• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 375
  • 230
  • 192
  • 83
  • 42
  • 26
  • 20
  • 19
  • 11
  • 8
  • 7
  • 7
  • 5
  • 5
  • 5
  • Tagged with
  • 1126
  • 344
  • 329
  • 209
  • 208
  • 174
  • 139
  • 125
  • 124
  • 121
  • 113
  • 97
  • 96
  • 96
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Bitcoin NFC

Bronleewe, David Allen 07 November 2011 (has links)
Bitcoin is a new digital, virtual currency. Unlike other currencies, it is not controlled by a single company, financial institution or government. Instead, it is controlled by a peer-to-peer network of clients running the open-source Bitcoin software. When using Bitcoin, online transactions can be made directly between two parties without the need for a trusted third party such as Paypal, Visa or a bank. This paper describes the development of Bitcoin NFC, an Android app designed to send bitcoins from one Android device to another. The technology used for sending information between devices is Near Field Communication (NFC), a very close-ranged wireless protocol. NFC allows devices to communicate by simply touching two devices together. There is no need for any configuration or pairing. Bitcoin NFC makes it possible to use bitcoins for point-of-sale transactions. Rather than swiping a credit card, a phone running Bitcoin NFC could be swiped instead. / text
22

A Web- and App- Based Interaction System Bridging the Gap between Patients and Doctors

Li, Zehua, Luo, Dan January 2014 (has links)
In modern society, people are lack of physical activity and have a poor eating habit. A sedentary lifestyle causes an increase of disease and death rate among European Union. Compared to the general population, people with Several Mental Illness(SMI) suffer more from poor health condition. Thus the project, as a part of the LIFEHOPE.EU, is established to ameliorate to this circumstances through encouraging people with SMI to regularly attend physical exercises and eat a balanced diet. However, most patients with SMI who participate in the program live in remote areas. It is inconvenient to hold face-to-face meetings with either doctors or group menmbers. Therefore, it is necessary to develop a system to solve this problem. The system contains an Android application for patients and an administrative website for doctors to keep contact with patients in order to monitor and assist patients' recovery. In this paper, the system is based on Apache Web Server and Android. How the functions of this system are created and realized will be  elaboratly introduced and illustrated. In addition, CakePHP framework applies in website development. After design and implementaion, tests will be run on both the the Android app and the website to evaluate security and performance.
23

PScout: Analyzing the Android Permission Specification

Au, Kathy Wain Yee 18 March 2013 (has links)
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of the security mechanisms these systems use is permission system. We perform an analysis of the Android permission system in an attempt to begin answering some of the questions that have arisen about its design and implementation. We developed PScout, a tool that extracts the permission specification from the Android OS source code using static analysis and analyzed 5 versions of Android spanning version 2.2 up to the recently released Android 4.1. Our main findings are that while there is little redundancy in the permission specification, if applications could be constrained to only use documented APIs, then about 18-26% of the non-system permissions can be hidden. Finally, we find that a trade-off exists between enabling least-privilege security with fine-grained permissions and maintaining stability of the permission specification as the Android OS evolves.
24

Zpracování obrazu prostřednictvím mobilních zařízení

Čermák, Pavel January 2013 (has links)
No description available.
25

Mobilní aplikace pro sledování osobních financí

Kejda, Jan January 2013 (has links)
No description available.
26

Checkers game app

Sharan, Smita January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Daniel Andresen / Android Phones and Tablets are driven by apps and becoming more and more popular these days. Enthusiastic game players around the world are always looking for fun and exciting games which are easily accessible from their handheld devices like smartphones, tablets etc. Checkers is one such mobile game app based on the popular game American Checkers or Draughts and is developed on Android platform. This game is turn based in which players play against each other. The player capture the pieces of opponent and progresses diagonally, trying to become the winner by capturing all the pieces of opponent or blocking the opponent so that there is no legal moves left. There are various features in the game. Instant messaging allows players to chat during the game.. Saved Games feature lets users to play the incomplete games later. Leaderboards and Scores make the game competitive as players can see their rankings and scores after the game. Tournaments and Scheduling enables players to schedule matches. Tournament is scheduled with Round Robin process wherein each player plays with all other players in turn and finally winner is declared after end of the game.
27

Manga Feed

Gregoire, Andre Maurice January 1900 (has links)
Master of Science / Department of Computer Science / Mitchell L. Neilsen / Mobile technology has advanced significantly in the last decade, devices have gotten smaller and much more powerful. Because mobile devices are so accessible, they have spread everywhere and are used extensively by an immense portion of the population for various tasks. Mobile devices are no longer a means to just communicate with another person, you can use them to take pictures, scan documents, create a Wi-Fi hotspot, or just be entertained. E-Readers have been around for a while and implemented as a source of entertainment on many mobile platforms. However very few e-readers for Manga, which is a type of comic book, have been developed. Manga Feed, built on the Android platform, strives to help fill this void by providing a clean and simple to user interface for users to enjoy reading on the go. There are thousands of manga of various genres made available to users, offering entertainment to any individual interested in manga.
28

Family Tracker

Mandadi Venkata, Uma Maheshwar Reddy January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Daniel A. Andresen / People always want know the whereabouts of their loved ones. They want to make sure everything is fine and that they are safe all the time. In this modern age, almost everyone owns a smart phone, which they tend to keep on them all the time. By using these smartphones, we can locate a person anywhere in this world. Android is open source software stack and has the highest smart phone user base. Hence, this application is developed in android. The Family Tracker is an android Application used for finding whereabouts of a person in the most efficient and simple manner. Here we will be having guardians and subjects (users), where users add other people as their guardians. When the user does not lift the phone, the details of his location are sent to the guardian in the form of an SMS. Here the address along with the location link will be sent, using which we can locate it in the map. Guardian can also get the location of user by sending out an SMS to his phone. A one click messaging service is also implemented in this application through which guardian can send message to user’s friends in one click for further inquiry. In order to make this application more helpful for the users, Geo-Fencing is implemented through which guardian can know whether the subject is in or around a particular place (location) of interest (Ex: a university).
29

Monitoring and Preventing Data Exfiltration in Android-hosted Unmanned Aircraft System Applications

Malik, Akshat 06 August 2019 (has links)
With the dominance of Android in the smartphone market, malware targeting Android users has increased over time. Android applications are now being used to control unmanned aircraft systems (UAS) making smartphones the storehouse for all the data that is generated by the UAS. This data can be sensitive in nature which puts the user at the risk of data exfiltration. As most Android-hosted UAS applications are proprietary software, their source code cannot be studied or modified. This thesis discusses an external monitoring system which is devised in order to assess the threat of data exfiltration. The system is further used to analyze the network behavior of the popular Android-hosted UAS application, DJI GO 4. Current methods to limit data exfiltration are discussed along with their limitations and are categorized based on the ease of deployment. Even though the Android framework provides a permission system which helps to limit the capabilities of an application, this security mechanism is coarse-grain in nature. The user either allows access to the required permissions or the application fails to function. Moreover, there is no system in place to provide finer control over the existing permissions that are granted to an application. This thesis proposes a fine-grain and application-specific access control mechanism based on system call interposition. The solution focuses on limiting the I/O operations of the target application without any framework or application modification. / Master of Science / Advances in smartphone technology has led major consumer and commercial unmanned aircraft system (UAS) manufacturers to provide users with the feature to fly the UAS using their smartphones. The UAS generate and store large amounts of data which may be sensitive in nature. This has led the U.S. Department of Defense to ban the use of all commercial off-the-shelf UAS due to the threat of data leakage. This thesis discusses an external monitoring system which maps the network behavior of an Android-hosted UAS application, along with the existing methods to limit data leakage. To overcome the limitations of existing techniques, a fine-grain and application-specific access control mechanism is proposed. The solution provides users with the ability to enforce custom security policies to safeguard their data.
30

Vizualizace geodat v rozšířené realitě

Bílek, Adam January 2017 (has links)
The aim of this thesis is to design and implement a mobile application for a user-friendly visualization of geodata in augmented reality. The application is created in Java using Android SDK and Android Studio IDE. Geodata represented as geographic points is imported into the application via KML format. The data is shown over a native camera preview as a virtual overlay with use of sensors and GPS. Some of the viewing parameters are adjustable via GUI.

Page generated in 0.0421 seconds