.

Kirjasto - Tampereen teknillinen yliopisto

Browsing Tampereen teknillinen yliopisto by Title

Sort by: Order: Results:

  • Lahtinen, Essi (2002-05-15)
    The topic of this thesis is assessing the product-line architecture of a warehouse management system by using the SAAM. The case study concentrates on assessing the modifiability of the product line but also reusability ...
  • Ruokonen, Anna (2012-12-14)
    Service-oriented architecture (SOA) is a software architectural style, which relies on reusable and composable services. In addition to software-orientation, SOA includes a business viewpoint, so that business requirements ...
  • Liu, Wei (2012-06-06)
    Scene image classification and retrieval not only have a great impact on scene image management, but also they can offer immeasurable assistance to other computer vision problems, such as image completion, human activity ...
  • Vuorinen, Jyri (2011-02-09)
    Ketterät ohjelmistotuotantomenetelmät ovat laajasti käytössä ohjelmistoteollisuudessa. Yksi suosituimmista menetelmistä on Scrum, joka sisältää tyypillisen ketterän menetelmän tapaan sovelluskehityksen iteratiivisuutta ja ...
  • Purola, Jukka (2000-12-14)
    Tämän työn tavoitteena oli selvittää mitä ominaisuuksia SC-syväpainopaperista tulisi mitata haluttaessa arvioida paperin painettavuutta. Selvityksessä käytettiin apuna kirjallisuutta sekä asiakashaastattelua (painotalo). ...
  • Nurminen, Jukka (2001-02-14)
    Tässä diplomityössä on pohdittu kahta protokollasuunnittelun toteutusvaiheeseen liittyvää tekijää. Ensin on tarkasteltu SDL-kielisen protokollakuvauksen osittelua heterogeeniseen kohdeympäristöön ja toiseksi on arvioitu ...
  • Belimpasakis, Petros (2009-06-17)
    User generated content, captured with handheld and mobile devices, is constantly increasing both in terms of quantity and quality, as modern devices have become very affordable and easy to use. At the same time, wide ...
  • Suomela, Tero (2000)
    Communication in open networks is liable to eavesdropping and other security attacks. Security can be improved by using proper security systems which are based on strong cryptographic methods. An important step in the field ...
  • Huttunen, Mikko J. (2013-05-18)
    In this work, nonlinear light-matter interactions occurring at the focal volume of a tightly focused laser beam are studied and two new techniques for microscopy are developed. The techniques are based on the nonlinear ...
  • Vesa, Ilkka (2003-03-12)
    During the last tem years, the Internet has extended rapidly and developed technically. New access technologies and especially wireless networks have given Internet service providers an opportunity to offer customers the ...
  • Alapoikela, Tero (2008-02-06)
    The aim of the thesis was to study how to develop a secure power supply for an electric actuator, which will control the fuel racks in The Company. The position of the fuel rack defines the amount of fuel injected to the ...
  • Sundquist, Jaakko (1998-12-09)
    The massive growth of the Internet has created an increasing demand for conveying also the telephone traffic, traditionally transmitted through circuit-switched telephone networks, in this packed-based network. At the same ...
  • Aghababaee Tafreshi, Mona (2013-10-09)
    Wireless memories are the new trend in memory technology and a result of the latest advances in wireless and data transfer technologies. Allowing transfer of large amounts of data between a host device (e.g., a computer, ...
  • Nikunen, Joona (2001-02-14)
    Verkko on ollut teollisuusprosessien ohjauksen pohjana jo vuosikymmeniä. Niin kauan kuin turvallisuus perustui täydelliseen eristyneisyyteen, ei ollut tarvetta miettiä tietoturvakysymyksiä. Vasta viime aikoina, kun teolliset ...
  • Salli, Karri-Tuomas (1998)
    Wireless Local Area Network (WLAN) technology has been considered very promising for wireless indoor communication purposes during the last few years. Although WLANs give new dimensions for networking and user mobility ...
  • Airaksinen, Mikko (2001-08-22)
    The IP -based Data Communication Network (DCN) provides the means of connectionbetween the Operations Support Systems (OSS) and the network elements. The OSS isresponsible for the configuration and management of the various ...
  • Palokangas, Sakari (2007-09-19)
    Histopathology studies diseased tissue using tissue sections. In cancer diagnostics, especially quantitative and morphological properties of nuclei are of interest. To replace the slow manual analysis, considerable effort ...
  • Farinha, Ricardo (2008-08-13)
    The thesis proposes and evaluates fully automatic segmentation methods for the extraction of striatal brain surfaces from high resolution positron emission tomography (PET) images. Both the right and the left striata were ...
  • Korpelainen, Tomi (2007-10-17)
    AB3:Biologiset tutkimukset tukeutuvat yhä enemmän automaattisiin kuva-analyysimenetelmiin. Jotta nämä automaattiset menetelmät voivat korvata perinteisesti käytössä olevat manuaaliset analyysit, on niiden oltava tarkkoja ...
  • Jokinen, Timo (2013-10-09)
    Maailmalla on paljon tietoa liittopilarien käyttäytymisestä tulipalossa, ja niille on olemassa hyviä mitoitusohjeita. Suurimassa osassa tutkimuksia palon on kuitenkin oletettu vaikuttavan samalla tavalla jokaiseen pilarin ...