On the skin care market there exist approx. 100,000 differently standardized skin care products for various applications. The typical consumer is overwhelmed by product diversity and receives no or insufficient advice in retail. 4 of 5 consumers buy unsuitable products due to this fact and lack of knowledge. Long-term use of unsuitable products is damaging the skin of many customers.
Big cosmetic companies, such as Loreal, are still unable to offer personalized skin care products since they do not have direct contact with the customer. The goal of this thesis is the design, development and evaluation of a mobile application, which is based on a predefined, measurable number of skin parameters, to give a personalized product recommendation to the user.
The thesis is actively supported by Max Noah in cooperation with the Charité Berlin and supported with a setting of usability testers. After successful completion of the thesis, there is also the possibility of longer-term employment.
Knowledge of User-centered Design and experience with the programming of mobile applications (Android / iOS) are desirable but not required.
Since today almost every patient has a smartphone, the life patterns of patients can be determined by their GPS data. These life patterns enable physicians to gain deeper insight into a patient's life. For this purpose, first the GPS data are recorded in the form of trajectories, then stored and subsequently evaluated. The findings from thus gained life patterns should be available in a relevant and graphically appealing form to a physician.
The aim of this thesis is the design, implementation and evaluation of a software solution that allows physicians to determine a more accurate picture, in the form of a life patterns of their patients.Knowledge of Trajectory Data Mining and practical experience with Android applications are desirable but not necessary.
Many people already use so-called "wearables" to monitor their fitness. In doing so, some bio-data, such as blood pressure, can be recorded directly from the patient and tracked live.
The aim of this thesis is the design, development and evaluation of a software solution, which allows the patient to obtain his or her bio-data in a relevant and suitable form, like the S Health application from Samsung, and, at the same time, allows the attending physician to gain insight into the patient's health as well as trends in the development of the patient's medical condition.
Many people are writing e-mails on a daily basis. All have different reasons to write them. From birthday wishes to high sensible data like passwords. With that in mind not many people are using encryption while writing e-mails.
The goal of this Bachelor thesis is to discover, how many people need to use encryption, that 20%/40%/60%/80%/100% of the communication is secured. A further goal is a temporal analysis, to discover, if the encryption has more impact at different times of a day. The result also have to be visualized in this thesis.
The company "IAV Ingenieursgesellschaft Auto und Verkehrs GmbH" is modernizing its own fleet. Within the scope of this conversion, a digitized logbook with automatic travel detection of private and operational journeys is developed.
The goal of this thesis is the design, development and evaluation of a digital travel book, which collects and classifies semi-automated different types of journeys and makes suggestions to the user.
Basics in pattern recognition and practical experience with Android applications are desirable but not necessary.
In many situations, the blood of a patient is taken and analyzed by a laboratory. The result of these analyzes is still today a data set consisting of many numbers and cryptic names. The goal of this thesis is the design, implementation and evaluation of a suitable visualization of blood values for physician, but also for patients.
CT (Computer Tomography) is an imaging procedure used to create 3-dimensional images of certain body regions. These images assist doctors by providing essential information about their patients, which is relevant to their further treatment. This procedure, however, exposes patients to high doses of radiation. This drawback motivates us to look for alternative, less harmful methods that can nevertheless provide relevant 3D information about a body region.
The goal of this thesis is to develop such a method. Specifically, neural networks should be used to match 2-dimensional X-ray (Roentgen) images to their corresponding 3D structures. An X-ray scan is much less harmful to a patient than a CT scan.
Hint: Knowledge of neural networks and image processing are desirable, but not necessary.
Within the scope of this master thesis, it will be investigated how medical (especially protective) data can safely be transferred between two smartphones (Android). The goal of the master thesis is the development of cryptographic protocols for secure data transfer.
In the future, patients will store all their health data on their smartphone (see M1721). The smartphone supports the patient in his/her recovery process by providing his or her own data, as well as data of other patients with whom the patient has built a network to achieve health-oriented goals (in competition or cooperatively).
Within the scope of this master thesis, it will be investigated how medical (particularly protective) data can be exchanged securely between web services and smartphones (Android) or between web services. The goal of the master thesis is the development of cryptographic protocols for secure data transfer.
In the future, patients will store all their health data on their smartphone (see M1721). Patients can link their smartphones to the web service of a physician for the duration of the treatment, thus releasing their data. In the case that a patient is treated b more than one physician at the same time, the data of a physician should also be accessible to other physicians.
Within the scope of this master thesis, we will investigate how security mechanisms can be used to safely store sensitive (especially protective) data on a smartphone. The basic assumption is that the amount of data to be stored has a size that exceeds the size of the secure element of a smartphone. The goal is that data stored in a database on the smartphone will remain secure even after a hacker attack on the operating system (administration rights in Android). The data should be read and written by an authorized application on the smartphone (Android app) and by an authorized web service.