• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1261
  • 687
  • 2
  • Tagged with
  • 1952
  • 1948
  • 1946
  • 203
  • 200
  • 188
  • 174
  • 156
  • 141
  • 139
  • 122
  • 111
  • 94
  • 93
  • 83
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Säkerhetshot mot molnet

Arvidsson, Alexander, Lundberg, Magnus January 2018 (has links)
Att använda sig av molntjänster är idag en växande trend och allt fler företag börjar adoptera molntjänster i sin verksamhet. Trots det upplever många företag att den fortsatta utvecklingen hindras på grund av oro för IT-säkerhetskunskaperna hos leverantörerna. I denna uppsats så ställs frågan “Vilka åtgärder kan tas för att förebygga svagheter och hot mot säkerheten och tillgängligheten av molntjänster?”. Frågan försöker besvaras genom att sammanställa de mest relevanta hoten tillsammans med lösningar på problematiken, genom att utföra en litteraturstudie på ämnet. Uppsatsen inriktar sig främst på leveransmodeller där infrastrukturlösningar erbjuds.  Med den inhämtade kunskapen konstruerades ett formulär med frågor, som sedan skickades ut till olika svenska molntjänstleverantörer. Detta för att försöka skapa en inblick i hur marknaden ser ut när det gäller säkerhetsaspekter, samt vilka åtgärder leverantörerna kan vidta för att hantera säkerhetshot. Uppsatsen har identifierat flera olika hot samt åtgärder för säkerhetsproblem, för tjänster relaterade till infrastruktur lösningar. Uppsatsen bidrar med en bild om vilka åtgärder som en molntjänstleverantör kan ta när det kommer till de mest aktuella säkerhetshot som existerar idag.
272

CCUAV : Cloud Center for Unmanned Aerial Vehicle

Tell, Fredrik January 2018 (has links)
Projektets syfte är att bryta kopplingen mellan en specifik användare och drönare. Målet med projektet är att flera användare ska kunna hantera flera drönare från en central. En länk mellan en internetbaserad plattform vid namn Thingworx och en drönare med en inbyggd styrenhet, som kallas Pixhawk, sammankopplas med mikrodatorn Raspberry Pi 3. Sjöräddningssällskapet i Sverige önskar ett interface där flera av deras drönare med den inbyggda styrenheten kan hanteras och se dess position och videoström. PDSVisions mål är att skapa en demonstrator i en nyutvecklad plattform som förenklar uppkoppling med enheter med hjälp av ett begrepp som kallas IoT (Internet of Things). Resultat har resulterat i en prototyp av Sjöräddningssällskapets drönare ämnad att kontrolleras via den internetbaserade plattformen Thingworx. Drönaren startar, lyfter från marken och flyger en planerad rutt utan pilot. Slutsatsen visade att projektet kunde genomföras samt att det är möjligt att kommunicera med drönare via Thingworx
273

Volume measurement of wood disks

Dånmark, Anders January 2013 (has links)
At the Department of Forest Products at Swedish University of Agricultural Sciences different metrics for wood are used. The volume of wood disks' is measured using archimedes principle.There are concerns of how accurate this measurement is and a different measuringsystem is wanted. This thesis has investigated the possibility of measuring the disks' volumes with imageanalysis. The recovery error should be less than 1% of the actual volume. In general, there are two methods for recovering an object using imageanalysis, active and passive methods. Compairing active and passive methods, active methods usually require simple algorithms but more expensive equipment compared to passive methods. Different methods for measuring objects' volumes have been evaluated and the choosen method was ``shape from silhouette''. Shape from silhouette is a passive method, only using the silhouette of anobject from multiple views to recover the objects volume. Passive methods have one drawback, they can only recover the visual hull of an object and the wood disks can be slightly concave. Due to the questionable accuracy of the current measurement method it was still deemed as possible to achieve at least equal performance. When the volume measuring algorithm was developed it was first tested in two simulations using on a sphere to determine its performance with different voxel sizes and different number of images. The algorithm performed well and an error of less than 1 % was achieved with a sphere. A third simulation was performed using a simulated wood disk, which is a much more complex object, and 5 % accuracy was achieved. Finally, an experiment on real images was performed. This experiment did, however, fail due to the low quality imaging setup. The conclusion of this thesis is that itis not possible to achieve less than 1 % accuracy of the recovered volume using the shape from silhouette technique.
274

Webbbaserad Givarservice Myrorna

Svärd, Annika January 2008 (has links)
Examensarbetet, 15 poäng har utförts på högskolan i Kalmar. Input Soft AB är ett företag som är beläget i Strängnäs. Uppdraget för projektarbetet bestod av att utforma en webbbaserad givarservice till Myrorna. Myrorna använder idag fleetIT som är ett program utvecklat av Input Soft AB för registrering/hämtning av gåvor till Myrorna. Denna webbaserade givarservice förenklar och effektiviserar arbetet för Myrorna genom att användarna själva går in via Internet och registrerar sina gåvor istället för som idag då registreringen sköts helt av personalen i Sätra. Teknikerna som använts är ASP-dotnet och en nexus databas som är integrerad med fleetIT Systemet. Server Applikationen kommer att ligga på Myrornas egen server och vara kopplat till fleetIT systemet.
275

Webbsida med WEB 2.0

Eriksson, Mattias, Gustafsson, Mikael January 2009 (has links)
WEB 2.0
276

Security issues with Mobile IP

Alkhawaja, Abdel Rahman, Sheibani, Hatem January 2011 (has links)
With a rapid growth in wireless technology in recent years, Mobile IP has become very important for consumers and businesses by providing mobility based on IP addresses using several applications, which keep the employees connected with each others with critical information. In mobile IP the node can change its location by maintaining the same IP address and keep connected to the internet, which solves the issue of terminating the communication once it moves. Since Mobile IP uses open airwaves as a transmission medium, it is subject to the many security threats that are routed in mobile IP network .Protecting mobile IP from threats and attacks is one of the most challenging task now days. IPSec is a standard security protocol solution for TCP/IP network that provides security through Authentication, Encryption and data integrity services. Mobile IP data traffic can be secured by combining with IP Security (IPSec) protocol. This thesis describes Mobile IP operations, security threats, different existing methods for securing mobile IP and then IPSec standard, how it works and why IPSec is the best solution. This thesis also describes how to combine IPSec with a mobile IP to provide a solution called (SecMIP) that protects the mobile device’s communication from any threats. Finally it describes Mobile IPv6, binding update and associated security concern.
277

Network Admission Control (NAC)Securing end point devices

Yusuf, Adewale, Lartey, Jerry, Wareus, Vilhelm January 2010 (has links)
There have been remarkable growths in wireless communication networks in recent years; this is because of its merits over the wired networks such as Mobility and convenience. Wireless networks transmit the signal over the open air via radio waves of different frequencies, this makes it to be vulnerable to several attacks and anybody on the street can easily intercept the wireless data or inject new data into the entire network. There has been existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which was designed for wireless network security. There were concerns of security vulnerabilities in WEP; this made it necessary for the implementation of another solution to overcome the weaknesses of the previous wireless network security. The IEEE 802.1X (port-based network admission control) which is defined on Extensible Authentication protocol (EAP) provides effective and efficient admission control to wireless and other networks devices [8]. Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security solution, access different vendor solutions, protocols supported and look into the inter-operability of these various vendors. In as much as we support the premise of NAC being an excellent solution, we will also make brilliant recommendations in this thesis to be considered for future refinements of this security solution as well as deployment scenarios for the university network.
278

Hemsida för ett musikbolag : Website for a music company

Youssefi, Masoud, Andersson, Patrik January 2007 (has links)
The purpose of this report is to answer the question: How do you create a media player that can stream music for a website? We started the work by searching the web and reading books about the subject and found several technologies to use to stream media files over the internet. We decided upon using the http protocol and created the media player itself in Macromedia Flash. The website is mostly developed with PHP, JavaScript and CSS templates and the websites design was created with Macromedia Dreamweaver and Adobe Photoshop. We also created an administrative system for the media player with PHP programming. The website contains a simple guestbook; the guestbook makes use of a database created with MySQL. Our work resulted in a webpage with a fully functional media player that streams audio files together with a corresponding administrative system for it.
279

Awesome Fragrance Company : Utveckling av en e-butik för parfymprover / Awesome Fragrance Company : Development of an online store for perfume samples

Ahrengart, Hugo, Borg, Therese, Magnuson, David, Nilsson, Victor, Partain, Beatrice, Voss-Lagerlund, Carl, Wagner, Mattias January 2016 (has links)
This bachelor's thesis accounts for the results and takeaways from the process of developing the web application for Awesome Fragrance Company. The goal of this thesis is to provide an increased understanding of how a usable web application can be designed, by studying the development of an online store with the purpose of selling fragrance samples. The agile method Scrum has been the foundation of the development, and based on this, the focus has been to develop a continuously deliverable product, where functionality is added in increments. By starting with a rough prototype and then gradually adjusting the final vision for the product based on feedback, the group has developed an online store which, according to users, is usable and intuitive. Thus, the group has created a foundation for further research on usable web applications, which was the goal of the project. / Denna rapport redogör för resultaten från, och erfarenheterna av, utvecklingsprocessen av webbapplikationen för Awesome Fragrance Company. Rapporten syftar till att ge en ökad förståelse för hur en användbar webbapplikation kan utformas, genom att studera utvecklingen av en e-butik för försäljning av parfymprover. Arbetsmodellen Scrum har legat till grund för utvecklingen, och i led med detta har fokus varit att utveckla en ständigt levererbar produkt, där funktionalitet läggs till i små inkrement. Genom att basera utvecklingen på en grov prototyp och sedan successivt anpassa målbilden efter feedback har gruppen utvecklat en e-butik som enligt tillfrågade användare är användbar och intuitiv. Således har gruppen skapat en bra grund för vidare forskning om användbara webbapplikationer, vilket också var arbetets mål.
280

A flexible framework for detection of feature interactions in telecommunication systems

Naeser, Gustaf January 2000 (has links)
The complexity of today's telecommunications systems grows with each new feature introduced. As the number of services an operator provides can be used to gain advantage over competitors the number of services will continue to increase. As the complexity grows, so does the possibility for feature interactions, situations where the operation of features interfere with the operation of other features. Interactions cost more to resolve the later during the introduction of a new feature they are detected. This makes the need for analysis of feature interactions during development preeminent. There exists a multitude of frameworks and techniques for specification and analysis of models of telecommunications systems. However, we have identified that they often impose unnecessary design decisions on the models, making them untoward. In this thesis we propose a framework for specification of models of telecommunications systems. The framework is designed to describe them as general systems of communicating processes in a flexible way which allows alterations to be made late during the design. We also present definitions of interactions and how the interaction definitions are used in the framework to detect undesired interactions. A model for telephony systems is derived through observations made of common telephony concepts and constructs. Delving into concepts early in the design of the system is shown to avoid several sources of interactions. To demonstrate the potential of the framework we present a case study where the system and services described in the first interaction detection contest has been implemented and searched for interactions.

Page generated in 0.0619 seconds