art / design / tech­nol­ogy

philigran

  • Home
  • Timeline
  • Photography
  • Blog
  • Academia
  • About

Academia

As a part of my “aca­d­e­mic career” I had to do some research and var­i­ous projects for which, in the spirit of Open Access, I pub­lish var­i­ous mate­ri­als to on this page.

Jump to :

  • Personalized Web Search (Bachelor Seminar)
  • CSI Touch (Bachelor Thesis)
  • Soft Biometrics (Master Seminar)
  • System Monitoring on Windows 7⁄8  (Master Practical)
  • Keystroke Dynamics on Mobile Devices (Master Thesis)
  • Reselling Digital Content (Master Thesis)

Personalized Web Search

Seminar Paper; P. Kapfer, “Personalized Web Search”, Johannes Kepler University Linz, 2011.

Abstract

This sem­i­nar paper tries to cre­ate a com­pre­hen­sive overview about the topic of “Personalized Web Search”. The basics of per­son­al­iza­tion — and what this term means in con­text of search engines — are explained. The nec­es­sar­ity to adapt search results to the needs of users and how these adap­tions fit into the psy­cho­log­i­cal back­ground are dis­cussed. Besides the ele­ments in the search process, which ben­e­fit from per­son­al­iza­tion, mea­sure­ment of search engine qual­ity is also men­tioned. In addi­tion, this work deals with the process in which the user pro­file is cre­ated, the ways in which the data for it is col­lected and how this pro­file can influ­ence the process of find­ing results in var­i­ous ways. Also, two com­mer­cial search engines and two aca­d­e­mic sys­tems are inspected in regards of per­son­al­iza­tion before finally legal data pro­tec­tion aspects are dis­cussed and four lev­els of pri­vacy are defined.

Downloads

Seminar Paper (German), Presentation Slides (German)

A Multi-​Touch User Interface for Supporting Collaborative Situation Awareness

Bachelor Thesis; P. Kapfer, “A Multi-​Touch User Interface for Supporting Collaborative Situation Awareness”, Johannes Kepler University Linz, 2012.

Abstract

In this bach­e­lor the­sis, we describe an inno­v­a­tive user inter­face for col­lab­o­ra­tive sit­u­a­tion aware­ness that fos­ters col­lab­o­ra­tion between road author­i­ties and improves data visu­al­iza­tion. We describe the CSI project, in the con­text of which we imple­mented our appli­ca­tion, and what the goals of this imple­men­ta­tion are. We ana­lyze related work in the field of col­lab­o­ra­tive table­top appli­ca­tions and present some of the projects. Following that, we describe what each of the sources has found in the con­text of cer­tain col­lab­o­ra­tion aspects that we think are important.

In the sec­ond part of the the­sis, we intro­duce our col­lab­o­ra­tive table­top appli­ca­tion called “CSI Touch”. We describe the tech­nol­ogy we used to cre­ate and imple­ment the pro­gram and how its basic struc­ture looks like. We talk about inter­ac­tion with the CSI data­base and what data struc­tures we work with. We then pro­ceed to the user per­spec­tive, where we describe the appli­ca­tion win­dow itself and how users can inter­act with it. After that, we depict the col­lab­o­ra­tion meth­ods avail­able to work with other author­i­ties. Finally, we ana­lyze the results of our work and how it can be improved in future work.

Downloads

Bachelor Thesis, Presentation Slides for CSI Students’ Day (German)

Soft Biometrics

Seminar Report; P. Kapfer, “Soft Biometrics”, Johannes Kepler University Linz, 2014.

Abstract

This sem­i­nar report tries to give an overview on “soft bio­met­rics”. After a short gen­eral intro­duc­tion to bio­met­rics and their build­ing blocks, soft bio­met­rics are related to these tra­di­tional sys­tems. It is shown where the pit­falls of strong bio­met­ric sys­tems are and how well soft bio­met­rics enhance secu­rity in rela­tion to other counter-​measures. Finally, using four prac­ti­cal exam­ples, the three usage sce­nar­ios of soft bio­met­ric sys­tems – com­bi­na­tion, fil­ter and stand-​alone – are described. It is illus­trated why bio­met­ric sys­tems that can’t iden­tify per­sons are valu­able nonetheless.

Downloads

Seminar Report (German), Presentation Slides (English)

System Monitoring on Windows 7⁄8 

Master Practical; P. Kapfer, “Systemüberwachung unter Windows 7/8″, Johannes Kepler University Linz, 2015.

Abstract

This report doc­u­ments plan­ning and devel­op­ment of a pro­gram to mon­i­tor sys­tem activ­ity of run­ning processes under Windows 7 and 8 as a mas­ter prac­ti­cal. The mod­u­lar char­ac­ter enables the use of gath­ered data not only for log­ging pur­poses but also for any other pro­cess­ing pur­pose. First, we give an overview of the assign­ment and goals and how they are reached in the imple­men­ta­tion. Also, we present and describe the basic func­tion­al­ity of the API hook­ing library EasyHook, which was selected as the basis for cap­tur­ing API calls. Furthermore, we describe the imple­men­ta­tion of our sys­tem itself, its project struc­ture and which imple­men­ta­tion deci­sions we made in selected impor­tant classes. Furthermore, we talk about the imple­mented project’s eval­u­a­tion and its results. Finally, we list the changes that would be nec­es­sary for a pro­duc­tively used mon­i­tor­ing tool, which weren’t imple­mented as a part of this project.

Downloads

Master Practical (German), System Monitor (Sources and Binaries)

Keystroke Dynamics on Mobile Devices

Master Thesis; P. Kapfer, “PhonyKeyboard : Sensor-​enhanced Keystroke Dynamics Authentication on Mobile Devices”, Johannes Kepler University Linz, 2016.

Abstract

In this Master Thesis, we pro­pose a novel sensor-​enhanced key­stroke dynam­ics authen­ti­ca­tion sys­tem for mobile devices. First, we describe bio­met­ric sys­tems and how soft bio­met­rics can be used to authen­ti­cate users. A com­par­i­son of bio­met­ric fea­tures sets the frame for our approach. We con­tinue by estab­lish­ing how key­stroke dynam­ics can enhance pass­word authen­ti­ca­tion and what types of sen­sors in mobile devices com­ple­ment them best. Next, we sum­ma­rize related approaches and describe the lessons we learned. Part two doc­u­ments our authen­ti­ca­tion sys­tem called PhonyKeyboard. Initially, we describe the the­o­ret­i­cal con­cepts of our approach inde­pen­dent of imple­men­ta­tion deci­sions. Then we doc­u­ment the imple­men­ta­tion and how we added bio­met­rics to the Google Keyboard. We also intro­duce an exam­ple client for the pro­posed API. Furthermore, we inte­grate it into the CORMORANT frame­work. After that, we eval­u­ate the sys­tem with real­is­tic data and con­clude that enhanc­ing authen­ti­ca­tion with rel­a­tive sen­sor mea­sure­ments between two key presses reaches an EER of 17.19 %, while using the orig­i­nal approach with­out sen­sors increases it by 13.68 %. Nevertheless, future research has to find bet­ter ways to inte­grate sen­sor data for real-​life appli­ca­tions. Finally, we sum­ma­rize the the­sis and give an outlook.

Downloads

Master Thesis (English), Defense Presentation Slides (English)

Reselling Digital Content

Master Thesis; P. Kapfer, “Weiterveräußerung dig­i­taler Inhalte : Änderun­gen durch die DID-​RL und alte Probleme”, Johannes Kepler Universität Linz, 2021.

Abstract

Die vor­liegende Arbeit behan­delt ver­tragsrechtliche Fragen beim Verkauf dig­i­taler Inhalte, die sich ergeben, wenn der orig­i­nale Käufer sein Eigentum weit­er­veräußern möchte, und ergänzt die Änderun­gen, die sich durch Inkrafttreten der DID-​RL in dieser Diskussion ergeben haben. Das erste Kapitel eruiert die Motivation für den Gebrauchthandel im dig­i­talen Umfeld, im zweiten Kapitel wer­den anschließend die notwendig­sten Grundbegriffe für das weit­ere Verständnis erk­lärt. Vervielfältigung und Verbreitung sind die wichtig­sten Grundrechte eines Urhebers, und die Erschöpfung des Verbreitungsrechts die Basis für einen Gebrauchtmarkt. Weiters sind diese Konzepte von der Vermietung und Verleihung zu unter­schei­den, die andere Rechtsfolgen nach sich ziehen. Im drit­ten Kapitel wer­den sodann die zwei wichtig­sten Fälle auf EU-​Ebene über die Werkskategorien der Computerprogramme und der Literatur als Auslegungsgrundlage für die Zulässigkeit von Gebrauchtkäufen dig­i­taler Inhalte erörtert und diese Erkenntnisse auf weit­ere Werksarten und ver­tragsrechtliche Regelungen aus­geweitet. Das vierte Kapitel konzen­tri­ert sich auf die Erläuterung der wichtig­sten Inhalte der DID-​RL und die Rezeption in der Literatur. Darauf auf­bauend analysiert das fün­fte Kapitel das Ausmaß der Diskussion um die Zweitverwertung dig­i­taler Inhalte und die Argumente für und gegen sie sowie neue Argumente, die die DID-​RL in diese Problematik brin­gen kann. Gegen Ende ver­sucht das sech­ste Kapitel einen Ausblick auf rel­e­vante ähn­liche Themen, die in dieser Arbeit nicht behan­delt wer­den kon­nten, aber trotz­dem inter­es­sante Perspektiven liefern kön­nen. Abschließend fasst das siebte Kapitel die behan­del­ten Themen noch ein­mal zusam­men und zieht ein Fazit aus der bish­eri­gen Diskussion.

Downloads

Master Thesis (German)

See more in CSI Touch

  • Home
  • Photography
  • Blog
  • Facebook
© Philipp Kapfer 2014 – 2022 | Built with Koken