Essays about: "thesis protocol testing"

Showing result 1 - 5 of 117 essays containing the words thesis protocol testing.

  1. 1. Comparative Analysis of In-Body to Out-Body Wireless CommunicationModules: Test Design and PerformanceEvaluation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Remya Sree Rema Bhai; Sisymol Stellus; [2024]
    Keywords : In-Body to Off-Body Communication; prototype; test-design; test protocol; medical device; wireless communication.;

    Abstract : Wireless communication for biomedical equipment is rapidly improving with the invention of new technologies. Due to the absence of cables, wireless technology is a growing area of interest for biomedical applications. As technology advances, many gadgets are becoming smaller and more portable. READ MORE

  2. 2. Web interface for a multi-purpose transmitter

    University essay from

    Author : Elin Cederlöf; Maximilian Mattsson; [2023]
    Keywords : Web interface; programming; JavaScript; CSS; HTML; Azure; RTOS;

    Abstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE

  3. 3. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Victor Massy; [2023]
    Keywords : Multiparty computation; Trusted execution envrionment; Web advertising; Private attribution reporting; Flerpartsberäkning; Pålitlig exekveringsmiljö; Webannonsering; Privat attributionsrapportering;

    Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE

  4. 4. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE

  5. 5. Development and Implementation Strategies Towards a Comprehensive YANG Model-Based Configuration Data Generation Tool

    University essay from KTH/Hälsoinformatik och logistik

    Author : Alma Garpenfeldt; Linus Silfver Shahparastan; [2023]
    Keywords : YANG modeling language; Configuration management; Network management; Template-based configuration; NETCONF protocol; YANG-modelleringsspråk; Konfigurationshantering; Nätverkshantering; Mall-baserad konfiguration; NETCONF-protokoll;

    Abstract : Effective management and operation of modern networks heavily rely on efficient network configuration management and infrastructure. Manual configuration management has been proven inefficient, and there is a need to automatize it. READ MORE