Sökning: "datavetenskap bth"
Visar resultat 1 - 5 av 1076 uppsatser innehållade orden datavetenskap bth.
1. Wireless Sensor Network for Controlling the Varroasis Spread within Bee colonies across a Geographical Region
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background: With the global decline of honey bee populations, safeguarding these vital pollinators has become crucial. Varroa destructor mites are a primary threat, weakening bees and facilitating the spread of diseases, which can decimate colonies and disrupt ecosystems. LÄS MER
2. Physical Layer Security for MIMOTransmission of Short PacketCommunications
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. LÄS MER
3. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. LÄS MER
4. Develop A Predictive Model & Analyze The Impact On Common Memory Usage In A 5G Radio Unit
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : .... LÄS MER
5. Android Malware Detection Using Machine Learning
Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. LÄS MER