• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1683
  • 222
  • 132
  • 106
  • 19
  • 18
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 3
  • Tagged with
  • 2393
  • 2393
  • 1002
  • 458
  • 443
  • 290
  • 287
  • 254
  • 247
  • 227
  • 221
  • 206
  • 202
  • 201
  • 188
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

Klientbaserad GeoTIFF-rendering

Lewin, Marcus, Grant, Harald January 2017 (has links)
När en användare idag efterfrågar rendering av en kartvy i en applikation behöver en server först rendera en bild utifrån given geografisk data och därefter skicka bilden till klientens mobila enhet. Detta kan resultera i höga responstider, speciellt för användare som befinner sig i områden med bristfällig täckning. I denna studie utvärderas en alternativ lösning där rendering istället sker direkt på klientens enhet. En prototyp av en mobil kartapplikation med stöd för lokal rendering av geografisk rådata utvecklas och utvärderas utefter en konstant för acceptabel fördröjning vid visualisering av information. Resultatet av testerna visar att prototypens prestanda är beroende av mängden information som ska visas. För högre zoomnivåer ger prototypen ett tillfredsställande resultat, men vidare åtgärder krävs för de lägre nivåerna. De främsta utmaningarna vid utvecklingen av applikationen redovisas och förbättringsförslag för fortsatt utveckling framförs.
312

Methods for developing visualizations in a non-designer environment : A case study

Antonov, Vera, Sterner, Adam January 2019 (has links)
Teams consisting of only software developers will occasionally need to develop products that has to be easy to use. User Centered Design (UCD) is one approach to help increase the ease of use of a product and that can be incorporated into the teams’ traditional workflow when needed. The software developer team followed in this thesis had not tried to incorporate UCD into their current workflow when developing such products. So, this thesis looks at how a product designed with an agile/UCD approach differs from a product developed by the software development team’s traditional approach. The two products were designed to solve the same problem. The results show that the product developed with an agile/UCD-approach gave better usability rankings and better external appeal than the one created with the team’s traditional approach. On the other hand, traditional methods constitute a better choice for quick development of products for more technical user groups within the company for example.
313

Software development for embedded systems

Bapoo, Hansraj 14 July 2016 (has links)
A dissertation submitted to the Faculty of Engineering, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Master of Science in Engineering. Johannesburg, 1996. / This report examines the major factors influencing the development of embedded systems. The discussion covers, among other aspects, features of embedded systems that are common to software development in general, the main characteristics of embedded systems, some of the current development strategies, the mlcrocontroller market, language issues and development tools. Following the assessment study and a practical embedded system development, the report concludes that although: I embedded systems are typified by relatively few lines of codes, their complex nature necessitates the application of a disciplined development approach. The report presents a riskbased hardware-software co-design development approach in an attempt to reconcile the existing formal development models to the technical realities of embedded systems. A practical embedded system case study is presented, It involves the development of a microcontroller-based system for the three-phase inverter of an uninterruptible power supply (UPS).
314

Smart cropping tools with help of machine learning

Kanwar, John January 2019 (has links)
Machine learning has been around for a long time, the applications range from a big variety of different subjects, everything from self driving cars to data mining. When a person takes a picture with its mobile phone it easily happens that the photo is a little bit crooked. It does also happen that people takes spontaneous photos with help of their phones, which can result in something irrelevant ending up in the corner of the image. This thesis combines machine learning with photo editing tools. It will explore the possibilities how machine learning can be used to automatically crop images in an aesthetically pleasing way and how machine learning can be used to create a portrait cropping tool. It will also go through how a straighten out function can be implemented with help of machine learning. At last, it is going to compare this tools with other software automatic cropping tools. / Maskinlärning har funnits en lång tid. Deras jobb varierar från flera olika ämnen. Allting från självkörande bilar till data mining. När en person tar en bild med en mobiltelefon händer det lätt att bilden är lite sned. Det händer också att en tar spontana bilder med sin mobil, vilket kan leda till att det kommer med något i kanten av bilden som inte bör vara där. Det här examensarbetet kombinerar maskinlärning med fotoredigeringsverktyg. Det kommer att utforska möjligheterna hur maskinlärning kan användas för att automatiskt beskära bilder estetsikt tilltalande samt hur maskinlärning kan användas för att skapa ett porträttbeskärningsverktyg. Det kommer även att gå igenom hur en räta-till-funktion kan bli implementerad med hjälp av maskinlärning. Till sist kommer det att jämföra dessa verktyg med andra programs automatiska beskärningsverktyg.
315

Effektiv patchhantering / Efficient patch management

Karlsson, Magnus January 2019 (has links)
Organisationer är utsatta för ständiga säkerhetshot på internet och penetrationstester uppdagar hur sårbara nätverken är när mjuk- och hårdvara inte är uppdaterade. Uppdateringar i IT-sammanhang kallas ”patchar” och brukar generellt förbättra antingen funktioner eller säkerhet. Det finns en arbetsprocess inom IT kallad patch management, som ansvarar för hur mjukvara och annan utrustning uppdateras för att göra nätverket säkrare. Idag finns stora utmaningar i arbetsprocessen och denna studie undersöker hur arbetet kan effektiviseras. Ett problem historiskt sett har varit att det släppts för många patchar, vilket gjort det svårare för organisationer att hålla sig uppdaterade. Enligt rekommendationer från standardiseringsorgan ska patchar helst testas innan de implementeras, för att undvika eventuella följdproblem som kan uppstå. Genom intervjuer med personer som har ansvar för patch management, visades att det finns framgångsrika metoder för att hålla systemen uppdaterade, men delvis genom att bortse från vissa rekommenderade arbetsmetoder. Automatiserade verktyg underlättar processen till stor del men det finns delprocesser som ännu inte har blivit fullgott automatiserade. Test av patchar har närmast helt förbigåtts i organisationer vars nätverk är anslutna mot internet, därför att testprocessen i dagsläget tar för mycket tid. Slutsatsen som dragits är att det är att säkrare att snabbt lösa eventuella problem som uppstår på grund av en dålig patch, hellre än att testa patchar under långa perioder, eftersom nätverket är sårbart så länge ett känt säkerhetshål inte har täppts igen. / Organizations are exposed to constant security threats from the internet and penetration tests reveal just how vulnerable networks are when software and hardware patching aren’t up to date. Updates, known in IT as “patches”, usually enhances functions or security. Patch Management is the field in which anything related to patching of software and other various equipment falls under. As of today, Patch Management faces great challenges and the purpose of this study is to understand how the process can be made more efficient. Historically, a common issue has been the number of patch releases, which has made it cumbersome for organizations to stay up to date. Standardization bodies, such as IEC and NIST recommend that patches are tested in test environments before being installed to the production environment, to make sure no unintended consequences arise from faulty patches. Through interviews with professionals working in Patch Management, it became clear that there are ways to stay up to date, but partly through disregarding recommended best practice. Automated tools ease the Patch Management process to great extents but there are still areas that remain non-automated. The testing process has been largely ignored by organizations whose networks are connected to the internet, because said process is much too inefficient. Their answer to the problem of staying up to date is to solve problems quickly that arise through faulty patching, rather than test patches over longer periods of time. Their reasoning being that leaving known vulnerabilities unpatched is more damaging to the network.
316

Virtualized Functional Verification of Cross-Platform Software Applications

Antti, William January 2019 (has links)
With so many developers writing code, so many choose to become a developer every day, using tools to aid in the work process is needed. With all the testing being done for multiple different devices and sources there is a need to make it better and more efficient. In this thesis connecting the variety of different tools such as version control, project management, issue tracking and test systems is explored as a possible solution. A possible solution was implemented and then analyzed through a questionnaire that were answered by developers. For an example results as high as 75\% answering 5 if they liked the connection between the issue tracking system and the test results. 75\% also gave a 5 when asked about if they liked the way the test results were presented. The answers they gave about the implementation made it possible to conclude that it is possible to achieve a solution that can solve some of the presented problems. A better way to connect various tools to present and analyze the test results coming from multiple different sources.
317

Simulating Realistic Ragdoll Behaviour In Physical Situations / Simulering av Realistiskt Ragdoll Beteende i Fysiska Situationer

Stenlund, Pontus January 2019 (has links)
When trying to make a game character come alive and add some sense of realism to a game, it can be done in multiple ways. Animating a 3D model is the commonly used one and it is usually done by hand. The artist moves the model's limbs bit by bit to make small animation clips that are then played in the game. This has a few drawbacks, it's time consuming and depending on what the character is doing in the game it won't always look accurate. Ragdolls can be used together with animations to help bring more realism to the model. Together with animation and colliders on the model limbs, it can simulate when the models limbs interact with objects on the screen. It can also simulate physical responses that happen. But some problems still remain that can't be solved by ragdolls and animation alone. One example is the foot position when a character walking up or down sloped terrain. The foot can clip through the terrain and destroy the sence realism, however ragdolls together with inverse kinematics can solve such problems.
318

Some applications of three-dimensional input

Schmandt, Christopher. January 1980 (has links)
Thesis (M.S.V.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1980. / Includes bibliographical references. / Three-dimensional, six degree of freedom input is explored in an interactive computer graphics environment. A particular device, the ROPAMS of Polhemus Navigational Sciences, Inc. is an accurate, unencumbering device based on electromagnetics. It is evaluated as a three-dimensional input device, and such input itself is evaluated for appropriateness and interactivity in a graphics environment. Emphasis is placed on human factors (pointing, body position) as a mode of interactivity. / by Christopher Schmandt. / Thesis (M.S.V.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1980.
319

Virtualization techniques for mobile systems

Unknown Date (has links)
In current mobile system environment there is a large gap in the use of smart phones for personal and enterprise use due to required enterprise security policies, privacy concerns as well as freedom of use. In the current environment, data-plans on mobile systems have become so wide spread that the rate of adaptation of data plans for every day customers has far outpaced the ability for enterprises to keep up with existing secure enterprise infrastructures. Most of the enterprises require/provide the access of emails and other official information on smart platforms which presents a big challenge for the enterprise in securing their systems. Therefore due to the security issues and policies imposed by the enterprise in using the same device for dual purpose (personal and enterprise), the consumers often lose their individual freedom and convenience at the cost of security. Few solutions have been successful addressing this challenge. One effective way is to partition the mobile device such that the enterprise system access and its information are completely separated from the personal information. Several approaches are described and presented for mobile virtualization that creates a secure and secluded environment for enterprise information while allowing the user to access their personal information. A reference architecture is then presented that allows for integration with existing enterprise mobile device management systems and at the same time providing a light weight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2013.
320

Detecção e Análise de Contornos em Imagens 2D. / Detection and analysis of contours on 2D images.

Bianchi, Andrea Gomes Campos 26 October 1998 (has links)
Neste trabalho apresentamos o desenvolvimento e a implementação de diversas técnicas de segmentação de imagens em termos de detecção de bordas, com um destaque especial para a segmentação não-linear. Os métodos considerados foram: o Gradiente, o Laplaciano da Gaussiana, a Regularização linear, e a segmentação não-linear usando o algoritmo Graduated Non Convexity, baseado na minimização de um funcional de energia associado à imagem. O tratamento matemático do funcional foi realizada segundo o paradigma do cálculo variacional. A sua principal vantagem é evidenciada durante o tratamento de bordas e descontinuidades, pois como a segmentação atua de forma não uniforme na imagem, apenas as regiões mais uniformes são suavizadas, preservando as descontinuidades, o que possibilita a conservação mais precisa dos contornos. Nos capítulos destinados a introdução das técnicas computacionais, apresentamos alguns exemplos das segmentações obtidas, possibilitando uma avaliação comparativa e qualitativa dos resultados. Aplicações em micrografias de cristais de KBr e de minerais serviram como um ensaio para a investigação da validação da segmentação através do algoritmo graduated Non Convexity. / In this work we describe the development and implementation of several image segmentation techniques, with special attention focused on non linear segmentation. The considered edge detection methods are: Gradient, Laplacian of Gaussian, linear regularization, and the non-linear Graduate Non Convexity segmentation algorithm based on the minimization of the energy functional associated with the image contour. The mathematical treatment was done according to the variational calculus paradigm. The major advantage of such an approach is noted during the treatment of borders and discontinuities, since this method causes the segmentation to act non-uniformelly on the image, in such a way that just the homogeneus regions are smoothed, while preserving discontinuities and enabling more exact localization of the contours. Along the charpters dedicated to introducing the techniques, we present some examples of segmented images, enabling the qualitative and quantitative evaluation of the results. Applications to micrographies of KB4 crystals and minerals in soil provide a possibility to investigate and validate the Graduate Non Convexity segmentation methods.

Page generated in 0.2342 seconds