• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1610
  • 643
  • 580
  • 293
  • 278
  • 193
  • 151
  • 76
  • 52
  • 50
  • 42
  • 39
  • 39
  • 32
  • 23
  • Tagged with
  • 4663
  • 888
  • 723
  • 695
  • 575
  • 553
  • 486
  • 465
  • 419
  • 415
  • 405
  • 369
  • 358
  • 351
  • 334
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

An Exploratory Analysis of Ex-Offender Employment in a Non-Urban Setting

Pape, Catherine M. 11 August 2014 (has links)
No description available.
322

Application-Aware Resource Management

Ghadse, Sheetal Prakash 21 March 2011 (has links)
No description available.
323

Simply Cooking - an interaction design project for children aged 8-12

Houlberg-Laursen, Maria January 2013 (has links)
The skill of cooking a meal from start to end is becoming a stressful every day activity in many homes in Denmark. Less and less parents focus on including their children in preparing dinner because they see it as a time-consuming activity that the child would rather be left out of. In this paper we examine the importance of teaching children how to cook from a young age as well as we investigate in why it can seem like such a big task for them to actually get started with cooking. The study focuses on how to develop an interactive tablet and smartphone application that provides children with an explorative platform for them to develop their cooking skills on. The detailed process of developing a simple tablet/smartphone application is explored in order to arrive at an understand of the challenges children face when cooking, how we encourage them to cook and how we facilitate them with the best possible options for this. By doing several explorative workshops and studying previous research about how children learn, understand and explore their creativity, we arrive at an understanding of the challenges, limits and benefits there would be with an application like this.
324

Simple Indoor Environmental Monitoring System for Houseplant using Web and Mobile Applications / Enkelt inomhus miljöövervakningssystem för krukväxt med webb- och mobilapplikationer

Jabbar, Maher January 2020 (has links)
In recent times, attention to the indoor plants in the houses has increased, which can be used to produce food or just for decoration and for health purposes. However, moving plants from their original place in nature to a closed place leads to negative effects due to changing environmental parameters around them. For instance, fluctuations in temperature, light, and soil moisture might affect indoor plant growth process. This work investigates the possibility of using the smart mobile and web applications to monitor remotely the most of changing environmental parameters around plants. These parameters can give the user the real-time information on air temperature and humidity, soil temperature and moisture, as well as amount of light. The Top-down method has been used to design a monitoring system to help the user keep informed of indoor climate changes. This system contains Raspberry and some sensors that are used in sensing various environmental conditions. It also includes the software component which defines services and actions to be taken on the data collected by sensing objects. The system is tested and evaluated in the indoor environment to prove the required concepts. The results indicated that web and mobile interfaces transfer data in real-time manner and send environmental information to the user. The data collected is visualized by different charts and figures to give a better understanding of the surrounding conditions in which the plant grows. It is concluded that the proposed system provides a user-friendly monitoring application to monitor the most indoor environmental parameters.
325

<b>Fate of soil residual herbicides in cover cropping systems</b>

Lucas Oliveira Ribeiro Maia (18420270), William G. Johnson (6508424), Eileen J. Kladivko (17477358), Shalamar D. Armstrong (18387737), Bryan G. Young (6508421) 22 April 2024 (has links)
<p dir="ltr">Cover crops and soil residual herbicides are some of the essential tools within the integrated weed management. When used at cover crop termination, residual herbicides can extend the period of weed control and reduce the selection pressure for herbicide resistance. However, previous research has indicated that the use of cover crops can increase the microbial activity of the soil which, in turn, is the primary route for herbicide degradation in the soil. In addition to the potential effect on the microbial breakdown of herbicides, cover crops can also alter the fate of herbicides by interception. Three field projects were established to (1) investigate the influence of cover crop [cereal rye (<i>Secale cereale</i> L.) and crimson clover (<i>Trifolium incarnatum</i> L.)] use on soil enzyme activities [β-glucosidase (BG) and dehydrogenase (DHA)], its effect on the concentration of residual herbicides (sulfentrazone, <i>s</i>-metolachlor, cloransulam-methyl, atrazine, and mesotrione) in the soil, and the interception of herbicides by cover crop residue; (2) to investigate the effect of cover crop termination strategies (fallow, standing, and roller crimped 1 d prior to application) and simulated rainfall volumes (0, 4.2, and 8.3 mm simulated over 20 min; equivalent to 0, 12.5, and 25 mm h<sup>-1</sup>) on atrazine wash off from cereal rye biomass onto the soil; (3) to investigate the effect of cereal rye termination strategies on the concentration of sulfentrazone, <i>s</i>-metolachlor, and cloransulam-methyl in the soil, weed control, and soybean [Glycine max (L.) Merr.] yield.</p><p dir="ltr">Results from the first project suggests that the use of cover crops occasionally resulted in increased BG and DHA activities relative to the fallow treatment. However, even when there was an increase in the activity of these two enzymes, increased degradation of the residual herbicides was not observed. Furthermore, the use of cereal rye or crimson clover as cover crops did not reduce the efficacy of the residual herbicides in controlling weeds early in the growing season.</p><p dir="ltr">In regards to the fate of atrazine after simulated rainfall, the results from the second project indicated that cereal rye biomass accumulation negatively impacted the amount of herbicide reaching the soil at the time of application. Although the roller crimped cereal rye reduced the amount of herbicide reaching the soil relative to the standing cereal rye, it also reduced atrazine leaching below the 0-5 cm of soil. Furthermore, in cover cropping systems with high levels of cereal rye biomass, more than 8.3 mm of rain are required to wash most of the atrazine off of the biomass.</p><p dir="ltr">Lastly, the adoption of the planting green systems resulted in up to 84% interception of residual herbicides by the roller crimped cereal rye biomass. The use of cereal rye as cover crop did not improve the weed control relative to the fallow during the two years of field research. Soybean yield losses ranged from 10 to 44% with the adoption of the planting green system, primarily due to stand losses. However, there are strategies and proper equipment available that can be used to minimize soybean stand losses.</p>
326

Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners

Shelly, David Andrew 17 September 2010 (has links)
The threat of cyber attacks due to improper security is a real and evolving danger. Corporate and personal data is breached and lost because of web application vulnerabilities thousands of times every year. The large number of cyber attacks can partially be attributed to the fact that web application vulnerability scanners are not used by web site administrators to scan for flaws. Web application vulnerability scanners are tools that can be used by network administrators and security experts to help prevent and detect vulnerabilities such as SQL injection, buffer overflows, cross-site scripting, malicious file execution, and session hijacking. However, these tools have been found to have flaws and limitations as well. Research has shown that web application vulnerability scanners are not capable of always detecting vulnerabilities and attack vectors, and do not give effective measurements of web application security. This research presents a method to analyze the flaws and limitations of several of the most popular commercial and free/open-source web application scanners by using a secure and insecure version of a custom-built web application. Using this described method, key improvements that should be made to web application scanner techniques to reduce the number of false-positive and false-negative results are proposed. / Master of Science
327

Generation of safe environmentsin geolocation applications

Börjesson, Arvid January 2023 (has links)
Mobile applications may employ the GPS as user input to create location-based games. The existing landscape of location-based applications predominantly falls into two categories: those offering high-paced action with free movement and those providing movement between established locations at a leisurely pace. However, the combination of fast player movement between game-selected locations can potentially lead to significant accidents if the locations are poorly chosen. A naively designed system may encourage players to traverse rivers, cross highways,or trespass into private areas. This report introduces a design aimed at establishing a safe real-world environment in mobile applications by mapping the surroundings and guiding the player safely. A map generationsystem is proposed, along with a conceptual framework for utilization the generated map.
328

Analyzing the feasibility of using secure application integration methodology (SAIM) for integrating don enterprise resource planning (ERP) application

Marin, Ramon O. 03 1900 (has links)
Approved for public release, distribution is unlimited / A thorough examination of the Secure Application Integration Methodology (SAIM) for applicability in the Department of the Navy (DON) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP) projects implemented by the SYSTEMS COMMANDS (SYSCOMS). The Navy Enterprise Convergence Team (NECT) that leads the ERP integration effort could benefit from a sound Enterprise Application Integration methodology. Results do not support SAIM as the sole guiding EAI methodology however it could have some value to the NECT. SAIM has three primary benefits which NECT could employ: 1) It provides a complete walkthrough of the EAI process, 2) It emphasizes the importance of an Enterprise Architecture, and 3) It provides useful management checklists along with other important considerations. SAIM also has some significant shortcomings: 1) It does not support all the DON Chief Information Officer requirements, 2) It does not provide Change Management Guidance, 3) It does not take into account the uniqueness of the Navy's environment, and finally 4) SAIM relies on an Enterprise Architecture as its foundation which the Navy does not currently have. / Lieutenant Commander, United States Navy
329

Návrh mobilní aplikace pro portál Hlidani.eu / Design of Mobile Application for Hlidani.eu

Weigel, Martin January 2016 (has links)
The master‘s thesis focuses on the design of mobile application for web portal Hlidani.eu on Android platform. The theoretical part of the thesis analyzes problems and terms concerning mobile applications. The thesis uses selected analytical methods to analyze the current state of web portal Hlidani.eu. Based on these results, the application itself is designed.
330

Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts / Detektering av sårbarhetsscanning med maskininlärning : Detektering och förhindrande av attacker i applikationslagret genom kombinationen av maskininlärning och AppSensor koncept

Shahrivar, Pojan January 2022 (has links)
It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. In this context, a vulnerability scanning attack is defined as an automated process that detects and classifies security weaknesses and flaws in the web application. To test the hypothesis that machine learning techniques can be used to create a detection model, twenty four models were trained. The models showed a high level of precision and recall, ranging from 91% to 0.96% and 85% to 0.93%, respectively. Although the classification performance was strong, the models were not calibrated sufficiently which resulted in an underconfidence in the predictions. The results can therefore been viewed as a performance baseline. Nevertheless, the results demonstrate an advancement over the simplistic threshold-based techniques developed in the early days of the internet, but require further research and development to tune and calibrate the models. / Det är väletablerat att tekniker för maskininlärning har använts med stor framgång inom andra domäner och har utnyttjats för att hantera källor till växande missbruk, såsom spam. Denna studie syftar till att avgöra om maskininlärningstekniker kan tillämpas för att skapa en modell som upptäcker sårbarhets-skanningsattacker med hjälp av proprietär data som samlats in från tCell, en webbapplikationsbrandvägg. I detta sammanhang definieras en sårbarhetsskanningsattack som en automatiserad process som upptäcker och klassificerar säkerhetsbrister och brister i webb-applikationen. För att testa hypotesen att maskininlärningstekniker kan användas för att skapa en detektionsmodell, tränades tjugofyra modeller. Modellerna visade en hög nivå av precision och sensitivitet, från 91% till 0,96% och 85% till 0,93%, respektive. Även om klassificeringsprestandan var god, var modellerna inte tillräckligt kalibrerade, vilket resulterade i ett svagt förtoende för förutsägelserna. De presenterade resultaten kan därför ses som en prestationsbaslinje. Resultaten visar ett framsteg över de förenklade tröskelbaserade teknikerna som utvecklades i begynnelsen av internet, men kräver ytterligare forskning och utveckling för att kalibrera modellerna.

Page generated in 0.1142 seconds