovillage Communities of Practice and Affordances of Virtual Immersive Learning Environments
University essay from Institutionen för tillämpad informationsteknologiAbstract : Ecovillages are intentional residential communities aimed at improving human quality of life while protecting and regenerating the surrounding nature in order to create a more sustainable lifestyle based on cooperative culture and sharing (Dawson, 2006; GEN, n.d.b; Mychajluk, 2017). READ MORE
-
2. Detecting Lithium Brine in Afghanistan Using Spaceborne Hyperspectral Data
University essay from Göteborgs universitet/Institutionen för geovetenskaperAbstract : The purpose of this thesis is to utilize hyperspectral remote sensing technology for the identification and evaluation of lithium mineral deposits in Afghanistan. Afghanistan boasts unique geological formations with substantial potential for lithium resources beneath its land crust. READ MORE
-
3. Perceptions and Challenges of Participative Decision-Making in Hybrid Teams
University essay from Lunds universitet/Företagsekonomiska institutionenAbstract : This thesis fulfills its aim by creating a theoretical framework in order to identify and analyze the perceived challenges of participative decision-making in hybrid teams, which are two concepts of growing importance. Previous research has neglected the intersection between the two, which is a shortcoming this thesis addresses by considering their challenges in conjunction. READ MORE
-
4. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE
-
5. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE