• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 169
  • 144
  • 49
  • 21
  • 14
  • 8
  • 7
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 472
  • 472
  • 144
  • 139
  • 130
  • 88
  • 86
  • 82
  • 68
  • 64
  • 63
  • 59
  • 54
  • 52
  • 52
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

Kvalitetsregister för epikutantestning / Patch register

Jakobsson, David, König, Bettina January 2010 (has links)
<p><strong>Inledning: </strong>Epikutantester används för utredning av kontaktallergier. Det görs ca 3000 tester varje år i Sverige som överförs till ett kvalitetsregister. <strong> </strong>Målet med projektet var att utveckla en webbapplikation och en underliggande databas för hantering och lagring av ett nationellt kvalitetsregister för epikutantester (The Swedish Patch Register). Databasen skall lagras på en central server lokaliserad på Universitetssjukhuset, Örebro.</p><p><strong>Metoder:</strong> Lösningen blev en applikation för webbläsare programmerad i språket C# med hjälp av Microsoft Visual Studio 2008 och ramverket ASP.NET 3.5. MySQL .NET connector tool 6.2.2 möjliggjorde anslutningen mellan ASP.NET och databasen. Databasen skapades på MySQL Server 5.1, en databasserver med öppen källkod. Driftsättning av webbapplikationen testades med IIS 7.</p><p><strong>Resultat: </strong>En webbapplikation, med en design liknande Örebro Läns Landsting webbplats och med följande funktionalitet skapades: Säker inloggning (https, SSL-certifikat), registrera testresultat, hantera användarkonton och behörigheter, skapa standardtester och lägga till nya ämnen för allergitestning, och en hjälpsida. Inmatningen av data standardiserades genom användning av kalenderkomponenten och DropDownLists med förvalda svar för testreaktioner, bedömning, relevans och ett fördefinierat standardtestsystem, för att minska antalet möjliga felkällor. Databasen inkluderar åtta tabeller och informationen har företrädesvis lagrats som heltalsvärden för att förenkla framtida statistiska beräkningar.</p><p><strong>Diskussion: </strong>I brist på licens för Microsoft SQL Server 2008 utvecklades projektet med hjälp av en lösning med öppen källkod som fungerar bra i utvecklingsmiljön. En lösning kopplad till en Microsoft SQL Server 2008 kräver en viss anpassning av källkoden.</p> / <p><strong>Introduction: </strong>Epicutaneous patch testing is used to evaluate contact allergies. Every year approximately<strong> </strong>3000 tests are performed in Sweden and the results are entered in a quality registry. The<strong> </strong>aim of the project was to develop a web application and a corresponding database for managing and storage of a national dermatologic quality registry (The Swedish Patch Test Register). The database will be located on a central server at the University hospital, Örebro.</p><p><strong>Methods:</strong> The solution required programming of an application for web browsers in the language C# with the help of Microsoft Visual Studio 2008 and the web framework ASP.NET 3.5. The .NET connector tool 6.2.2 enabled the connection between ASP.NET and the database created on the open source database server MySQL Server 5.1. Web server hosting was tested with IIS 7.</p><p><strong>Results: </strong>A web application in a design equivalent to the Örebro Läns Landsting web site and with the following functionalities was created: Secure Login (https, SSL-certificate), recording of test results, managing of user accounts and eligibility, creating test series and adding new substances for allergic skin testing respectively, and a help page. The input of data was standardised by means of the calendar component and DropDownLists with pre-selected answers for test reactions, evaluation, relevance of test results and a predefined standard test system in order to reduce possible handling errors. The database includes eight tables and information is preferably stored as integer values to facilitate future statistical calculation.'</p><p><strong>Discussion: </strong>Due to a lack of license for Microsoft SQL server 2008, the project was accomplished by means of an open source solution, and has full functionality in the corresponding environment. A solution in a Microsoft SQL server 2008 environment requires certain adapting of the source code.</p>
292

Anomaly Detection From Personal Usage Patterns In Web Applications

Vural, Gurkan 01 December 2006 (has links) (PDF)
The anomaly detection task is to recognize the presence of an unusual (and potentially hazardous) state within the behaviors or activities of a computer user, system, or network with respect to some model of normal behavior which may be either hard-coded or learned from observation. An anomaly detection agent faces many learning problems including learning from streams of temporal data, learning from instances of a single class, and adaptation to a dynamically changing concept. The domain is complicated by considerations of the trusted insider problem (recognizing the difference between innocuous and malicious behavior changes on the part of a trusted user). This study introduces the anomaly detection in web applications and formulates it as a machine learning task on temporal sequence data. In this study the goal is to develop a model or profile of normal working state of web application user and to detect anomalous conditions as deviations from the expected behavior patterns. We focus, here, on learning models of normality at the user behavioral level, as observed through a web application. In this study we introduce some sensors intended to function as a focus of attention unit at the lowest level of a classification hierarchy using Finite State Markov Chains and Hidden Markov Models and discuss the success of these sensors.
293

Suggest Me A Movie: A Multi-client Movie Recommendation Application On Facebook

Cakiroglu, Seda 01 July 2010 (has links) (PDF)
In this study, an online movie recommendation engine that serves on Facebook is developed in order to evaluate social circle eects on user preferences in a trust-based environment. Instead of using single-user profiles in the social environment identification process, virtual group profiles that present common tastes of the social environments, are formed to achieve a successful social circle analysis and innovative suggestions. Recommendations are generated based on similar social circles and based on social circles of similar users separately and their results are evaluated. Pure collaborative filtering is applied to emphasize the influence of social environment characteristics.
294

Administration of Access Rights in Web Applications

Worm, Stefan 28 October 2005 (has links) (PDF)
This work deals with the problem to find and rate a solution how to administrate access rights in web based applications that are flexible and offer a fine-grained allocation of rights. In particular the program phpGACL is analyzed and integrated into an example application to prove the feasibility of this system in principle. / Diese Arbeit beschäftigt sich mit der Lösungsfindung und -bewertung des Problems, Zugriffsrechte webbasierter Anwendungen flexibel zu administrieren und eine möglichst feinkörnige Rechtevergabe zu erlauben. Insbesondere das Programm phpGACL wird analysiert und in eine Beispielanwendung integriert um die prinzipielle Realisierbarkeit des System zu überprüfen.
295

Μελέτη τεχνολογιών τρισδιάστατης απεικόνισης και υλοποίηση πιλοτικού συστήματος για δυναμική παρουσίαση περιεχομένου στο διαδίκτυο / Study of web 3D technologies and pilot system implementation on web dynamic 3D content presentation

Γιαννακόπουλος, Μιχάλης 16 May 2007 (has links)
Η εργασία αυτή επικεντρώνεται στις τεχνολογίες τρισδιάστατης απεικόνισης στο διαδίκτυο. Αρχικά δίνεται μια σύντομη επισκόπηση των κυριότερων αντιπροσώπων των τεχνολογιών αυτών παρουσιάζοντας τα διακριτά χαρακτηριστικά τους. Στη συνέχεια, έχοντας πλέον περιγράψει τις δυνατότητες της τεχνολογίας αυτής, παρουσιάζεται η υλοποίηση ενός συστήματος που συνδυάζει στοιχεία της τεχνολογίας X3D με αυτή της HTML. Η εφαρμογή έχει ως στόχο να αναδείξει τις δυνατότητες συνεργασίας των δύο αυτών τεχνολογιών τόσο μεταξύ τους όσο και σε επίπεδο αλληλεπίδρασης με το χρήστη. / This study is focused on web 3D technologies. Starting with a short review of current major web 3D technology representatives, highlighting their distinct characteristics. Following, having all major capabilities of web 3D technology described, a system that combines X3D and HTML technologies is presented. This application aims on advancing the X3D and HTML unification benefits on internal and user interaction.
296

Veiklos taisyklių specifikavimo šablonais metodika ir jų manipuliavimo tyrimas / Templates based business rules specification methods and manipulation research

Ručinskaitė, Agnė 31 August 2009 (has links)
Šiame darbe nagrinėjama veiklos taisyklių sąvoka, jų klasifikacijos būdai bei panaudojimo galimybės skirtingiems poreikiams realizuoti. Kaip veiklos taisyklės yra specifikuojamos ir kokiais būdais galima jomis manipuliuoti. Pagrindinis šio darbo tikslas ištirti taisyklių valdymo įrankį (Blaze Advisor), išnagrinėti veiklos taisyklių specifikavimo principus, naudojant objektiškai orientuotą SRL kalbą bei jų panaudojimo galimybes remiantis vidiniais įrankio komponentais, skirtais veiklos taisyklių realizacijai. Atlikus išsamią analizę pastebėta, jog esti trūkumų, kurie neleidžia efektyviai modeliuoti veiklos taisykles bei apriboja įmonių atstovų priėjimą prie jų. Siekiant pašalinti trūkumus siūloma metodika, kuri suteiktų lankstesnį būdą veiklos taisyklėms kurti bei valdyti. Kuri užtikrintų galimybę veiklos atstovams patiems dalyvauti realizavimo ir kūrimo etape be IT specialisto betarpiškos pagalbos. Realizuojant sistemą siūlomu metodu, suteikiama galimybė veiklos atstovams valdyti veiklos procesus, keičiant veiklos taisyklių leistinas dalis, taip pakeičiant visą programos ir jos vykdymo logiką bei priimamus sprendimus. Galima lengvai veiklos procesus pritaikyti prie besikeičiančių sąlygų, kurios vienaip ar kitaip įtakoja įmonės veiklą, sumažinant įmonės kaštus. / In this work there is analyzed business rules` conception, ways of their classification and possibilities to use them in order to realize different needs, how business rules are specified and how you can manipulate them. The main aim of this work is to explore rules Blaze Advisor, to analyze business rules specification principles, by using objectively oriented SRL language and opportunities to use them on the ground of inner advisor components designed for business rules realization. After the detailed analysis it was noticed that there are defects, which don`t let effectively model business rules and narrow the access enterprises representatives to them, trying to eliminate the defects by suggested methods, which would present a more flexible way to create business rules and guide, which would ensure the possibility for business representatives themselves to participate in the realization and creation stage without IT specialists immediate help. Realizing the system by the suggested method, there is a possibility for business representatives to guide business processes, by changing business rules` permissible parts, in this way all the program`s and its realization logic and acceptable decisions. It`s easy to conform business processes to the changeable conditions, which in one or another way make influence to the enterprise`s activity by reducing the enterprise`s costs.
297

Steuerung Service-orientierter Architekturen durch Geschäftsprozessmodelle

Juhrisch, Martin, Weller, Jens 23 April 2014 (has links) (PDF)
No description available.
298

Μέθοδοι προστασίας ιστοσελίδων στο διαδίκτυο

Μπαλαφούτης, Χρήστος 19 October 2012 (has links)
Στην παρούσα διπλωματική εργασία παρουσιάζονται βασικές έννοιες και μέθοδοι για την ασφάλεια ιστοσελίδων και ιδιαίτερα των site με web application προσανατολισμό, χωρίς αυτό να σημαίνει ότι αρκετές τεχνικές προστασίας και σφάλματα που θα εντοπίσουμε δεν μπορούν να συναντηθούν και σε άλλου σκοπού ιστοσελίδες. Αρχικά, γίνεται αναφορά στο τι είναι μια εφαρμογή ιστού (web app) και ποια είναι τα στοιχεία που την αποτελούν. Στη συνέχεια, χρησιμοποιώντας έρευνες, παρουσιάζονται κάποιες από τις πιο “δημοφιλείς” επιθέσεις που γίνονται σε ιστοσελίδες και περιγράφεται πιο διεξοδικά ποια αδύνατα σημεία της δομής των ιστοσελίδων εκμεταλλεύονται. Παράλληλα, γίνεται αναφορά στο πως και με ποια εργαλεία μπορούμε να εντοπίσουμε και να κλείσουμε τα κενά ασφαλείας που τυχόν έχει μία εφαρμογή ιστού. Τέλος, παρουσιάζεται η εφαρμογή που αναπτύχθηκε στα πλαίσια της εργασίας με σκοπό να γίνει επίδειξη συγκεκριμένων επιθέσεων και σφαλμάτων που παρατηρούνται στο διαδίκτυο. / In the following pages basic principals and methods are presented in order to secure websites and web applications. I begin by mentioning what is a web application. Moreover, by using statistics and recent researches from various sources i mention the most common web app attack methods and which vulnerabilities can be found in a web app and how to prevent exploiting, something we can accomplish by using various penetration testing tools. Finally, by using a basic web app some web attacks are shown so that it will become more clear how these attacks work.
299

KomUt : Utveckling av en samåkningsplattform för företagsanställda / KomUt : Development of a carpooling platform for employees

Bjurenfalk, Jonatan, Cedighi, Saam, Fröberg, Simon, Holmström, Oskar, Hubertsson, Oscar, Leth, Axel, Olsson, Linda, Ågren, Sara January 2018 (has links)
In our society there is an increased awareness of environmental impact and reducing greenhouse gas emissions. An influencing factor is transport in passenger cars to and from work. In order to increase the utilization rate of passenger cars and thereby reduce environmental impact, a possible solution is to carpool. The purpose of the project was to create a web application to help those who want to carpool. To be effective and interesting to users such a web application needs to be useful and easy to navigate, as supported in previous surveys. The report’s issue is therefore how a carpooling web application, for companies and their employees, is designed and implemented to make it useful with regard to navigability. The attempt to answer the issue was initiated by finding relevant theory of navigabil- ity and usability. After that a market survey was conducted, to better understand the needs of the target group, and a prototype was developed based on the found theory. User stories were developed to define the application’s functionality and the development of the web application took place in parallel with iterative user tests, where feedback from the tests was implemented. At the end of the project, the final result and each user test were analyzed to compare users’ response to current theory and by answering the issue of the report. Based on the results of the tests, given the theoretical framework, it was shown that two out of four test subjects got lost in the web application. The test subjects were struggling to get through the buying process. They had insufficient understanding of what happens when placing a trip in the cart, that the trips are booked inside the shopping cart and that the payment of completed trips are found on the profile page. Reasons for the result may be due to both the weaknesses of the web application navigability or the characteristics of the test subjects. Despite this the web application was considered useful in accordance with the System Usability Test performed. In its entirety, the web application can be assessed as useful, though it can not be considered to meet the theoretical requirements for navigability. The conclusion is that a navigable web application can be developed by allowing users to effectively find the most important features of the web application. This can be imple- mented with a distinct navigation bar, visual indications for links, information boxes, a natural flow for the user through the page structure, and that the user can get through it with few steps. This should be specifically applied to the buying process, which is central to a consumer web application, to reduce perceived complexity and to be useful and navigable to the user. In order for the web application to be perceived as useful, it should contain the basic functionality requirements expected of a carpooling service. These are being able to register oneself, find a trip, create a trip, find information about pricing and to be able to remove a trip. / I samhället finns det en ökad medvetenhet kring miljöpåverkan och att minska utsläpp av växthusgaser. En påverkande faktor är transport i personbil till och från arbetet. För att öka nyttjandegraden av personbilar och därmed minska miljöpåverkan är en lösning att samåka. Syftet med projektet var att skapa en webbapplikation för att hjälpa de som vill samåka. För att vara effektiv och intressant för användarna behövde en sådan web- bapplikation vara användbar och lätt att navigera i, vilket stöds i tidigare undersökningar. Därför är rapportens frågeställning hur en webbapplikation för samåkning, för företag och dess anställda, designas och implementeras så att den är användbar med avseende på navigerbarhet. Besvarandet av frågeställningen inleddes med att relevant teori om navigerbarhet och användbarhet togs fram. Efter det gjordes en marknadsundersökning, för att tydliga- re förstå målgruppens behov, och en prototyp skapades utifrån den framtagna teorin. User stories användes för att definiera applikationens funktionalitet och utvecklingen av webbapplikationen skedde parallellt med iterativa användartester, där feedbacken från testerna implementerades. I slutet av projektet analyserades slutresultatet och varje enskilt användartest för att jämföra användarnas respons mot rådande teori, och genom det besvara arbetets fråge- ställning. Utifrån resultatet av testerna, sett till de teoretiska ramarna, visades det att två av fyra testpersoner var vilsna på webbapplikationen. Testpersonerna hade svårigheter att ta sig igenom köpprocessen. De hade bristande förståelse för vad som händer när man placerar resor i varukorg, att resorna bokas i varukorgen och att betalning av genomförda resor skedde på profilsidan. Anledningar till resultatet kan såväl bero på brister i web- bapplikationens navigerbarhet eller egenskaper hos testpersonerna. Trots detta ansågs webbapplikationen användbar i enlighet med de System Usability Test som utfördes. I sin helhet kan webbapplikationen därmed bedömas som användbar, däremot den kan inte anses uppfylla de teoretiska kraven för navigerbarhet. Slutsatsen dras att en navigerbar webbapplikation kan utvecklas genom att användar- na effektivt ska kunna hitta webbapplikationens mest väsentliga funktioner. Detta kan implementeras med en tydlig navigationsbar, visuella indikationer för länkar, informa- tionsrutor, ett naturligt flöde för användaren genom sidstrukturen och att användaren kan ta sig igenom den med få steg. Detta bör specifikt tillämpas i köpprocessen, som är central i en webbapplikation för konsumenter, för att minska upplevd komplexitet och att den är användbar och navigerbar för användaren. För att webbapplikationen ska upplevas som användbar bör den innehålla de grundläggande funktionalitetskraven som ställs på en samåkningstjänst. Dessa är att kunna registrera sig, hitta en resa, skapa en resa, hitta information kring prissättning och att kunna ta bort en resa.
300

Análise de técnicas de reconhecimento de padrões para a identificação biométrica de usuários em aplicações WEB Utilizando faces a partir de vídeos /

Kami, Guilherme José da Costa. January 2011 (has links)
Orientador: Aparecido Nilceu Marana / Banca: Hélio Pedrini / Banca: Aledir Silveira Pereira / Resumo: As técnicas para identificação biométrica têm evoluído cada vez mais devido à necessidade que os seres humanos têm de identificar as pessoas em tempo real e de forma precisa para permitir o acesso a determinados recursos, como por exemplo, as aplicações e serviços WEB. O reconhecimento facial é uma técnica biométrica que apresenta várias vantagens em relação às demais, tais como: uso de equipamentos simples e baratos para a obtenção das amostras e a possibilidade de se realizar o reconhecimento em sigilo e à distância. O reconhecimento de faces a partir de vídeo é uma tendência recente na área de Biometria. Esta dissertação tem por objetivo principal comparar diferentes técnicas de reconhecimento facial a partir de vídeo para determinar as que apresentam um melhor compromisso entre tempo de processamento e precisão. Outro objetivo é a incorporação dessas melhores técnicas no sistema de autenticação biométrica em ambientes de E-Learning, proposto em um trabalho anterior. Foi comparado o classificador vizinho mais próximo usando as medidas de distância Euclidiana e Mahalanobis com os seguintes classificadores: Redes Neurais MLP e SOM, K Vizinhos mais Próximos, Classificador Bayesiano, Máquinas de Vetores de Suporte (SVM) e Floresta de Caminhos Ótimos (OPF). Também foi avaliada a técnica de Modelos Ocultos de Markov (HMM). Nos experimentos realizados com a base Recogna Video Database, criada especialmente para uso neste trabalho, e Honda/UCSD Video Database, os classificadores apresentaram os melhores resultados em termos de precisão, com destaque para o classificador SVM da biblioteca SVM Torch. A técnica HMM, que incorpora informações temporais, apresentou resultados melhores do que as funções de distância, em termos de precisão, mas inferiores aos classificadores / Abstract: The biometric identification techniques have evolved increasingly due to the need that humans have to identify people in real time to allow access to certain resources, such as applications and Web services. Facial recognition is a biometric technique that has several advantages over others. Some of these advantages are the use of simple and cheap equipment to obtain the samples and the ability to perform the recognition in covert mode. The face recognition from video is a recent approach in the area of Biometrics. The work in this dissertation aims at comparing different techniques for face recognition from video in order to find the best rates on processing time and accuracy. Another goal is the incorporation of these techniques in the biometric authentication system for E-Learning environments, proposed in an earlier work. We have compared the nearest neighbor classifier using the Euclidean and Mahalanobis distance measures with some other classifiers, such as neural networks (MLP and SOM), k-nearest neighbor, Bayesian classifier, Support Vector Machines (SVM), and Optimum Path Forest (OPF). We have also evaluated the Hidden Markov Model (HMM) approach, as a way of using the temporal information. In the experiments with Recogna Video Database, created especially for this study, and Honda/UCSD Video Database, the classifiers obtained the best accuracy, especially the SVM classifier from the SVM Torch library. HMM, which takes into account temporal information, presented better performance than the distance metrics, but worse than the classifiers / Mestre

Page generated in 0.0468 seconds