398 research outputs found

    Formal functional testing of graphical user interfaces.

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre- DSC:DX177960 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Design and implementation of web-based keystroke analytics for user verification

    Get PDF
    Keystroke analytics is the study of the way in which a user types rather than simply what they are typing. Through the application of statistical or machine learning methods the gathered biometric data may be used to verify the identity of a user, based on their typing style. This project aims to explore the field of keystroke analytics to gain an understanding of the methods involved and as such detail the implementation process for such a system’s design and implementation in a web-based context. Details regarding the technical design and implementation are specifically highlighted as current literature often does not describe how the systems shown were developed by rather the theory and methods used by them. The use of JavaScript to gather typing characteristic data is explored and the process of extracting useful features illustrated. Additionally both PHP and MySQL and used to create the backbone infrastructure to process and store the typing data. A phased development approach has been employed, with the overall system being separated into a collection of subsystems which are designed, implemented and tested before combining them to form the overall system. The supplementary software system requirements are presented, including the process of setting up a system capable of both being used to perform research on a local system as well as expand to online users for the data collection process. Method of testing the performance of a keystroke analytics system are discussed with potential changes to improve performance and minimise problems encountered outlined. The project was successful in that a working proof-of-concept web-based keystroke verification system was designed and implemented which yielded promising results for the data tested (FAR: 0%, FRR: 3.33%). Although to fully evaluate the system’s performance further testing needs to take place for a larger sample size of participants. The results obtained show that a keystroke analytics system may be implemented in a web-based environment, with relatively simple statistical methods, and provide reasonable performance results with only minor additional interaction required by the end-user. This has shown that keystroke analytics is a valid and well-performing method of providing non-intrusive multifactor authentication to traditional login systems

    Internet of Things-Based Smart Classroom Environment

    Get PDF
    Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom. Indoor localization is not the only concept which was not thoroughly researched in RMS. Another valuable proposition is to treat physical chairs as “smart” devices, which can report their occupancy, user information, and duration of presence to a cloud data store. Interconnected smart chairs consisting of pressure sensors, RFID readers, wireless communication capabilities, indoor localization and useful mobile application can serve as a powerful tool for instructors and other stakeholders. In this thesis we propose a complete smart classroom system consisting of smart chairs, anchor nodes, cloud storage and Android application. Implementation of indoor localization is a challenging and intricate task. Furthermore, since GPS chips cannot be used indoors, different and more challenging techniques have to be used. We developed a special protocol to handle communication and data flow of localization between smart chairs and the master node. Finally, the system was evaluated and special algorithm was developed to improve the accuracy of indoor localization in the context of smart classroom

    Computer-aided design techniques in data processing for finite element analysis

    Get PDF
    Imperial Users onl

    Personal Virtual Assistant

    Get PDF
    The Personal Virtual Assistant (PVA) is an innovative, inexpensive, and reliable virtual secretary. This user-friendly system will perform many of the tasks commonly performed by a traditional secretary. The PVA will eradicate such problems and it will be easy to train by updating the software. The foundation for this project has come from research previously conducted in computer vision. Advanced features of the PVA will include the ability to identify humans. Some of the problems associated with working with humans can range from forgetting to write an appointment to missing work on a regular basis. The PVA project will expand upon computer vision research and incorporate new features which will lead to an interactive virtual assistant. The system will offer communication and other solutions to users. This system can be implemented in various fields. For example, in education, it can be used to organize and ease student appointments with deans or chairs. In business, offices can use it in instead of a regular secretary. This assistant will never forget about the meeting and will never be tired. Those are only the basic features of the PVA. At the long term a global network of PVA’s can be created allowing them to communicate between each other without need for appearance in person

    Interactive Electronic Book Operating Systems and Methods

    Get PDF
    Interactive electronic book operating systems and methods for displaying and allowing customization of content of scientific, engineering and other technical and professional digital books. The display screen can include icons for forward and backward page turning, generating of dynamic indexing and tables of contents, bookmarking, color themes, floating pages, highlighting, adding sticky notes, hiding selected content on the pages, quizzing the reader, lecturing the reader, tutoring the reader, showing the reader additional designs and practical relevance, and allowing the instructor to generate uniform seed numbers for problems and designs and/or allowing the instructor to generate random seed values for problems and designs

    Програмне забезпечення: практикум з англійської мови для студентів фізико-математичного факультету спеціальностей: «Інформатика», «Математика та інформатика», «Фізика та інформатика»

    Get PDF
    Практикум складається з 8 розділів, текстів для самостійного опрацювання, додаткового читання та додатків. Тексти підібрані з оригінальної науково-технічної літератури та містять необхідну термінологію зі спеціальності. До складу розділів входять вправи на закріплення лексико-граматичного матеріалу, тести, запитання. Вправи та тести побудовано на мовному матеріалі, який використовується в текстах розділів. Додається підсумковий тест для перевірки знань всього курсу. Для студентів неспеціальних факультетів денної, заочної та дистанційної форми навчання, які вивчають інформатику. Пізнавальний характер текстів зацікавить не лише зазначене коло студентів, але й усіх тих, хто поглиблено вивчає англійську мову

    Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices

    Get PDF
    While a few years ago, mobile phones were mainly used for making phone calls and texting short messages, the functionality of mobile devices has massively grown. We are surfing the web, sending emails and we are checking our bank accounts on the go. As a consequence, these internet-enabled devices store a lot of potentially sensitive data and require enhanced protection. We argue that authentication often represents the only countermeasure to protect mobile devices from unwanted access. Knowledge-based concepts (e.g., PIN) are the most used authentication schemes on mobile devices. They serve as the main protection barrier for many users and represent the fallback solution whenever alternative mechanisms fail (e.g., fingerprint recognition). This thesis focuses on the risks and potentials of gesture-based authentication concepts that particularly exploit the touch feature of mobile devices. The contribution of our work is threefold. Firstly, the problem space of mobile authentication is explored. Secondly, the design space is systematically evaluated utilizing interactive prototypes. Finally, we provide generalized insights into the impact of specific design factors and present recommendations for the design and the evaluation of graphical gesture-based authentication mechanisms. The problem space exploration is based on four research projects that reveal important real-world issues of gesture-based authentication on mobile devices. The first part focuses on authentication behavior in the wild and shows that the mobile context makes great demands on the usability of authentication concepts. The second part explores usability features of established concepts and indicates that gesture-based approaches have several benefits in the mobile context. The third part focuses on observability and presents a prediction model for the vulnerability of a given grid-based gesture. Finally, the fourth part investigates the predictability of user-selected gesture-based secrets. The design space exploration is based on a design-oriented research approach and presents several practical solutions to existing real-world problems. The novel authentication mechanisms are implemented into working prototypes and evaluated in the lab and the field. In the first part, we discuss smudge attacks and present alternative authentication concepts that are significantly more secure against such attacks. The second part focuses on observation attacks. We illustrate how relative touch gestures can support eyes-free authentication and how they can be utilized to make traditional PIN-entry secure against observation attacks. The third part addresses the problem of predictable gesture choice and presents two concepts which nudge users to select a more diverse set of gestures. Finally, the results of the basic research and the design-oriented applied research are combined to discuss the interconnection of design space and problem space. We contribute by outlining crucial requirements for mobile authentication mechanisms and present empirically proven objectives for future designs. In addition, we illustrate a systematic goal-oriented development process and provide recommendations for the evaluation of authentication on mobile devices.Während Mobiltelefone vor einigen Jahren noch fast ausschließlich zum Telefonieren und zum SMS schreiben genutzt wurden, sind die Anwendungsmöglichkeiten von Mobilgeräten in den letzten Jahren erheblich gewachsen. Wir surfen unterwegs im Netz, senden E-Mails und überprüfen Bankkonten. In der Folge speichern moderne internetfähigen Mobilgeräte eine Vielfalt potenziell sensibler Daten und erfordern einen erhöhten Schutz. In diesem Zusammenhang stellen Authentifizierungsmethoden häufig die einzige Möglichkeit dar, um Mobilgeräte vor ungewolltem Zugriff zu schützen. Wissensbasierte Konzepte (bspw. PIN) sind die meistgenutzten Authentifizierungssysteme auf Mobilgeräten. Sie stellen für viele Nutzer den einzigen Schutzmechanismus dar und dienen als Ersatzlösung, wenn alternative Systeme (bspw. Fingerabdruckerkennung) versagen. Diese Dissertation befasst sich mit den Risiken und Potenzialen gestenbasierter Konzepte, welche insbesondere die Touch-Funktion moderner Mobilgeräte ausschöpfen. Der wissenschaftliche Beitrag dieser Arbeit ist vielschichtig. Zum einen wird der Problemraum mobiler Authentifizierung erforscht. Zum anderen wird der Gestaltungsraum anhand interaktiver Prototypen systematisch evaluiert. Schließlich stellen wir generelle Einsichten bezüglich des Einflusses bestimmter Gestaltungsaspekte dar und geben Empfehlungen für die Gestaltung und Bewertung grafischer gestenbasierter Authentifizierungsmechanismen. Die Untersuchung des Problemraums basiert auf vier Forschungsprojekten, welche praktische Probleme gestenbasierter Authentifizierung offenbaren. Der erste Teil befasst sich mit dem Authentifizierungsverhalten im Alltag und zeigt, dass der mobile Kontext hohe Ansprüche an die Benutzerfreundlichkeit eines Authentifizierungssystems stellt. Der zweite Teil beschäftigt sich mit der Benutzerfreundlichkeit etablierter Methoden und deutet darauf hin, dass gestenbasierte Konzepte vor allem im mobilen Bereich besondere Vorzüge bieten. Im dritten Teil untersuchen wir die Beobachtbarkeit gestenbasierter Eingabe und präsentieren ein Vorhersagemodell, welches die Angreifbarkeit einer gegebenen rasterbasierten Geste abschätzt. Schließlich beschäftigen wir uns mit der Erratbarkeit nutzerselektierter Gesten. Die Untersuchung des Gestaltungsraums basiert auf einem gestaltungsorientierten Forschungsansatz, welcher zu mehreren praxisgerechte Lösungen führt. Die neuartigen Authentifizierungskonzepte werden als interaktive Prototypen umgesetzt und in Labor- und Feldversuchen evaluiert. Im ersten Teil diskutieren wir Fettfingerattacken ("smudge attacks") und präsentieren alternative Authentifizierungskonzepte, welche effektiv vor diesen Angriffen schützen. Der zweite Teil beschäftigt sich mit Angriffen durch Beobachtung und verdeutlicht wie relative Gesten dazu genutzt werden können, um blickfreie Authentifizierung zu gewährleisten oder um PIN-Eingaben vor Beobachtung zu schützen. Der dritte Teil beschäftigt sich mit dem Problem der vorhersehbaren Gestenwahl und präsentiert zwei Konzepte, welche Nutzer dazu bringen verschiedenartige Gesten zu wählen. Die Ergebnisse der Grundlagenforschung und der gestaltungsorientierten angewandten Forschung werden schließlich verknüpft, um die Verzahnung von Gestaltungsraum und Problemraum zu diskutieren. Wir präsentieren wichtige Anforderungen für mobile Authentifizierungsmechanismen und erläutern empirisch nachgewiesene Zielvorgaben für zukünftige Konzepte. Zusätzlich zeigen wir einen zielgerichteten Entwicklungsprozess auf, welcher bei der Entwicklung neuartiger Konzepte helfen wird und geben Empfehlungen für die Evaluation mobiler Authentifizierungsmethoden

    Text books untuk mata kuliah pemrograman web

    Get PDF
    .HTML.And.Web.Design.Tips.And.Techniques.Jan.2002.ISBN.0072228253.pd
    corecore