• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 378
  • 230
  • 194
  • 83
  • 42
  • 26
  • 20
  • 19
  • 11
  • 8
  • 7
  • 7
  • 5
  • 5
  • 5
  • Tagged with
  • 1133
  • 348
  • 332
  • 210
  • 210
  • 176
  • 141
  • 128
  • 124
  • 122
  • 113
  • 98
  • 97
  • 97
  • 95
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
431

Visualisering av vägdata i en AR-app

Nyqvist, Ida January 2020 (has links)
I och med smarttelefonens intåg i våra liv har Augmented Reality (AR) kommit att bli en teknik i ropet. Många företag och utvecklare är intresserade av att undersöka dess potentiella användningsområden för just deras nisch. Men det är inte bara fantasin som sätter gränser - även hårdvaran.2018 lanserades ARCore, en uppsättning utvecklingsverktyg för att bygga AR-appar för Android-smartmobiler. ARCore i sig har inte stöd för att bygga positionsbaserade appar, men i och med att smartmobiler och surfplattor är utrustade med GPS och kompass för att kunna avgöra sin position och orientering, syftar detta arbete till att utreda hur en platsbaserad AR-app för Android kan utvecklas, med målet att visa vägdata som AR-objekt.Projektet inleddes med en litteraturstudie för att undersöka teorierna bakom AR, positionsteknik och redan existerande platsbaserade AR-appar. Vidare genomfördes en fallstudie av att utveckla en AR-app för att visa utvald vägdata i stadsmiljö. Appen testades i stadsmiljö, där det upptäcktes att enhetens platsnoggrannhet var för dålig för att kunna placera och visa AR-objekt någorlunda verklighetstroget. Därefter gjordes en uppföljande litteraturstudie på området positionsteknik och platsnoggrannhet hos dagens mobila enheter för att undersöka vilka faktorer som påverkar enheters förmåga att bestämma sin position. Den uppföljande litteraturstudien visade att platsnoggrannheten framförallt påverkas av höga byggnader i närmiljön. / The introduction of the smartphone as we know it today, has made Augmented Reality (AR) a hot technology. Many companies and developers want to explore its potential uses within their area of interest. But not only does the imagination set the limits – the hardware does too.In 2018, ARCore was launched, a software development kit (SDK) for building AR apps for Android smartphones. ARCore itself does not provide support for building location-based apps, but since smartphones and tablets are equipped with a GPS and compass to determine their position, this project aims to explore how to develop a location-based AR app for Android, with the goal of visualizing road data as AR objects.The project started with a literature study to explore the theories behind AR, location technology and pre-existing location-based AR apps. This was followed by a case study of building an AR app to display selected road data in an urban environment. Tests with the app in an urban environment revealed that the location accuracy of the device was too poor to display AR objects in their correct position. To explore the major factors affecting a device’s capability to determine its position, a second literature study was conducted in the area of location technology in practice and accuracy of mobile devices. The second literature study showed that the location accuracy is mainly affected by tall buildings in the nearby area of usage.
432

Information Security Risk Assessment : An Analysis of a Medical Aid Service

Hedlund, Filip, Loots, Emma January 2020 (has links)
Security in the healthcare sector has historically been insufficient, seeing several high-profile cyber-attacks crippling availability of equipment and vital services with demands of ransom sums, and intrusions collecting sensitive patient data en masse. For this reason, digital services intended for medical use need to be convincingly secure in order to be adopted. This report investigates how to implement sufficient information security for a system involving a digital pill organiser with mobile application connectivity intended for professional medical use. Each component of the currently-indevelopment Dosis Pro system is systematically evaluated in order to assess which security measures need to be taken for the service to be considered adequately secure. The analysis is structured around the ISO IEC 27001:2013 guidelines, and potential solutions are suggested on a per-component basis based on a broad literature study in related research. The result is practical solutions for 19 highlighted problem areas, which should achieve a reasonable level of security overall in combination with the careful data flow of the service. Further, to achieve an exceptionally secure system it is advisable to test the solutions on a complete system, and continuously carry out similar evaluations and improve its design throughout several years of operation. / Hälsovårdssektorn har genom tiderna utstått många angrepp mot sina digitala verktyg och tjänster. Det har rådit allt från storskaliga dataintrång till förhindrande av kritiska offentliga tjänster med krav på lösensummor. På grund av det här måste digitala produkter avsedda för medicinskt bruk visas vara säkra för att bli accepterade. I detta examensarbete undersöks det hur man kan implementera fullgod datasäkerhet för ett system kring en digital pillerdosa med appanslutning avsedd för bruk inom vården. I rapporten undersöks systematiskt varje komponent av Dosis Pro-tjänsten för att avgöra vilka säkerhetsrisker som existerar och vilka åtgärder som behöver vidtas för att tjänsten ska kunna konstateras vara säker. Analysen struktureras enligt riktlinjerna från ISO IEC 27001:2013, lösningar föreslås komponentvis utifrån en bred litteraturstudie inom relaterad forskning. Resultatet är praktiska lösningar för 19 identifierade problemområden, vilka tillsammans bör uppnå en godkänd säkerhetsnivå medräknat tjänstens försiktiga data-flöde. Vidare, för att uppnå ett exceptionellt säkert system, rekommenderas det att testa lösningarna i ett färdigt system, och kontinuerligt utföra liknande utvärderingar för att göra förbättringar under flera år av drift.
433

Konzeption und Entwicklung eines Konferenzführers für Großereignisse als mobile Applikation für die ICC 2013

Hauck, Christian 08 May 2012 (has links) (PDF)
Das Betriebssystem Android bietet, aufgrund der stetig steigenden Zahl der verfügbaren mobilen Geräte auf Basis dieses System und der ebenfalls stark steigenden Zahl der Nutzer solcher Geräte, eine sehr gute Grundlage zur Entwicklung diverser mobiler Anwendungen. Es kann dabei für jeden erdenklichen Bereich des alltäglichen Lebens, vor allem Freizeit, aber auch Arbeit, eine App auf Grundlage von Android entwickelt werden. Im Bereich der mobilen Eventguides gibt es aktuell noch Entwicklungsbedarf bei den angebotenen mobilen Applikationen. So gibt es zahlreiche Anwendungen für Messen, Konferenzen oder Festivals, allerdings unterscheiden sich diese stark in ihren Funktionen und vor allem in der Darstellung von Karten und Plänen. Häufig werden solche Apps auf Grundlage eines Frameworks erstellt, welches es ermöglicht die App an verschiedene Veranstaltungen anzupassen. Die vorliegende Arbeit beschreibt die Implementierung eines Konferenzführers für die Internationale Kartographische Konferenz 2013 in Dresden. Grundlage für die Implementierung ist dabei die Betrachtung von Orientierungsmethoden und Navigationsanwendungen für Fußgänger im In- und Outdoorbereich und auf Großveranstaltungen. Hierzu werden bereits vorhandene Apps aus dem Bereich Veranstaltungen untersucht. Neben den allgemeinen Funktionen wird ein Augenmerk auf die kartographischen Funktionen solcher Apps gelegt. Im Rahmen der Arbeit wird ein Framework, auf Basis von Android, entwickelt, welches die Erstellung von mobilen Anwendungen für verschiedene Großereignisse ermöglicht. Dieses Framework wird speziell an die Internationale Kartographische Konferenz 2013 angepasst und liefert als Ergebnis eine App, die als digitaler Konferenzführer genutzt werden kann. / The Android operating system offers, due to the increasing number of available mobile devices based on this system and also the rapidly increasing number of users of such devices, a very good basis for the development of various mobile applications. It can be relevant to every conceivable area of everyday life, especially leisure, but also work to develop an app based on Android. It currently still requires development of the offered mobile applications in the area of mobile event guides. There are numerous applications for trade shows, conferences and festivals, but they differ greatly in their functions and, above all in the presentation of maps and plans. Often, such apps are created based on a framework that allows the app to adapt to different events. The present paper describes the implementation of a conference guide for the International Cartographic Conference 2013 in Dresden. Basis for the implementation is the consideration of methods of orientation and navigation applications at indoor and outdoor areas for pedestrians and on major events. To this end, existing applications from the category large events will be studied. Besides the general features a focus is placed on the cartographic features of such apps. A framework, based on Android, which allows the creation of mobile applications for various large events, will be created as part of the work. This framework is adapted to the International Cartographic Conference 2013 and delivers as a result an application that can be used as a digital conference guide.
434

Mobile Real-Time License Plate Recognition

Liaqat, Ahmad Gull January 2011 (has links)
License plate recognition (LPR) system plays an important role in numerous applications, such as parking accounting systems, traffic law enforcement, road monitoring, expressway toll system, electronic-police system, and security systems. In recent years, there has been a lot of research in license plate recognition, and many recognition systems have been proposed and used. But these systems have been developed for computers. In this project, we developed a mobile LPR system for Android Operating System (OS). LPR involves three main components: license plate detection, character segmentation and Optical Character Recognition (OCR). For License Plate Detection and character segmentation, we used JavaCV and OpenCV libraries. And for OCR, we used tesseract-ocr. We obtained very good results by using these libraries. We also stored records of license numbers in database and for that purpose SQLite has been used.
435

Miniatured Inertial Motion and Position Tracking and Visualization Systems Using Android Wear Platform

Patel, Dhruvkumar Navinchandra January 2016 (has links)
No description available.
436

Secure Communication in a Multi-OS-Environment

Bathe, Shivraj Gajanan 02 February 2016 (has links) (PDF)
Current trend in automotive industry is moving towards adopting the multicore microcontrollers in Electronic Control Units (ECUs). Multicore microcontrollers give an opportunity to run a number of separated and dedicated operating systems on a single ECU. When two heterogeneous operating systems run in parallel on a multicore environment, the inter OS communication between these operating systems become the key factor in the overall performance. The inter OS communication based on shared memory is studied in this thesis work. In a setup where two operating systems namely EB Autocore OS which is based on AUTomotive Open System Architecture standard and Android are considered. Android being the gateway to the internet and due to its open nature and the increased connectivity features of a connected car, many attack surfaces are introduced to the system. As safety and security go hand in hand, the security aspects of the communication channel are taken into account. A portable prototype for multi OS communication based on shared memory communication with security considerations is developed as a plugin for EB tresos Studio.
437

Konsumentbeteendet på Mobiltelefonmarknaden : En studie om applikationsanvändandet

Chabane, Karim, Pärnänen, Christoffer, Viel Lamare, Philippe January 2010 (has links)
<p>Studien är en undersökning om hur olika delar av konsumentbeteendet bland applikationsanvändare ser ut. En applikation är ett program eller en tjänst som tillför en ny funktion i mobiltelefonen. Studiens syfte och problemformulering hur olika delar av konsumentbeteendet ser ut och utifrån det ta fram den typiske applikationsanvändaren. Som teoretisk referensram används en bearbetad version av Peter & Olsons (2008) Wheel of consumer analysis som vi kallar konsumenthjulet. Konsumenthjulet består av affekt och kognition, konsumenters omgivning och beteende. Dessa områden för att få en övergripande bild över konsumentbeteendet.</p><p>En kvantitativ studie genomfördes genom en webbenkät för att samla in nödvändig data för studien. Enkätdistributionen skedde via forum och sociala medier för att få en så stor spridning som möjligt bland respondenter.</p><p>I Analysen diskuteras resultatet utifrån konsumenthjulet. Det visar sig att engagemang har stor betydelse för hur applikationer används och delarna av konsumenthjulet påverkas av just detta.  I slutsatsen diskuterades den typiska applikationsanvändaren fram och kortfattat är det en man i 25 års ålder som är en hög engagemangsanvändare av applikationer. För fortsatta studier rekommenderas studier om hur företag ska marknadsföra applikationer och mer djupingående studier som kan besvara <em>varför</em> applikationsanvändare beter sig som de gör.</p> / <p>This thesis is a study about the consumer behavior on the cellular telephone market regarding the usage of applications that can be downloaded and used on the cellular telephone. An application is a program or a service that contributes new functions to the cellular telephone. The purpose and main question of the thesis is to describe how different theory parts of the Consumer Wheel form the typical application user. The theoretical frame of reference was an adapted form of Peter & Olsons (2008) Wheel of consumer analysis, a theory framework used to describe the consumer behavior. The Consumer Wheel consist of three parts; affect and cognition, consumer environment and behavior.</p><p>A quantitative study was carried out through a web-based survey to collect the necessary data for the thesis. The survey was distributed through internet forums and social networks to get as large spread of the survey as possible.</p><p>In the analyze part of the thesis the result is discussed with the Consumer Wheel. Involvement seem to have a large meaning on how applications are used and that the different parts of the Consumer Wheel are influenced by the level of involvement. In the conclusion part the typical application user is presented as a 25 year old male and he is a high involvement application user. Future studies should focus on how companies can market applications and studies on why application users behave as they do.</p>
438

Predlog proširenja Android operativnog sistema servisima digitalne televizije / One approach to the extension of Android operating system with digital TV services

Lukić Nemanja 02 October 2014 (has links)
<p>Ova disertacija se bavi istraživanjem u oblasti integracije servisa digitalne televizije u moderne uređaje potrošačke elektronike. Cilj teze je da razvije pristup za sistemsko proširenje Android operativnog sistema servisima digitalne televizije, i da predloži rešenje koje omogućuje rad u realnom vremenu. Kvalitet rešenja se ocenjuje odgovarajućim metrikama preko ocene kvaliteta implementirane Java objektno orijentisane sprege za TV servise. Osnovni doprinos teze se ogleda u definisanju jedinstvene programske sprege servisa digitalne televizije na platformama koje prate paradigmu virtuelne mašine. Predloženo rešenje omogućuje razvoj aplikacija optimizovanih za izvršavanje na TV uređajima i dalje sprezanje podataka TV servisa sa ostatkom Android ekosistema.</p> / <p>This PhD dissertation addresses the problem of integration of the digital TV services inside modern consumer electronic devices. The main focus of the dissertation is a development of systematic approach for extension of Android operating system with support for digital television. Combined with this, the dissertation describes solution in form of hardware platform with accompanying software that closely follows this approach and achieves real-time performance. Quality of proposed solution is benchmarked using metrics for measuring quality of object-oriented program code. The main contribution of the dissertation is unification of system software API for digital television on Android-based platforms. Proposed solution allows development of TV-centric software capable of real-time performance, and further native integration of data coming from DVB broadcast into Android ecosystem.</p>
439

Highlight and execute suspicious paths in Android malware / Mettre en avant et exécuter les chemins suspicieux dans les malwares Android

Leslous, Mourad 18 December 2018 (has links)
Les smartphones sont devenus omniprésents dans notre vie quotidienne à cause des options qu'ils proposent. Aujourd'hui, Android est installé sur plus de 80% des smartphones. Les applications mobiles recueillent une grande quantité d'informations sur l'utilisateur. Par conséquent, Android est devenu une cible préférée des cybercriminels. Comprendre le fonctionnement des malwares et comment les détecter est devenu un défi de recherche important. Les malwares Android tentent souvent d'échapper à l'analyse statique en utilisant des techniques telles que l'obfuscation et le chargement dynamique du code. Des approches d'analyse ont été proposées pour exécuter l'application et surveiller son comportement. Néanmoins, les développeurs des malwares utilisent des bombes temporelles et logiques pour empêcher le code malveillant d'être exécuté sauf dans certaines circonstances. Par conséquent, plus d'actions sont requises pour déclencher et surveiller leurs comportements. Des approches récentes tentent de caractériser automatiquement le comportement malveillant en identifiant les endroits du code les plus suspicieux et en forçant leur exécution. Elles se basent sur le calcul des graphes de flot de contrôle (CFG) qui sont incomplets, car ils ne prennent pas en considération tous les types de chemins d'exécution. Ces approches analysent seulement le code d'application et ratent les chemins d'exécution générés quand l'application appelle une méthode du framework, qui appelle à son tour une autre méthode applicative. Nous proposons GPFinder, un outil qui extrait automatiquement les chemins d'exécution qui mènent vers les endroits suspicieux du code, en calculant des CFG qui incluent les appels interprocéduraux explicites et implicites. Il fournit aussi des informations clés sur l'application analysée afin de comprendre comment le code suspicieux a été injecté dans l'application. Pour valider notre approche, nous utilisons GPFinder pour étudier une collection de 14224 malwares Android. Nous évaluons que 72,69% des échantillons ont au moins un endroit suspicieux du code qui n'est atteignable qu'à travers des appels implicites. Les approches de déclenchement actuelles utilisent principalement deux stratégies pour exécuter une partie du code applicatif. La première stratégie consiste à modifier l'application excessivement pour lancer le code ciblé sans faire attention à son contexte originel. La seconde stratégie consiste à générer des entrées pour forcer le flot de contrôle à prendre le chemin désiré sans modifier le code d'application. Cependant, il est parfois difficile de lancer un endroit spécifique du code seulement en manipulant les entrées. Par exemple, quand l'application fait un hachage des données fournies en entrée et compare le résultat avec une chaîne de caractères fixe pour décider quelle branche elle doit prendre. Clairement, le programme de manipulation d'entrée devrait inverser la fonction de hachage, ce qui est presque impossible. Nous proposons TriggerDroid, un outil qui a deux buts : forcer l'exécution du code suspicieux et garder le contexte originel de l'application. Il fournit les événements framework requis pour lancer le bon composant et satisfait les conditions nécessaires pour prendre le chemin d'exécution désiré. Pour valider notre approche, nous avons fait une expérience sur 135 malwares Android de 71 familles différentes. Les résultats montrent que notre approche nécessite plus de raffinement et d'adaptation pour traiter les cas spéciaux dus à la grande diversité des échantillons analysés. Finalement, nous fournissons un retour sur les expériences que nous avons conduites sur différentes collections, et nous expliquons notre processus expérimental. Nous présentons le dataset Kharon, une collection de malwares Android bien documentés qui peuvent être utilisés pour comprendre le panorama des malwares Android. / The last years have known an unprecedented growth in the use of mobile devices especially smartphones. They became omnipresent in our daily life because of the features they offer. They allow the user to install third-party apps to achieve numerous tasks. Smartphones are mostly governed by the Android operating system. It is today installed on more than 80% of the smartphones. Mobile apps collect a huge amount of data such as email addresses, contact list, geolocation, photos and bank account credentials. Consequently, Android has become a favorable target for cyber criminals. Thus, understanding the issue, i.e., how Android malware operates and how to detect it, became an important research challenge. Android malware frequently tries to bypass static analysis using multiple techniques such as code obfuscation and dynamic code loading. To overcome these limitations, many analysis techniques have been proposed to execute the app and monitor its behavior at runtime. Nevertheless, malware developers use time and logic bombs to prevent the malicious code from executing except under certain circumstances. Therefore, more actions are needed to trigger it and monitor its behavior. Recent approaches try to automatically characterize the malicious behavior by identifying the most suspicious locations in the code and forcing them to execute. They strongly rely on the computation of application global control flow graphs (CFGs). However, these CFGs are incomplete because they do not take into consideration all types of execution paths. These approaches solely analyze the application code and miss the execution paths that occur when the application calls a framework method that in turn calls another application method. We propose in this dissertation a tool, GPFinder, that automatically exhibits execution paths towards suspicious locations in the code by computing global CFGs that include edges representing explicit and implicit interprocedural calls. It also gives key information about the analyzed application in order to understand how the suspicious code was injected into the application. To validate our approach, we use GPFinder to study a collection of 14,224 malware samples, and we evaluate that 72.69% of the samples have at least one suspicious code location which is only reachable through implicit calls. Triggering approaches mainly use one of the following strategies to run a specific portion of the application's code: the first approach heavily modifies the app to launch the targeted code without keeping the original behavioral context. The second approach generates the input to force the execution flow to take the desired path without modifying the app's code. However, it is sometimes hard to launch a specific code location just by fuzzing the input. For instance, when the application performs a hash on the input data and compares the result to a fixed string to decide which branch of the condition to take, the fuzzing program should reverse the hashing function, which is obviously a hard problem. We propose in this dissertation a tool, TriggerDroid, that has a twofold goal: force the execution of the suspicious code and keep its context close to the original one. It crafts the required framework events to launch the right app component and satisfies the necessary triggering conditions to take the desired execution path. To validate our approach, we led an experiment on a dataset of 135 malware samples from 71 different families. Results show that our approach needs more refinement and adaptation to handle special cases due to the highly diverse malware dataset that we analyzed. Finally, we give a feedback on the experiments we led on different malware datasets, and we explain our experimental process. Finally, we present the Kharon dataset, a collection of well documented Android malware that can be used to understand the malware landscape.
440

GNSS undersökning : För bättre precision i smartphones

Fredin, Elias January 2019 (has links)
To be able to receive a position from a smartphone user is very valuable. Wit- hout this many applications would not work at all. For many applications the existing position libraries are not good enough, for example augmented reality applications which requires millimeter precision for a good experience. The goal of this report is to study if GNSS positioning can be improved for smartphones.The study focuses mostly on Android and has the goal of using the method “trilateration” to combine multiple satellites position and their distance to a receiver in order to calculate a real position. The projekt consists of two parts: and Android application and a Java Tomcat server. The android applica- tion uses the programming library “Location” to access raw GNSS-data for cal- culating the distance between the receiver and the satellites, which is called “pseudorange”, and the server functions as a REST API which provides GALI- LEO satellites current position. The project tries to combine these parameters in the Application to create a position. Although the report did not succeed in com- bining these parameters to calculate a position, it does describe of it is still pos- sible; which applications has succeeded before and what others ought to think about when starting similar studies. This project would require a bit more time to reach its end goal, but the fact that raw GNSS-data has become available to all developers on Android is a promising development since others may conti- nue or do their own research. This project focuses solely on GALILEO satelli- tes, mostly to time constraints. In future works all available satellite constella- tions should be used for better results. / Att få en position av en smartphoneanvändare är mycket användbart, utan detta skulle många applikationer inte fungera alls. För många applikationer är den givna positionerings biblioteken inte tillräckligt bra dock, som t.ex. för augmen- ted reality applikationer som kräver millimeter-säker precision för en bra an- vändarupplevelse. Målet med denna rapport är att undersöka om GNSS-positio- nering kan förbättras inom smartphones. Undersökningen fokuserar mest på Android och har som målsättning att använda metoden “trilateration” för att kombinera satelliternas position och dess distans till en mottagare för att sedan räkna ut en verklig position. Projektet består av två delar: en Android applika- tion och en Java TomCat server. Android applikationen använder programme- rings biblioteket “Location” för att få tag på rå GNSS-data för att räkna ut di- stansen mellan satelliter och mottagaren, vilket kallas för “pseudorange”, och servern fungerar som ett REST API som returnerar GALILEO-satelliters nuva- rande position. Applikationen försöker kombinera pseudorange och satelliter- nas position med trilateration för at få ut mottagarens position. Rapporten lyck- as inte uppnå detta mål dock, men den beskriver hur det ändå är möjligt, vilka andra applikationer som lyckats och vad andra bör tänka på om de vill göra lik- nande studier. Det skulle behövas lite mer tid för att avsluta detta projekt, men faktumet att råa GNSS-data har blivit tillgänglig för alla Android-utvecklare, från att ha varit helt gömd, är en lovande utveckling då det låter andra forska på egen hand. Detta projekt fokuserar enbart på GALILEO satelliter, mestadels för tidsbegränsningar.

Page generated in 0.0447 seconds