• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 144
  • 128
  • 29
  • 13
  • 10
  • 9
  • 8
  • 8
  • 7
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 409
  • 409
  • 117
  • 96
  • 74
  • 47
  • 45
  • 45
  • 44
  • 41
  • 41
  • 36
  • 34
  • 33
  • 33
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Études et conception d'algorithmes de reconstruction 3D sur tablettes : génération automatique de modèles 3D éditables de bâtiments existants / Study and Conception of 3D Reconstruction Algorithms on Tablets : Automatic Generation of 3D Editable Models of Existing Buildings

Arnaud, Adrien 03 December 2018 (has links)
L'objectif de ces travaux de thèse consiste à mettre en place des solutions algorithmiques permettant de reconstruire un modèle 3D éditable d'un environnement intérieur à l'aide d'une tablette équipée d'un capteur de profondeur.Ces travaux s'inscrivent dans le contexte de la rénovation d'intérieur. Les normes Européennes poussent à la rénovation énergétique et à la modélisation 3D des bâtiments existants. Des outils professionnels utilisant des capteurs de type LIDAR permettent de reconstruire des nuages de points de très grande qualité, mais sont coûteux et longs à mettre en œuvre. De plus, il est très difficile d'identifier automatiquement les constituants d'un bâtiment pour en exporter un modèle 3D éditable complet.Dans le cadre de la rénovation d’intérieur, il n'est pas nécessaire de disposer des informations sur l'ensemble du bâtiment, seules les principales dimensions et surfaces sont nécessaires. Nous pouvons alors envisager d'automatiser complètement le processus de modélisation 3D.La mise sur le marché de capteurs de profondeur intégrables sur tablettes, et l'augmentation des capacités de calcul de ces dernières nous permet d'envisager l'adaptation d'algorithmes de reconstruction 3D classiques à ces supports.Au cours de ces travaux, nous avons envisagé deux approches de reconstruction 3D différentes. La première approche s'appuie sur des méthodes de l'état de l'art. Elle consiste à générer un maillage 3D d'un environnement intérieur en temps réel sur tablette, puis d'utiliser ce maillage 3D pour identifier la structure globale du bâtiment (murs, portes et fenêtres). La deuxième approche envisagée consiste à générer un modèle 3D éditable en temps réel, sans passer par un maillage intermédiaire. De cette manière beaucoup plus d'informations sont disponibles pour pouvoir détecter les éléments structuraux. Nous avons en effet à chaque instant donné un nuage de points complet ainsi que l'image couleur correspondante. Nous avons dans un premier temps mis en place deux algorithmes de segmentation planaire en temps réel. Puis, nous avons mis en place un algorithme d'analyse de ces plans permettant d'identifier deux plans identiques sur plusieurs prises de vue différentes. Nous sommes alors capables d'identifier les différents murs contenus dans l'environnement capturé, et nous pouvons mettre à jour leurs informations géométriques en temps réel. / This thesis works consisted to implement algorithmic solutions to reconstruct an editable 3D model of an indoor environment using a tablet equipped with a depth sensor.These works are part of the context of interior renovation. European standards push for energy renovation and 3D modeling of existing buildings. Professional tools using LIDAR-type sensors make it possible to reconstruct high-quality point clouds, but are costly and time-consuming to implement. In addition, it is very difficult to automatically identify the constituents of a building to export a complete editable 3D model.As part of the interior renovation, it is not necessary to have information on the whole building, only the main dimensions and surfaces are necessary. We can then consider completely automating the 3D modeling process.The recent development of depth sensors that can be integrated on tablets, and the improvement of the tablets computation capabilities allows us to consider the adaptation of classical 3D reconstruction algorithms to these supports.During this work, we considered two different 3D reconstruction approaches. The first approach is based on state-of-the-art methods. It consists of generating a 3D mesh of an interior environment in real time on a tablet, then using this 3D mesh to identify the overall structure of the building (walls, doors and windows). The second approach envisaged is to generate a 3D editable model in real time, without passing through an intermediate mesh. In this way much more information is available to be able to detect the structural elements. We have in fact at each given time a complete point cloud as well as the corresponding color image. In a first time we have set up two planar segmentation algorithms in real time. Then, we set up an analysis algorithm of these plans to identify two identical planes on different captures. We are then able to identify the different walls contained in the captured environment, and we can update their geometric information in real-time.
162

Strategies to Prevent Security Breaches Caused by Mobile Devices

Griffin, Tony 01 January 2017 (has links)
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government contractor located in the southeastern region of the United States. Ludwig von Bertalanffy's general systems theory was used as the conceptual framework of this study. The data collection process included interviews with organization security managers (n = 5) and company documents and procedures (n = 13) from the target organization related to mobile device security. Data from the interviews and organizational documents were coded using thematic analysis. Methodological triangulation of the data uncovered 4 major themes: information security policies and procedures, security awareness, technology management tools, and defense-in-depth. The implications for positive social change from this study include the potential to enhance the organizations' security policies, cultivate a better security awareness training program, and improve the organizations data protection strategies. In addition, this study outlines some strategies for preventing data breaches caused by mobile devices while still providing maximum benefit to its external and internal customers.
163

Conservation of Limited Resources: Design Principles for Security and Usability on Mobile Devices

Horcher, Ann-Marie 01 January 2018 (has links)
Mobile devices have evolved from an accessory to the primary computing device for an increasing portion of the general population. Not only is mobile the primary device, consumers on average have multiple Internet-connected devices. The trend towards mobile has resulted in a shift to “mobile-first” strategies for delivering information and services in business organizations, universities, and government agencies. Though principles for good security design exist, those principles were formulated based upon the traditional workstation configuration instead of the mobile platform. Security design needs to follow the shift to a “mobile-first” emphasis to ensure the usability of the security interface. The mobile platform has constraints on resources that can adversely impact the usability of security. This research sought to identify design principles for usable security for mobile devices that address the constraints of the mobile platform. Security and usability have been seen as mutually exclusive. To accurately identify design principles, the relationship between principles for good security design and usability design must be understood. The constraints for the mobile environment must also be identified, and then evaluated for their impact on the interaction of a consumer with a security interface. To understand how the application of the proposed mobile security design principles is perceived by users, an artifact was built to instantiate the principles. Through a series of guided interactions, the importance of proposed design principles was measured in a simulation, in human-computer interaction, and in user perception. The measures showed a resounding difference between the usability of the same security design delivered on mobile vs. workstation platform. It also reveals that acknowledging the constraints of an environment and compensating for the constraints yields mobile security that is both usable and secure. Finally, the hidden cost of security design choices that distract the user from the surrounding environment were examined from both the security perspective and public safety perspective.
164

MDE-URDS-A Mobile Device Enabled Service Discovery System

Pradhan, Ketaki A. 16 August 2011 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Component-Based Software Development (CSBD) has gained widespread importance in recent times, due to its wide-scale applicability in software development. System developers can now pick and choose from the pre-existing components to suit their requirements in order to build their system. For the purpose of developing a quality-aware system, finding the suitable components offering services is an essential and critical step. Hence, Service Discovery is an important step in the development of systems composed from already existing quality-aware software services. Currently, there is a plethora of new-age devices, such as PDAs, and cell phones that automate daily activities and provide a pervasive connectivity to users. The special characteristics of these devices (e.g., mobility, heterogeneity) make them as attractive choices to host services. Hence, they need to be considered and integrated in the service discovery process. However, due to their limitations of battery life, intermittent connectivity and processing capabilities this task is not a simple one. This research addresses this challenge of including resource constrained devices by enhancing the UniFrame Resource Discovery System (URDS) architecture. This enhanced architecture is called Mobile Device Enabled Service Discovery System (MDE-URDS). The experimental validation of the MDE-URDS suggests that it is a scalable and quality-aware system, handling the limitations of mobile devices using existing and well established algorithms and protocols such as Mobile IP.
165

A feasibility study on pairinga smartwatch and a mobile devicethrough multi-modal gestures

Bernardi, Dario January 2019 (has links)
Pairing is the process of establishing an association between two personal devices. Although such a process is intuitively very simple, achieving a straightforward and secure association is challenging due to several possible attacks and usability-related issues. Indeed, malicious attackers might want to spoof the communication between devices in order to gather sensitive information or harm them. Moreover, offering users simple and usable schemes which attain a high level of security remains a major issue. In addition, due to the great diversity of pairing scenarios and equipment, achieving a single, usable, secure association for all possible devices and use cases is simply not possible.In this thesis, we study the feasibility of a novel pairing scheme based on multi-modal gestures, namely, gestures involving drawing supported by accelerometer data. In particular, a user can pair a smart-watch on his wrist and a mobile device (e.g., a smart-phone) by simply drawing with a finger on the screen at the device.To this purpose, we developed mobile applications for smart-watch and smart-phone to sample and process sensed data in support of a secure commitment-based protocol. Furthermore, we performed experiments to verify whether encoded matching-movements have a clear similarity compared to non-matching movements.The results proved that it is feasible to implement such a scheme which also offers users a natural way to perform secure pairing. This innovative scheme may be adopted by a large number of mobile devices (e.g., smart-watches, smart-phones, tablets, etc.) in different scenarios. / Parkoppling är processen för att etablera en anslutning mellan två personliga enheter. Även om den processen rent intuitivt verkar väldigt enkel så är det en utmaning att göra det säkert på grund av en uppsjö olika attackvektorer och användbarhets-relaterade problem. Faktum är att angripare kanske vill spionera på kommunikationen mellan enheterna för att samla information, eller skada enheten. Dessutom kvarstår problemet att erbjuda användaren ett simpelt och användarvänligt sätt att parkoppla enheter som håller en hög nivå av säkerhet. På grund av mängden av olika enheter och parkopplingsscenarier är det helt enkelt inte möjligt att skapa ett enskilt säkert sätt att parkoppla enheter på.I den här uppsatsen studerar vi genomförbarheten av ett nytt parkopplingsschema baserat på kombinerade rörelser, nämligen en målande rörelse supportat av data från accelerometern. I synnerhet kan en användare parkoppla en smart klocka på sin handled med en mobiltelefon genom att måla med sitt finger på mobiltelefonens skärm. För ändamålet utvecklar vi en mobilapplikation för smarta klocka och mobiltelefoner för att testa och processa inhämtad data som support för ett säkert engagemangsbaserat protokoll. Utöver det genomförde vi ett antal experiment för att verifiera om synkroniserade rörelser har tydliga liknelser i jämförelse med icke synkroniserade rörelser.Resultatet visade att det är genomförbart att implementera ett sådant system vilket också erbjuder användaren ett naturligt sätt att genomföra en säker parkoppling. Detta innovativa system kan komma att användas av ett stort antal mobila enheter (t.ex. smarta klockor, mobiltelefoner, surfplattor etc) i olika scenarion.
166

The Use of Mobile Applications in Preventive Care and health-Related Conditions: A Review of the Literature

Ringer, Naomi 01 August 2014 (has links)
The purpose of this review of literature was to understand the role of mobile device applications in health related conditions and to analyze their effects on health outcomes related to the management of chronic illnesses. Implications for future use of applications in client-centered care and interpretation of the data by health care providers was also explored. Peer-reviewed, English-language research articles published from 2008 to present were included for synthesis. Study results revealed positive outcomes when health-related mobile applications were used in practice and support clinicians' use of mobile applications as a tool for monitoring symptoms and communicating with individuals. The literature indicated nurses play a significant role in providing feedback, which reinforces self-care strategies and adherence, with the potential for improving outcomes. Additional research is needed to evaluate the long-term effects of applications on patient outcomes, nurses' perspectives, and feasibility of implementation into practice.
167

Message Prioritization In Computer-mediated Communication: A Study Of Mobile Device Use In The Classroom

Wills, Paul 01 January 2013 (has links)
College students are using their mobile devices during class and this research investigates different aspects of why college students feel so inclined to use these devices during class as well as by what means are students using to participate in computer-mediated communication while simultaneously engaging in classes. This research surveyed 146 students on their perceived use of their own mobile device use during class. The study compared how often different types of devices, such as mobile phones, tablets, and laptops, and different types of social media outlets, like Facebook, Twitter, and other social media websites, were used during class. The study compares these devices and media outlets to students’ perception of the levels of incivility of using these various means of communication during class and their perceptions of how they impact their ability to focus on the class. Mobile phones, Facebook, and Twitter use were negatively associated with the perception of the incivility of use in the classroom. This research found phone use was viewed as more uncivil than tablets and tablet use was viewed as more uncivil than laptop use. In addition, students’ perceptions of instructors’ tolerance of mobile phone and laptop use was negatively associated with their perception of the incivility of using those devices during class. All three tested mobile devices and all three tested social media outlets were positively associated with students’ perception that its use affects their ability to focus on the class. This research found mobile phones use as more distracting than laptops and laptops use as more distracting than tablets.
168

Data Entry Error In Mobile Keyboard Device Usage Subject To Cognitive, Environmental, And Communication Workload Stressors Present In Fully Activated Emergency Operations Centers

Durrani, Samiullah 01 January 2009 (has links)
The diversity and dynamic nature of disaster management environments necessitate the use of convenient, yet reliable, tools for technology. While there have been many improvements in mitigating the effects of disasters, it is clearly evident by recent events, such as Hurricane Katrina that issues related to emergency response and management require considerable research and improvement to effectively respond to these situations. One of the links in a disaster management chain is the Emergency Operations Center (EOC). The EOC is a physical command center responsible for the overall strategic control of the disaster response and functions as an information and communication hub. The effectiveness and accuracy of the disaster response greatly depends on the quality and timeliness of inter-personnel communication within an EOC. The advent of handheld mobile communication devices have introduced new avenues of communication that been widely adopted by disaster management officials. The portability afforded by these devices allows users to exchange, manage and access vital information during critical situations. While their use and importance is gaining momentum, little is still known about the ergonomic and human reliability implications of human-handheld interaction, particularly in an Emergency Operations Center setting. The purpose of this effort is to establish basic human error probabilities (bHEP's) for handheld QWERTY data entry and to study the effects of various performance shaping factors, specifically, environmental conditions, communication load, and cognitive load. The factors selected are designed to simulate the conditions prevalent in an Emergency Operations Center. The objectives are accomplished through a three-factor between-subjects randomized full factorial experiment in which a bHEP value of 0.0296 is found. It is also determined that a combination of cognitive loading and environmental conditions has a statistically significant detrimental impact on the HEP.
169

Elevers privata mobiltelefoner som didaktiska verktyg / Pupils Private Mobile Phones as Didactic Tool

Kristiansson, Sara, Novljakovic, Selma January 2023 (has links)
This knowledge overview seeks to answer the question; What opportunities and difficulties are there in using students' private mobile phones as a didactic tool? To answer the question, we will also investigate what students and teachers' views are. We will use various research texts that will give us an insight into how the situation looks for students in the classroom. The research is done between the years 2013-2022 with both Sweden and the international arena as focus. The research texts show that the possibilities with mobile phones as didactic tools are many and broad, however the difficulties are likewise. This knowledge overview has given us as new teachers a broader understanding of how mobile phones can be used to an advantage or disadvantage. The research also shows that mobile phones can be used as a didactic tool with the right resources, understanding and efforts. Unfortunately, we believe that there is not enough research on how it concretely can be used in Sweden and what the school world needs to contribute.
170

Implementation of Mobile Television Environments with New Forms of Content and Commercial Advertising

Earnshaw, Rae A., Robison, David J., Al Sheik Salem, Omar F.A., Excell, Peter S. January 2011 (has links)
No / Mobile television environments offer the potential for the repurposing of media content and services, and also the introduction of new forms of commercial advertising which are more accurately targeted towards a user’s profile, as per an advertiser’s requirements. This modality can include non-commercial information provision. The Google model for linking search terms and keywords to advertisements demonstrates that ‘intelligent’, context-aware, targeted advertisements are more responsive to user profiles. Advertiser practices such as product placement need re-examination in this context. Prototype mobile TV interfaces, as alternatives to the well-established TV model of viewing content, are presented, in order to evaluate the relationship between television content and mobile devices and to understand the key factors determining possible directions, for the future of mobile television. Changes need to be made to content display, interaction paradigms and device parameters, as social and cultural expectations are re-negotiated.

Page generated in 0.0419 seconds