• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4487
  • 975
  • 69
  • 49
  • 39
  • 11
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 5871
  • 5871
  • 5591
  • 5343
  • 5321
  • 773
  • 451
  • 372
  • 320
  • 314
  • 304
  • 271
  • 265
  • 257
  • 254
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Authentication system based on hand-arm-movements

Lindström, Johan, Sonnert, Adrian January 2016 (has links)
This study treats behavioral biometric authentication, and its focus is on creating an application that uses hand-arm-movements to identify users. The systemis modelled to achieve a minimal false rejection rate (FRR) and false acceptance rate (FAR). Experiments featuring several test subjects performing hand-arm-movements using our device were performed in order to gauge the FRR and FAR of our system. The FRR and FAR achieved were 35% and 15.8%, respectively. The study concludes that hand-arm-movements may be useful for authentication, but further research is required.
82

Security in software : How software companies work with security during a software development process / Säkerhet i mjukvara : Hur mjukvaruföretag arbetar med säkerhet under en mjukvaruutvecklingsprocess

Lindmark, Fanny, Kvist, Hanna January 2016 (has links)
This study is conducted, due to recent interest in privacy and software security, on how a number of software development companies work during a development process to develop secure software to the possible extent. The study is based on four interviews with four software companies located in Linköping, Sweden. The interviews followed a semi-structured format to ensure the possibility to compare the given answers from the companies to each other. This structure was chosen to give each company the liberty to express what they valued and thought were important during a software development process. The aim was to analyze how and if these companies work with security when developing software, and to see what differences and similarities that could be established. We found differences between the companies' perspective of security and on their methods of working. Some valued secure software more than others and performed more measures to ensure it. We also found some similarities on their view on importance of secure software and ways to work with it. The differences and similarities were related to the size of the companies, their resources, the types of products they develop, and the types of clients they have.
83

Ransomwarehotet ur kommunalt perspektiv : Erfarenheter, utmaningar, förebyggande åtgärder och incidenthantering / The ransomware threat from a swedish municipal point of view : Experiences, challenges, security measures and incident management

Larsson, Petter January 2016 (has links)
Ransomware är en typ av skadlig programvara som tar gisslan på ett offers dator genom att till exempel låsa hela datorn, eller genom att kryptera (låsa och göra obrukbara) filer så som foton och dokument, och sedan kräver en lösensumma för att låsa upp datorn eller dekryptera (återställa) filerna. Ransomware har på senare år blivit vanligare och vanligare, och är idag vanligt förekommande även i Sverige. Ett exempel på svensk spridning är de mail som sedan september 2015 skickats till svenska användare, och påståtts komma från Postnord. När mottagare öppnat mailet och försökt ladda hem den fraktsedel som mailet sagt sig innehålla har dennes personliga filer krypterats av ransomware och en lösensumma har utkrävts för att filerna ska återfås. Denna studie undersöker denna otrevliga typ av skadlig programvaras inverkan på arbetet med IT inom kommuner i Skaraborg, vilka erfarenheter och utmaningar kommunernas IT-avdelningar kopplar till ransomware, samt hur de hanterar hotet. Intervjuer har använts för att samla in informationen. Resultatet visar att ransomware drabbat de allra flesta av kommunerna, men att IT-avdelningarna har kunnat återställa det mesta som förlorats från säkerhetskopior. Resultatet visar också att en stor utmaning för kommunerna är att utbilda sina användare i hur denna typ av angrepp kan kännas igen, och därmed undvika smitta. Till sist visar resultatet även att problematiken kan komma att växa då en ny förordning om dataskydd från EU införs.
84

The Indie Developer’s guide to immersive tweens and animation : What you need to know as a programmer to animate and increase immersion

Öhrström, Fredrik January 2016 (has links)
Some games are grabbing your attention more than others. Some even do it so well people even lose track of time and their surroundings. Why does this happen? And how can the effect be harnessed for your own game? This report studies what immersion is and subjects related to it, such as richness and flow, and then how and what kind of easy animations and effects that build on these concepts that you can create in a 2D puzzle game. Most of the effects, animations and ideas can probably be carried over to other game types without much difficulty if you want a more immersive product. In the end, the player experience is tested by two surveys to see if players were immersed, PANAS and IEQ. The results go over what kind of effects were implemented and the surveys showed that most players were a bit immersed and that they enjoyed the graphics of the game.
85

Human resource matching through query augmentation for improving search context

Tran, Huy January 2016 (has links)
The objective with the thesis is to research how to match a company's human resources with job assignments received from clients. A common problem is the difficulty for computers to distinguish what semantic context a word is in. This means that for words with multiple interpretations it is hard to determine which meaning is the correct meaning in a given context. The proposed solution is to use ontologies to implement a query augmentation that will improve defining the context through users adding suggestions of relevant words. The intuition is that by incrementally adding words, the context narrows, making it easier to search for any consultant matching a specific assignment. The query augmentation will then manifest in a web application created in NodeJS and AngularJS. The experiments will then measure, based on \emph{precision}, \emph{recall} and \emph{f-measure}, the performance of the query augmentation. The thesis will also look into how to store document-based résumés, .docx file-format, and properly enable querying over the database of résumés. The Apache based frameworks Solr and Lucene, with its inverted indexing and support for HTTP requests, are used in this thesis to solve this problem. Looking at the results, the query augmentation was indicated of having somewhat too strict restrictions for which the reason is that it only permits \emph{AND} conditions. With that said, the query augmentation was able to narrow down the search context. Future work would include adding additional query conditions and expand the visualization of the query augmentation.
86

Static Code Analysis of C++ in LLVM

Kvarnström, Olle January 2016 (has links)
Just like the release of the Clang compiler, the advent of LLVM in the field of static code analysis already shows great promise. When given the task of covering rules not ideally covered by a commercial contender, the end result is not only overwhelmingly positive, the implementation time is only a fraction of what was initially expected. While LLVM’s support for sophisticated AST analysis is remarkable, being the main reason these positive results, it’s support for data flow analysis is not yet up to par. Despite this, as well as a lack of thorough documentation, LLVM should already be a strong rival for any commercial tool today.
87

Semi-automated annotation of histology images : Development and evaluation of a user friendly toolbox / Semi-automatisk uppmärkning av histologibilder : Utveckling och utvärdering av en användarvänlig verktygslåda

Sanner, Alexander, Petré, Fredrik January 2016 (has links)
Image segmentation has many areas of application, one of them being in medical science. When segmenting an image, there are many automatic approaches that generally do not let the user change the outcome. This is a problem if the segmentation is badly done. On the other hand there is the manual approach which is slow and cumbersome since it relies heavily on the users effort. This thesis presents a semi-automated approach that allow user interaction and computer assisted segmentation, which was realized in a hi-fi prototype. The prototype made use of SLIC superpixels which the user could combine with interactions to create segments. The prototype was iteratively developed and tested to ensure high usability and user satisfaction. The final prototype was also tested quantitatively to examine if the process of segmenting images had been made more efficient, compared to a manual approach. It was found that the users got a better result in the prototype than the manual if the same time was spent segmenting. Although it was found that the users could not segment images faster by using the prototype than the manual process, it was believed that it could be made more efficient with superpixels that followed the natural border of the image better. / Bildsegmentering har många användningsområden, där ett av dem är inom medicinsk foskning. Det finns många automatiska algoritmer för att segmentera bilder som generellt inte låter användaren ändra resultatet av segmenteringen. Detta är problematiskt när segmenteringen blir dåligt gjord. Däremot finns det helt manuella tillvägagångssätt som är mer besvärliga och tidskrävande eftersom de kräver mer utav användaren. Det här arbetet presenterar ett semi-automatiskt tillvägagångssätt som tillåter användarinteraktion tillsammans med dator-assistans för att segmentera bilder. Det semi-automatiska tillvägagångsättet realiserades i en hi-fi prototyp som använder SLIC superpixlar. Superpixlarna kan slås samman genom användarinteraktion där de sammanslagna superpixlarna utgör segmenten. Prototypen utvecklades och testades iterativt för att uppnå hög användbarhet och nöjda användare. Prototypen testades även kvantitativt för att undersöka om segmenteringsprocessen hade effektiviserats tidsmässigt jämfört med redan existerande mjukvaran. Det visade sig att användarena fick högre precision i segmenteringen vid användning av prototypen jämfört med den existerande mjukvaran när samma tid lades. Även om det visades att segmenteringen inte var mer tidseffektiv så troddes det att tidseffektiviteten i prototypen kunde ökas genom att superpixlarna föjde de naturliga områdena bättre i bilden.
88

Studentkassen : Utvecklingen av en e-handel för matkassar med fokus på användbarhet / Studentkassen : The development of an e-commerce for grocery bags with focus on usability

Aspholm, Emelie, Berg, Richard, Duvnäs, Vidar, Fjellström, Frida, Höjvall, Olof, Kvick, Gustav, Lundström, Henrik, Ohlsson, Emil January 2016 (has links)
Den här rapporten redovisar resultat och slutsatser från arbets- och utvecklingsprocessen för webbapplikationen Studentkassen. Studentkassen är en e-handelsbutik där kunden får möjlighet att skräddarsy sin egen matkasse utifrån färdiga recept. Utvecklingen har fokuserats kring designval och funktionalitet för att undersöka hur en användbar webbapplikation för onlineförsäljning av matkassar ska utformas. Arbetsprocessen har följt metodiken Scrum som resulterade i effektivt arbete tack vare kontinuerliga iterationer. Användbarhetsutvärderingar utfördes för att verifiera att applikationens design och funktionalitet var lämplig. I rapporten redogörs för applikationens design- och funktionalitetsval. Detta ligger till grund för rapportens diskussioner och slutsatser. För att uppnå användbarhet av en webbapplikation för försäljning av matkassar ska köpprocessen vara effektiv, vilket kan uppnås med en genomgående konsistent design där navigationen kräver få klick. / This report outlines the results and conclusions from the work process and development process of the web application Studentkassen. Studentkassen is an e-commerce, whereupon the customer may customize their own bag of groceries from a list of recipes. The development focused on choices of design and functionality in order to research how a web application for online sales of grocery bags should be designed to achieve usability. Today, usability within web development is trending, which has driven the framing of question of this report. The work process followed the Scrum methodology, which resulted in an efficient working procedure due to continuous iterations. Usability evaluations were conducted, with the purpose of verifying the suitability of the web application’s design and functionality. In the frame of the project, the design and functionality decisions within the application are outlined. This lays the foundation of the results and reflections within the report. To achieve usability of a web application for online sales of grocery bags, an efficient purchasing process is necessary, which is acquired through a consistent design where few clicks are required to navigate.
89

Reliability comparison of wireless protocols IEEE 802.15.1 and IEEE 802.15.4

Sjöberg, Niklas January 2016 (has links)
No description available.
90

Estimating Time to Repair Failures in a Distributed System / Estimering av reparationstid vid haverier i ett distribuerat system

Söderholm, Matilda, Habbe, Lisa January 2016 (has links)
To ensure the quality of important services, high availability is critical. One aspect to be considered in availability is the downtime of the system, which can be measured in time to recover from failures. In this report we investigate current research on the subject of repair time and the possibility to estimate this metric based on relevant parameters such as hardware, the type of fault and so on. We thoroughly analyze a set of data containing 43 000 failure traces from Los Alamos National Laboratory on 22 different cluster organized systems. To enable the analysis we create and use a program which parses the raw data, sorts and categorizes it based on certain criteria and formats the output to enable visualization. We analyze this data set in consideration of type of fault, memory size, processor quantity and at what time repairs were started and completed. We visualize our findings of number of failures and average times of repair dependent on the different parameters. For different faults and time of day we also display the empirical cumulative distributionfunction to give an overview of the probability for different times of repair. The failures are caused by a variety of different faults, where hardware and software are most frequently occurring. These two along with network faults have the highest average downtime. Time of failure proves important since both day of week and hour of day shows patterns that can be explained by for example work schedules. The hardware characteristics of nodes seem to affect the repair time as well, how this correlation works is although difficult to conclude. Based on the data extracted we suggest two simple methods of formulating a mathematical model estimating downtime which both prove insufficient; more research on the subject and on how the parameters affect each other is required.

Page generated in 0.1412 seconds