• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6857
  • 2288
  • 1
  • 1
  • Tagged with
  • 9147
  • 9121
  • 8130
  • 8071
  • 1264
  • 925
  • 898
  • 703
  • 668
  • 661
  • 626
  • 552
  • 460
  • 426
  • 360
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
421

Evaluation of Markov Models in Location Based Social Networks in Terms of Prediction Accuracy

Yasheen, Sharifa January 2016 (has links)
Location Based Social Networks has attracted millions of mobile internet users. On their smart phones people can share their locations using social network services. The main purpose of check-ins is to provide other users’ information about places they visit. Location Based Social Network with thousands of check-ins allows users to learn social behavior through spatial-temporal effect, which provides different services such as place recommendation and traffic prediction. Through this information, we can have an idea about important locations in the city and human mobility. The main purpose of this thesis is to evaluate Markov Models in Location Based Social Networks in terms of prediction accuracy. Location Based Social Network features and basic information’s will be analyzed before modeling of human mobility. Afterwards with the use of three methods human mobility will be modeled. In all the models the check-ins are analyzed based on prior category. After estimation the user’s possible next check-in category, and according to the user’s check-ins in the following category, it predicts the next possible check-in location. Finally a comparison will be made considering the models prediction accuracy.
422

Big data analytics attack detection for Critical Information Infrastructure Protection

Stouten, Floris January 2016 (has links)
Attacks on critical information infrastructure are increasing in volume and sophistication with destructive consequences according to the 2015 Cyber Supply Chain Security Revisited report from ESG recently (ESG, 2015). In a world of connectivity and data dependency, cyber-crime is on the rise causing many disruptions in our way of living. Our society relies on these critical information infrastructures for our social and economic well-being, and become more complex due to many integrated systems. Over the past years, various research contributions have been made to provide intrusion detection solutions to address these complex attack problems. Even though various research attempts have been made, shortcomings still exists in these solutions to provide attack detection. False positives and false negatives outcomes for attack detection are still known shortcomings that must be addressed. This study contributes research, by finding a solution for the found shortcomings by designing an IT artifact framework based on the Design Science Research Methodology (DSRM). The framework consist of big data analytics technology that provides attack detection. Research outcomes for this study shows a possible solution to the shortcomings by the designed IT artifact framework with use of big data analytics technology. The framework built on open source technology can provide attack detection, and possibly provide a solution to improve the false positives and false negatives for attack detection outcomes. Three main modules have been designed and demonstrated, whereby a hybrid approach for detection is used to address the shortcomings. Therefore, this research can benefit Critical Information Infrastructure Protection (CIIP) in Sweden to detect attacks and can possibly be utilized in various network infrastructures.
423

Seamlessly Displaying Models in Virtual Reality

Huang, Peter, Gagnero, Pontus January 2018 (has links)
No description available.
424

Native vs Webb : En analys av appstrukturer

Larsson, David, Stoll, Thomas January 2013 (has links)
No description available.
425

Optimizing Tor Bridge Distribution

Starzer, Michael January 2013 (has links)
The Onion Router (Tor) is a good way to have privacy and anonymity while using the Internet. However there are several problems it has to deal with, because it is also possible to bypass governmental censorship, which also became goal of the Tor network. By different techniques several governments and other parties who have the capability to, try to block the network completely. One technique is to overwhelm the distribution strategies for bridges – which are an essential part of the Tor network, especially for censored users. Hereby a possible approach for distributing bridges via online social networks (OSN) is presented. It is based on the Proximax distribution but has also the capability to separate and exclude possible adversaries who managed to join the social group. Moreover trustful users get rewarded by a better status and less waiting time for bridges.
426

Virtual environment for assembler code analysis

Thorstenson, Erik January 2012 (has links)
The hardware that computers consist of may for dierent reasons be dicult to monitor, the price may be high or the hardware itself may be unavailable. The most apparent reason though is the fact that hardware generally is not transparent, i.e. the hardware does not provide informa- tion on how a task is conducted, only its result. To provide a virtual en- vironment that enables simulation according to specic input parameters eectively solves many of the issues associated with hardware evaluation. Simulation has applications everywhere, not the least in computer science: From the low level of micro code all the way up to interpreting a high level implementation on top of a profound software stack. This thesis entails a virtual environment running a MIPS pipeline, although the simulator is implemented in the high level language C, it executes simulation at the fairly low level of assembler code. When provided with a user specied conguration le, the environment allows simulation of MIPS assembler programs, through the CPU, via interconnecting buses, ending at the level of virtual memory.
427

A virtual Music fountain simulation based on particle system

Xiang, Luo January 2013 (has links)
This report presents a real-time simulation of a music fountain which is simulated in three dimensions by a particle animation system. In this system, gravity and wind are factors that affect the locus movement of particles. Using kinematic equations, the dynamic behaviors of particles is modeled. A specific contribution of the work presented here is that parameters for the motion equation are estimated from sound playing in real-time which controls the dynamic behavior of animated fountain. An open source programming language called Processing is used to implement the environment. Results of the system are demonstrated in form of its graphical output and performance benchmarks from run-time evaluation. The author investigates the influence of the parameters of particle system and music attributes on the animation of the music fountain simulation. The size, number, color, texture and transparency of particles can influence the quality of music fountain simulation. Using FFT function to get music parameters is the best way to figure out differences between different music.
428

Development of Mobile Application for the Dissemination of Operational Information to Customers and Suppliers

Mohamad, Rukesh January 2013 (has links)
Smartphone are very common to use by more people and for more purposes, and the interest into the mobile applications development has increased. Many companies, that are exposing their service as web services, intended to enable mobile access to distribute their web resources. This work is about developing a mobile phone application for disseminating operational information to customers and suppliers of the company “100 Procent Media AB”.  This application is based on android as operating system. The company put messages on its server that the mobile application later reads and store data in the database of the mobile application. The customers of the company receive a message that is stored in the server of the developing application.
429

Införande av objektorienterade mönster för ökad förändringsbarhet i mjukvarusystem / Introduction of object oriented patterns to increase software modifiability

Jonsson, Andréas January 2007 (has links)
Objektorienterade mönster och omkonstruktion är två olika designstrategier som har ett gemensamt mål: att göra mjukvarusystem mer förändringsbara och mindre komplexa. Mönster tillämpas för att förebygga utvecklingen av komplexitet i mjukvara. Omkonstruktioner görs för att reducera komplexitet som redan uppstått i mjukvarans inre struktur. Denna rapport identifierar fyra grundläggande strukturproblem som gör mjukvara onödigt komplex och svår att förändra: duplicerad kod, villkorslogik, långa metoder och bristande inkapsling. Rapporten visar hur objektorienterade mönster kan införas i mjukvara genom omkonstruktion och göra mjukvara mer förändringsbar genom att reducera de fyra nämnda strukturproblemen. Som en fallstudie om mönsterbaserade omkonstruktioner, omkonstrueras en del av systemet INCA genom att tillämpa mönstren Template Method och Strategy. / Object oriented patterns and refactoring are two different approaches to software design that both share a common objective: to increase software modifiability and reduce its complexity. Patterns are applied to prevent the development of software complexity. Refactorings are applied to reduce complexity that has already found its way into the internal structures of software. This report identifies four fundamental structural problems that make software unnecessarily complex and hard to maintain: duplicated code, conditional logic, long methods and poor encapsulation. The report shows how object oriented patterns can be introduced in software by means of refactoring and make software more modifiable by reducing the four mentioned structural problems. As a case study of pattern based refactorings, a part of the INCA system is refactored by applying the patterns Template Method and Strategy.
430

Utvärdering av Microsoft SharePoint 2003

Ljungkvist, Jan January 2007 (has links)
I have been studied Microsoft SharePoint on behalf of Prevas in Karlstad. The purpose of my work was to see if Microsoft SharePoint was what Prevas wanted as a replacement for the existing intranet, which they are not satisfied with today. My work was a kind of foundation for Prevas so they could make a decision in this matter. The work began with installing SharePoint at one single server at Prevas. We used a virtual technology (VMware) at the installation, which can be described as that we created two “miniservers” in a bigger server, one for SharePoint and the other for storing the information. This kind of technology is strongly advancing. The main work consisted of setting up the structure for the navigation and designing both the portal and the local homepage for Prevas Karlstad. The inbuilt functions which were already setup from the supplier were tested by simulating different scenarios. The result of my work was a test version for how it looks like if the existing intranet will be replaced with Microsoft SharePoint.

Page generated in 0.0524 seconds