• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1531
  • 192
  • 128
  • 104
  • 19
  • 18
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 3
  • Tagged with
  • 2199
  • 2199
  • 850
  • 456
  • 442
  • 283
  • 277
  • 249
  • 242
  • 221
  • 214
  • 202
  • 201
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Design, implementation and evalulation of the user interface for healthcare information systems in Hong Kong

梁綿榮, Leung, Min-wing, Raymond. January 2001 (has links)
published_or_final_version / Community Medicine / Master / Master of Philosophy
522

A mobile object container for dynamic component composition

翁楚灝, Yung, Chor-ho. January 2001 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
523

A virtual reality modeling tool for students of architecture

黃偉生, Wong, Wai-sang. January 2000 (has links)
published_or_final_version / Architecture / Master / Master of Philosophy
524

A user interface builder/manager for knowledge craft /

Sedighian, Kamran January 1987 (has links)
No description available.
525

Multi-user interface for group ranking: a user-centered approach

Luk, Wai-Lan 11 1900 (has links)
The proliferation of collaborative computer applications in the past decade has resulted in a corresponding increase in the need for multi-user interfaces. The current research seeks to contribute to the design of a user-centered multi-user interface for a group ranking task. User requirements were identified by observing groups perform the ranking task in a non-computer environment. A design was proposed based on these identified requirements. The user-centered design was compared to preliminary designs based on the intuitions of programmers. The conclusions indicate that an analysis of observations in the non-computer environment does yield insight beyond the initial intuition of programmers. A prototype based on the user-centered design was implemented. Informal user evaluation was performed by observing users working with the prototype and obtaining verbal feedback both on the ease of use of the system and on possible improvements. The informal user evaluation provides evidence for the usefulness of user-centered design. The evaluation also suggests that not all features identified were found useful and not all features necessary were identified.
526

A concept of operations utilizing interactive graphics for rapid military deployment in a crisis situation

Nulty, William Glenn 12 1900 (has links)
No description available.
527

Improving operator effectiveness in monitoring complex systems : a methodology for the design of interactive monitoring and control interfaces

Thurman, David A. 05 1900 (has links)
No description available.
528

Identification of an operator's associate model for cooperative supervisory control situations

Bushman, James B. 05 1900 (has links)
No description available.
529

Effects of representation on programming behavior

Allen, Jeanette 05 1900 (has links)
No description available.
530

An improved randomization of a multi-blocking jpeg based steganographic system.

Dawoud, Peter Dawoud Shenouda. January 2010 (has links)
Steganography is classified as the art of hiding information. In a digital context, this refers to our ability to hide secret messages within innocent digital cover data. The digital domain offers many opportunities for possible cover mediums, such as cloud based hiding (saving secret information within the internet and its structure), image based hiding, video and audio based hiding, text based documents as well as the potential of hiding within any set of compressed data. This dissertation focuses on the image based domain and investigates currently available image based steganographic techniques. After a review of the history of the field, and a detailed survey of currently available JPEG based steganographic systems, the thesis focuses on the systems currently considered to be secure and introduces mechanisms that have been developed to detect them. The dissertation presents a newly developed system that is designed to counter act the current weakness in the YASS JPEG based steganographic system. By introducing two new levels of randomization to the embedding process, the proposed system offers security benefits over YASS. The introduction of randomization to the B‐block sizes as well as the E‐block sizes used in the embedding process aids in increasing security and the potential for new, larger E‐block sizes also aids in providing an increased set of candidate coefficients to be used for embedding. The dissertation also introduces a new embedding scheme which focuses on hiding in medium frequency coefficients. By hiding in these medium frequency coefficients, we allow for more aggressive embedding without risking more visual distortion but trade this off with a risk of higher error rates due to compression losses. Finally, the dissertation presents simulation aimed at testing the proposed system performance compared to other JPEG based steganographic systems with similar embedding properties. We show that the new system achieves an embedding capacity of 1.6, which represents round a 7 times improvement over YASS. We also show that the new system, although introducing more bits in error per B‐block, successfully allows for the embedding of up to 2 bits per B‐block more than YASS at a similar error rate per B‐block. We conclude the results by demonstrating the new systems ability to resist detection both through human observation, via a survey, as well as resist computer aided analysis. / Thesis (M.Sc.)-University of KwaZulu-Natal, Durban, 2010.

Page generated in 0.052 seconds