• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • Tagged with
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Application of cloud computing in South African libraries : a case study of Polokwane Municipal Libraries

Molaudzi, Amogelang Isaac January 2020 (has links)
Thesis (M.A. (Information Studies)) -- University of Limpopo, 2020 / International, national and local public and private sectors are shifting into Cloud Computing (CC). This paradigm shift is fuelled by technological and transformational changes of CC in every sector, including libraries. Presently in South Africa, some libraries still operate on the traditional ICT based desktop applications, whereas some hardly notice that CC is part of their daily activities such as carrying out transactions in the cloud services like emailing on Gmail. There is a major gap in terms of adopting and understanding CC technology in public libraries. Hence the study proposed to describe and explore the application and understanding of CC in Polokwane Municipal libraries. The study identified CC tools used by librarians and determined the level of librarians’ knowledge and understanding of CC. The study further measured perceptions of librarians towards CC and established factors influencing the use of CC in libraries. The researcher used a mixed-methods research approach and case study research design, located within postpositivism and interpretivism paradigm. The study was a census in nature because of the small population. Data was collected using questionnaire and interviews from 30 respondents who were librarians and participants who were library managers. Collected data were analysed through descriptive statistics and thematic data analysis. Findings from the study reveal that librarians are not fully using CC but use some of the CC applications such as google scholar, without having detailed knowledge and understanding. The study further found out that Polokwane Municipal libraries fail to adopt CC as a result of limited budget and poor internet connection. The study recommends intensive study on factors influencing adoption of CC, workshops and training for librarians, and initiatives on fundraising within these libraries.
2

Study of Development of Java Applications in Eclipse Environment and Development of Java Based Calendar Application with Email Notifications

Nazir, Muhammad Abid January 2013 (has links)
Eclipse is one of the mostly used software in professional development of programming applications and software solutions. It is open source software and provides extensive availability of free libraries. In this thesis work, Eclipse was studied for Java applications development. To enhance the study and to get hands on experience over Eclipse IDE, an application was developed using Java programming language. The proposed application is a desktop application that can be used on all modern operating systems. Application was developed using Java SE (standard edition) version 1.7, which is the latest version available from Oracle Corporation. Java Swing API has been used for building GUI (graphical user interface) of the application. Database for event credentials was developed by MySQL database management system. The connection between application and database has been done through Java database connectivity JDBC. Some additional Java APIs were loaded to Eclipse project work space, and a comprehensive explanation has been provided on how to use external libraries in Eclipse environment. / tel # : +46720107602 email: abidnazir89@gmail.com
3

Testverktyg för prestandamätningar av feta klienter : - En fallstudie med fokus på identifiering av testverktyg och beskrivning av viktiga kriterier för dessa / Testing tools for performance testing thick clients : – a case study with focus on identifying testing tools and describing important criteria for these

Stenberg, Maria January 2017 (has links)
Denna studie syftar till att beskriva prestandatest av feta klienter, ibland också kallade skrivbordsapplikationer. Studien syftar även till att kartlägga testverktyg som kan användas för att utföra prestandatest av feta klienter och att identifiera vilka egenskaper som anses vara viktiga kriterier för dessa testverktyg. Undersökningen är skapad som en fallstudie som undersökningsstrategi där fallets utgångspunkt är Trafikverkets behov men undersökning och dess resultat kan även appliceras på andra verksamheter där testarbete utförs. Både kvalitativ och kvantitativ datainsamling användes i undersökningen genom intervjuer och dokumentstudier samt enkätformulär. Då insamlat data i undersökningen är av både kvalitativ och kvantitativ form så användes också en blandning av en kvalitativ tematisk analys och kvantitativ dataanalys. En del av analysen är en utvärdering av ett testverktygsurval mot sammanställda kriterier, en kriteriebaserad utvärderingsmetod. Tillvägagångssättet för val och utvärdering av testverktyg som tillämpats genom studien är baserat på tidigare befintliga teorier som funnits genom litteraturstudier. Litteraturstudierna har även stått till grund för att definiera undersökningens centrala begrepp och bidrar till resultat genom en jämförelse med insamlat data. Resultatet från undersökningen bidrar med ett beslutsunderlag för verksamheter som står inför ett val av testverktyg för prestandatest av feta klienter och en utvärdering av dessa innan licenser införskaffas. Undersökningen bidrar även med en karakterisering av prestandatest av feta klienter. I just detta fall var de mest passande testverktygen för syftet HP LoadRunner samt två testverktyg från eggPlant i kombination (eggPlant Functional och eggPlant Performance). / The aim of this study is to describe performance testing on thick clients, sometimes also referred to as desktop applications. Another aim with this study is to map out a selection of testing tools that can be used for performance testing of thick clients and to identify what qualities that is considered to be important criteria for these testing tools. The study is based on the research strategy called case study where the case is grounded the needs from Trafikverket but the results from this study could be applied on other business organizations that works with testing. Both qualitative and quantitative data collecting methods where used in this study, in the form och interviews, document studies and questionnaires. Since the collected data in the study where in both qualitative and quantitative form the use of a mix between a qualitative thematical data analysis and a quantitative data analysis had to be done. A part of the analysis was an evaluation on a selection of testing tools towards a compiled list of criteria, as an evaluation method based on criteria. The course of action for choosing and evaluation a testing tool that has been applied throughout the study is based on preexisting theories that has been found through reviews of literature. The reviews of literature have also been the ground for defining the central concepts of the study and contributes to the result by comparing what’s been found in literature to the collected data. The result of the study contributes with a basis for decision for companies and organizations that is in the process of getting a testing tool for performance testing thick clients och how to evaluate these before obtaining the testing tool licenses. The study also contributes with a characterization of performance testing thick clients. In this particular case, the most suitable testing tools came to be HP LoadRunner and also two testing tools from eggPlant combined (eggPlant Functional and eggPlant Performance).
4

Validace přístupnosti webových stránek / Validation of Web Accessibility

Krásný, Kamil January 2011 (has links)
The subject matter of this project is accessibility of web pages and possibilities of its automated validation. This thesis defines what web accessibility really is and identifies what disabilities can users of the Internet suffer from. The main goal is to analyse and to compare current web accessibility rules valid in the USA, in the European Union and in the Czech Republic and to research existing validators as well. The tools are divided into the following categories: Online tools, toolbars and desktop applications. The output of this project is in form of specification and implementation of a new validation tool.
5

Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop / Rollbaserad åtkomstkontroll (RBAC) för smarta nät : Implementering och utvärdering av ett rollbaserat åtkomstkontrollsystem för konfigurationsinläsning i en transformatorstation från en datorapplikation.

Ducornaud, Gatien January 2023 (has links)
Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. This, in addition to devices in a substation being usually strictly controlled, means that having an RBAC limited to a desktop application can be necessary. Moreover, the cost of adding additional layers of security needs to be considered too, as the cost of adding specific features can vary significantly. This thesis thus looks into the existing solutions for desktop applications in substations, explains their viability and implements an RBAC system using Group Nesting in Windows user management, in the context of a configuration loading application on a main computer in a substation. It is then used to evaluate the cost of this new solution, in terms of maintainability, usability and flexibility, compared to the gained security. This is done by using static analysis of both codebases, and evaluation of usability and security. It shows that security can be added for a reasonable cost using Group Nesting in Smart Grids if the focus is to delegate some tasks to the directory, improving on the security of the application and the system as a whole. / Åtkomstkontroll är en viktig aspekt av cybersäkerhet, och rollbaserad åtkomstkontroll (RBAC) är ett typiskt ramverk för att kontrollera åtkomsten till specifika resurser. I smarta nät kan det dock hända att den vanliga autentiseringslösningen med en betrodd identitetsleverantör inte är tillräcklig för att autentisera en användare, eftersom systemen inte kan förlita sig på externa tjänster. Detta, förutom att enheterna i en transformatorstation vanligtvis är strikt kontrollerade, innebär att det kan vara nödvändigt att ha en RBAC som är begränsad till en datorapplikation. Dessutom måste kostnaden för att lägga till ytterligare säkerhetslager också beaktas, eftersom kostnaden för att lägga till specifika funktioner kan variera avsevärt. Denna avhandling omfattar därför dels undersökning av de befintliga lösningarna för datorapplikation i transformatorstationer, dels redogörelse av genomförbarheten och dels implementeringen av ett RBAC-system. Implementationen använder funktionen Group Nesting i Windows-användarhantering och integrerades i en applikation för konfigurationsinläsning på en huvuddator i en transformatorstation. Därefter utvärderas kostnaden för denna nya lösning i fråga om underhållbarhet, användbarhet och flexibilitet i förhållande till den ökade säkerheten. Detta görs med hjälp av statisk analys av de båda mjukvarulösningarna och utvärdering av användbarhet och säkerhet. Det visar att säkerheten kan ökas till en rimlig kostnad med hjälp av Group Nesting i smarta nät, om fokus ligger på att delegera vissa uppgifter till en katalog, vilket förbättrar säkerheten i applikationen och systemet som helhet. / Le contrôle ’daccès est un aspect essentiel de la cybersécurité, et utiliser des rôles pour implémenter cela est souvent le modèle recommandé. Pour autant, dans le contexte des réseaux électriques intelligents, il ’nest pas toujours possible de posséder un parti tiers fiable qui puisse faire autorité car il ne faut pas dépendre de systèmes extérieurs. ’Cest particulièrement vrai dans une sous-station où les ordinateurs connectés ont un rôle strictement défini. Ainsi il peut être nécessaire ’davoir un système de contrôle ’daccès basé sur les rôles (RBAC, Role-Based Access Control) uniquement contenu sur un ordinateur. Il faut de plus pouvoir estimer le coût de cette sécurité supplémentaire. Ce rapport évalue les solutions existantes dans cette situation et leur viabilité, et implémente un RBAC grâce à ’limbrication de groupe ’dutilisateur Windows, pour une application desktop pour le chargement de configuration pour l´ordinateur central ’dune sous-station. Cette implémentation est ensuite utilisée pour estimer les coûts associés à ’lajout ’dun RBAC en termes de maintenabilité, ’dutilisabilité et de flexibilité par rapport aux gains de sécurité. Cela est fait à travers des outils ’danalyse statique sur le code avant et après implémentation et ’dautres techniques ’danalyse de la sécurité et de la maintenabilité. Cela permet de montrer que, avec ’limbrication de groupes, il est possible ’dobtenir un niveau de sécurité satisfaisant tout en limitant les coûts associés, grâce au fait de déléguer les fonctions de gestion ’dutilisateur à un système de directory (répertoire).

Page generated in 0.1238 seconds