• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3651
  • 1034
  • 1
  • Tagged with
  • 4688
  • 4688
  • 4688
  • 4688
  • 4252
  • 568
  • 523
  • 462
  • 462
  • 349
  • 268
  • 243
  • 233
  • 209
  • 199
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Software Encryption in Mobile Devices

Nordwall, Jennifer January 2013 (has links)
No description available.
32

Ny i Inre Skandinavien : Webbaserad Personutställning - Ett verktyg för visning och underhåll av intervjuer

Mumun, Sinan, Glennberg, David January 2013 (has links)
Some people do not have the opportunity to visit a physical exhibition because of limited time or long travelling distances, it is here the need for a web-based exhibition arises. This dissertation describes the development of an interactive web-site representing a part of a physical exhibition of over 200 interviews on different peoples immigration to inner Scandinavia. The interviews contain text, audio clip, pictures and video clip. The website contains modern programming technologies such as HTML5, ASP.NET MVC3, SQL, JavaScript and jQuery. A cover of the technologies used and how the project has been designed and implemented is explained in the dissertation. In the end of the dissertation we discuss about how the result of the project follows the goals we set up in the start phase. The result of this project is an interactive and easy to use web-site showing a part of the physical exhibition online. An easy administration to insert new information and edit existing without any major computer knowledge.
33

Business intelligence : Framgångsfaktorer vid användningen av ett BI system

Emelie, Adolfsson January 2012 (has links)
The management of information is a significant competitiveness in companies. Companies stored and save information every day, and it is very common to save de information in different sources. This makes de management of information complex. To mange, monitor and analyze the information, companies can use a system called Business Intelligence. BI system is an analytical system that extracts and converts data into useful information that helps employees to make informed decisions. My purpose was to identify success factors that affect the use of a BI system. The purpose was also to present the success factors you need to consider within the use of a BI system. The study was based on a qualitative method where I Interviewed companies using BI systems and consultant that are experts in the area. I did this because I wanted to see how the use of the BI system differs from what the author writes. I was then able to identify success factors that affect the use of a BI system. The result I came up with is that learning and data quality are critical success factors which are important to consider within the use of a BI system. I have also been able to identifysuccess factors that are known in the use of BI systems.
34

Continuous Measurements of Core Body Temperature using Body Sensor Networks

Hegen, Peter January 2012 (has links)
Long-term body temperature measurements for research and diagnosis are currently done in hospitals or specialized research labs. This method has several drawbacks: the use of wired ob- trusive sensors (e.g., rectal probes to measure the core body temperature) may be uncomfortable for patients. Furthermore, situations recorded in laboratory settings do not reflect reality as patients are not subject to their normal living environment. Furthermore, it is labor-intensive to regularly check upon patients and care for their well-being. Using small wireless sensor nodes in a body sensor network to measure body functions, one can mostly offset the limitations listed above. For this work, we have developed a wireless sensor node that uses an infrared thermopile as a sensor to unobtrusively measure the core temperature at the tympanic membrane. Due to their construction, these sensors are heavily dependent on the ambient temperature in the surroundings of the sensor packaging. While this does not affect their use in single-shot measurements (e.g., using an ear thermometer), it poses a challenge for continuous measurements, as common living environments do not have constant ambient air temperatures and people frequently commute between different places. These conditions may offset measurements significantly, an important problem for medical applications that require high accuracy. In this work, we employ infrared thermopiles in a body sensor network and characterize their behaviour in various situations, especially in the presence of varying environmental conditions. Based on our observations, we describe methods for post-processing measurements in order to compensate environmental changes and hence get results reflecting reality more closely. Our evaluation shows that these methods can offset the infrared thermopile’s weakness but need further work to achieve the degree of accuracy that is needed for medical applications.
35

An ALARP Stop-Test Decision for the Worst-Case Timing Characteristics of Safety-Critical Systems

Malekzadeh, Mahnaz January 2016 (has links)
Safety-critical systems are those in which failure can lead to loss of people’s lives, or catastrophic damage to the environment. Timeliness is an important requirement in safety-critical systems, which relates to the notion of response time, i.e., the time a system takes to respond to stimuli from the environment. If the response time exceeds a specified time interval, a catastrophe might occur.   Stringent timing requirements make testing a necessary and important process with which not only the correct system functionality has to be verified but also the system timing behaviour. However, a key issue for testers is to determine when to stop testing, as stopping too early may result in defects remaining in the system, or a catastrophe due to high severity level of undiscovered defects; and stopping too late will result in waste of time and resources. To date, researchers and practitioners have mainly focused on the design and application of diverse testing strategies, leaving the critical stop-test decision a largely open issue, especially with respect to timeliness.   In the first part of this thesis, we propose a novel approach to make a stop-test decision in the context of testing the worst-case timing characteristics of systems. More specifically, we propose a convergence algorithm that informs the tester whether further testing would reveal significant new insight into the timing behaviour of the system, and if not, it suggests testing to be stopped. The convergence algorithm looks into the observed response times achieved by testing, and examines whether the Maximum Observed Response Time (MORT) has recently increased, and when this is no longer the case, it investigates if the distribution of response times has changed significantly. When no significant new information about the system is revealed during a given period of time it is concluded, with some statistical confidence, that more testing of the same nature is not going to be useful. However, some other testing techniques may still achieve significant new findings.   Furthermore, the convergence algorithm is evaluated based on the As Low As Reasonably Practicable (ALARP)  principle which is an underpinning concept in most safety standards. ALARP involves weighting benefit against the associated cost. In order to evaluate the convergence algorithm, it is shown that the sacrifice, here testing time, would be grossly disproportionate compared to the benefit attained, which in this context is any further significant increase in the MORT after stopping the test.   Our algorithm includes a set of tunable parameters. The second part of this work is to improve the algorithm performance and scalability through the following steps: firstly, it is determined whether the parameters do affect the algorithm. Secondly, the most influential parameters are identified and tuned. This process is based on the Design of Experiment (DoE)  approach.   Moreover, the algorithm is required to be robust, which in this context is defined “the algorithm provides valid stop-test decisions across a required range of task sets”. For example, if the system’s number of tasks varies from 10 to 50 tasks and the tasks’ periods change from the range [200 μ s, 400 μ s] to the range [200 μ s, 1000 μ s], the algorithm performance would not be adversely affected. In order to achieve robustness, firstly, the most influential task set parameters on the algorithm performance are identified by the Analysis of Variance (ANOVA)  approach. Secondly, it is examined whether the algorithm is sound over some required ranges of those parameters, and if not, the situations in which the algorithm’s performance significantly degrades are identified. Then, these situations will be used in our future work to stress test the algorithm and to tune it so that it becomes robust across the required ranges.   Finally, the convergence algorithm was shown to be successful while being applied on task sets having similar characteristics. However, we observe some experiments in which the algorithm could not suggest a proper stop-test decision in compliance to the ALARP principle, e.g., it stops sooner than expected. Therefore, we examine whether the algorithm itself can be further improved focusing on the statistical test it uses and if another test would perform better.
36

Traveling Into The Future: The Development of a Currency Exchange Application

Dahlén, Olle, Urby, Fredrik, B. Fredriksson, Sebastian, Dabérius, Kevin, Qaderi, Idris, Wilson, Magnus, Axelsson, Martin, Ask Åström, Anton, Nilsson, Gustaf January 2016 (has links)
This thesis examines the experiences and results regarding the development of the web application Cash-on- Arrival, an online currency exchange service where the customer can order their currency exchange ahead of their travel to save money compared to exchanging their money at the time of arrival to their destination. The thesis mainly focuses on answering the research questions raised concerning how a secure and usable web application can be developed as well as how it can save money for travelers. In order to establish what design and features customers preferred, a market research in the form of a survey and market plan was done in the pre-study phase. Furthermore, the thesis continues with presenting how the implementation of features and solutions were performed. The result of the development is the web application Cash-on-Arrival where focus was on the security and usability of the application. Conclusions drawn were the need for a secure site, with a quick and efficient buying process, to encourage users to utilize the service. The implementation of the currency exchange optimization has not been fully answered.
37

Authentication system based on hand-arm-movements

Lindström, Johan, Sonnert, Adrian January 2016 (has links)
This study treats behavioral biometric authentication, and its focus is on creating an application that uses hand-arm-movements to identify users. The systemis modelled to achieve a minimal false rejection rate (FRR) and false acceptance rate (FAR). Experiments featuring several test subjects performing hand-arm-movements using our device were performed in order to gauge the FRR and FAR of our system. The FRR and FAR achieved were 35% and 15.8%, respectively. The study concludes that hand-arm-movements may be useful for authentication, but further research is required.
38

Security in software : How software companies work with security during a software development process / Säkerhet i mjukvara : Hur mjukvaruföretag arbetar med säkerhet under en mjukvaruutvecklingsprocess

Lindmark, Fanny, Kvist, Hanna January 2016 (has links)
This study is conducted, due to recent interest in privacy and software security, on how a number of software development companies work during a development process to develop secure software to the possible extent. The study is based on four interviews with four software companies located in Linköping, Sweden. The interviews followed a semi-structured format to ensure the possibility to compare the given answers from the companies to each other. This structure was chosen to give each company the liberty to express what they valued and thought were important during a software development process. The aim was to analyze how and if these companies work with security when developing software, and to see what differences and similarities that could be established. We found differences between the companies' perspective of security and on their methods of working. Some valued secure software more than others and performed more measures to ensure it. We also found some similarities on their view on importance of secure software and ways to work with it. The differences and similarities were related to the size of the companies, their resources, the types of products they develop, and the types of clients they have.
39

Ransomwarehotet ur kommunalt perspektiv : Erfarenheter, utmaningar, förebyggande åtgärder och incidenthantering / The ransomware threat from a swedish municipal point of view : Experiences, challenges, security measures and incident management

Larsson, Petter January 2016 (has links)
Ransomware är en typ av skadlig programvara som tar gisslan på ett offers dator genom att till exempel låsa hela datorn, eller genom att kryptera (låsa och göra obrukbara) filer så som foton och dokument, och sedan kräver en lösensumma för att låsa upp datorn eller dekryptera (återställa) filerna. Ransomware har på senare år blivit vanligare och vanligare, och är idag vanligt förekommande även i Sverige. Ett exempel på svensk spridning är de mail som sedan september 2015 skickats till svenska användare, och påståtts komma från Postnord. När mottagare öppnat mailet och försökt ladda hem den fraktsedel som mailet sagt sig innehålla har dennes personliga filer krypterats av ransomware och en lösensumma har utkrävts för att filerna ska återfås. Denna studie undersöker denna otrevliga typ av skadlig programvaras inverkan på arbetet med IT inom kommuner i Skaraborg, vilka erfarenheter och utmaningar kommunernas IT-avdelningar kopplar till ransomware, samt hur de hanterar hotet. Intervjuer har använts för att samla in informationen. Resultatet visar att ransomware drabbat de allra flesta av kommunerna, men att IT-avdelningarna har kunnat återställa det mesta som förlorats från säkerhetskopior. Resultatet visar också att en stor utmaning för kommunerna är att utbilda sina användare i hur denna typ av angrepp kan kännas igen, och därmed undvika smitta. Till sist visar resultatet även att problematiken kan komma att växa då en ny förordning om dataskydd från EU införs.
40

The Indie Developer’s guide to immersive tweens and animation : What you need to know as a programmer to animate and increase immersion

Öhrström, Fredrik January 2016 (has links)
Some games are grabbing your attention more than others. Some even do it so well people even lose track of time and their surroundings. Why does this happen? And how can the effect be harnessed for your own game? This report studies what immersion is and subjects related to it, such as richness and flow, and then how and what kind of easy animations and effects that build on these concepts that you can create in a 2D puzzle game. Most of the effects, animations and ideas can probably be carried over to other game types without much difficulty if you want a more immersive product. In the end, the player experience is tested by two surveys to see if players were immersed, PANAS and IEQ. The results go over what kind of effects were implemented and the surveys showed that most players were a bit immersed and that they enjoyed the graphics of the game.

Page generated in 0.1903 seconds