• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • 1
  • Tagged with
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Vývoj webovej aplikácie s podporou metodiky UWE

Križan, Daniel January 2018 (has links)
This master's thesis focuses on the design and development of a web application to support the automation of law firm processes using pre-programmed tasks, the design of which is created using the UWE methodology. At the same time, it describes the implementation of the extension into the Synopsis II information system, used to manage the above-mentioned tasks. The thesis also deals with the deployment of this software solution to the production server of SynopsIS Technologies a.s.
2

Identifying problematic student work patterns

Salo, Joel, Ekberg, Karl January 2022 (has links)
Many students do not finish their introductory programming courses in higher education and it is difficult to identify why. While this thesis doesn’t concern itself with investigating drop outs, this fact motivated the authors to research if there was a correlation between problematic student work patterns and the students' success in the course.The aim of this thesis is to identify problematic student work patterns. To do this, we conducted a case study on the introductory programming course 1DV025 at Linnaeus University, focusing on quantitative data. This data was collected by developing an application which fetches student data from the GitLab repository of the course. After conducting statistical testing on the data, the results were analyzed in order to determine distinguishing traits that can be an indication of problematic student work patterns.The analysis uncovered that these do exist for some students that fail their examination assignments. Hopefully, the conclusions of this report can help teachers to recognize problematic student work patterns and apply preemptive actions accordingly.
3

Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution / Implementering av en Zero Trust miljö för en existerande påplats molnlösning

Pero, Victor, Ekman, Linus January 2023 (has links)
This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. The system must provide minimal access for users and should be integrated with the existing cloud-based infrastructure. The result is a system that leverages Keycloak for identity management and authentication services, GitLab to provide a code hosting solution, GPG for commit signing, and OpenVPN for network access. Through the utilization of Gitlab, Keycloak and OpenVPN the system achieved a comprehensive design for data protection, user authentication and network security. This report also highlights alternative methods, future enhancements and potential improvements to the completed system. / Målet med denna rapport är att designa och implementera ett säkert system för hantering och skydd av personlig data. Syftet med arbetet är att förhindra obehöriga att få tillgång till system och data. Den föreslagna lösningen är en Zero Trustarkitektur som betonar skärpta säkerhetsåtgärder genom design och strikta åtkomstkontroller. Systemet måste ge minimal åtkomst för användare som brukar det och integreras med den befintliga molnbaserade infrastrukturen. Resultatet är ett system som använder Keycloak för hantering av identiteter och autentisering, GitLab för att tillhandahålla ett kodarkiv där användare kan ladda upp sin kod, GPG för att signera commits, och OpenVPN för nätverksåtkomst. Genom användning av GitLab, Keycloak och OpenVPN uppnådde systemet en omfattande design för dataskydd, användarautentisering och nätverkssäkerhet. Denna rapport nämner också alternativa metoder, framtida och potentiella förbättringar av det färdiga systemet.
4

A new approach for medical device product documentation

Hamnede, Elisabet January 2017 (has links)
Hardware and software developers rely on different tools for document management, product data management (PDM) and software configuration management (SCM). As more and more products include components of both types there is a growing demand for one collaborative system. This becomes even more critical in the medical sector, where a device is under regulatory demands for document management to even be allowed in to the market. Combined systems become more complex and are generally based on PDM-principles rather than SCM. Current development of SCM tends instead towards simpler systems focused on pure version control (VCS) that are easy to use and economically available to small- and medium sized enterprises (SME), which is not the case with generic PDM-systems or combined systems. This study explored the possibility to extend the usage of such a VCS and include hardware documentation as well as software. The aim was to further our understanding of the SME perspective on product documentation for the medical device field. The method was a case study, collaboration with a SME development company. The scope was to explore possible usage of a chosen VCS (GitLab) and to compare it with a generic PDM-system and with existing manual system. The results showed that for several of the hardware document types there are special made Git-solutions to find within the open source community. However, none of the ones tested in the study was deemed good enough with respect to functionality and reliability. Instead the case study used direct storage of the files in their binary format and focused on testing different VCS functions and on how to organize in order to best gain the advantages of using the system. The conclusions showed that hardware documents can be stored in the same iterative manner as software but with limited Git functionality. Compared with a PDM system GitLab can offer the same level of revision control and communication around the specifications but lacks classification of parts and detailed product structures. GitLab offers better iteration history than both a PDMsystem and the existing manual system does. But not being able to use full Git functionality the organization needs a collaboration strategy to handle the decentralized storage. If the collaboration strategy matches the organization development practices, GitLab is a useful alternative for medical device documentation.
5

Automatic Detection of Source Code Plagiarism in Programming Courses / Automatisk identifiering av kodplagiat i programmeringskurser

Bergman, Adam January 2021 (has links)
Source code plagiarism is an ongoing problem in programming courses at higher academic institutions. For this reason, different automated source code plagiarism detection tools have been developed. However, they require several manual steps before the submissions can be compared. Linnaeus University uses GitLab to handle their students’ code-related assignments but lacks an integrated workflow for checking submissions against plagiarism. Instead, Linnaeus University’s plagiarism-checking process is done manually, which is a challenging and time-consuming process. This thesis is a case study on Linnaeus University, focusing on integrating one of the plagiarism detection tools with GitLab using Continuous integration pipelines. The objectives have been to collect students’ submissions, communicate with the plagiarism tool, and visually present the results within GitLab. The prototype has been evaluated by a set of manually created submissions with different levels of plagiarism to ensure that the detection tool differentiates plagiarized and non-plagiarized submissions. Teachers at Linnaeus University have tested the workflow and reasoned whether the prototype fulfills their requirements.
6

Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability / Säkerhetshantering av data som överförs genom molnbaserade tjänster: åtkomstkontroll, kryptering och omutlighet

Al Khateeb, Ahmad, Summaq, Abdulrazzaq January 2023 (has links)
The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. This places higher demands on security in terms of protecting data against cyber-attacks and controlling access to data that authenticated users want to access. The paper focuses on studying concepts of secure data practices in a GitLab-based cloud environment. The objective is to give answers to questions such as how to ensure the guarantee of secure data and protect it from unauthorized access and changes. The work behind this thesis includes exploring techniques for access control, data encryption, and data immutability. The study is followed by an implementation project that includes fetching code from GitLab verifying user identity and access control, managing data access, and displaying the results. The results of the thesis demonstrate the effectiveness of the implemented security measures in protecting data and controlling access. / Mängden av data och utvecklingen av banbrytande teknologier som idag används av alla samhällsbärande organisationer ökar drastiskt. I samma takt ökar dataintrång, cyberattacker och dess förödande konsekvenser samt antalet personer och organisationer som utgör potentiella offer för sådana typer av attacker. Detta ställer högre krav på säkerheten när det gäller att skydda data mot cyberattacker, men även att kontrollera åtkomsten till data som autentiserade användare vill komma åt. Rapporten fokuserar på att studera hur data säkras i GitLab-baserade molnsystem. Syftet med detta arbete är att ge svar på frågeställningar som till exempel att lova säker åtkomst och skydd för data från obehörig åtkomst och ändringar. Arbetet bakom detta projekt inkluderade undersökning av tekniker som används inom accesskontroll, datakryptering och data-omutlighet. Studien resulterade i en implementation som möjliggör att hämta signerade ändringar (Commits) från GitLab, verifiera användaridentiteten och åtkomstbehörighet, hantera dataåtkomst samt presentera resultaten. Resultaten av detta examensarbete demonstrerar effektiviteten av den implementerade säkerhetsteknikerna i att skydda data och kontrollera access.
7

Aplikace pro obsluhu měřicích zařízení v energetice / Application for operation of measuring devices in power engineering

Ševčík, Radek January 2019 (has links)
This thesis is focused on application development with ARM processor architecture and Linux operating system. It uses cloud hosting services to build, test and deploy applications with container-based virtualization. The application communicates with smart meters on serial buses. It stores measurements in a database. It provides access to devices and measurements in internet network.
8

Systém pro kontinuální integraci projektu k-Wave / Continuous Integration System for the k-Wave Project

Nečas, Radek January 2016 (has links)
The main goal of this thesis is to describe the implementation of continuous integration into the k-Wave project. The thesis focuses primarily on the version written in the C/C++ language with the usage of the OpenMP library which typically runs on supercomputers. Accordingly, many of popular workflows and approaches ought to be adapted, a few more created. The outcome of the thesis is a complete solution with real and practical usage. The author provides design, tools selection, runtime environment administration and configuration for each one of the used services. Software implementation of the basic framework is used in order to utilize running tests on the supercomputers. Furthermore, the implementation of chosen types of regression and unit tests are performed. Realisation is based on Gitlab and Jenkis services that are running on separated Docker containers.
9

Systém pro automatickou správu serverů / System for Automated Server Administration

Pavelka, Martin January 2019 (has links)
The goal of this diploma thesis is to design the user interface and implement the information system as a web application. Using the custom implemented library the system communicates with GraphQL server which manages the client data. The thesis describes possible solutions for physical servers automatization. The application provides the application interface to manage virtual servers. Automatization is possible without human interaction. Connection to the virtualization technologies is handled by web interface APIs or custom scripts running in the virtual system terminal. There is a monitoring system built over project components. The thesis also describes the continuous integration using Gitlab tools. Running the configuration task is solved using the Unix CRON system.

Page generated in 0.0517 seconds