Haku
Viitteet 1-10 / 11
CONTINUOUS DEPLOYMENT WORKFLOW : Case Lego Mindstorms EV3
(Jyväskylän ammattikorkeakoulu, 2014)
This thesis was created for N4S@JAMK project. The N4S@JAMK project is part of Need4Speed program run by DIGILE. The assignment for this thesis had two focuses: to create a continuous deployment chain that would deploy ...
Data Platform Using Open-Source Tools to Support Geospatial Research: case SAR Satellite Based Change Detection
(2023)
Many national and global institutions share open data for anyone to use. One such institution is the European Space Agency (ESA) that shares the images from their satellites as open data. The ESA satellite data was utilized ...
Predicting the electricity consumption of Finland
(Suomen automaatioseura, 2023)
Improved Difference Images for Change Detection Classifiers in SAR Imagery Using Deep Learning
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Detecting One-Pixel Attacks Using Variational Autoencoders
(Springer, 2022)
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
(Springer, 2019)
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ...
Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software
(FRUCT, 2022)
The modern trend of moving artificial intelligence computation near to the origin of data sources has increased the demand for new hardware and software suitable for such environments. We carried out a scoping study to ...
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier
(Springer International Publishing, 2022)
Food supply chain cyber threats: a scoping review
(Springer Nature, 2024)
Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This ...








