Essays about: "thesis in networking internet"

Showing result 21 - 25 of 99 essays containing the words thesis in networking internet.

  1. 21. Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alexandr Silonosov; [2020]
    Keywords : Behavioral biometric systems; free-text keystroke dynamics; virtual desktop infrastructure; remote display protocol; network latency;

    Abstract : The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. READ MORE

  2. 22. Connectedness : Designing interactive systems that foster togetherness as a form of resilience for people in social distancing during Covid-19 pandemic. Exploring novel user experiences in the intersection between light perception, tangible interactions and social interaction design (SxD).

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Valeria Iezzi; [2020]
    Keywords : Research Through Design; Social Resilience; Interaction design technologies; Commensality; Social Connectedness; Remote Communication; Tangible Interaction; Tangible User Interface; Shared Experience; Covid-19 Pandemic; Social Distancing; Designing for Crises; Tangible and Embedded Interaction; Internet of things;

    Abstract : This thesis project explores how interactive technologies can facilitate a sense of social connectedness with others whilst remotely located. While studying the way humans use rituals for emotional management, I focused my interest on the act of commensality because it is one of the oldest and most important rituals used to foster togetherness among families and groups of friends. READ MORE

  3. 23. Support for Emulated 5G-System Bridge in a Time-Sensitive Bridged Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shrinish Donde; [2020]
    Keywords : Bounded ultra low latency; Deterministic traffic; Egress port; Multiqueuing; Quality of service; Scheduling; Time Synchronization; Traffic classes; Time aware system; 5G-System bridge; Begränsad ultra låg latens; Deterministisk trafik; Utgångsport; flera köer; servicenivå; schemaläggning; Tid Synkronisering; trafikklass; Tidsmedveten system; systemet med 5G;

    Abstract : Time Sensitive Networking (TSN) defined in the IEEE 802.1 working group, is an important enabler for industrial Internet of things, specifically industry 4.0. 3GPP release 16 specifications includes the 5G system as a logical TSN bridge, thus promoting the integration of 5G technology with TSN. READ MORE

  4. 24. User churning behavior in social networks

    University essay from Jönköping University/Tekniska Högskolan

    Author : Jihui Lu; [2020]
    Keywords : ;

    Abstract : Abstract Background: With the rapid development of Internet and social network, some social networking sites as Renren.com have achieved breakthrough development, rapidly gathering and driving numerous users. However, with the advent of Web 3.0, the social networking has a new change. READ MORE

  5. 25. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE