• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 777
  • 215
  • 1
  • Tagged with
  • 993
  • 977
  • 975
  • 139
  • 115
  • 99
  • 98
  • 83
  • 82
  • 74
  • 72
  • 60
  • 57
  • 57
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Bildfilter för publikt API med hjälp av deep learning

Engström, Rebecka, Herö, Johan January 2020 (has links)
No description available.
62

Utvecklingen av ett verktyg för att automatisera konfiguration av plattformar i taktiska simuleringar / The development of a tool for automating configuration of platforms in tactical simulations

Olsson, Hampus, Nilsson, Pontus January 2019 (has links)
Idag är det vanligt att automatisera mer och mer av människors arbete för att spara in tid på repetitiva och tidskrävande arbetsuppgifter. Ett sätt att göra detta på är att utveckla ett användargränssnitt för att samla flera handlingar i t.ex. en knapp. I detta arbete skapas ett verktyg i form av ett användargränssnitt för att automatisera och effektivisera konfigureringen av plattformar i taktiska simuleringar för arbetarna på FOI. Egenskaper och funktionalitet i verktyget specificeras i en kravspecifikation skriven av FOI. Detta verktyg strävar efter en hög användbarhet och bra möjligheter till utbyggbarhet för att möjliggöraframtida tillägg till verktyget av arbetarna på FOI. Arbetet resulterade i ett verktyg som både är användarvänligt och utbyggbart som visade sig vara en förbättring av FOI:s tidigare arbetssätt
63

Keep our web applications safe : A security evaluation of Service Workers

Erickson, Adam, Nielsen, Oscar January 2019 (has links)
With the ever-expanding internet, finding new ways to increase the user experience are vital in order to keeping concurrent users on your web application. One way to achieve this could be to implement a Service Worker to unlock more capabilities of a web application. The purpose of this paper is to evaluate what new security vulnerabilities can arise when implementing a Service Worker. This could then be used to evaluate if the technology has evolved far enough to be used by a wider audience of programmers and users. The analysis in this paper will be presented in a security matrix that is based on four experiments and a complementary literature study on web-based attacks. This paper found that some new vulnerabilities must be considered when implementing a Service Worker in a web application. The worst of these is the Living Outside of Scope, which can be used by an attacker to secretly hijack a victim's computer even when the application is shut down. This paper concludes that the technology has evolved far enough so that a secure web application with the use of the Service Worker is possible, but there are still some new vulnerabilities that can become a problem if not considered.
64

Machine Learning-Assisted Performance Assurance

Helali Moghadam, Mahshid January 2020 (has links)
With the growing involvement of software systems in our life, assurance of performance, as an important quality characteristic, rises to prominence for the success of software products. Performance testing, preservation, and improvement all contribute to the realization of performance assurance. Common approaches to tackle challenges in testing, preservation, and improvement of performance mainly involve techniques relying on performance models or using system models or source code. Although modeling provides a deep insight into the system behavior, drawing a well-detailed model is challenging. On the other hand, those artifacts such as models and source code might not be available all the time. These issues are the motivations for using model-free machine learning techniques such as model-free reinforcement learning to address the related challenges in performance assurance. Reinforcement learning implies that if the optimal policy (way) for achieving the intended objective in a performance assurance process could instead be learnt by the acting system (e.g., the tester system), then the intended objective could be accomplished without advanced performance models. Furthermore, the learnt policy could later be reused in similar situations, which leads to efficiency improvement by saving computation time while reducing the dependency on the models and source code. In this thesis, our research goal is to develop adaptive and efficient performance assurance techniques meeting the intended objectives without access to models and source code. We propose three model-free learning-based approaches to tackle the challenges; efficient generation of performance test cases, runtime performance (response time) preservation, and performance improvement in terms of makespan (completion time) reduction. We demonstrate the efficiency and adaptivity of our approaches based on experimental evaluations conducted on the research prototype tools, i.e. simulation environments that we developed or tailored for our problems, in different application areas.
65

Discovering what makes news tweets popular when controlling for content / Undersöker vad som gör tweets populära när man tar hänsyn till innehållet

Christensson, Martin, Holmgren, William January 2021 (has links)
Twitter is one of the largest social networks with over 330 million active users. Therefore, by being able to better create tweets that spread further, the message of the tweet can reach more people. It is also a social platform that is widely used by news networks to share news and is the main source of news for many people. Twitter also has an API that researchers can use to easily extract data from the website. This in combination with the reasons abovehas made Twitter into a hot research topic. This study has, to the best of the knowledge of the authors, introduced a novel approach of analyzing twitter data. It has focused on tweets containing links to news articles and groups these into clusters based on the contents of said news articles. Tweets that share near identical news articles, will be grouped into clone sets, which allows to only analyze tweets that share the same content. This eliminates content as a factor that could impact the popularity and allows to better understand theunderlying factors that make a tweet popular. While only subtle differences were found in this study when controlling for content (e.g., regardless if we control for content, we found that followers, following, and whether a user was verified were the most important predictive factors), the approach provided new insights into the timing of when tweets are being posted. Tweets posted early on had a great majority of total retweets as well as the most successful tweet. While tweets posted late had a great majority of the least successful tweets. The methodology of controlling for content gave interesting insights and the authors believe it deserves further attention when doing similar research.
66

Digital Power of Attorney for authorization in industrial cyber-physical systems

Vattaparambil Sudarsan, Sreelakshmi January 2021 (has links)
In the age of digitization, many Cyber-Physical Systems are semi-autonomous and have sufficient power and resources to perform tasks on behalf of users. This thesis defines an authorization technique to transfer the power of legitimate users to trusted CPS or IoT devices, allowing the device to sign or access resources on behalf of the user. The authorization technique is based on digital Power of Attorney, which is a self-contained document generated by the user (principal) and sent to the agent (trusted device). A Power of Attorney contains a timestamp, that makes it invalid after a period of time predefined by the principal. Here, the agent who receives the PoA does not require a separate account; instead, it uses the principal account with limited features. The thesis studies and analyzes other delegation based and subgranting based authorization techniques, such as the OAuth standard. There are certain similarities and differences between OAuth and PoA, that are analyzed based on metrics such as protocol flow, communication type, token format, and control expiration. Considering the benefits and challenges of both the OAuth and PoA, this thesis combines these two techniques and proposes a multilevel subgranting system. The conceptual architecture, protocol flow, design overview, PoA format, use case scenarios, and implementation details of the proposed system are presented. The system is implemented based on an industrial CPS usecase scenario. The results are qualitatively analysed and also quantitatively evaluated based on the metric of computational time.Future work includes security analysis, result evaluation, and comparison of findings with respect to OAuth and other delegation based authorization standards, implementation of PoA based authorization technique from the scratch, and integration with frameworks such as Arrowhead.
67

UNDERSTANDING DIGITAL TWIN: A SYSTEMATIC MAPPING STUDY

Guzina, Luka January 2021 (has links)
Digital Twin is a concept that refers to a virtual representation of manufacturing elements suchas personnel, products, assets and process definitions, a living model that continuously updatesand changes as the physical counterpart changes to represent status, working conditions, productgeometries and resource states in a synchronous manner [1]. The digital representation providesboth the elements and the dynamics of how a physical part operates and lives throughout its lifecycle.In recent years, digital twin caught the attention of many researchers, who investigated its adoptionin various fields. In this thesis, we report on the planning, execution and results of a systematicmapping study to examine the current application of the digital twin, its research relevance, application domains, enabling technologies and perceived benefits. We start from an initial set of 675publications and through a rigorous selection process we obtain a final set of 29 primary studies.Using a classification framework, we extract relevant data. We analyse the extracted data usingboth quantitative and qualitative analyses using vertical and orthogonal analysis techniques.This work is aimed to investigate the current achievements of Digital Twin with the focus on revealing technologies it uses, its applications and benefits it offers by implementing it as well aspublication details.
68

Omarbetning utav PHP-skript och databasintegritet / Revision of PHP-scripts and database integrity

Mellberg, Simon January 2019 (has links)
Den här rapporten beskriver det arbete som är utfört hos Techsam AB för att eliminera eller åtminstone minska riskerna att data går förlorad eller förändras. Projektets syfte är att redogöra problemområden och åtgärda nuvarande system. Problemområden är alla ställen det görs en insättning eller en uppdatering utav databasen. Projektets huvudsakliga uppgift är att utveckla det system som redan finns driftsatt. Databasintegritet är en viktig punkt i projektet, och det finns större möjligheter att kontrollera data desto längre mot slutet produkten kommer. Därmed har andra lösningar införts i början utav produktionen. De lösningarna är visuella stöd och varningar som hjälper att göra rätt beslut. Eftersom systemet endast används \textit{''in-house''} finns det inga krav på utseende eller säkerhet utifrån, utan kraven ligger kring funktion och integritet mot databasen. Utseendet har inte påverkats. / This report describes the work that is done at Techsam AB to eliminate or at least lower the risk of dataloss or change of data. The project purpose is to uncover problematic areas and fix these issues. Problematic areas are everywhere where data is sent och updated in the database. The projects main assignment is to update the system that is already in use. Databaseintegrity is an important topic in this article, and there the possibilities to check data are greater the further down the line you get. Therefore other solutions have been used to aid the user. Those solutions are visual aids and warnings to help make correct decisions. Since the system is only used in-house there are no demands on the apperance nor security outwards, the demands are on the function and integrity towards the database. The appereance have not been altered.
69

Automatisk uppgradering av Cisco IOS

Sjöström, Frej January 2020 (has links)
No description available.
70

Anomaly Detection using Machine Learning Approaches in HVDC Power System

Borhani, Mohammad January 2020 (has links)
No description available.

Page generated in 0.0471 seconds