• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 6
  • 5
  • 5
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 28
  • 20
  • 12
  • 11
  • 11
  • 11
  • 11
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Tillit på webben : En rapport om arbetet med en webbaserad tjänst med målet att inge tillit hos användare / Trust on the Internet : A report on the work with a web based service with the goal to induce trust in users

Huber, Christine January 2015 (has links)
Denna rapport redogör kring arbetet med tjänsten Hästjuristen och svårigheterna kring att designa och utveckla en webbplats som inger förtroende och tillit. Hästjuristen är en helt ny tjänst som erbjuder information om hästjuridik och nedladdning av juridiska avtal rörande hästar. Målet med arbetet har varit att ta fram en fullt fungerande tjänst som är tilltalande, användarvänlig och förtroendeingivande för att göra det enklare för behövande att erhålla sig korrekta avtal. Arbetet med tjänsten har haft tre teoretiska modeller för webbutveckling för e-handelstjänster som grund. Intervjuer, personas, prototyper och användartester har varit delar av arbetsprocessen. Resultatet är en webbaserad tjänst som erbjuder nedladdning av hästavtal, information om hästjuridik och medlemskap. Webbplatsen är fullt responsiv och kodad i CSS, HTML, PHP och JavaScript. / This report present the work of the service Hästjuristen and the difficulties with designing and developing a website which induces credibility and trust. Hästjuristen is a completely new service that offers information about jurisprudence and the possibility of downloading contracts concerning horses. The goal has been to develop a fully functional service which is appealing, user friendly and confidence inspiring to make it easier for people to obtain correct contracts for their own needs. The work with the service has been based on three theoretical models for development of e-commerce. Interviews, personas, prototypes and users test have been parts of the working procedure. The result is a web based service which offers horse contracts for downloading, information regarding jurisprudence concerning horses and membership on the site. The website is fully responsive and coded using CSS, HTML, PHP and JavaScript.
42

Extrakce informací z webových stránek / Information Extraction from Web Pages

Bukovčák, Jakub January 2019 (has links)
This master thesis is focused on current technologies that are used for downloading web pages and extraction of structured information from them. The paper describes available tools to make this process possible and easier. Another part of this document provides the overview of technologies that can be used for creating web pages. Also, there is an information about development of information systems with web user interface based on Java Enterprise Edition (Java EE) platform. The main part of this master thesis describes design and implementation of application used to specify and manage extraction tasks. The last part of this project describes application testing on real web pages and evaluation of achieved results.
43

Embedded Software Streaming via Block Streaming

Kuacharoen, Pramote 12 April 2004 (has links)
Downloading software from a server usually takes a noticeable amount of time, that is, noticeable to the user who wants to run the program. However, this issue can be mitigated by the use of streaming software. Software steaming is a means by which software can begin execution even while transmission of the full software program may still be in progress. Therefore, the application load time (i.e., the amount of time from when an application is selected for download to when the application can be executed) observed by the user can be significantly reduced. Moreover, unneeded software components might not be downloaded to the device, lowering memory and bandwidth usages. As a result, resource utilization such as memory and bandwidth usage may also be more efficient. Using our streaming method, an embedded device can support a wide range of applications which can be run on demand. Software streaming also enables small memory footprint devices to run applications larger than the physical memory by using our memory management technique. In this dissertation, we present a streaming method we call block streaming to transmit stream-enabled applications, including stream-enabled file I/O. We implemented a tool to partition software into blocks which can be transmitted (streamed) to the embedded device. Our streaming method was implemented and simulated on an MBX860 board and on a hardware/software co-simulation platform in which we used the PowerPC architecture. We show a robotics application that, with our software streaming method, is able to meet its deadline. The application load time for this application also improves by a factor of more than 10X when compared to downloading the entire application before running it. The experimental results also show that our implementation improves file I/O operation latency; in our examples, the performance improves up to 55.83X when compared with direct download. Finally, we show a stream-enabled game application combined with stream-enabled file I/O for which the user can start playing the game 3.18X more quickly than using only the stream-enabled game program file alone.
44

Listening to Digital Media: Analysis of Music Consumption Pattern on the Example of Russian Social Networking Site VKontakte : A user-focused research based on in-depth interviews

Kyryllova, Iuliia January 2018 (has links)
The present paper represents an overview of the most popular Russian social networking site VKontakte and its role in the formation of modern music consumption pattern in post-Soviet countries. Until spring 2017, it was known as the biggest platform for free music consumption in the region. The main distinctive feature of VKontakte was that it was providing free music content for its members and, as a result, was known for problems with international copyright law.However, in 2017 drastic changes occurred in copyright policies of the network, which affected music content distribution in it. As a result, VKontakte users were experiencing new routines and rapid evolution of their daily consumption habits. This research provides extensive analysis of digital music listening practices, based on the in-depth interviews with the members of the network.
45

Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse / Does Application Permissions Matter? : A Quantitative Survey of Android Users Behaviour and Awareness

Jamil, Eva, Shirazi, Mazdak January 2017 (has links)
Problem - Android är det ledande operativsystemet på marknaden, samtidigt har tidigare forskning påvisat att skadlig kod och mobila attacker främst har riktats mot Androidenheter. Attacker utförs genom att applikationer som innehar skadlig kod, får den åtkomst på enheten som de begär genom att applikationsbehörigheter godkänns av användaren före installation av en applikation. Ett stort problem är att användarna i dagsläget väljer att ignorera behörigheterna före installation samt inte förstår dess betydelse. Frågeställning och syfte - Studien syftar till att undersöka tre frågeställningar. Den första forskningsfrågan behandlar hypoteser kring hur pass medvetna Androidanvändarna är om riskerna som finns hos tio applikationsbehörigheter vilket ofta förekommer bland skadliga applikationer. Vidare var målet med studien att undersöka om det finns ett samband mellan användarnas medvetenhet och nedladdningsbeteende. Den sista frågeställningen undersöker om användarna läser igenom applikationsbehörigheter före installation av en applikation och vilka bakgrundsorsaker det finns ifall de inte gör det. Metod - Kvantitativa metoder har använts i form av att det empiriska materialet inhämtats med hjälp av en enkätundersökning. I studien deltog 116 respondenter och resultatet togs fram med hjälp av stapeldiagram, korstabeller, Chi2-tester och frekvenstabeller. Resultat och slutsats - Målet har uppfyllts till hög grad, dock hade det varit gynnsamt att ha ett större urval för att möjligen kunna säkerställa samt stärka signifikansen i Chi2-testerna. Resultatet visade att en hög grad av användarna inte är medvetna om riskerna hos de undersökta behörigheterna. Vidare visade fynden att det finns ett visst samband mellan användarnas medvetenhet och nedladdningsbeteende då sex av tio hypoteser bekräftats. Resultatet visade även att 62 procent av användarna aldrig alternativt sällan läser igenom behörigheterna före installation, samt att orsaken till detta är att de inte förstår behörigheternas beskrivning alternativt inte lägger märke till behörigheterna. Slutligen påpekade respondenterna att de inte förstår behörigheternas beskrivning på grund av att de är för korta samt innehåller för många tekniska termer. Originalitet - Studiens resultat nyttjar främst Androidanvändarna för att öka deras kunskap vilket skyddar dem mot de risker som finns. Resultatet ger dock även nytta för vidare utveckling av applikationsbehörigheterna för att mer effektivt fungera som en varningsmetod vid nedladdning. Det som är nytt och värdefullt i studien är att vi baserat på problemen som påvisats hos tidigare forskning, valt att ytterligare fördjupa oss inom ämnet. Studien har undersökt om det finns ett samband mellan användarnas medvetenhet och nedladdningsbeteende, samt vilka bakgrundsorsaker det finns som medfört att användarna inte läser igenom samt inte förstår sig på applikationsbehörigheterna. Originalitet finns även i studien då vi avgränsat oss till att specifikt undersöka medvetenheten kring tio behörigheter som ofta förekommer bland skadliga applikationer, men som även uppkommer hos vanliga applikationer på Google Play. / Problem – Android is the leading operative system on the market, while previous studies have shown that malware and attacks have mostly been targeted at Android units. Attacks are executed when applications that consist malware gets access of the permissions they demand of the unit. This is by the approval of the user before an installation of an application. A problem is that many users ignores or don’t understand the permission they give applications access to. Purpose - The study aims to examine three issues. The first research question contains hypotheses about how aware Android users are of the risks which ten application permissions contain. These permissions often occurs among malicious applications but are also included among safe applications at Google Play. Furthermore, the objective of this study is to investigate whether there is a connection between the user awareness and their downloading behavior. The last issue examines whether users read through the application permissions before installing an application, and what possible reasons that causes them to not read the permissions. Methodology - Quantitative methods have been used by gathering the empirical material through a questionnaire. The study involved 116 respondents and the results were created by using bar graphs, crosstabs, Chi-square tests and frequency tables. Results and Conclusion - The goal has been met to a large extent, however, it would have been beneficial to have a larger selection to possibly be able to ensure and strengthen the significance of the Chi-square tests. The result showed that a high degree of users are not aware of the risks of the investigated permissions. Further findings showed that there is some connection between the user’s awareness and download behavior, since six out of ten hypotheses got confirmed. The results also showed that 62 percent of the users never alternatively rarely read permissions before installation. The reason for this is that they don’t understand the permissions associated description, alternatively don’t notice the permissions at all. Finally, the respondents indicated that they do not understand the description of the permissions because they are too short and have too many technical terms. Originality - The results of the study mainly benefits the Android users since it increases their knowledge which protects them against the risks. The result, however, also benefit the further development of the application permissions, to make them work more effectively as a warning method. What’s new and valuable in the study is that it’s based on the problems that was identified in previous research and we decided to further immerse ourselves in the subject. The study has investigated whether there is a connection between the user awareness and downloading behavior, as well as the background causes which makes the users ignore and don’t understand the permissions. Originality is also found in the study since we limited ourselves to specifically investigate ten permissions that often occur among malicious applications. The study is written in Swedish.
46

Multimediální přehrávač pro iOS / Multimedia Player for iOS

Singh, Kevin January 2019 (has links)
Diploma work „Multimedia player for iOS“ deals with the description of the video formats such as HLS, MP4, MPEG Transport Stream, and Dash. Next, it continues with protected content DRM, VAST advertisements and analytics tool called Google Analytics. During compilation of this diploma work was created a framework in programming language Swift. This framework is basically a player, that besides playing Interactive videos is able to show ads, subtitles, can change the video quality, AirPlay and download the content for offline playing. A feature to play a protected content could not be done as a developer's request for a product deployment SDK Fairplay was refused from an SDK owner. A testing app was also created that implements developed a framework and prove the functionality of the developed functions.
47

Download culture and the dilemma of postmodern technologies: (il) legal digital music sharing and itss effects on South African artistes

Kgasago, Tshepho Justice January 2022 (has links)
Thesis(Ph.D. (Communication Studies)) -- University of Limpopo, 2022 / Digital technologies are increasingly revolutionising music consumption patterns globally. Consequently, there is an emerging culture in which online tools have become primary platforms for music consumption. In this postmodern era, digital technologies make music easily accessed, consumed and shared, thereby providing a seemingly global recognition to artistes beyond their immediate geographical market. As a result, artistes sometimes distribute their music for free with the intention to reach potential consumers. Equally, these technologies also allow consumers to illegally access and share music freely without financial compensation to the artistes. At the same time artistes also sell their music through different online stores to generate revenue. Alongside these developments, there are challenges with access to the Internet in South Africa with older adults and those in rural areas being disadvantaged, and the cost of Internet curtailing what youths can afford to do online. This then prompts critical questions: How do older adults and youth listen to music? Where and how do they access music? How does the new digitalised music affect their music consumption? What are the implications of all these to the social capital and social lifestyles of youth and older South African adults? Also, how has the digitalisation of music impacted on the political economy of the music industry in South Africa? In what ways do the illegal and legal downloads of music benefit or disadvantage local artistes? From a critical theorisation of an emerging ‘download culture’ and a discussion of the postmodern technological turn, this study examined a case study of South African youth and older adults’ music consumption pattern. Through a survey of 202 university students in a rural South African university and 100 older adults from semi rural areas of Limpopo Province in South Africa, the study examined the ways youth and older adults access and consume music. It explored music sharing habits and opinions about piracy in a culture where music has become instantaneously shareable. Apart from findings from this study, new knowledge and a contribution to communication scholarship is presented here with a proposal of new theory of ‘download culture’. Fundamental to this study is the implications of download culture for the creative industry, predominantly, its impact on the South African music industry. The data show that this cohort of South African youth are not different from youths globally, where music is accessed through mobile cell phones. This study also reflects that many older adults do not access digitalised music due to socio economic conditions and challenges of technology access. Nevertheless, the social cultural impact of this has repercussions on the cultural well-being of this vital group in society. Although internet access challenges persist, a critical concern is the blurring distinctions about the legal and illegal download of music. / National Institute for the Humanities and Social Sciences (NIHSS), in collaboration with the South African Humanities Deans Association (SAHUDA)
48

Combining MAS and P2P systems : the Agent Trees Multi-Agent System (ATMAS)

Gill, Martin L. January 2005 (has links)
The seamless retrieval of information distributed across networks has been one of the key goals of many systems. Early solutions involved the use of single static agents which would retrieve the unfiltered data and then process it. However, this was deemed costly and inefficient in terms of the bandwidth since complete files need to be downloaded when only a single value is often all that is required. As a result, mobile agents were developed to filter the data in situ before returning it to the user. However, mobile agents have their own associated problems, namely security and control. The Agent Trees Multi-Agent System (AT-MAS) has been developed to provide the remote processing and filtering capabilities but without the need for mobile code. It is implemented as a Peer to Peer (P2P) network of static intelligent cooperating agents, each of which control one or more data sources. This dissertation describes the two key technologies have directly influenced the design of ATMAS, Peer-to-Peer (P2P) systems and Multi-Agent Systems (MAS). P2P systems are conceptually simple, but limited in power, whereas MAS are significantly more complex but correspondingly more powerful. The resulting system exhibits the power of traditional MAS systems while retaining the simplicity of P2P systems. The dissertation describes the system in detail and analyses its performance.
49

A study of the copyright protection in the digital environment in HongKong

Chan, Lai-sha., 陳麗莎. January 2011 (has links)
published_or_final_version / Politics and Public Administration / Master / Master of Public Administration
50

Funktionelle Analyse von Systemsoftware-Updatesystemen [DVB-fähiger Multimedia-Entertainment-Endgeräte] /

Knauf, Robert. Eibl, Maximilian. January 2007 (has links)
Chemnitz, Techn. Univ., Diplomarb., 2006.

Page generated in 0.0471 seconds