• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 93
  • 33
  • 32
  • 22
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 220
  • 220
  • 36
  • 36
  • 35
  • 34
  • 33
  • 29
  • 28
  • 27
  • 25
  • 23
  • 23
  • 22
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Model-Based Systems Engineering in Mobile Applications

Koch, Oliver, Weber, Jürgen January 2016 (has links)
An efficient system development needs reuse, traceability and understanding. Today, specifications are usually written in text documents. Reuse means a copy and paste of suitable specifications. Traceability is the textual note that references to affected requirements. Achieving a full context understanding requires reading hundreds of pages in a variety of documents. Changing one textual requirement in complex systems can be very time-consuming. Model-based systems engineering (MBSE) addresses these issues. There, an integrated system model is used for the design, analysis, communication and system specification and shall contribute to handling the system complexity. This paper shows aspects of this approach in the development of a wheel loader\'s attachment system. Customer requirements will be used to derive a specification model. Based on this, the author introduces the system and software architecture. The connection between requirement and architecture leads to a traceable system design and produces the huge advantage of MBSE.
62

Využití mobilních aplikací ve výuce chemie / The use of mobile applications in the teaching of chemistry

Hrubá, Běla Marie January 2020 (has links)
The diploma thesis focuses on teaching of Chemistry using mobile phones at primary and secondary schools. The theoretical part is dedicated to the research articles and final theses focused on the topic. Moreover, this thesis shows whether and how school curricula and school regulations dedicate to the topic of mobile phones in education. The practical part of the thesis introduces a research of available chemical educational applications and also an analysis of chosen applications based on predetermined criteria. All of the researched applications are divided according to their topics and arranged in a table summarizing their main content. Furthermore, this thesis describes a trial lesson with implementation of mobile phones and its evaluation. This part also includes all materials used in the pedagogical experiment.
63

Strong Authentication Protocol using PIV Card with Mobile Devices

Kunning, Mao January 2013 (has links)
Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However it has many security weaknesses and even strong passwords are not strong enough. For example, strong secrets are difficult to remember, and people tend to share authentication credentials across systems, which reduce the overall security tremendously. Thus, for security sensitive environment we need strong multi-factors authentication. Smart card based certificate strong authentication solution can be used as a replacement for standard password-based schemes. And also a large existing base of deployed smart cards used to provide authentication in other areas can be reused to reduce costs significantly. This master thesis presents a study of how to implement certificate-based strong authentication on mobile devices using PIV smart card. It proposes a strong authentication protocol based on FIPS 201 Personal Identity verification standard, and FIPS 196 entity strong authentication protocol scheme, and describes the implementation of a mobile security application developed on iOS system using a smart card reader. Our solution can provide high level of security services for mobile applications, and can easily protect their confidentiality, integrity and authenticity.
64

Security Services for Mobile Applications

Mumtaz, Majid January 2012 (has links)
In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running on them enable users to access information anytime and anywhere over the air network. Ubiquitous nature of smartphones stimulates the growth of applications development, especially for small scale devices. Protection and security of sensitive mobile applications and their resources against threats are new emerging challenges for mobile application developers. Even competitive enterprise application development organizations lack comprehensive security services for small scale devices. Ultimately unpredictable threats become active anytime and can easily hamper the whole infrastructure within short time frame. In future enterprise applications, to protect entities and overall access of back-end secure infrastructure and services secure and easy to deploy strong authentication and authorization services will play a key role. Complexity of security risks in wireless networks is changing the ways of protection mechanisms for mobile applications. Achieving security balance with convenience becomes a challenging task for application developers. Due to complex blurred picture of an attack in an enterprise applications development, usually the developers don't pay attention against the mitigation of such threats at the initial phase of application development. Due to this, weaknesses appear in latter stages that make an application system vulnerable. Conventionally it is a common practice by application developers to rely on username/password authentication mechanism, and even more secure way that is considered to be a One Time Password (OTP) or complex passphrase schemes. These schemes have a number of limitations and drawbacks regarding today’s diverse wireless environments. In this research we used Public Key Infrastructure (PKI) certificate-based strong authentication scheme for small scale devices which is a significant step-up from simple username/password, OTP and location-based authentication schemes. Leading standards which we followed FIPS 201 Personal Identity Verification standard and FIPS 196 Strong Authentication Protocol scheme. Our solution is based on secure smart microSD card that can be used for providing high level of security for mobile enterprise applications. Also other considerable security services included confidentiality of exchanged transaction messages between applications and back-end application provider server, integrity of transaction messages, and non-repudiation services.
65

Branding through mobile applications : - A case study of Swedish campaign applications

Vikström, Henrik, Zheng, Caroline January 2013 (has links)
We are a few years into a paradigm shift where mobile Internet usage around the world is increasing fast. Smartphones have in Sweden become the device a substantial proportion of the population have, and companies have seen them as a new way to communicate with consumers. This thesis is a case study of four smartphone applications issued by companies in brand building purposes. The applications are King of the slope by Vattenfall, Körklar? by SalusAnsvar, McWrap Go&Get by McDonalds and Många Sträckor Små by Lantmännen. Empirical materials are gathered through semi-structured interviews with people involved in the creation of each application. Results are then analysed based on what initial goals each issuer had set for the application with the aim of obtain learnings valuable to future application issuers. Findings have shown that the mindset when creating these applications has generally been short-term. This contradicts the nature of a mobile application and its purpose of strengthening a company’s brand, which usually is a long-term process. We advocate a more long-term mindset and a consumer-oriented standpoint instead of product- oriented when creating mobile applications for branding purposes.
66

Using Gamification to Improve User Experience and Health Effects in Mobile Applications

Andersson, Jonathan January 2021 (has links)
Background. According to the World Health Organization, over 264 million people suffer from depression. A recent trend to treat and combat depression is e-health applications like Headspace with the help of mindfulness or meditation. The rise of new treatment methods based on these concepts are seen as a promising alternative to traditional methods like cognitive behavioural therapy and medication. Objectives. The objectives of this study is to make a new mobile application, in the form of a mobile e-health prototype. The application, called MindBud, is designed to help the user reduce depressive thoughts. This is done by using a daily schedule to plan your day and in turn, reduce depressive thoughts and procrastination through structure. Then, the study seeks to compare two versions of this application, one version will have gamification elements and one will be without them. The comparison will measure overall user experience through a test called the system usability scale, and in addition measure the effectiveness of the application on depressive thoughts.Methods. Two versions of MindBud were implemented, one basic app and one with gamification elements added to it. The applications were then tested by performing an experiment with sixteen participants. Each of the participants tested both versions of the application, and then answered a questionnaire about the app. The answers of the questionnaire were used to compare test scores between the two versions of the application, to see if gamification had any impact on overall user experience and to see which gamification elements could be used to reduce depressive thoughts through the application. Results. The results show a slight increase in score in regards to overall user experience when comparing the gamified app with the basic one. Most notable increases came in questions about frequency of use, and complexity of the application. Additionally, the gamified application scored significantly better when participants were asked how much they thought the app version would reduce depressive thoughts.Conclusions. The gamification elements added were found to increase overall user experience, and also help reduce depressive thoughts more than the basic version. The used gamification elements were an in-game avatar, a reward system and an experience and level system.
67

Menstrual tracking applications in women's health studies

Nguyen, Mymy 24 July 2018 (has links)
OBJECTIVE: After comparing the top 10 menstrual tracking applications, there are no applications that address symptoms specific to Polycystic Ovary Syndrome (PCOS). This thesis demonstrates the need for a comprehensive menstrual tracking application that caters toward all populations, including patients with PCOS. METHODS: Mobile application usage was evaluated through data from the Ovulation and Menstruation (OM) Health Study to view relationships between PCOS/demographic groups and preference for tracking methods. The top 10 most popular mobile menstrual tracking applications were compiled through a search on the iOS operating system. Mobile menstrual tracking applications were then evaluated through an adapted APPLICATIONS system, which includes categories to score for PCOS-specific symptoms. RESULTS: PCOS groups showed clear preference for tracking methods overall, and are more likely to view their own health as fair/poor. P values for tests between other demographic variables in the OM Health study were insignificant, but there are observable trends in education, income, and age and usage of tracking methods. Evaluation of the top 10 mobile menstrual applications resulted in Clue scoring the highest, but no applications scored a complete PCOS-specific score. CONCLUSIONS: With continual variance in menstrual cycles, there needs to be development of a mobile menstrual application that is effective for all populations. Mobile menstrual applications have proven their popularity through PCOS groups and the rising usage within younger age groups. However, through the adapted APPLICATIONS system, major features are still missing, and are necessary to cater towards unique groups such as people with menstrual irregularities and PCOS.
68

Minimal Criteria: Minimizing User Input and User Interface for Faster Output in Minimalistic Mobile Applications

Maddirala, Sumanth 19 November 2019 (has links)
No description available.
69

An Integrated Room Booking and Access Control System for Public Spaces

Kamil, Jaffar, Amer, Mohamed January 2023 (has links)
Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. This bachelor thesis introduces a proof-of-concept for a cohesive room booking and access control system to address these issues. The proposed solution encompasses two mobile applications, one as the room reservation platform and the other as the access control mechanism. By integrating the management of bookings and access control, this proof-of-concept aims to overcome the prevalent shortcomings in existing systems. Halmstad University's IT department was consulted during the requirement definition phase to ensure a comprehensive understanding of the common problems, their underlying causes, and possible solutions. The proposed system utilizes common technologies such as NodeJS, Android Studio, and PostgreSQL. Additionally, Mobile BankID is integrated as a unique feature for secure user authentication, providing a trusted and widely-accepted method to verify users' identities. The final results were tested in a simulated environment and indicate that the developed system satisfies the initial requirements, addressing the problems of double bookings and unauthorized access identified during the consultation with the IT department.
70

Designing Better Mobile Apps: An Experimental Evaluation of Apple’s and Google’s Design Guidelines : How analysing the Human Interface Guidelines for iOS and Material Design for Android better our understanding of the usability challenges app users face and what we can do to overcome key issues.

Gülenman, Tom January 2022 (has links)
When developing mobile apps, multiple factors must be considered when choosing between native or cross-platform technologies. The latter offers deployment of one codebase to multiple operating systems, such as Android and iOS. However, we argue that common design techniques lack an understanding of specific needs that separate iOS and Android users. This work presents an experimental approach using UI prototypes and existing native iOS and Android mobile applications to identify issues in usability of the two systems. We conduct a large amount of usability tests involving 34 participants and find that our prototypes and apps that follow Apple’s Human Interface Guidelines are easier to use in terms of one primary usability metric, notably task time, with a statistically significant difference between iOS and Android testers in two out of four tests. On this basis we investigate what key UI elements and design patterns cause disruptions in otherwise smooth User Experiences. Alongside documenting those, we also list key elements that influence the usability on a more general level. We provide suggestions to app designers and developers on avoiding designs that are considered producing usability issues by at least one of the two groups of iOS and Android users and on design patterns to improve the User Experience.

Page generated in 0.1343 seconds