• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1044
  • 402
  • 315
  • 176
  • 112
  • 106
  • 37
  • 34
  • 29
  • 24
  • 17
  • 14
  • 13
  • 12
  • 7
  • Tagged with
  • 2736
  • 784
  • 528
  • 323
  • 319
  • 296
  • 254
  • 248
  • 231
  • 224
  • 220
  • 219
  • 195
  • 180
  • 173
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Researching the conflicts between user experience, front-end and back-end in software development process

Pavicevic, Tea, Tomasevic, Dejana January 2021 (has links)
User experience design is the process of improving the accessibility and use of a product during user’s interaction with it. This study investigates the issues that occur in the coordination of UX design and software development. Furthermore, it examines diverse types of conflicts between UX designers, front-end and back-end developers, factors contributing to these conflicts and their influence on the software development process. The method used in this study is a survey conducted in an online form with a target group of practitioners. The data show that task conflicts are the most common type of conflicts in teams, that gender of a person can influence its awareness of the project status and that age and geographical location do not affect the occurrence of the identified conflicts.
202

End-to-end Optics Design for Computational Cameras

Sun, Qilin 10 1900 (has links)
Imaging systems have long been designed in separated steps: the experience-driven optical design followed by sophisticated image processing. Such a general-propose approach achieves success in the past but left the question open for specific tasks and the best compromise between optics and post-processing, as well as minimizing costs. Driven from this, a series of works are proposed to bring the imaging system design into end-to-end fashion step by step, from joint optics design, point spread function (PSF) optimization, phase map optimization to a general end-to-end complex lens camera. To demonstrate the joint optics application with image recovery, we applied it to flat lens imaging with a large field of view (LFOV). In applying a super-resolution single-photon avalanche diode (SPAD) camera, the PSF encoded by diffractive op tical element (DOE) is optimized together with the post-processing, which brings the optics design into the end-to-end stage. Expanding to color imaging, optimizing PSF to achieve DOE fails to find the best compromise between different wavelengths. Snapshot HDR imaging is achieved by optimizing a phase map directly. All works are demonstrated with prototypes and experiments in the real world. To further compete for the blueprint of end-to-end camera design and break the limits of a simple wave optics model and a single lens surface. Finally, we propose a general end-to-end complex lens design framework enabled by a differentiable ray tracing image formation model. All works are demonstrated with prototypes and experiments in the real world. Our frameworks offer competitive alternatives for the design of modern imaging systems and several challenging imaging applications.
203

Cloud-Based Collaborative Local-First Software

Vallin, Tor January 2023 (has links)
Local-first software has the potential to offer users a great experience by combining the best aspects of traditional applications with cloud-based applications. However, not much has been documented regarding developing backends for local-first software, particularly one that is scalable while still supporting end-to-end encryption. This thesis presents a backend architecture that was then implemented and evaluated. The implementation was shown to be scalable and was able to maintain an estimated end-to-end latency of around 30-50ms as the number of simulated clients increased. The architecture supports end-to-end encryption to offer user privacy and to ensure that neither cloud nor service providers can access user data. Furthermore, by occasionally performing snapshots the encryption overhead was shown to be manageable compared to the raw data, at around 18.2% in the best case and 118.9% when using data from automerge-perf, a standard benchmark. Lastly, the processing times were shown to be upwards of 50 times faster when using snapshots compared to handling individual changes.
204

Pwm: A Secure Webmail System Designed for Easy Adoption

Burgon, Benjamin W. 07 March 2014 (has links) (PDF)
None of the three largest webmail service providers (serving over 1 billion users) support end-to-end message encryption. Encrypted email has never seen mass adoption because it is prohibitive for non-experts to use. Private WebMail (Pwm) is our extension to popular webmail systems that lets users easily encrypt sensitive messages without having to first contact the recipient and share information. It is designed to spread quickly in a grassroots fashion so that a user receiving their first encrypted message can quickly and easily start using the system. This thesis describes the design and implementation of Pwm, then measures its usability through analysis and a user study.
205

Browser-Based Manual Encryption

Song, Yuanzheng 08 August 2014 (has links) (PDF)
Billions of web-based email and chat messages are sent over the Internet every day. However, very few service providers support end-to-end privacy protection. While providing security for these messages is technically feasible, usability remains a challenge in this field. Recent research attempts to hide security details like key management and encryption in order to make the system more usable. However usability studies demonstrated that hiding these details may confuse the user and contribute to mistakes (e.g., sending out an email in plaintext when the user thought it would be encrypted). In an effort to increase trust and eliminate mistakes, this thesis presents the design of a browser-based manual encryption mechanism that supports automatic key-management and manual encryption. It also describes the Message Protector (MP) prototype. An evaluations of MP is presented based on a user study conducted on the campus of BYU.
206

What are the Students’ Housing Preferences? : A Case Study of Lublin, Poland / Vad har studenter for boendepreferenser? : En studie från Lublin, Polen

Bozena Strzalka, Katarzyna January 2019 (has links)
Housing preferences are unique to each individual. Nevertheless, there are certain similarities between the residential needs within the same demographic groups. This research will focus on the students’ housing preferences. The aim is to understand the factors affecting the decision-making process regarding the choice of housing by students in Lublin, Poland. The findings provide guidelines for the future student housing (re)development in the local area. The theoretical concepts used are The Theory of Basic Human Values and The Means-End Chain Theory. They assume that when making decision, the consumer is affected by his/her core values. The research strategy uses qualitative approach. It consists of both primary and secondary data. The first includes conducting interviews with 15 students. The second is based on the literature review and the official documents available at the official local government’s website. The limitations of the research are the bias of authors’ interpretation and exclusion of the students attending smaller, private universities, which may give an inadequate picture for the generalisation of the population. The findings are that the location, finance, privacy continue to be the key determinants in students’ housing choices. Moreover, students value the ability to personalise their rooms and having no noise distractions. They are also attracted to the attributes that improve their sleeping quality. The new generations of students value happiness and have high expectations. Thus, people responsible for the future (re)developments should keep those in mind, when designing the accommodation for students. The implications and guidelines are at the end of each section of data analysis. / Bostadspreferenser är unika för varje individ. Dock, finns det vissa likheter i bostadsbehov inom samma demografiska grupper. Denna studie fokuserar på studenternas boendepreferenser. Syftet är att förstå de faktorer som påverkar beslutsprocessen kring val av bostad för studenter i Lublin, Polen. Resultaten ger ett förslag till framtidsutvecklingen för studentboende i lokalområdet. De teoretiska begreppen som används är Theorin av grundläggande mänskliga värderingar och The Means-End Värdekedja. De innebär att när beslut fattas då påverkas konsumenten av sina grundläggande värden. Forskningsstrategin är baserad på kvalitativ metodologi. Den använder både primär och sekundär data. Den första inkluderar intervjuer med 15 studenter. Den andra baseras på litteraturöversikten och de officiella dokumenten som finns på den offentliga kommunens hemsida. Forskningsbegränsningarna här bias som kommer ifrån författarnas tolkning och resultatet är begränsat med syn på eleverna som går på privata universitet, vilket kan ge inte tillräcklig bild för generaliseringen från den statistiska populationen. Slutsatser är att lokaliseringen, finansieringen och integriteten fortsätter att vara de viktigaste determinanterna i studenternas bostadsval. Dessutom värderar eleverna förmågan att anpassa sina rum på individnivå och inte ha bullerstörningar. De lockas också till de attributen som förbättrar deras sömnkvalitet. De nya studentgenerationerna uppskattar lyckan och har höga förväntningar. Således bör personer som är ansvariga för framtidsutvecklingen tillämpa dem när de utveckla studentboende. Slutsatser och förslaget på de nya riktlinjerna finns i slutet av varje dataanalyskapitel.
207

Nursing students´ experiences of end-of-life care education in Belgium

Nordin, Elin, Roman, Hilda January 2023 (has links)
Background: The need for palliative care and end-of-life care increases as the world population grows older and as people, more extensively, suffer from chronic diseases. End-of-life care is described as a part of palliative care and people in need of end-of-life care can be met anywhere in the health care system, therefore, education about end-of-life care is necessary for nursing students. Assisted suicide, or, euthanasia is legal in Belgium and can also be a part of end-of-life care, which makes it a convenient subject to include in nursing education in Belgium.Aim: The aim was to delve into the experiences of nursing students in Belgium regarding their education in end-of-life care.Method: The school project had a qualitative-descriptive design, with an inductive approach, and was analyzed through a qualitative content analysis.Result: The results describe how Belgian nursing students experience end-of-life care, their perception of euthanasia and their satisfaction with their end-of-life care education.Conclusion: Belgian nursing students are in general pleased with their education in end-of-life care. However, there is still room for development regarding education in end-of-life care and euthanasia.
208

End-to-end Transcription of Presentations and Meetings / 講演・会議のend-to-end自動書き起こし

Mimura, Masato 26 September 2022 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第24256号 / 情博第800号 / 新制||情||135(附属図書館) / 京都大学大学院情報学研究科知能情報学専攻 / (主査)教授 河原 達也, 教授 森 信介, 教授 伊藤 孝行 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
209

Design and Analysis of Novel Verifiable Voting Schemes

Yestekov, Yernat 12 1900 (has links)
Free and fair elections are the basis for democracy, but conducting elections is not an easy task. Different groups of people are trying to influence the outcome of the election in their favor using the range of methods, from campaigning for a particular candidate to well-financed lobbying. Often the stakes are too high, and the methods are illegal. Two main properties of any voting scheme are the privacy of a voter’s choice and the integrity of the tally. Unfortunately, they are mutually exclusive. Integrity requires making elections transparent and auditable, but at the same time, we must preserve a voter’s privacy. It is always a trade-off between these two requirements. Current voting schemes favor privacy over auditability, and thus, they are vulnerable to voting fraud. I propose two novel voting systems that can achieve both privacy and verifiability. The first protocol is based on cryptographical primitives to ensure the integrity of the final tally and privacy of the voter. The second protocol is a simple paper-based voting scheme that achieves almost the same level of security without usage of cryptography.
210

Double-Strand DNA Break Repair By Homologous Recombination Contributes To The Preservation of Genomic Stability In Mouse Embryonic Stem Cells

Tichy, Elisia D. 13 April 2010 (has links)
No description available.

Page generated in 0.0396 seconds