• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 87
  • 69
  • 53
  • 8
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 281
  • 113
  • 106
  • 81
  • 59
  • 54
  • 45
  • 43
  • 37
  • 36
  • 36
  • 35
  • 33
  • 30
  • 29
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Applikationsutveckling i språket Objective-C för iOS

Dürebrandt, Jesper January 2012 (has links)
Applications for mobile devices, also known as apps, are today the backbone of a huge market where the company Apple is one of the key players. Apple develops, among other things, handheld electronic devices, which are powered by the operating system iOS. Through iOS, millions of customers get access to Apple’s App Store. During a period of two months, an app in the form of a game has been developed for iOS in the programming language Objective-C. The user of the app is presented intuitive menus and interactive graphical objects that seemingly obey physical laws. The app contains quick game sessions, a score system and a dynamic environment with gradually increasing difficulty. The app also plays background music and sound effects. The open source package Cocos2D with the integrated physics engine Box2D has been used as an aid during the app development.
2

A Comparison of the Usability of Security Mechanisms Provided by iOS and Android

Maulick, David E 01 June 2018 (has links)
The Open Web Application Security Project identifies that the number one vulnerability in mobile applications is the misuse of platform-provided security mechanisms. This means that platforms like iOS and Android, which now account for 99.8\% of the mobile phone market, are providing mechanisms that are consistently being used in an incorrect manner. This statistic shines a spotlight onto both platforms. Why is it that so many people are misusing platform provided security mechanisms? And is it the platform’s fault? The supposition of this paper is that both iOS and Android are not creating usable security mechanisms. This paper is meant to be a direct response to the number one spot on the OWASP Top Ten Mobile Vulnerabilities list. As a result, our primary goal is to identify whether or not iOS and Android are creating usable security mechanisms. To do this we first proposed an evaluation framework that is tailored to evaluate the usability of mobile device security mechanisms. Then we used it to evaluate seven of the most important and therefore most popular security mechanisms provided by iOS and Android. Through this evaluation we not only hope to develop a clear landscape of overall mobile security mechanism usability, but we also hope to compare the usability across the two platforms. Overall, it was found that both platforms adequately supported the more popular security mechanisms like key storage and HTTPS. Whereas support for some of the more low-level mechanisms, like encryption and MACs, were often neglected. Such neglect could be seen in a number of different ways; however, the most common neglect came in the form of old documentation, or APIs that are long over do for a rebuild or increased abstraction. Furthermore, both platforms barely addressed the testing of implementations, despite the fact that testing is arguably the most important part of the software development cycle. Both iOS and Android seldom gave the developer any guidance on verifying the functionality of their implementations.
3

Open-source mobilná a webová aplikacia pre elektronickú evidenciu tržieb

Osuský, Peter January 2019 (has links)
The text describes the process of designing and developing mobile applications for electronic sales records. The work also describes the procedure of electronic registration and also contains an analysis of existing solutions.
4

DESIGN AND IMPLEMENTATION OF LOCATION BASED INFORAMTIONAL MOBILE APPLICATION

Koothal, Akhil Kumar Goud, koothal 09 May 2018 (has links)
No description available.
5

Montanita: A Modern Augmented Reality System

Adler, Sean 01 January 2013 (has links)
Augmented Reality (AR) applications require novel rendering technologies, sensors, and interaction techniques. This thesis describes the nascent field of AR, and outlines the design of a new college campus annotation application which serves as a concrete example of how to flesh out a full AR system. Code for the application is included in the Appendix. As such, this thesis demonstrates that AR is advanced paradigm that nonetheless constitutes a feasible challenge for independent programmers.
6

Non-Isotropic Planar Motion Planning for Sailboat Navigation

Yifei, Li, Lin, Ge January 2013 (has links)
The purpose of the thesis was to explore the possibilities of using a Level-Set method to design a time-optimal path planar of a subject to direction-dependent maximum velocities. A promising application for such a planning approach lies in sailboat navigation planning, because of the dynamic ocean waves, current, wind and the characteristics of a sailboat. In the thesis, we developed an IOS application to simulate such scenario as environment properties with wind, static obstacles and the sailboat mapped into direction-dependent velocities in different locations of the environment.  Considering the wind is the main power for the sailboat, a wind speed generation function was created, based on different locations. The Level-Set method is widely used in image processing because of its various advantages, for instance, the ability to deal with topology change and stability. It also can be applied in path planning, in which the process of the Level-Set method can be considered as a continuous wave front propagating with a speed from the start location. A grid-based map was used to represent the environment. While the wave front was crossing the cell on the grid, a time was recorded for every cell, following the negative gradient direction of such crossing time, and then an optimal path could be found. In addition, we used the Narrow Band method to speed up the calculation of processing the level set equation. Finally, this report gives the results of the experiments of static obstacle avoidance, wind effects and smooth path planning.
7

The impact of Transaction and Partnership Characteristics on Interorganization System Integration in Manufacturer-supplier Dyads

Chang, Hsing-ya 02 July 2009 (has links)
Nowadays, given the high pressure caused by severe competition, establishing a more efficient supply-chain management has become an essential competitive strategy for many manufacturing firms. The inter-organizational systems (IOS) are considered to be the most important instrument that can link manufacturers and suppliers in the supply chain. Thus, supply chain management has become more valuable as more and more people realize that it is the supply chain that is critical when analyzing a company¡¦s advantage competence. Nowadays, business to business (B2B) commerce is the new subject in e-commerce: IOS are the systems that link several different organizations. In the past, the researchers not only discuss IOS adoption and use from the perspectives of technology, organization and environment. Now, however, they also evaluate factors which impact on the adoption of electronic data interchange (EDI) systems. Because the Internet expands, the role of IOS moves from being merely an operational tool to becoming a collaborative commercial instrument. Thus, integration has become a critical issue. On the other hand, firms have to address the variable environment more than ever, because they not only maintain the fixed supply chain components but also link up with the global market. The role of IOS has progressed from being concerned only with operational efficiency to becoming a collaborative tactical tool. This study emphasizes two major dimensions: transaction and partnership, as the main factors which affect IOS integration in manufacturer-supplier dyads. Based on a survey of Taiwanese electronics firms, our results show that based on the context of transactions and partnerships, there are five critical factors that have a positive significant effect on IOS integration, that is, the complexity of components, component criticality, trust, supplier dependence and supplier investments. Market variables have negative significant effects on IOS integration. The uncertainty of demand is the only factor that has an insignificant effect on IOS integration. In this study, partnership characteristics are more important than transaction ones. Keeping collaborative relationship will improve the depth of IOS integration.
8

SportMingles sports social network for iOS

Huang, Frank Mintzu 23 April 2013 (has links)
We live in a post-PC era with mobile devices on the rise. We can witness a growing number of applications that utilize the mobility of such devices to create applications that make our lives more efficient and connected. In the United States alone, millions of Americans play sports each year starting from middle school through college. With social media on the rise, there is a need for an application that takes advantage of the technologies incorporated in mobile devices with the ability to connect athletes in an area to one another. There is currently a lack of a social network application in the sports category of the Apple App Store. Therefore, this report describes how an iOS mobile application for a sports social network is designed, developed, and deployed. Specifically, we will explore in depth the iOS framework, user stories and requirements, the design and development of the client and backend application, and the tests and results. / text
9

MetApp : an efficient and cost saving method for small businesses to create iOS applications

McCann, Simon Vincent 22 November 2013 (has links)
Interactions between small businesses and their customers often involve some form of electronic transaction. With the growing proliferation of portable computing, many of these transactions are taking place on a “smart device,” such as an iPhone or iPad. Many businesses will want to create their own custom apps to better serve their customers. Currently this process can be difficult and expensive to do well. This report proposes a method to make app production a little easier and cheaper. / text
10

MobiShare : mobile computing with no strings attached

Castillo, Jason Moses 15 April 2014 (has links)
In today’s world, technology is growing at a fast rate compared at other times. Sales have increased in the smart phone market, which has created new opportunities in pervasive computing. In pervasive computing, nodes enter and leave a network at any time. Within the network, nodes can transfer data to other nodes. The information is not retained in any static location such as a server. The mobile infrastructure requires a way to handle all the information in a dynamic way. The use of a centralized server in a mobile environment creates deterioration in the performance of obtaining information. The main goal of this paper is to provide data persistence using a “substrate” that is inherently not persistent. The data will be stored within the network for availability to all users. Saving data within a network would provide a means to obtain any type of information without relying on the source of where the data came from in the network. Users would also be able to continue downloading where they left off when they return to the network. Consider an environment where people can share music or books. For example, say that John Doe was searching for a particular song to download and in the network Jane has the song that was requested. John decides to download the song without knowing that it is from Jane. Then John decides to leave the network and the download stops. Whenever John rejoins the network the download of his song will continue where he left off, and his ability to access the information will not depend whether or not Jane is present in the network. John may retrieve the file from any other user who has the exact same file. The requested information that the user queries in a search engine will be stored as a metadata within the network, either by other nodes or a temporary server. This allows data to be obtained without relying on the "main user" or creator of the data to be present in the network. The users would also be able to retrieve the data at multiple times. / text

Page generated in 0.0224 seconds