• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 158
  • 151
  • 94
  • 40
  • 12
  • 11
  • 8
  • 8
  • 8
  • 7
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 521
  • 521
  • 158
  • 156
  • 128
  • 123
  • 123
  • 123
  • 123
  • 122
  • 120
  • 110
  • 108
  • 102
  • 87
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Návrhové vzory architektury OS Android s využitím jazyka Kotlin / Android OS software design patterns utilizing the Kotlin language

Maloušek, Jan January 2020 (has links)
The aim of this thesis is to describe design patterns and other programming best practices used in the development of Android applications. The theoretical part analyzes design patterns, Kotlin programming language, dependency injection, reactive programming and automatic testing. The practical part deals with the design and implementation of a sample Android application, which demonstrates the advantages of using design patterns and other proven programming practices described in the theoretical part.
232

Transparency between consumers and grocery stores : Evincer - A design prototype to empower consumer experience during grocery shopping

Aldulaymi, Mohammed January 2021 (has links)
This study explores how the interaction design techniques approach can contribute to enabling more transparency in physical shopping by creating bridges between consumers and various stakeholders. The aim is to empower the consumers to make informed decisions through obtaining and understanding health and environmental information for individual commodities. Through close collaboration with users, and with the support of active designers, the design process results in the development of an interactive mobile application proposal. The prototype aims to create a hub between consumers and different stakeholders concerning individual products. Furthermore, the prototype grants consumers access to the information they desire, sharing or requesting product feedback from stakeholders and consumers, focusing on the environment and health aspects.
233

Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

Danilovic, Robert, Svensson, Måns January 2021 (has links)
A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. The world has become more and more connected and the amount of people who store personal information online or on their phones has steadily increased. In this thesis, a solution is proposed and evaluated to make authentication safer and less intrusive. Less intrusive in this case means that it does not require cooperation from the user, it just needs to capture data from the user in the background. As authentication methods such as fingerprint scanning and facial recognition are becoming more popular this work is investigating if there are any other biometric features for user authentication.Employing Artificial Intelligence, extra sensor metrics and Machine Learning models with the user's typing characteristics could be used to uniquely identify users. In this context the Neural Network and Support Vector Machine algorithms have been examined, alongside the gyroscope and the touchscreen sensors. To test the proposed method, an application has been built to capture typing characteristics for the models to train on. In this thesis, 10 test subjects were chosen to type a password multiple times so that they would generate the data. After the data was gathered and pre-processed an analysis was conducted and sent to train the Machine Learning models. This work's proposed solution and presented data serve as a proof of concept that there are additional sensors that could be used to authenticate users, namely the gyroscope. Capturing typing characteristics of users, our solution managed to achieve a 97.7% accuracy using Support Vector Machines in authenticating users.
234

Podpora prodejního procesu na mobilních platformách / Sales Process Support on Mobile Platforms

Pěnkava, Pavel January 2014 (has links)
This thesis deals with the creation of the application for sales process support on Android mobile platform. It describes the application concept and the consequent implementation of solution for Allium Catalogue based on Microsoft Dynamics NAV. It also explains the importance of ERP systems for sales process and includes the familiarization with already existing applications for their support. It analyses the multiplatform development environments and basic principles of the multiplatform development.
235

Mobilní systém pro podporu cestování / Mobile System for Travelling Support

Blatný, Petr January 2014 (has links)
This master's thesis describes process of design and development of a mobile system for travelling support. Application named TravelHelper is developed for Android operating system therefore is implemented in Java programing language. In thesis's text is described used platform and its primary construction blocks. Main function of application is a journeys' diary, which allows storing activities of a trips. Application also allows backing up and sharing journeys on a social networks. Other functions of the application are searching for interesting places nearby, manager of travel expenses, translator, currency converter, and a packing list.
236

Mobilní klient pro elektronické žákovské knížky / Mobile Client for Electronic Pupil's Evidence

Bučko, Peter January 2013 (has links)
This Thesis is focused on electronization of schools and on using of Electronic Pupil's Evidence. Possibilities of mobile client developing for these systems and user requirements are examined. It introduces demonstration application and describes implementation for Android. It presents results from testing with users and experience with demonstration application. Finally it describes possibilities of extension and connection to real system.
237

Rozšířená realita v reklamě / Augmented Reality for Commercials

Angelov, Michael January 2011 (has links)
Master's thesis presents a possible application of augmented reality in domain of commerci- als. It presents designed architecture of a mobile application that is able to detect and track specific objects (e.g. printed commercials, logos) in mobile';s phone camera in real time and provide some extra information about the detected object towards the user. Thesis also provides a review of contemporary used techniques in object recognition, object tracking and image retrieval from image databases.
238

Models for Risk assessment of Mobile applications

Ikwuegbu, Chigozie Charles January 2020 (has links)
Mobile applications are software that extend the functionality of our smartphones by connecting us with friends and a wide range of other services. Android, which is an operating system based on the Linux kernel, leads the market with over 2.6 million applications recorded on their official store. Application developers, due to the ever-growing innovation in smartphones, are compelled to release new ideas on limited budget and time, resulting in the deployment of malicious applications. Although there exists a security mechanism on the Google Play Store to remove these applications, studies have shown that most of the applications on the app store compromise privacy or pose security-related risks. It is therefore essential to investigate the security risk of installing any of these applications on a device. The objectives are to identify methods and techniques for assessing mobile application security, investigate how attributes indicate the harmfulness of applications, and evaluate the performance of K Nearest Neighbors(K-NN) and Random forest machine learning models in assessing the security risk of installing mobile applications based on information available on the application distribution platform. A literature analysis was done to gather information on the different methods and techniques for assessing security in mobile applications and investigations on how different attributes on the application distribution platform indicate the harmfulness of an application. An experiment was also conducted to examine how various machine learning models perform in evaluating the security risk associated with installing applications, based on information on the application distribution platform. Literature analysis presents the various methods and techniques for mobile application security assessment and identifies how mobile application attributes indicate the harmfulness of mobile applications. The experimental results demonstrate the performance of the aforementioned machine learning models in evaluating the security risk of installing mobile applications. In conclusion, Static, dynamic, and grey-box analysis are the methods used to evaluate mobile application security, and machine learning models including K-NN and Random forest are suitable techniques for evaluating mobile application security risk. Attributes such as the permissions, number of installations, and ratings reveal the likelihood and impact of an underlying security threat. The K-NN and Random forest models when compared to evaluate the security risk of installing mobile applications based on information on the application distribution platform showed high performance with little differences.
239

HTML5-based Travel HabitApplication: Investigation of VectorWeb Mapping Possibilities / HTML5-baserad res-logg applikation:Undersökning av möjligheterna med vektor kartläggning

Isaksson, Camilla January 2013 (has links)
The subject of the report is to review and evaluate the potential for vector graphics in web maps. It ishoped that a web mapping only should display vector graphics. Compared to the traditional webmapping approach, that has raster tiles pre-rendered on the server side for each zoom level. Thedrawback with raster data is that it lacks in information content compared to vector data, which interms can contribute to a richer user interface. However, vector graphics, in comparison to raster datahave a complex data structure and are inefficient to handle such as raster data traditionally is managed.Thanks to new rendering techniques for vector graphics, such as by VML, SVG, but mainly throughthe canvas element, web maps can be improved since vector graphics can be drawn directly in theclient through the browser without the need to generate data on the server side and sent it to the client.By selecting three vector-based mobile mapping libraries that use HTML5, in particular the canvaselement, each library is examined and evaluated based on their ability to use vector graphics, bothperformance-wise, by randomly generating vector data on a map comprising of the world, but alsoaccording to a number of usability criteria. Thereafter, a mobile travel habit implementation isdeveloped based on one of the libraries that meets the criteria the best. The travel habit application isdesigned to register the user’s geographical movements and subsequently display the user’s completedtrip in terms of vector data on a map. The application is developed with the ASP.NET technique thatconsists of HTML, JavaScript and C# languages. Results show that each library is superior / comparesfavourably to the others for at least one of the assessment criteria. Based on the performance test forthe rendering of vector data, the Tile5 library performed best with a rendering time corresponding toapproximately half the time it took for the second best library Leaflet. However, since Tile5 indicatesdeficiencies in the documentation, Leaflet fits the overall established assessment criteria best and isselected for the implemented of the mobile application for travel habits. For future development, Tile5has the potential to become a useful and effective tool for vector web mapping and to compete withthe traditional mapping platforms that renders raster data. / Motivet till rapporten är att granska och utvärdera möjligheterna för vektorgrafik i webbkartor,förhoppningen är att i en webbkarta endast visa vektorgrafik. Istället för på det traditionella sättet medraster data som genererats färdigt på server-sidan för varje zoom-nivå av kartan. Nackdelen medrasterdata är att den är fattig på information jämfört med vektordata, som i sin tur kan bidra till ettrikare användargränssnitt. Dock har vektorgrafik jämfört med rasterdata en komplex datastruktur ochär ineffektivt att hantera så som rasterdata traditionellt görs.Tack vare nya rittekniker för vektorgrafik, så som genom VML, SVG men främst via canvaselementet, kan webbkartor förbättras i och med att vektorgrafik kan ritas upp direkt genom browserutan att behöva generera data på server-sidan. Genom att välja ut tre vektor-baserade utvecklingsbibliotek som använder sig utav HTML5 och speciellt canvas elementet, så undersöks och utvärderasrespektive bibliotek utifrån deras möjlighet att använda vektorgrafik, både prestandamässigt, genomatt slumpmässigt generera vektor data på en karta omfattande av hela världen, men också utifrån ettantal användbarhetskriterier. Därefter utvecklas en test implementation, d.v.s. en applikation för resvanor,baserat på den utav biblioteken som uppfyller kriterierna bäst. Res-vane applikationen ärinriktad på att registrera användarens geografiska rörelser och kan sedan visa användarens genomfördaresa i form av vektordata på en karta. Applikationen är utvecklad med ASP.NET tekniken som bestårutav HTML, JavaScript och C# språken. Resultatet från den empiriska undersökningen visar attkartbiblioteken utmärker sig på förmånligt men på olika områden. Utifrån prestandatestet förrendering av vektordata, presterade Tile5 bibliotek bäst med en renderingstid motsvarande ungefärhäften av tiden det tog för det näst bästa biblioteket, Leaflet. Dock ledde bristande dokumentation förTile5 till att Leaflet, till det stora hela sett, passade bedömningskriterierna bäst och kom attimplementeras i den mobila test applikationen för resvanor. För framtida utvecklings, har Tile5potential att utvecklas till ett användbart och effektivt verktyg för vektorkartläggning och för attkonkurrera med traditionella webbkartor som renderar rasterdata.
240

Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures

Bhalotiya, Anuj Arun 05 1900 (has links)
In recent years, brain computer interfaces (BCIs) have gained popularity in non-medical domains such as the gaming, entertainment, personal health, and marketing industries. A growing number of companies offer various inexpensive consumer grade BCIs and some of these companies have recently introduced the concept of BCI "App stores" in order to facilitate the expansion of BCI applications and provide software development kits (SDKs) for other developers to create new applications for their devices. The BCI applications access to users' unique brainwave signals, which consequently allows them to make inferences about users' thoughts and mental processes. Since there are no specific standards that govern the development of BCI applications, its users are at the risk of privacy breaches. In this work, we perform first comprehensive analysis of BCI App stores including software development kits (SDKs), application programming interfaces (APIs), and BCI applications w.r.t privacy issues. The goal is to understand the way brainwave signals are handled by BCI applications and what threats to the privacy of users exist. Our findings show that most applications have unrestricted access to users' brainwave signals and can easily extract private information about their users without them even noticing. We discuss potential privacy threats posed by current practices used in BCI App stores and then describe some countermeasures that could be used to mitigate the privacy threats. Also, develop a prototype which gives the BCI app users a choice to restrict their brain signal dynamically.

Page generated in 0.3647 seconds