• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 35
  • 35
  • 14
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Från ax till limpa : Verksamhetsprocessen vid framtagande av applikationer till handdatorer på Fazer Bageri AB / <em>From ear to loaf </em> : <em>The organizational development process for application development for handheld computers at Fazer Bageri AB </em>

Lindquist, Jennie, Mikaela, Andersson January 2009 (has links)
<p>Human Computer Interaction (HCI) is a broad discipline that studies different concerns regarding interactive systems’ development. One of the major interest points within the discipline is the reasoning behind building specific functionality into computers and the long-term effects that usage of systems will have on humans.</p><p>Within Human Computer Interaction there are theories and frameworks how to involve a user in the process of developing new systems. In this paper focus is applied to the development process within developing applications for Enterprice Digital Assistants (EDA) and to what extent the end-users are involved in the process. Fazer Bageri AB has been choosen to represent a business corporation that uses handheld computers in their everyday tasks.</p><p>The method used to gather information for this study has been by performing interviews and observations with key stakeholders at Fazer Bageri AB and MobiOne AB. Fazer Bageri AB is the purchaser, customer and user of the handheld computer applications that MobiOne AB developed.</p><p>The result shows that the end-users were only involved in the end of the developing process. We found that one of the main reasons for this is that there are not any resources for supporting involvement of the end-users. Within user-centric design there are many aspects to consider, but one of the most prominently is to establish a mutual understanding by all persons involved in the project, from developers to end-users about the importance of involving users throughout the development. We also found that there is no routine established for securing that the information about different updates in the handheld computers reaches the end-users.</p><p>The development process demonstrates that Fazer Bageri AB uses a traditional system development philosophy rather than a user-centric system development philosophy.</p> / <p>Inom ämnet människa datorinteraktion handlar många metoder om hur man involverar användaren i framtagandet av nya system. I denna undersökning ville författarna ta reda på hur verksamhetsprocessen vid framtagande av systemapplikationer för handdatorer kan gå till och om användarna involveras i processen. Verksamhetsprocessen jämfördes sedan mot teorier inom området. Valet föll på att undersöka verksamhetsprocessen hos Fazer Bageri AB då vetskap fanns om att de har 350 chaufförer som använder handdatorer i sitt dagliga arbete. När man utvecklar för så många användare är det viktigt att ta med användaren tidigt i processen.</p><p>Metoderna som använts i undersökningen har varit strukturerade intervjuer och observationer. Respondenterna har varit nyckelpersoner inom Fazer Bageri AB och MobiOne AB. Fazer Bageri AB är beställare, kund och användare av de mobila applikationerna för handdatorer som MobiOne AB tillhandahåller och är experter på.</p><p>Resultatet visar att användarna i denna undersökning var involverade endast i slutet av processen, en orsak till detta tycks vara att det saknas resurser för att ersätta ytterligare involvering av användare. Med att ersätta menas i detta fall ekonomisk kompensation till chaufförerna för den extra arbetstid det skulle innebära att involveras i processen. En viktig aspekt inom användarcentrerad design är att säkerställa att samtliga involverade har samma uppfattning om det som skall göras eller vad som åstadkommits. Viktigt är därför att informationsflödet inom företagen fungerar för att samtliga skall ha möjlighet att ta del av arbetet. Informationsflödet mellan handdatoransvarig och slutanvändare hos Fazer Bageri AB kan verka tveksamt då det innefattar flera olika informationsled.</p><p>Verksamhetsprocessens olika faser som kartlagts skiljer sig delvis ifrån de teorier inom människa datorinteraktion som tagits del av inför denna undersökning. Detta beror till stor del på att Fazer Bageri AB har en traditionell systemutvecklingsfilosofi snarare än en användarcentrerad designfilosofi.</p>
22

Speech Translation into Pakistan Sign Language / Speech Translation into Pakistan Sign Language

Haseeb, Ahmed Abdul, Ilyas, Asim January 2012 (has links)
ABSTRACT Context: Communication is a primary human need and language is the medium for this. Most people have the ability to listen and speak and they use different languages like Swedish, Urdu and English etc. to communicate. Hearing impaired people use signs to communicate. Pakistan Sign Language (PSL) is the preferred language of the deaf in Pakistan. Currently, human PSL interpreters are required to facilitate communication between the deaf and hearing; they are not always available, which means that communication among the deaf and other people may be impaired or nonexistent. In this situation, a system with voice recognition as an input and PSL as an output will be highly helpful. Objectives: As part of this thesis, we explore challenges faced by deaf people in everyday life while interacting with unimpaired. We investigate state of art work done in this area. This study explores speech recognition and Machine translation techniques to devise a generic and automated system that converts English speech to PSL. A prototype of the proposed solution is developed and validated. Methods: Three step investigation is done as part of thesis work. First, to understand problem itself, interviews were conducted with the domain experts. Secondly, from literature review, it is investigated whether any similar or related work has already been done, state of the art technologies like Machine translation, speech recognition engines and Natural language processing etc. have been analyzed. Thirdly, prototype is developed whose validation data is obtained from domain experts and is validated by ourselves as well as from domain experts. Results: It is found that there is a big communication gap between deaf and unimpaired in Pakistan. This is mainly due to the lack of an automated system that can convert Audio speech to PSL and vice versa. After investigating state of the art work including solutions in other countries specific to their languages, it is found that no system exists that is generic and automated. We found that there is already work started for PSL to English Speech conversion but not the other way around. As part of this thesis, we discovered that a generic and automated system can be devised using speech recognition and Machine translation techniques. Conclusion: Deaf people in Pakistan lack a lot of opportunities mainly due to communication gap between deaf and unimpaired. We establish that there should be a generic and automated system that can convert English speech to PSL and vice versa. As part of this, we worked for such a system that can convert English speech to PSL. Moreover, Speech recognition, Machine translation and Natural language processing techniques can be core ingredients for such a generic and automated system. Using user centric approach, the prototype of the system is validated iteratively from domain experts. / This research has investigated a computer based solution to facilitate communication among deaf people and unimpaired. Investigation was performed using literature review and visits to institutes to gain a deeper knowledge about sign language and specifically how is it used in Pakistan context. Secondly, challenges faced by deaf people to interact with unimpaired are analyzed by interviews with domain experts (instructors of deaf institutes) and by directly observing deaf in everyday life situations. We conclude that deaf people rely on sign language for communication with unimpaired people. Deaf people in Pakistan use PSL for communication, English is taught as secondary language all over Pakistan in all educational institutes, deaf people are taught by instructors that not only need to know the domain expertise of the area that they are teaching like Math, History and Science etc. but they also need to know PSL very well in order to teach the deaf. It becomes very difficult for deaf institutes to get instructors that know both. Whenever deaf people need to communicate with unimpaired people in any situation, they either need to hire a translator or request the unimpaired people to write everything for them. Translators are very difficult to get all the time and they are very expensive as well. Moreover, using writing by unimpaired becomes very slow process and not all unimpaired people want to do this. We observed this phenomena ourselves as instructors of the institutes provided us the opportunity to work with deaf people to understand their feelings and challenges in everyday life. In this way, we used to go with deaf people in shopping malls, banks, post offices etc. and with their permission, we observed their interaction. We have concluded that sometimes their interaction with normal people becomes very slow and embarrassing. Based on above findings, we concluded that there is definitely a need for an automated system that can facilitate communication between deaf and unimpaired people. These factors lead to the subsequent objective of this research. The main objective of this thesis is to identify a generic and an automated system without any human intervention that converts English speech into PSL as a solution to bridge the communication gap between deaf and unimpaired. It is identified that existing work done related to this problem area doesn’t fulfill our objective. Current solutions are either very specific to a domain, e.g. post office or need human intervention i.e. not automatic. It is identified that none of the existing systems can be extended towards our desired solution. We explored state of the art techniques like Machine translation, Speech recognition and NLP. We have utilized these in our proposed solution. Prototype of the proposed solution is developed whose functional and non functional validation is performed. Since none of existing work exactly matches to our problem statement, therefore, we have not compared the validation of our prototype to any existing system. We have validated prototype with respect to our problem domain. Moreover, this is validated iteratively from the domain experts, i.e. experts of PSL and the English to PSL human translators. We found this user centric approach very useful to help better understand the problem at the ground level, keeping our work user focused and then realization of user satisfaction level throughout the process. This work has opened a new world of opportunities where deaf can communicate with others who do not have PSL knowledge. Having this system, if it is further developed from a prototype to a functioning system; deaf institutes will have wider scope of choosing best instructors for a given domain that may not have PSL expertise. Deaf people will have more opportunities to interact with other members of the society at every level as communication is the basic pillar for this. The automatic speech to sign language is an attractive prospect; the impending applications are exhilarating and worthwhile. In the field of Human Computer Interface (HCI) we hope that our thesis will be an important addition to the ongoing research. / Ahmed Abdul Haseeb & Asim ilyas, Contact no. 00923215126749 House No. 310, Street No. 4 Rawal town Islamabad, Pakistan Postal Code 44000
23

Från ax till limpa : Verksamhetsprocessen vid framtagande av applikationer till handdatorer på Fazer Bageri AB / From ear to loaf : The organizational development process for application development for handheld computers at Fazer Bageri AB

Lindquist, Jennie, Mikaela, Andersson January 2009 (has links)
Human Computer Interaction (HCI) is a broad discipline that studies different concerns regarding interactive systems’ development. One of the major interest points within the discipline is the reasoning behind building specific functionality into computers and the long-term effects that usage of systems will have on humans. Within Human Computer Interaction there are theories and frameworks how to involve a user in the process of developing new systems. In this paper focus is applied to the development process within developing applications for Enterprice Digital Assistants (EDA) and to what extent the end-users are involved in the process. Fazer Bageri AB has been choosen to represent a business corporation that uses handheld computers in their everyday tasks. The method used to gather information for this study has been by performing interviews and observations with key stakeholders at Fazer Bageri AB and MobiOne AB. Fazer Bageri AB is the purchaser, customer and user of the handheld computer applications that MobiOne AB developed. The result shows that the end-users were only involved in the end of the developing process. We found that one of the main reasons for this is that there are not any resources for supporting involvement of the end-users. Within user-centric design there are many aspects to consider, but one of the most prominently is to establish a mutual understanding by all persons involved in the project, from developers to end-users about the importance of involving users throughout the development. We also found that there is no routine established for securing that the information about different updates in the handheld computers reaches the end-users. The development process demonstrates that Fazer Bageri AB uses a traditional system development philosophy rather than a user-centric system development philosophy. / Inom ämnet människa datorinteraktion handlar många metoder om hur man involverar användaren i framtagandet av nya system. I denna undersökning ville författarna ta reda på hur verksamhetsprocessen vid framtagande av systemapplikationer för handdatorer kan gå till och om användarna involveras i processen. Verksamhetsprocessen jämfördes sedan mot teorier inom området. Valet föll på att undersöka verksamhetsprocessen hos Fazer Bageri AB då vetskap fanns om att de har 350 chaufförer som använder handdatorer i sitt dagliga arbete. När man utvecklar för så många användare är det viktigt att ta med användaren tidigt i processen. Metoderna som använts i undersökningen har varit strukturerade intervjuer och observationer. Respondenterna har varit nyckelpersoner inom Fazer Bageri AB och MobiOne AB. Fazer Bageri AB är beställare, kund och användare av de mobila applikationerna för handdatorer som MobiOne AB tillhandahåller och är experter på. Resultatet visar att användarna i denna undersökning var involverade endast i slutet av processen, en orsak till detta tycks vara att det saknas resurser för att ersätta ytterligare involvering av användare. Med att ersätta menas i detta fall ekonomisk kompensation till chaufförerna för den extra arbetstid det skulle innebära att involveras i processen. En viktig aspekt inom användarcentrerad design är att säkerställa att samtliga involverade har samma uppfattning om det som skall göras eller vad som åstadkommits. Viktigt är därför att informationsflödet inom företagen fungerar för att samtliga skall ha möjlighet att ta del av arbetet. Informationsflödet mellan handdatoransvarig och slutanvändare hos Fazer Bageri AB kan verka tveksamt då det innefattar flera olika informationsled. Verksamhetsprocessens olika faser som kartlagts skiljer sig delvis ifrån de teorier inom människa datorinteraktion som tagits del av inför denna undersökning. Detta beror till stor del på att Fazer Bageri AB har en traditionell systemutvecklingsfilosofi snarare än en användarcentrerad designfilosofi.
24

Plateforme ouverte, évolutive, sécurisée et orientée utilisateur pour l'e-commerce / Open, scalable, secure and user-centric platform for e-commerce

Delettre, Christian 12 December 2014 (has links)
De nos jours, l’e-commerce est devenu un écosystème complexe où de multiples solutions (en termes de plateforme) sont possibles et réalisables pour un e-commerçant. En parallèle, un nouveau paradigme a fait son apparition, celui du Cloud Computing. Malgré les avantages certains qu’il apporte, peu des plateformes existantes sont pensées pour fonctionner sur une architecture Cloud. De plus, face à la complexité d’obtenir une plateforme d’e-commerce (PE) sécurisée, flexible et évolutive s’appuyant sur des applications et services hétérogènes existants et répondant aux besoins des e-commerçants, il est légitime de se demander si une PE basée sur le Cloud permettrait de réellement simplifier les difficultés rencontrées par les e-commerçants. Cette thèse propose de valider la pertinence de l’utilisation du Cloud dans un contexte d’e-commerce avant de proposer les principes architecturaux d’une PE ouverte, évolutive et sécurisée basée sur une architecture de Cloud. De plus, la mise en œuvre d’une PE par un e-commerçant, n’est pas orientée utilisateur. Face à ceci, nous proposons un mécanisme orienté utilisateur simplifiant la mise en œuvre d’une PE tout en assurant un haut degré de sécurité au sein de celle-ci. Enfin, nous nous sommes également intéressés à répondre à la question suivante dans un contexte d’e-commerce : Comment assurer qu’aucune inférence d’activités sur une taille constatée d’une BD ne puisse être réalisée par des entités non autorisées ? Pour y répondre, nous proposons une solution de sécurité de dissimulation de données orientée utilisateur permettant de résoudre la propriété de confidentialité forte des données au sein des SGBDR. / Nowadays, e-commerce has become a complex ecosystem where multiple solutions (in terms of platforms) are possible and feasible for e-merchant. Concurrently, a new paradigm called Cloud Computing has emerged. Despite some advantages it brings, few of these platforms have been designed to operate on a Cloud architecture. Thus, because of the complexity to design a flexible and scalable e-commerce platform (EP), based on existing heterogeneous applications/services and fulfilling the needs of e-merchants, it is legitimate to ask ourself if a PE based on the Cloud would really simplify the difficulties faced by e-merchants. This thesis aims to validate the relevance of using the Cloud Computing in the e-commerce context and propose the architectural principles of an open, scalable and secure EP based on a Cloud architecture. In addition, the EP used by e-merchants are not user-centric EP. As a consequence, we propose a user-centric mechanism simplifying the design and implementation of an EP while ensuring a high security level. Finally, we tried to answer the following question: How to ensure that no activity inference on a database size, in an e-commerce context, can be achieved by unauthorized entities? As a response, we propose a user-centric security solution of data concealment to resolve the property of strong data confidentiality within relational database management system (RDBMS).
25

A head-in-hand metaphor for user-centric direct camera control in virtual reality

Günther, Tobias, Querner, Erich, Groh, Rainer 17 May 2021 (has links)
The explorative examination of constructed 3D models in immersive environments requires suitable user-centric interaction methods. Especially novel concepts for virtual camera control can offer advantages, e.g. for the analysis of model details. We extend the known concept of the camera-in-hand metaphor and implement a multidimensional viewport control technique that can be used with common head-mounted displays and VR-controllers. With our head-in-hand view the user is able to control the virtual camera directly by hand without losing the flexibility of head movements. To ensure convenient operation, the method restricts special rotation parameters and smoothes jerky gestures of the user hand. Inaddition, we discuss implications and improvement potential of the proposed concept as well as adverse effects on the user, such as motion sickness.
26

Sécurité pour les réseaux du futur : gestion sécurisée des identités / Security for future networks : secure identity management

Aissaoui Mehrez, Hassane 10 July 2015 (has links)
Aujourd'hui, l'Internet change radicalement nos habitudes, avec l'arrivée massive du nomadisme, l'internet des objets, l'utilisation croissante de l'informatique en grille, les services Web, les réseaux sociaux et l'émergence de nouvelles approches dans ces dernières années. La virtualisation des infrastructures informatiques et le Cloud Computing ont particulièrement, permis de définir des nouveaux paradigmes, appelés X as a Service (XaaS), introduisant ainsi une rupture assez franche avec les modèles traditionnels, qui sont perçus comme une étape préparatoire vers l'Internet du Futur. En effet, la mise en œuvre de ces paradigmes, permet de mutualiser et de réorganiser le système informatique de manière différente, de dématérialiser les infrastructures physiques, de déporter les systèmes ou les applications sur des conteneurs virtuels distants. Par conséquent, l'architecture globale de l'Internet doit évoluer, en s'appuyant fortement sur ces nouvelles approches, en particulier, le Cloud Computing et la virtualisation. Malheureusement, comme toute technologie nouvelle, elle crée de nouveaux risques, qui viennent se greffer aux problèmes traditionnels : la séparation des privilèges, la gestion des accès, la gestion de l'identité, les failles des logiciels de virtualisation, l'isolation des machines virtuelles (VM), la protection des données personnelles, la vie privée, la réversibilité pendant l'externalisation (Outsourcing), etc. Les services basés sur les Clouds requièrent des fonctions de collaboration inter-fonctionnelles sécurisées ainsi que des systèmes de protection contre l'utilisation abusive des ressources. Ces systèmes doivent être équilibrés de façon raisonnable avec les besoins de confidentialité, d’intégrité, de protection de la vie privée des utilisateurs. Ils doivent permettre l’authentification des utilisateurs sans révéler des informations sur leur identité. Ainsi, une offre de services personnalisés aux clients dans un environnement virtuel et/ou transorganisationnel, en utilisant des mécanismes de sécurité adaptés à des infrastructures traditionnelles, peut prendre une dimension très complexe dans le modèle Cloud Computing, et peut constituer des défis à soulever pour les fournisseurs de ces services. Parmi ces défis à résoudre, la gestion d’identités des ressources, qui constitue un élément crucial pour authentifier les services à consommer, minimiser le risque d’accès frauduleux à des données personnelles, qui peut conduire à des conséquences désastreuses pour une entreprise ou un client. Les solutions existantes sont insuffisantes pour répondre aux défis soulevés par ces nouvelles approches. La mise en œuvre de ces modèles et ces outils posent des défis sécuritaires à la fois d’ordre organisationnel, architectural et protocolaire, pour garantir à chaque client des niveaux de sécurité. Ces niveaux doivent être identifiés pour guider les choix architecturaux et techniques à prendre, pour répondre en particulier aux exigences (LoA : Level of Assurance) et (LoT : Level of Trust), qu’un fournisseur de Cloud doit mettre en place pour garantir et protéger ses ressources. En effet, ces verrous et ces défis sécuritaires vont être relevés dans ce travail de recherche qui se situe dans le cadre du projet sécurité pour les réseaux du futur (SecFuNet : Security for Future Networks). C’est un projet collaboratif entre l’Europe et le Brésil, qui implique neuf partenaires européens répartis sur (la France, la Pologne, l'Allemagne et le Portugal) et 7 partenaires académiques brésiliens. Ce projet a pour ambition de proposer une nouvelle infrastructure de sécurité générale pour la communication des informations des utilisateurs sur Internet. L’objectif principal est de concevoir et développer une nouvelle architecture de sécurité cohérente pour les réseaux virtuels. / Today, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture.
27

Advanced personalization of IPTV services / Individualisation avancée des services IPTV

Song, Songbo 06 January 2012 (has links)
Le monde de la TV est en cours de transformation de la télévision analogique à la télévision numérique, qui est capable de diffuser du contenu de haute qualité, offrir aux consommateurs davantage de choix, et rendre l'expérience de visualisation plus interactive. IPTV (Internet Protocol TV) présente une révolution dans la télévision numérique dans lequel les services de télévision numérique sont fournis aux utilisateurs en utilisant le protocole Internet (IP) au dessus d’une connexion haut débit. Les progrès de la technologie IPTV permettra donc un nouveau modèle de fourniture de services. Les fonctions offertes aux utilisateurs leur permettent de plus en plus d’autonomie et de plus en plus de choix. Il en est notamment ainsi de services de type ‘nTS’ (pour ‘network Time Shifting’ en anglais) qui permettent à un utilisateur de visionner un programme de télévision en décalage par rapport à sa programmation de diffusion, ou encore des services de type ‘nPVR’ (pour ‘network Personal Video Recorder’ en anglais) qui permettent d’enregistrer au niveau du réseau un contenu numérique pour un utilisateur. D'autre part, l'architecture IMS proposée dans NGN fournit une architecture commune pour les services IPTV. Malgré les progrès rapides de la technologie de télévision interactive (comprenant notamment les technologies IPTV et NGN), la personnalisation de services IPTV en est encore à ses débuts. De nos jours, la personnalisation des services IPTV se limite principalement à la recommandation de contenus et à la publicité ciblée. Ces services ne sont donc pas complètement centrés sur l’utilisateur, alors que choisir manuellement les canaux de diffusion et les publicités désirées peut représenter une gêne pour l’utilisateur. L’adaptation des contenus numériques en fonction de la capacité des réseaux et des dispositifs utilisés n’est pas encore prise en compte dans les implémentations actuelles. Avec le développement des technologies numériques, les utilisateurs sont amenés à regarder la télévision non seulement sur des postes de télévision, mais également sur des smart phones, des tablettes digitales, ou encore des PCs. En conséquence, personnaliser les contenus IPTV en fonction de l’appareil utilisé pour regarder la télévision, en fonction des capacités du réseau et du contexte de l’utilisateur représente un défi important. Cette thèse présente des solutions visant à améliorer la personnalisation de services IPTV à partir de trois aspects: 1) Nouvelle identification et authentification pour services IPTV. 2) Nouvelle architecture IPTV intégrée et comportant un système de sensibilité au contexte pour le service de personnalisation. 3) Nouveau service de recommandation de contenu en fonction des préférences de l’utilisateur et aussi des informations contextes / Internet Protocol TV (IPTV) delivers television content to users over IP-based network. Different from the traditional TV services, IPTV platforms provide users with large amount of multimedia contents with interactive and personalized services, including the targeted advertisement, on-demand content, personal video recorder, and so on. IPTV is promising since it allows to satisfy users experience and presents advanced entertainment services. On the other hand, the Next Generation Network (NGN) approach in allowing services convergence (through for instance coupling IPTV with the IP Multimedia Subsystem (IMS) architecture or NGN Non-IMS architecture) enhances users’ experience and allows for more services personalization. Although the rapid advancement in interactive TV technology (including IPTV and NGN technologies), services personalization is still in its infancy, lacking the real distinguish of each user in a unique manner, the consideration of the context of the user (who is this user, what is his preferences, his regional area, location, ..) and his environment (characteristics of the users’ devices ‘screen types, size, supported resolution, ‘‘ and networks available network types to be used by the user, available bandwidth, ..’) as well as the context of the service itself (content type and description, available format ‘HD/SD’, available language, ..) in order to provide the adequate personalized content for each user. This advanced IPTV services allows services providers to promote new services and open new business opportunities and allows network operators to make better utilization of network resources through adapting the delivered content according to the available bandwidth and to better meet the QoE (Quality of Experience) of clients. This thesis focuses on enhanced personalization for IPTV services following a user-centric context-aware approach through providing solutions for: i) Users’ identification during IPTV service access through a unique and fine-grained manner (different from the identification of the subscription which is the usual current case) based on employing a personal identifier for each user which is a part of the user context information. ii) Context-Aware IPTV service through proposing a context-aware system on top of the IPTV architecture for gathering in a dynamic and real-time manner the different context information related to the user, devices, network and service. The context information is gathered throughout the whole IPTV delivery chain considering the user domain, network provider domain, and service/content provider domain. The proposed context-aware system allows monitoring user’s environment (devices and networks status), interpreting user’s requirements and making the user’s interaction with the TV system dynamic and transparent. iii) Personalized recommendation and selection of IPTV content based on the different context information gathered and the personalization decision taken by the context-aware system (different from the current recommendation approach mainly based on matching content to users’ preferences) which in turn highly improves the users’ Quality of Experience (QoE) and enriching the offers of IPTV services
28

Manipulerade streams och dess roll i musikbranschen : - En kvalitativ studie om hur manipulerade streams färgar dagens musikbransch (ur ett marknadsföringsperspektiv). / Stream manipulations and its role in the music industry : - A qualitative study of how manipulated streams color today's music industry (from a marketing perspective).

Berggren, Alva, Danielsson, Samuel, Ogvall, Bernadina January 2021 (has links)
The digitalization and emergence of the Internet have given rise to new platforms providing marketing, distribution and revenues to happen in the same place, a significant difference from the past. New platforms have become new places for artists to compete for, for instance, positions on toplists. This is the fundamental background to the occurrence of manipulated streams in the music industry. The purpose of this study has been to examine and create a deeper understanding of manipulated streams and its role in the music industry, from a marketing perspective. Thus, the study aims to provide knowledge on the meaning of having high streaming numbers, why streams are being manipulated and how they are used in marketing.  The empirical data is based on six interviews with people from different parts of the music business. The results indicate that manipulated streams affect expectations of the artist and provide an opportunity for the artist to stand out in today's information overload. The artists have gained more power and influence as they are now being compared with influencers, and can influence the way the audience listens to music. Moreover, the findings also indicate that actors and platforms of the music industry need adjustments to encounter the phenomenon of manipulated streams.  Lastly, we suggest that future research should focus on how to prevent the occurrence of manipulated streams, in addition to social media's effect on cognitive behaviours of the users in relation to high streaming numbers.
29

New networking paradigms for future wireless networks

Shams Shafigh, A. (Alireza) 29 March 2018 (has links)
Abstract With the current technological advancements, stage is being set for new ultra-responsive and robust 5G-enabled applications (e.g., virtual reality, Tactile Internet,…) to deliver critical real-time traffic. The emergence of such critical applications requires new networking models that can handle more connected devices with super high reliability and low latency communications. In the view of these research challenges, this thesis aims to propose new techno-economic models and networking paradigms needed in the redesign of wireless network architectures and protocols to support the connectivity requirements by which operators and users effectively benefit from new opportunities introduced by 5G-enabled applications. In this thesis, new paradigms in wireless network access are presented and analyzed. First, dynamic network architecture (DNA) is introduced, where certain classes of wireless terminals can be turned temporarily into an access point (AP) anytime while connected to the Internet. In this concept, a framework is proposed to optimize different aspects of this architecture. Furthermore, to dynamically reconfigure an optimum topology and adjust it to the traffic variations, a new specific encoding of genetic algorithm (GA) is presented. Then, a distributed user-centric spectrum sharing is developed based on DNA networks to enable user-provided access points pervasively share the unused resources. Next, a flexible cloud-based radio access network (FRAN) is proposed to offload traffic to DNA networks in order to provide low latency communications. In the sequel of the thesis, as a new paradigm, a context-aware resource allocation scheme based on adaptive spatial beamforming and reinforcement learning is proposed. In addition, semi-cognitive radio network (SCRN) as a new spectrum sharing model is developed to improve the utility of primary and secondary owners. / Tiivistelmä Nykyaikaisilla teknologisilla edistysaskeleilla mahdollistetaan uusien 5G-pohjaisien erittäin lyhyen vasteajan ja suuren luotettavuuden sovelluksien ilmestyminen kriittisen reaaliaikaisen informaation välittämiseen (esim. taktiiliset ja virtuaalitodellisuus-sovellukset). Näiden kaltaiset sovellukset vaativat uudenlaisia verkottumismalleja, jotka kykenevät käsittelemään enemmän laitteita suurella toimintavarmuudella ja matalalla latenssilla. Tämä väitöskirja ehdottaa näiden haasteiden valossa uusia teknis-taloudellisia malleja ja verkottumisparadigmoja, joita tarvitaan verkkoarkkitehtuurien ja -protokollien uudelleensuunnittelussa tulevaisuuden sovelluksien tarpeet huomioiden, joiden kautta operaattorit ja käyttäjät voivat hyödyntää tulevien 5G-sovelluksien tuomat mahdollisuudet. Tässä väitöskirjassa esitetään ja analysoidaan uusia paradigmoja langattomaan verkkoliityntään. Ensimmäisenä esitellään dynaaminen verkkoarkkitehtuuri (dynamic network architecture, DNA), missä tietyt langattomat terminaalit voidaan väliaikaisesti muuttaa liityntäpisteiksi milloin vain internetyhteyden ollessa käytettävissä. Tämän konseptin puitteissa ehdotetaan viitekehys sen eri osa-alueiden optimoimiseksi. Tämän lisäksi esitetään uusi spesifinen geneettisen algoritmin (GA) koodaus optimaalisen topologian dynaamiseen konfigurointiin ja sen säätämiseen tietoliikenteen määrän mukaan. Tämän jälkeen esitellään kehitetty hajautettu käyttäjäkeskeinen spektrinjako, joka perustuu DNA-verkkoihin ja joka mahdollistaa käyttämättömien resurssien kokonaisvaltaisen jakamisen käyttäjien kautta. Seuraavaksi työssä ehdotetaan joustavaa pilvipalvelu-pohjaista liityntäverkkoa (flexible cloud-based radio access network, FRAN) käyttäjädatan purkamiseksi DNA-verkoille matalalatenssisen tietoliikenteen tarjoamiseksi. Edellä mainittujen menetelmien seurauksena ehdotetaan uutta paradigmaa: Kontekstiriippuvaista resurssien allokointia perustuen adaptiiviseen spatiaaliseen keilanmuodostukseen ja vahvistusoppimiseen. Näiden lisäksi kehitetään uusi spektrinjakomalli puolikognitiivisille radioverkoille (semi-cognitive radio network, SCRN) ensisijaisien ja toissijaisien käyttäjien utiliteetin parantamiseksi.
30

以使用者中心概念,發掘企業創新來源? - 以趨勢科技為例 / Discover the source of corporate innovation by adopting user centric design methodology? - A study of Trend Micro Technology

趙伯鈞, Chao, Po Chun Unknown Date (has links)
什麼是創新的來源,許多人會認為創新來自於更好的產品功能或是更高階的設計概念。然而,也有人會認為創新來自於使用者。 如果創新來自於使用者,那麼我們是否可以要求他們描述自己的需要,便可以知道如何創造新的產品或服務呢? 從上述例子我們可以推論,使用者不一定明白知道自己真正的需要,若沒有完善的輔佐機制,使用者無法成為產品/服務創新的來源。 本研究發現,深入瞭解使用者的情境脈絡,可以發現新的創新來源。為了分析使用者的情境脈絡如何影響到組織對於資訊安全的需求,本研究調查六個來自不同產業的個案,並檢驗不同使用者的情境脈絡,如何影響到該組織對與資安的看法與行為。 事實上,個案的田野調查真實地呈現了如何將使用者的”洞見”轉化成產品/服務創新的最佳來源。來自五個不同產業的個案不但展現了大相逕庭的資安痛點,同時也廣泛地觸及了五個在未來具有高度發展潛力的領域,資安相關人員所關心的資安議題。 本研究強調,當我們試著瞭解使用者在不同產業處理資安議題時,深入地探索與思考使用者所處的情境脈絡時,我們一定會發掘到許多產品/服務創新的機會,以及相對應的組織管理議題。 / What are the sources of innovation? Many people would consider better technical functions or superior industrial designs as innovations. Currently, more people would argue that innovative ideas come from users. Therefore, if we ask users to describe their needs, we will know how to innovate our products or services. But, users’ inputs might not always be right because they might not know what they really want. Our research suggests that ideas of innovation may better be inspired by user’s local practices. To analyze how local practices may influence an organisation’s security requirements, this paper presents five case studies and examines the contextual details affecting the expectations of different organizations. Indeed, this field study illustrates how customers’ insights could become a rich source of product/service innovation. It not only underscores the security pain points in each firm, but also exposes broader security issues in five different market segments. The findings indicate that when we come to appreciate how users make sense of computer security in their actual business situations, we are able to identify viable ideas for innovation in products, services and organization management.

Page generated in 0.117 seconds