• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 164
  • 144
  • 49
  • 21
  • 14
  • 8
  • 7
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 467
  • 467
  • 144
  • 139
  • 128
  • 87
  • 85
  • 80
  • 68
  • 63
  • 63
  • 59
  • 53
  • 52
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Comparison between Progressive Web App and Regular Web App

Said Tahirshah, Farid January 2019 (has links)
In 2015 the term Progressive Web Application was coined to describe applications that are getting the advantage of all Progressive App features. Some of the essential features are offline support, app-like interface, secure connection, etc. Since then, case studies from PWA’s implementation showed optimistic promises for improving web page performance, time spent on site, user engagement, etc. The goal of this report is to analyze some of the effects of PWA. This work will investigate the browser compatibility of PWA’s features, compare and analyze performance and memory consumption effect of PWA’s features compared to Regular WebApp. Results showed a lot of the features of PWA are still not sup-ported by some major browsers. Performance benchmark showed that required https connection for PWA is slowing down all of the PWA’s performance metrics on the first visit. On a repeat visit, some of the PWA features like speed index is outperforming the Regular Web App. Memory consumption on PWA increased more than 2 times the size of RWA. The conclusion is that even if some features are not directly supported by browsers, they still might have workaround solutions. PWA is slower than regular web app if https on your web server is not optimized. Different browsers have different memory limitations for PWA caches. You should implement https and PWA features only if you have HTTP/2 support on your web server, otherwise, performance can decrease.
22

A Technical Evaluation of the WebXR Device API for Developing Augmented Reality Web Applications / En teknisk utvärdering av WebXR Device API som verktyg för utveckling av AR-webbapplikationer

Renius, Olle January 2019 (has links)
The aim of this project was to explore the WebXR Device API to find out the extent of its usefulness for creating augmented reality (AR) applications, as well as determine whether it is a valid platform independent alternative to the frameworks ARKit and ARCore. Exper- iments were conducted to measure its precision (the ability to persistently maintain virtual objects relative to the real world), its battery consumption and its frame rate stability. The results from the experiments are fairly positive, with the exception of some outliers among the precision and frame rate measurements. However, a number vital features are miss- ing from the API, and in its current state it only runs on Android in a specific version of Google Chrome. Thus, it is concluded that the API has potential, but it needs further de- velopment before it can be used commercially and be seen as a serious alternative to ARKit and ARCore.
23

Dynamic vs Static user-interface : Which one is easier to learn? And will it make you more efficient?

Augustsson, Christopher January 2019 (has links)
Excel offers great flexibility and allows non-programmers to create complex functionality – but at the same time, it can become very nested with cells pointing to other cells, especially if there have been many changes over a more extended period. This has happened to ICS – a small company who has its focus on calibration, out of an array of different things relating to material testing. The system they have for field calibrations today have been overly complicated and hard to maintain and consists of multiple Excel spreadsheets. The conclusion has been that a new system needs to be developed – but question how, remains. By creating a prototype using modern web-technologies, this study has evaluated if a web application can meet the specific functional requirements ICS have and if it is a suitable solution for a new system. The prototype was put under manual user test, and the results find that the prototype meets all the requirements, meaning that a webapplication could work as a replacement. During the user tests, this study has also evaluated the differences in learnability and efficiency of users, between the static user interface of the current Excel-based system and the dynamic user interface of the web-based prototype. The users have performed a calibration with both systems, and parameters such as time to completion or number of errors made have been recorded. By comparing the test results from both systems, this study has concluded that a dynamic user interface is more likely to improve learnability for novice users, but have a low impact on efficiency for expert users.
24

A Thesis Evaluation System

Yanhua Zong (6636164) 10 June 2019 (has links)
<div>With the development of web-based technologies, online evaluation systems have been replacing paper-based ones in various domains at a fast pace because of their many advantages such as easy administration, high efficiency, and eco-friendliness. This study aims at developing an online thesis evaluation system which can act as a substitute to the paper-based one being currently used in Department of Computer Graphics Technology at Purdue. It contains two parts: the development of the online thesis evaluation system, and the assessment of the system. The system was developed using Angular as the client-side technology, PHP as the server-side technology, MySQL as the database management system, and D3 for the data visualization. Bootstrap was also used to simply format the table and forms. The developed system features easy administration, easy to do evaluations, visual reports of evaluation results and so on. Surveys were used to assess the system. The experimental results indicate this system has relatively good performance, usability, and reliability. However, further development and assessment are in need to make it a better substitute of the current paper-based evaluation system.<br></div>
25

EASY EXAM

DABHI, SARTHAK 01 March 2019 (has links)
Easy Exam is web-based educational software which allows professors to take and students to give exams. This project focuses on making an effortless process for professors to make an exam, to grade exams for all students, and to create class statistical analysis reports about all exam-taking students. At the end of the exam, students can see their report with analytics based on topics in the exam. This web-based software will help students to identify their weaknesses and strengths. So, students can focus on their weaknesses and improve their knowledge. Furthermore, this software will help the professors to identify which students are weak in which sections in their studies. So, professors can focus on those areas and make their student understand more. This project works on multiple choices questions. However, this project has extensive unique opportunities and abilities that will be covering many different types of questions such as programming questions in the future stages of this project.
26

A Model-driven Penetration Test Framework for Web Applications

Xiong, Pulei 12 January 2012 (has links)
Penetration testing is widely used in industry as a test method for web application security assessment. However, penetration testing is often performed late in a software development life cycle as an isolated task and usually requires specialized security experts. There is no well-defined test framework providing guidance and support to general testers who usually do not have in-depth security expertise to perform a systematic and cost-efficient penetration test campaign throughout a security-oriented software development life cycle. In this thesis, we propose a model-driven penetration test framework for web applications that consists of a penetration test methodology, a grey-box test architecture, a web security knowledge base, a test campaign model, and a knowledge-based PenTest workbench. The test framework enables general testers to perform a penetration test campaign in a model-driven approach that is fully integrated into a security-oriented software development life cycle. Security experts are still required to build up and maintain a web security knowledgebase for test campaigns, but the general testers are capable of developing and executing penetration test campaigns with reduced complexity and increased reusability in a systematic and cost-efficient approach. A prototype of the framework has been implemented and applied to three web applications: the benchmark WebGoat web application, a hospital adverse event management system (AEMS), and a palliative pain and symptom management system (PAL-IS). An evaluation of the test framework prototype based on the case studies indicates the potential of the proposed test framework to improve how penetration test campaigns are performed and integrated into a security-oriented software development life cycle.
27

M-crawler: Crawling Rich Internet Applications Using Menu Meta-model

Choudhary, Suryakant 27 July 2012 (has links)
Web applications have come a long way both in terms of adoption to provide information and services and in terms of the technologies to develop them. With the emergence of richer and more advanced technologies such as Ajax, web applications have become more interactive, responsive and user friendly. These applications, often called Rich Internet Applications (RIAs) changed the traditional web applications in two primary ways: Dynamic manipulation of client side state and Asynchronous communication with the server. At the same time, such techniques also introduce new challenges. Among these challenges, an important one is the difficulty of automatically crawling these new applications. Crawling is not only important for indexing the contents but also critical to web application assessment such as testing for security vulnerabilities or accessibility. Traditional crawlers are no longer sufficient for these newer technologies and crawling in RIAs is either inexistent or far from perfect. There is a need for an efficient crawler for web applications developed using these new technologies. Further, as more and more enterprises use these new technologies to provide their services, the requirement for a better crawler becomes inevitable. This thesis studies the problems associated with crawling RIAs. Crawling RIAs is fundamentally more difficult than crawling traditional multi-page web applications. The thesis also presents an efficient RIA crawling strategy and compares it with existing methods.
28

A Model-driven Penetration Test Framework for Web Applications

Xiong, Pulei 12 January 2012 (has links)
Penetration testing is widely used in industry as a test method for web application security assessment. However, penetration testing is often performed late in a software development life cycle as an isolated task and usually requires specialized security experts. There is no well-defined test framework providing guidance and support to general testers who usually do not have in-depth security expertise to perform a systematic and cost-efficient penetration test campaign throughout a security-oriented software development life cycle. In this thesis, we propose a model-driven penetration test framework for web applications that consists of a penetration test methodology, a grey-box test architecture, a web security knowledge base, a test campaign model, and a knowledge-based PenTest workbench. The test framework enables general testers to perform a penetration test campaign in a model-driven approach that is fully integrated into a security-oriented software development life cycle. Security experts are still required to build up and maintain a web security knowledgebase for test campaigns, but the general testers are capable of developing and executing penetration test campaigns with reduced complexity and increased reusability in a systematic and cost-efficient approach. A prototype of the framework has been implemented and applied to three web applications: the benchmark WebGoat web application, a hospital adverse event management system (AEMS), and a palliative pain and symptom management system (PAL-IS). An evaluation of the test framework prototype based on the case studies indicates the potential of the proposed test framework to improve how penetration test campaigns are performed and integrated into a security-oriented software development life cycle.
29

Development of An Online Marketing Research System

Chiu, Chun-Cheng 27 June 2001 (has links)
In order to survive well in the rapidly changing and very competitive E-Commerce age, a website manager must discern the customer behavior all the times and carry out the necessary marketing research and therefore proceed the right marketing decisions at the right time. Although the Internet brings a new chance to the small and medium enterprises (SME), it is not easy for them to develop an online marketing research system by themselves due to the scarcity of resources. In order to let the SME have better online marketing capabilities, the purpose of this research is to develop a scaleable, flexible, and portable online marketing research system. What the flexibility means is that users can configure the system and implement the marketing analysis based on their requirements, whereas the scalability means that users can add new items into the available analytical models or new models into the system whenever there is new marketing research requirement. Regarding the portability, it means the system can be used in various system environments. With such a system, the marketing people of SME can carry out the required online marketing research easily without the assistance from IS people.
30

Verifying Web Application Vulnerabilities by Model Checking

Hung, Chun-Chieh 20 August 2009 (has links)
Due to the continued development of Internet technology, more and more people are willing to take advantage of high-interaction and diverse web applications to deal with commercial, knowledge-sharing, and social activities. However, while web applications deeply affect our society by degrees, hackers start exploiting web application vulnerabilities to attack innocent end user and back-end database, and therefore pose significant threat in information security. According to this situation, this paper proposes a detection mechanism based on Model Checking to detect web application vulnerabilities. We reduce the problem whether the vulnerabilities exist or not to a kind of SMT (Satisfiability Modulo Theories) problem, and analyze all of the traces of tainted data flow in web applications to find possible vulnerabilities by SMT solver. The experimental results show that the method we proposed can identify SQL injection and XSS vulnerabilities effectively, and prove our method is a feasible way to find web application vulnerabilities.

Page generated in 0.1078 seconds