Fontys

Technology Impact Cycle Tool

Courses Login

Dela deaths AI

Coronavirus is a family of viruses that are named after their spiky crown. The novel coronavirus, also known as SARS-CoV-2, is a contagious respiratory virus that first reported in Wuhan, China. On the 2nd November 2020, the World Health Organization designated the name COVID-19 for the disease caused by the novel coronavirus. Our aim, as per Dela’s instructions, is to explore and predict COVID-19’s mortality rates through data analysis and projections.

Sharing: Public

Created by: Mickey

Created on: March 23, 2021 8:38 AM

Changed on: March 23, 2021 9:34 AM

Stress Wearable Platform

The goal of this project is to create a fully functioning prototype. which involves the full process from a user wearing a wearable to users being able to see live data on an application (mobile or web). For this to be realized a connection must be made from the wearable to the backend so that data can be collected from the wearable. Once the data from the wearable has been collected, the data needs to be sent to the user interface.

Sharing: Public

Created by: Mikoko

Created on: October 29, 2022 11:36 AM

Changed on: October 29, 2022 1:36 PM

AI

We are building a game revolving around AI. It is crucial that everything is up to standards, ethics wise.

Sharing: Public

Created by: Timmie1998

Created on: June 16, 2020 7:47 AM

Changed on: June 19, 2020 8:46 AM

Wordpress forum

Make a forum to increase the ease of Farmers in Nepal to share their experiences with Farming. The forum should be able to go international after the testing phase.

Sharing: Public

Created by: 386957

Created on: September 8, 2020 7:41 AM

Changed on: September 8, 2020 8:32 AM

Automated Validation of IoT Security Design Patterns for Smart Lamps

The project focuses on automating the validation of IoT security design patterns, specifically for smart lamps like Philips Hue and low-cost models. Using tools such as Node-RED, Nmap, and Wireshark, the system identifies vulnerabilities like weak encryption and insecure communication. It validates security patterns, including encrypted communication and authentication mechanisms. By providing a Proof of Concept, the technology compares security practices in high-end and low-cost devices, aiming to improve IoT security standards. This contributes to both academic research and practical applications in securing IoT devices.

Sharing: Public

Created by: jordik

Created on: November 25, 2024 12:37 PM

Changed on: November 25, 2024 1:15 PM