Ändra sökning
Avgränsa sökresultatet
900901902903904905906 45101 - 45150 av 50609
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 45101.
    Thomas, Lynda
    et al.
    Computer Science, Aberystwyth University , UK.
    Boustedt, Jonas
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, Datavetenskap.
    Eckerdal, Anna
    Department of Information Technology, Uppsala University, Sweden.
    McCartney, Robert
    Department of Computer Science and Engineering University of Connecticut, USA.
    Moström, Jan-Erik
    Department of Computing Science, Umeå University , Sweden.
    Sanders, Kate
    Mathematics and Computer Science Department ,Rhode Island College, USA.
    Zander, Carol
    Computing & Software Systems, University of Washington Bothell , USA.
    In the liminal space: software design as a threshold skill2017Ingår i: Practice and Evidence of the Scholarship of Teaching and Learning in Higher Education, ISSN 1750-8428, E-ISSN 1750-8428, Vol. 12, nr 2, s. 333-351Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In previous work we proposed the idea of ‘threshold skills’ as a complement to threshold concepts. The definition of threshold concepts assumes that theoretical knowledge is paramount: gaining the understanding of particular concepts irreversibly transforms the learners. We noted, however, that mastering computing, like many disciplines, requires learning a combination of concepts and skills, and we suggested that this required further investigation. In this paper we examine the activity of designing software as a possible example of such a threshold skill. We looked at 35 software designs collected from students nearing graduation in computing courses, and see many of the characteristics of threshold skill and also of students being in liminal space. A close examination of the students’ designs leads to some useful implications for teaching this fundamental activity.

  • 45102. Thomas, Lynda
    et al.
    Boustedt, Jonas
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, Datavetenskap.
    Eckerdal, Anna
    McCartney, Robert
    Moström, Jan-Erik
    Sanders, Kate
    Zander, Carol
    Threshold concepts in computer science: an ongoing empirical investigation2010Ingår i: Threshold concepts and transformational learning / [ed] Jan H. F. Meyer, Ray Land, Caroline Baillie, Rotterdam: Sense Publishers , 2010, s. 241-258Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    The chapter describes an ongoing multi-national, multi-institutional project aimed at empirically identifying threshold concepts in Computer Science, and describing students’ experiences of learning these concepts.

  • 45103. Thomas, Lynda
    et al.
    Eckerdal, Anna
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för beräkningsvetenskap. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Tillämpad beräkningsvetenskap.
    McCartney, Robert
    Moström, Jan Erik
    Sanders, Kate
    Zander, Carol
    Graduating students' designs — through a phenomenographic lens2014Ingår i: Proc. 10th International Computing Education Research Conference, New York: ACM Press, 2014, s. 91-98Konferensbidrag (Refereegranskat)
  • 45104. Thomas, Lynda
    et al.
    Zander, Carol
    Eckerdal, Anna
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för teknisk databehandling. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Tillämpad beräkningsvetenskap.
    Harnessing Surprise: Tales from students' transformational biographies2010Ingår i: Proc. 41st ACM Technical Symposium on Computer Science Education, New York: ACM Press , 2010, s. 300-304Konferensbidrag (Refereegranskat)
  • 45105. Thomas, Lynda
    et al.
    Zander, Carol
    Loftus, Chris
    Eckerdal, Anna
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för beräkningsvetenskap. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Tillämpad beräkningsvetenskap.
    Student software designs at the undergraduate midpoint2017Ingår i: Proc. 22nd Conference on Innovation and Technology in Computer Science Education, New York: ACM Press, 2017, s. 34-39Konferensbidrag (Refereegranskat)
  • 45106. Thomas, Lörunser
    et al.
    Bastos Rodriguez, Charles
    Demirel, Denise
    Fischer-Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Gross, Thomas
    Länger, Thomas
    Des Noes, Mathieu
    Pöhls, Henrich C.
    Rozenberg, Boris
    Slamanig, Daniel
    Towards a New Paradigm for Privacy and Security in Cloud Services2015Ingår i: Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers / [ed] Frances Cleary, Massimo Felici, Heidelberg: Springer Berlin/Heidelberg, 2015, s. 14-25Kapitel i bok, del av antologi (Refereegranskat)
  • 45107.
    Thomasson, Anton
    Linköpings universitet, Institutionen för datavetenskap.
    Measuring energy consumption characteristics in mobile data communication2011Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This report looks at the modern cellular wireless network environment and the factors of energy consumption therein. The consumption of connectivity re- lated hardware is gradually becoming a larger part of the power consumption of virtually any mobile device. This report studies measurements of a mobile broadband module energy usage due to data transfer. It is found that switch- ing between technologies is still beneficial and savings are very feasible when using technologies with different traits if done correctly. Further the possibility of energy savings within a single high-bandwidth technology (3G) are assessed considering variations on response time and throughput. This is relevant as the need to handle highly dynamic loads becomes more and more important in the modern connectivity landscape. By gauging the savings available from schedul- ing link accesses and switching technology this is put in context by sampling a few common services namely Skype, Spotify and normal web browsing for their energy footprints. We will also look briefly at the background traffic generated by two common operating systems, Windows 7 and Ubuntu GNU/Linux.

  • 45108.
    Thomasson, Viola
    Linköpings universitet, Institutionen för systemteknik, Datorseende.
    Liver Tumor Segmentation Using Level Sets and Region Growing2011Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Medical imaging is an important tool for diagnosis and treatment planning today. However as the demand for efficiency increases at the same time as the data volumes grow immensely, the need for computer assisted analysis, such as image segmentation, to help and guide the practitioner increases.

    Medical image segmentation could be used for various different tasks, the localization and delineation of pathologies such as cancer tumors is just one example. Numerous problems with noise and image artifacts in the generated images make the segmentation a difficult task, and the developer is forced to choose between speed and performance. In clinical practise, however, this is impossible as both speed and performance are crucial. One solution to this problem might be to involve the user more in the segmentation, using interactivite algorithms where the user might influence the segmentation for an improved result.

    This thesis has concentrated on finding a fast and interactive segmentation method for liver tumor segmentation. Various different methods were explored, and a few were chosen for implementation and further development. Two methods appeared to be the most promising, Bayesian Region Growing (BRG) and Level Set.

    An interactive Level Set algorithm emerged as the best alternative for the interactivity of the algorithm, and could be used in combination with both BRG and Level Set. A new data term based on a probability model instead of image edges was also explored for the Level Set-method, and proved to be more promising than the original one. The probability based Level Set and the BRG method both provided good quality results, but the fastest of the two was the BRG-method, which could segment a tumor present in 25 CT image slices in less than 10 seconds when implemented in Matlab and mex-C++ code on an ACPI x64-based PC with two 2.4 GHz Intel(R) Core(TM) 2CPU and 8 GB RAM memory. The interactive Level Set could be succesfully used as an interactive addition to the automatic method, but its usefulness was somewhat reduced by its slow processing time ( 1.5 s/slice) and the relative complexity of the needed user interactions.

  • 45109.
    Thombre, Sumeet
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Luleå tekniska universitet, Institutionen för system- och rymdteknik, CDT.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    IP based Wireless Sensor Networks: performance Analysis using Simulations and Experiments2016Ingår i: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 7, nr 3, s. 53-76Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Wireless sensor networks are at the crux of the Internet of Things applications. At the current state, there exist several technologies competing against each other in the IoT space. These proprietary technologies and hardware pose a serious problem of interoperability, which is vital to unleash the vision of the Internet of Things. Moreover, the traditional approach towards wireless sensor networks was to be unlike the internet, primarily because of the power and memory constraints posed by the tiny sensor nodes. The IETF 6LoWPAN technology facilitates the usage of IPv6 communications in sensor networks, which helps solve the problem of interoperability, enabling low power, low cost micro-controllers to be globally connected to the internet. Another IETF technology, CoAP allows interactive communication over the internet for these resource constrained devices. Along with 802.15.4, 6LoWPAN and CoAP, an open, standardized WSN stack for resource constrained devices and environments becomes available. The Contiki OS, touted as the open source OS for IoT, provides low power IPv6 communications and supports the 6LoWPAN and CoAP protocols, along with mesh routing using RPL. Along with these, a CoAP framework, Californium (Cf) provides a scalable and RESTful API to handle IoT devices. These open tools and technologies are employed in this work to form an open, inter-operable, scalable, reliable and low power WSN stack. This stack is then simulated using Contiki's default network simulator Cooja, to conduct performance analysis in varying conditions such as noise, topology, traffic etc. Finally, as a proof of concept and a validation of the simulated stack, physical deployment is carried out, using a Raspberry Pi as a border router, which connects the wireless sensor network to the global internet along with the T-mote sky sensor motes. Therefore, this work develops and demonstrates an open, interoperable, reliable, scalable, low power, low cost WSN stack, both in terms of simulations and physical deployments, and carries out performance evaluation of the stack in terms of throughput, latency and packet loss.

  • 45110.
    Thombre, Sumeet
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Luleå tekniska universitet, Institutionen för system- och rymdteknik, CDT.
    Hossain, Mohammad Shahadat
    University of Chittagong.
    Performance Analysis of an IP based Protocol Stack for WSNs2016Ingår i: Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Piscataway, NJ: IEEE Communications Society, 2016, s. 691-696, artikel-id 7562102Konferensbidrag (Refereegranskat)
    Abstract [en]

    Wireless sensor networks (WSNs) are the key enablers of the internet of things (IoT) paradigm. Traditionally, sensor network research has been to be unlike the internet, motivated by power and device constraints. The IETF 6LoWPAN draft standard changes this, defining how IPv6 packets can be efficiently transmitted over IEEE 802.15.4 radio links. Due to this 6LoWPAN technology, low power, low cost micro-controllers can be connected to the internet forming what is known as the wireless embedded internet. Another IETF recommendation, CoAP allows these devices to communicate interactively over the internet. The integration of such tiny, ubiquitous electronic devices to the internet enables interesting real-time applications. We evaluate the performance of a stack consisting of CoAP and 6LoWPAN over the IEEE 802.15.4 radio link using the Contiki OS and Cooja simulator, along with the CoAP framework Californium (Cf).

  • 45111.
    Thomenius, Ronja
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Agila metoder: Produktivitetsökning i IT-projekt genom införandet av agila metoder2011Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 45112.
    Thomessen, T.
    et al.
    PPM AS, Trondheim, Norway .
    Ratvik Lian, Björn Harald
    Niitsuma, M.
    Chuo University, Tokyo, Japan .
    Towards virtual presence based on multimodal man-machine communication: How to control and communicate grasping conditions2015Ingår i: 2015 IEEE/SICE International Symposium on System Integration, SII 2015, Institute of Electrical and Electronics Engineers (IEEE), 2015, s. 75-80, artikel-id 7404957Konferensbidrag (Refereegranskat)
    Abstract [en]

    The global industry is developing towards smaller and smaller batch sizes in production due to the high pressure on Just-in-time production. This has led to the need for providing cost efficient support to robot users, especially SMEs having limited internal resources and competence to setup, maintain and reconfigure their industrial robot systems. In this study, a new method for the remote operation of industrial robot systems is presented. The method is based upon multi-modal man-machine communication and sensor bridging to transfer huge amounts of information from the industrial robot cell to the brain of the remote operator. The general methodology is explained, however, a special focus is put on gripping and stick-slip detecting in order to provide optimal grasping conditions during robot operations; especially during remote operation.

  • 45113. Thompson, W. F.
    et al.
    Friberg, Anders
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    Frydén, Lars
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    Sundberg, Johan
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    Evaluating rules for the synthetic performance of melodies1986Ingår i: STL-QPSR, Vol. 27, nr 2-3, s. 027-044Artikel i tidskrift (Övrigt vetenskapligt)
    Abstract [en]

    Starting from a text-to-speech conversion program (Carlson & Granstrom, 1975), a note-to-tone conversion program has been developed (!Xmdberg & ~rydh, 1985). It works with a set of ordered rules af fe&- ing the performance of melodies written into the computer. Depending on the musical context, each of these rules manipulates various tone parameters, such as sound level, fundamental frequency, duration, etc. In the present study the effect of some of the rules developed so far on the musical quality of the performance is tested; various musical excerpts perbrmed according to different combinations an5 versions of nine performance rules were played to musically trained listeners who rated the musical quality. The results support the assumption that the musical quality of the performance is improved by applying the rules. 

  • 45114. Thompson, W. F.
    et al.
    Sundberg, Johan
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    Friberg, Anders
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    Frydén, Lars
    KTH, Tidigare Institutioner (före 2005), Tal, musik och hörsel.
    The Use of Rules for Expression in the Performance of Melodies1989Ingår i: Psychology of Music, ISSN 0305-7356, E-ISSN 1741-3087, Vol. 17, s. 63-82Artikel i tidskrift (Refereegranskat)
  • 45115.
    Thomsen, Michel
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Människa och Informationsteknologi (MI-lab).
    Beställarkompetens vid upphandling och utveckling av IT: Om kompetensframväxt i skuggan av kunskapsfragmentering2010Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Ever since IT started to become important and strategic assets in organizational practices, systems acquisitions have been a challenging and complex endeavor. There are seemingly never ending reports of unsuccessful IT acquisitions and lack of systems acquisition competence (beställarkompetens in Swedish). The aim of this thesis is to shed deeper light on what systems acquisition competence is about, and to present a framework for understanding its nature and premises in IT-projects. This thesis is grounded on three concurring problem areas. First, IT projects are notoriously prone to problems. This despite of decades of IS and ISD research on methods, project management, etc. While there is extensive knowledge about the development process, methods, techniques, tools, developers' skills and competence requirements, less is known about systems acquisition competence. Second, and following from the first, there are few established or generally agreed upon definitions, or substantial theories, of this distinct competency. Third, there is still a limited understanding of systems development from a learning or knowledge work point of view. This thesis deals with the concept of “beställarkompetens”, and theorizes the underlying empirical phenomena; knowledge work in IT project practices. Drawing on exploratory empirical work in an interpretive multiple case study, this thesis investigates 10 governmental IT projects, their outcomes and stakeholders perceptions of acquisition competency. This investigation was supported by theories of individual and organizational perspectives on learning, as well as knowledge theory, competence theory and systems development theory. This thesis presents a theoretical perspective suggesting that acquisition competence can be understood as an emergent quality of the system development process, that is, as dynamic rather than static knowledge. Further, it suggests that key stakeholders interaction, collaboration, situated learning and competence renewal are prime mechanisms to ensure sufficient systems acquisition competence and project performance. One important practical implication from this research is the identification of fragmentation of knowledge as a main threat to successful outcome of IT projects. The contribution is a theoretical framework useful for understanding “beställarkompetens” in systems development contexts, and a tentative theory of emergent competence.

  • 45116.
    Thomsen, Michel
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Människa och Informationsteknologi (MI-lab).
    Åkesson, Maria
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Människa och Informationsteknologi (MI-lab).
    Teaching Strategies for Bringing Authenticity and Contextual Relevance to Information Systems Students2014Ingår i: ICERI2014 Proceedings: 7th International Conference of Education, Research and Innovation: November 17th-19th, 2014 — Seville, Spain / [ed] L. Gómez Chova, A. López Martínez, I. Candel Torres, Valencia: IATED Academy , 2014, s. 3373-3378Konferensbidrag (Refereegranskat)
    Abstract [en]

    Information Systems (IS) education deals with increasingly abstract and complex design challenges. Through digital innovation, the field continuously expands to new application areas. To develop design competence, students need to build up a repertoire of experiences enabling in-depth understanding of use context and design settings. Most students are young and have limited workplace experience.  These circumstances are challenging to IS education and teaching. In this paper we share experiences from teaching and designing IS education to be adapted to this situation. We propose three teaching strategies for bringing authenticity and contextual relevance to IS education; (1) teaching by doing together, (2) enable authentic experiences, and (3) critical formative dialogue.

  • 45117.
    Thomsson, Johan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Organizational effects and management of information security: A cross-sectoral case study of three different organizations2017Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna uppsats jämför tre olika organisationer verksamma i olika sektorer, syftet är att undersöka effekterna  informationssäkerhet kan ha på en organisation men även hur dessa effkter är hanterade. 

    Med fokus på policy, träning av anställda men också medvetenheten så siktar denna uppsats på att svara på hur organisationer ser informationssäkerhet. Den kommer också att försöka hitta vad konsekvenserna av informationssäkerhet i det dagliga arbetet. 

    Resultatet från denna studie visar att ökad informationssäkerhet måste vara motiverat och i konstant dialog med användarna och implementera incitament för att öka motivet. Ökad informationssäkerhet kan ha en skadande effekt på effektiviteten, därför är det viktigt att organisationerna får den önskade effekten de vill av den ökade säkerheten. Genom mer transparans och tillgänglighet så medför det också att anställda har lättare att hitta rätt information som behös vilket är nödvändigt för effektivitet inom organisationen, men detta ökar även incitament för olika typer av attacker och misskötsel av information. 

  • 45118.
    Thongchua, Chalita
    et al.
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för programvarusystem.
    Yang, Wenjin
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för programvarusystem.
    Correlations between Requirement Attributes and Process Attributes: Identifying and quantifying the correlations in a rapid software development process2007Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    It is reported that the market-driven product development is becoming common in the software industry. There are two challenges in the market-driven product development: time-to-market and meeting customers’ requirements. A rapid software development process is regarded as a good way to solve those two challenges. Streamline development process (SLDP) is aligned with a rapid software development process, which is an in-house development process of Ericsson AB. In this study, seven completed projects from the streamline development process were investigated. The correlations between requirement attributes and process attributes were identified and quantified in the SLDP. Nine hypotheses were assumed. Four hypotheses were derived from the correlations from the other software development processes, and the other five hypotheses were derived from new requirement attributes and process attributes in SLDP. Two statistical software applications were used in the hypotheses testing. The results of those hypotheses showed that too much time spent in the early phase of streamline development would not reduce the time to market. A SLDP measurement program contains the measurements of requirement attributes and process attributes. This measurement program was mainly composed of four core attributes (size, effort, schedule, and fault), the requirement volatility, the completeness, the resource overrun, and the estimation accuracy. The results of the SLDP measurement program reflected four challenges in the SLDP: the requirement engineering process, the release planning, the estimation accuracy at each development phase, and the quality of the documentation. At last, based on those four challenges (the requirement engineering process, the release planning, the estimation accuracy at each development phase, and the quality of the documentation) and the defined correlations between requirement attributes and process attributes in the SLDP, the improvement opportunities were proposed for the SLDP.

  • 45119.
    Thor, Christer
    Linköpings universitet, Institutionen för datavetenskap, Interaktiva och kognitiva system. Linköpings universitet, Tekniska högskolan.
    Silent Install2012Självständigt arbete på grundnivå (kandidatexamen), 10,5 poäng / 16 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Det här arbetet har gjorts på Infor, som idag har problem med krångliga och långsamma installationer av en produktsvit. Exjobbet beskriver en automatiserad installation av denna produktsvit med några få möjligheter till konfigurering. Skriptet som sköter installationen är skrivet i Ruby.

    Installationstiden kortades från 4-5 timmar till cirka 30 minuter.

  • 45120.
    Thor, Kim
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Allared, Sofie
    Mälardalens högskola, Akademin för innovation, design och teknik.
    LAN-refresh och WAN-migrering2010Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This work has been carried out at a company in the region which has about 30000 employeeswith about 400 sites all over the world. The company outsources their network including theLAN refresh and the WAN migration. They needed help with an upgrade of their LAN at theirScandinavian headquarters and to find a new solution for their WAN. The reason why the upgradeof the LAN was needed was that the equipment was too old and did not pass the securityrequirements. They also required a solution to segment their LAN, which consisted of a singlelarge VLAN with 1,300 employees. their WAN solution was made up of tunnels between all officesand the headquarter were used as the central point. They wanted to get away from beingdependent on a central point while redundancy was not always working as it should.The solution to the WAN problem was to use the ISPs backbone based on MPLS. There are two mainsolutions, layer 2 (Ethernet) VPN or layer 3 (IP) VPN. In the case of IP VPN, there are a couple of differentconnectivity options such as a static route, or use a routing protocol (eg OSPF or BGP). The final solutionwas IP VPN with OSPF as routing protocol to the ISP. With regard to the configuration of the OSPF solutionwas that every office became an own OSPF domain, configured with area 0. The report also includesthe implementation of the WAN migration with its problems.The upgrade of the LAN was a lot of planning, documentation and security. The solution for the segmentationwas to create a VLAN per floor. Because of the new software they can have the required securityfeatures.

  • 45121.
    Thorarensen, Sebastian
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system.
    A Back-End for the SkePU Skeleton Programming Library targeting the Low-Power Multicore Vision Processor Myriad 22016Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The SkePU skeleton programming library utilises algorithmic skeletons to offer a high-level approach for creating parallel applications. By using different back-ends, SkePU applications can run on multicore systems, GPGPU systems, and computer clusters.

    Myriad 2 is a low-power multicore vision processor for embedded systems, capable of running parallel applications energy-efficiently. Myriad 2 is heterogeneous, containing two different processor architectures and memories with different characteristics.

    In this thesis, we implement a back-end for SkePU, that allows SkePU applications to run on Myriad 2. We describe how the back-end is designed and evaluate the performance of SkePU applications running on Myriad 2. By conducting a series of benchmarks, we show that our back-end achieves enough performance to make SkePU a useful tool for creating applications for Myriad 2. We also show that SkePU applications can run more energy-efficiently on Myriad 2, compared to a GPGPU system.

  • 45122.
    Thorarinsson, Johann Sigurdur
    Högskolan i Skövde, Institutionen för kommunikation och information.
    Navigating in a dynamic world: Predicting the movements of others2009Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The human brain is always trying to predict ahead in time. Many say that it is possible to take actions only based on internal simulations of the brain. A recent trend in the field of Artificial Intelligence is to provide agents with an “inner world” or internal simulations. This inner world can then be used instead of the real world, making it possible to operate without any inputs from the real world.

    This final year project explores the possibility to navigate collision-free in a dynamic environment, using only internal simulation of sensor input instead of real input. Three scenarios will be presented that show how internal simulation operates in a dynamic environment. The results show that it is possible to navigate entirely based on predictions without a collision.

  • 45123.
    Thorarinsson, Johann Sigurdur
    Högskolan i Skövde, Institutionen för kommunikation och information.
    ruleViz: visualization of large rule sets and composite events2008Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    Event Condition Action rule engines have been developed for some time now. Theycan respond automatically to events coming from different sources. Combination ofdifferent event types may be different from time to time and there for it is hard todetermine how the rule engine executes its rules. Especially when the engine is givena large rule set to work with. To determine the behavior is to run tests on the ruleengine and see the final results, but if the results are wrong it can be hard to see whatwent wrong. ruleViz is a program that can look at the execution and visually animatethe rule engine behavior by showing connections between rules and composite events,making it easier for the operator to see what causes the fault. ruleViz is designed toembrace Human Computer Interaction (HCI) methods, making its interfaceunderstandable and easy to operate.

  • 45124.
    Thorburn, Henrik
    Högskolan i Skövde, Institutionen för datavetenskap.
    Applying Bioinformatic Techniques to Identify Cold-associated Genes in Oat2002Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats
    Abstract [en]

    As the interest in biological sequence analysis increases, more efficient techniques to sequence, map and analyse genome data are needed. One frequently used technique is EST sequencing, which has proven to be a fast and cheap method to extract genome data. An EST sequencing generates large numbers of low-quality sequences which have to be managed and analysed further.

    Performing complete searches and finding guaranteed results are very time consuming. This dissertation project presents a method that can be used to perform rapid gene prediction of function-specific genes in EST data, as well as the results and an estimation of the accuracy of the method.

    This dissertation project applies various methods and techniques on actual data, attempting to identify genes involved in cold-associative processes in plants. The presented method consists of three steps. First, a database with genes known to have cold-associated properties is assembled. These genes are extracted from other, already sequenced and analysed organisms. Secondly, this database is used to identify homologues in an unanalysed EST dataset, generating a candidate-list of cold-associated genes. Last, each of the identified candidate cold-associative genes are verified, both to estimate the accuracy of the rapid gene prediction and also to support the removal of candidates which are not cold-associative.

    The method was applied to a previously unanalysed Avena sativa EST dataset, and was able to identify 135 candidate genes from approximately 9500 EST's. Out of these, 103 were verified as cold-associated genes.

  • 45125.
    Thorburn, Lukas
    et al.
    Blekinge Tekniska Högskola.
    Floren Aréla, Oscar
    Blekinge Tekniska Högskola.
    Exploring how multiple stories, connectivity, and mystique can give the illusion of a larger digital world that is rich in history and open for interpretations2018Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Detta kandidatarbete kommer att utforska möjligheter till hur spelskapare ska kunna göra för att expandera, utveckla, och förstora sina digitala världar för att ge spelarna en illusion av att det finns mer till den digitala världen än endast huvudkaraktären och den del av världen där spelets historia utspelar sig. Vi vill utforska detta genom rhizomatiska kopplingar, ubuntu filosofi, multipla historier, och mystik. Vi hoppas på att dessa nyckelord ska erhålla nyckeln till att skapa mer intressanta världar för videospel där världen verkar vid och spännande, samt tronar på en rik och händelsefull historia likt hur vi ser den verkliga fysiska världen.

    Vi lever som en karaktär, ofta i en liten del av världen men vi vet att det finns mer där ute än endast våra egna liv och de platser där detta liv utspelar sig.

  • 45126.
    Thorelli, Lars-Erik
    et al.
    KTH, Tidigare Institutioner, Mikroelektronik och informationsteknik, IMIT.
    Vlassov, Vladimir
    KTH, Tidigare Institutioner, Mikroelektronik och informationsteknik, IMIT.
    An Approach to Composing Parallel Programs2001Ingår i: PARALLEL COMPUTING TECHNOLOGIES / [ed] Malyshkin, V, Berlin: Springer Berlin/Heidelberg, 2001, s. 371-378Konferensbidrag (Refereegranskat)
    Abstract [en]

    Principles  for  coordination  and  composition  of  parallel/distributed programs  are  discussed.  We  advocate  a  synchronizing  shared  memory  model (EDA) for coordination and an algebraic approach to building programs using a linking language (LL) based on module composition, restriction and renaming. A prototype system ErlEda illustrating these principles is described. The system uses   the   concurrent   programming   language   Erlang   and   its   distributed environment as a basis. We illustrate the approach using the Dirichlet problem.

  • 45127.
    Thorheim, Johanna
    et al.
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Boyer de la Giroday, Anna
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Simulation of Location-aware Ad-Hoc Information Sharing Systems2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    We have simulated the effect of different parameters in location-aware information sharing policies for crowd-based information exchange systems. The purpose of this simulation was to find out which parameters improved the upload time, battery life and success rate for nodes trying to upload a large file under bad conditions. To test the effect of these parameters on a larger scale, we simulated an area where a large number of nodes were moving around. Our test results showed that nodes greatly improved their battery life and the upload time by limiting the number of nodes they send data to, rather than sharing data with all nodes within reach. However, sending the oldest collected data performed very bad in regards of battery life time and had a relatively high amount of nodes that did not manage to upload their file. We concluded that nodes should not share their data with all available nodes at all times, and be restrictive in the amount of data they share with other nodes to conserve battery.

  • 45128.
    Thorin, Johan
    Högskolan i Skövde, Institutionen för datavetenskap.
    Generating a textual representation of a relational model2001Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats
    Abstract [en]

    o aid the software and database developer in the development process, specialised software is needed, known as CASE-tools. To form a productive work environment, multiple CASE-tools should be able to cooperate with each other, as it is likely that a single tool cannot give full support for the whole development process. An aid in the integration of tools is that information is stored in a central repository, available for any tool that needs it. A problem which arises is that not all tools are capable of directly accesing the contents of the repository. Thus export procedures are needed that transforms the repository contents into a format that an external tool can read and understand. If these transformation procedures are specified directly in the implementation language, modification can be difficult or even impossible.

    This work proposes a general transformation model for storing rules in a repository. These rules operate on the information in a source model and transform it to a textual representation ready for export to external tools. An example ruleset is given that transforms an example relational model into SQL code.

  • 45129.
    Thorn, Evelina
    Linköpings universitet, Institutionen för systemteknik.
    Säkerhet i Wireless Local Area Networks: En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.2004Självständigt arbete på grundnivå (yrkesexamen)Studentuppsats
    Abstract [en]

    Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company’s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

    With the release of the standard IEEE802.11i, the possibility to build a secure WLAN has improved considerably. With the combination of standards such as IEEE802.1X and IEEE802.11i, and improved encryption with Advanced Encryption Standard (AES) it is possible to make the wireless network more secure.

    It is important to ensure secure wireless communication between the client and the accesspoint, and to install a personal firewall on every wireless client in the network. There are many aspects to take into consideration when building a WLAN, some are discussed in this report and some are discussed in the secret part of the report for Saab Bofors Dynamics AB only.

  • 45130.
    Thorngren, Erik
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Medie- och Informationsteknik. Linköpings universitet, Tekniska högskolan.
    Adapting a website for mobile use2014Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Ett företag som bedriver hunduppfödning når många av dess kunder via Internet och befintliga webbsida. Detta examensarbete syftade till att via en deduktiv metod ta fram en prototyp baserat på studier inom mobil designprocess, mobilt användbarhet samt en granskning av relaterade mobila hemsidor som redan finns på marknaden. Frågor gällande rätt mängd information på mobilhemsidan samt passande designmönster låg i fokus för att lösningen skulle vara användarvänligt men samtidigt innehållsmässigt tillfredsställande. En prototyp skapades och testades via kvalitativa intervjuer. Då antaganden gällande prototypens design till viss del bekräftades uppkom även, via användarnas feedback, behov av att göra vissa ändringar. Resultatet av rapporten belyste vikten av hur struktur och siduppbyggnad måste brytas ned från en webbsida och återskapas för att passa i ett mobilt användningsområde. Samt hur användandet av korrekta designmönster och rätt mängd innehåll, krävdes för att skapa en snabb, lättanvänd och innehållsmässigt korrekt sida för användning i ett mobilt sammanhang.

  • 45131.
    Thorsen, Sofie
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Replica selection in Apache Cassandra: Reducing the tail latency for reads using the C3 algorithm2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    För att kunna erbjuda en bra användarupplevelse så är det av högsta vikt att hålla responstiden låg. Speciellt svanslatensen är en utmaning att hålla låg då dagens applikationer växer både i storlek, komplexitet och användning. I denna rapport undersöker vi svanslatensen vid läsning i databassystemet Apache Cassandra och huruvida den går att förbättra. Detta genom att implementera den nya selektionsalgoritmen för replikor, kallad C3, nyligen framtagen av Lalith Suresh, Marco Canini, Stefan Schmid och Anja Feldmann.

    Genom utförliga tester med flera olika stressverktyg så finner vi att C3 verkligen förbättrar Cassandras svanslatenser på genererad last. Dock så visade använding av C3 på produktionslast ingen större förbättring. Vi hävdar att detta framförallt beror på en variabel storlek på datasetet och att produktionsklienten är tokenmedveten. Vi presenterar också en klientimplementation av C3 i Java-drivrutinen från DataStax, i ett försök att åtgärda problemet med tokenmedventa klienter.

    Klientimplementationen av C3 gav positiva resultat, men då testresultaten uppvisade stor varians så anser vi att resultaten är för osäkra för att kunna bekräfta att implentationen fungerar så som den är avsedd. Vi drar slutsatsen att C3, implementerad på servern, fungerar effektivt på system med homogen storlek på datat och där klienter ej är tokenmedvetna.

  • 45132.
    Thorslund, Gustaf
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska fakulteten.
    Simulating Partial Differential Equations using the Explicit Parallelism of ParModelica2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The Modelica language is a modelling and programming  language for modelling cyber-physical systems using equations and  algorithms. In this thesis two suggested extensions of the Modelica  language are covered. Those are Partial Differential Equations (PDE)  and explicit parallelism in algorithmic code.  While PDEs are not  yet supported by the Modelica language, this thesis presents a  framework for solving PDEs using the algorithmic part of the  Modelica language, including parallel extensions. Different  numerical solvers have been implemented using the explicit parallel  constructs suggested for Modelica by the ParModelica language  extensions, and implemented as part of OpenModelica. The solvers  have been evaluated using different models, and it can be seen how  bigger models are suitable for a parallel solver. The intention has  been to write a framework suitable for modelling and parallel  simulation of PDEs. This work can, however, also be seen as a case  study of how to write a custom solver using parallel algorithmic  Modelica and how to evaluate the performance of a parallel solver.

  • 45133.
    Thorson, Pehr
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för arkiv- och datavetenskap.
    Upplevda framgångsfaktorer för kommunal IT-support: Är ITSM svaret på pedagogernas önskan om att minska supportbehovet?2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Det senaste decenniet har svenska skolor fått tillgång till stora mängder tekniska hjälpmedel. Skolverket har de senaste åren kunnat konstatera att det finns ett stort behov av kompetenshöjning vad gäller IT-kunskaper hos pedagoger. Samtidigt är tillgången på support för pedagoger på vissa håll begränsad. IT Service Management (ITSM) är en strategi för hur IT-tjänster kan hanteras för olika organisationer, och används för att se till att tjänsterna levereras med rätt kvalité och så kostnadseffektivt som möjligt. Syftet var att undersöka om ITSM, eller delar av strategin, fungerar som framgångsfaktorer som bidrar till att minska den tid pedagoger måste lägga på teknikstöd. Undersökningen skedde i form av två enkäter, där en var riktad mot IT-avdelningar och en mot skolrepresentanter. Dessa båda enkäter skickades ut till 29 kommuner som valdes ut genom systematiskt urval. Resultaten visade att en klar majoritet av respondenterna i kommuner som använder sig av delar av ITSM också anser att dessa komponenter är framgångsfaktorer för att minska behovet av teknikstöd. Resultaten visade också att det inte finns någon stark koppling mellan antalet ITSM-komponenter en kommun har och dess storlek.

  • 45134.
    Thorsteinsson, Russell
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad.
    WATER CONTAMINATION RISK DURING URBAN FLOODS: Using GIS to map and analyze risk at a local scale2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Water contamination during urban flood events can have a negative impact on human health and the environment. Prior flood studies lack investigation into how GIS can map and analyze this at a large scale (cadastral) level. This  thesis  focused on how GIS can  help map and analyze water contamination risk in urban  areas  using  LiDAR  elevation  data,  at  a  large-scale  (cadastral)  level,  and  symbology  and  flood classification  intervals  specifically  selected  for  contamination  risk.  This  was  done  by  first  completing a literature review about past research and studies  of similar scope. Based on  the findings, a method to map and analyze water contamination risk during sea-based flood scenarios was tested in the Näringen district of Gävle, Sweden. This study area was investigated and flood contamination risk maps were produced  for two different  flood scenarios which illustrated  which properties are vulnerable to flooding and at what depth, what their contamination risk is, and if they are hydrologically connected to the ocean.  The findings from this investigation  are that this method of examining water contamination risk could be useful to planning officials who are in charge of policies relating to land-use. These findings could help guide landuse  or  hazardous  material  storage  regulations  or  restrictions.  To  further  research  in  this  topic,  it  is recommended  that  similar  studies  are  performed  that  use  a  more  detailed  land-use  map  which  has information  on  what  type  and  quantity  of  possible  contaminants  are  stored  on  individual  properties. Furthermore, flood modeling should be employed in place of the flood mapping which was conducted in this thesis.

  • 45135.
    Thorstenson, Erik
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Virtual environment for assembler code analysis2012Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The hardware that computers consist of may for dierent reasons be

    dicult to monitor, the price may be high or the hardware itself may be

    unavailable. The most apparent reason though is the fact that hardware

    generally is not transparent, i.e. the hardware does not provide informa-

    tion on how a task is conducted, only its result. To provide a virtual en-

    vironment that enables simulation according to specic input parameters

    eectively solves many of the issues associated with hardware evaluation.

    Simulation has applications everywhere, not the least in computer science:

    From the low level of micro code all the way up to interpreting a high level

    implementation on top of a profound software stack. This thesis entails a

    virtual environment running a MIPS pipeline, although the simulator is

    implemented in the high level language C, it executes simulation at the

    fairly low level of assembler code. When provided with a user specied

    conguration le, the environment allows simulation of MIPS assembler

    programs, through the CPU, via interconnecting buses, ending at the level

    of virtual memory.

  • 45136.
    Thorstensson, Eleonor
    Högskolan i Skövde, Institutionen för datavetenskap.
    Important properties for requirements reuse tools2002Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats
    Abstract [en]

    Requirements reuse is based upon the idea that it is possible to reuse requirements from previous software development projects. Requirements reuse leads to efficiency and quality gains in the beginning of the development process. One of the obstacles for requirements reuse is that there is a lack of appropriate tools for it. This work approaches this hinder by identifying properties that are important, that is, that the properties represent something that has so much influence that it should be in a requirements reuse tool. These identified properties may then guide the development when building requirements reuse tools.

    In order to find the properties this work is conducted as a literature study where both tool-specific and non-tool specific articles were searched in order to elicitate the properties. The work focuses on properties present in both tool-specific and non-tool specific articles. This makes the result more reliable since two different sources have identified them. 18 verified properties were identified through this work.

  • 45137.
    Thorstensson, Fredrik
    Högskolan i Skövde, Institutionen för datavetenskap.
    Specifikation för ett visualiseringsverktyg för consumption modes i aktiva databaser.1997Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Syftet med denna rapport är att ta fram en specifikation för ett datorverktyg som visualiserar händelseupptäckt i aktiva databaser.

    Konventionella databashanteringssystem (DBHS) är passiva i den mening att data är skapad, hämtad, modifierad och raderad endast när en användare eller ett applikationsprogram explicit angivit detta. Många applikationer, såsom process control och power generation/distribution networks, kräver en snabb respons i kritiska situationer, och därför räcker inte ett passivt DBHS till. För dessa applikationer måste man kunna definiera villkor som övervakas av databasen. När dessa villkor sedan uppfylls utförs specificerade åtgärder/handlingar.

    Consumption modes är ett svårt och komplext område inom aktiva databaser. Som ett resultat av detta finns ett intresse i att använda visualisering för att lättare förstå de olika consumption modes som finns.

    En prototyp utformades för att fungera som underlag vid de intervjuer som senare genomfördes. Utifrån de krav och önskemål som kom fram vid dessa intervjuer utformades sedan den slutgiltiga prototypen. Prototypen är ingen prototyp i vanlig mening, utan består av sk. skärmdumpar med beskrivande text.

    Resultatet av detta arbete är en specifikation över ett grafiskt verktyg som visualiserar hur sammansatta händelser fungerar ihop med olika consumption modes.

  • 45138.
    Thorstensson, Mirko
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Data Collection in Rescue Operations2002Ingår i: The International Emergency Management Society 9th Annual Conference Proceedings, 2002, s. 136-147Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Rescue operations are complex distributed activities. First response, incident command and rear support have to be coordinated under time pressure and safety critical conditions. Analysing an operation and learning from the experience is problematic because spatially separated units, heterogeneous systems and fragmentary information make it difficult for participants, managers and researchers to grasp the ramifications of a complex scenario. In training, multimedia representations of rescue operations support after-action reviews, post-mission analyses and distance learning by providing coherent and persistent representations of exercises. In this paper we investigate how methods and tools developed in a training context can be adapted to support reconstruction and exploration of real rescue operations as a basis for experience-based learning and operational development. Especially, we study the requirements and limitations on data collection in real rescue operations in relation to emergency-response training. We elaborate on the consequences of the differences in data collection abilities for documenting an involved scenario, analysing the facts of the event and communicating the results and findings.

  • 45139.
    Thorstensson, Mirko
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Supporting Observers in the Field to Perform Model Based Data CollectionManuskript (Övrigt vetenskapligt)
    Abstract [en]

    Computerized support systems enhancing taskforce performance are being increasingly used in different organizations in the military, emergency response and crisis management fields. Computerized command and control (C2) systems and systems supporting concept development and experimentation (CD&E), training and capability development mostly handle data logged by technical systems, devices and sensors. Organizational demands for improved mission capabilities and reduced budgets impose new requirements on system performance and data content. More information needs to be provided by humans in the field, reporting observations from the evolving course of events in order to enhance possibilities for operational analyses and continuous development of organizational abilities. In this paper, we introduce model-based data collection (MBDC) and describe a method that can improve human datacollection abilities and data quality when using human observers as data collecting sensors in distributed tactical operations. Furthermore, we introduce a tool that can support observers in the field. The network-based observer tool (NBOT) can support human observers in determining what to report, and how and when to report the observation. It is possible to configure NBOT to meet different requirements, for example from a consideration of information needs, the field environment and available budget. We present results and findings from three different use cases.

  • 45140.
    Thorstensson, Mirko
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Using Observers for Model Based Data Collection in Distributed Tactical Operations2008Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Modern information technology increases the use of computers in training systems as well as in command-and-control systems in military services and public-safety organizations. This computerization combined with new threats present a challenging complexity. Situational awareness in evolving distributed operations and follow-up in training systems depends on humans in the field reporting observations of events. The use of this observer-reported information can be largely improved by implementation of models supporting both reporting and computer representation of objects and phenomena in operations.

    This thesis characterises and describes observer model-based data collection in distributed tactical operations, where multiple, dispersed units work to achieve common goals. Reconstruction and exploration of multimedia representations of operations is becoming an established means for supporting taskforce training. We explore how modelling of operational processes and entities can support observer data collection and increase information content in mission histories. We use realistic exercises for testing developed models, methods and tools for observer data collection and transfer results to live operations.

    The main contribution of this thesis is the systematic description of the model-based approach to using observers for data collection. Methodological aspects in using humans to collect data to be used in information systems, and also modelling aspects for phenomena occurring in emergency response and communication areas contribute to the body of research. We describe a general methodology for using human observers to collect adequate data for use in information systems. In addition, we describe methods and tools to collect data on the chain of medical attendance in emergency response exercises, and on command-and-control processes in several domains.

  • 45141.
    Thorstensson, Mirko
    et al.
    Linköpings universitet, Institutionen för datavetenskap.
    Axelsson, Markus
    Visuell Systemteknik i Linköping AB, Linköping, Sweden.
    Morin, Magnus
    Visuell Systemteknik i Linköping AB, Linköping, Sweden.
    Jenvald, Johan
    Swedish Armed Forces, Naval Centre, Hårsfjärden, Sweden.
    Monitoring and Analysis of Command Post Communication in Rescue Operations2001Ingår i: Safety Science, ISSN 0925-7535, E-ISSN 1879-1042, Vol. 39, nr 1-2, s. 51-60Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The performance of a command post staff has a decisive effect on the outcome of a rescue operation when it comes to co-ordination and management of various rescue forces. Monitoring and documentation of the internal work and communication processes that take place in a command team can increase the ability to investigate and understand cause–effect relationships between incoming field reports, operational procedures, decisions, commands and the rescue response in the field. To this end we present a method and a software tool that enable an observer to monitor and record communication events in a command post staff. The method extends link analysis by introducing time stamping and classification of events. Thus, extended link analysis enables both cumulative measures and detailed temporal analysis of staff communication. The software tool supports configuration, monitoring, time stamping and classification of communication events. It can export data in standard formats for statistical analysis and visualisation.

  • 45142.
    Thorstensson, Mirko
    et al.
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Morin, Magnus
    Visuell Systemteknik i Linköping AB Storskiftesgatan 29 SE-583 34 Linköping, Sweden.
    Jenvald, Johan
    Department of Military Technology National Defence College PO Box 27805, SE-115 93 Stockholm, Sweden.
    Monitoring and Visualisation Support for Management of Medical Resources in Mass-Casualty IncidentsManuskript (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    Improving command and control of rescue operations requires methods to elucidate the dynamic interaction between different teams in a rescue force in a stressful situation. To this end, we present a method to monitor and visualise the utilisation of medical resources in mass-casualty incidents. The flow of casualties is monitored at specific checkpoints where each individual is assigned a time stamp. This process generates a timeline for each casualty which shows, in great detail, how he or she was transferred through the chain of medical attendance. These timelines can be combined to model the flow of casualties from the location of the incident, through various aid stations and assembly areas, to hospitals. The resulting flow model can be visualised using a software tool. We have applied the method to training exercises where we used it both to support debriefing after the exercise and to facilitate subsequent, in-depth analysis. We conclude by exploring ways to use time-stamped checkpoints as a means of supporting the management of medical resources in real emergency operations.

  • 45143.
    Thorstensson, Niklas
    Högskolan i Skövde, Institutionen för datavetenskap.
    A knowledge-based grapheme-to-phoneme conversion for Swedish2002Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats
    Abstract [en]

    A text-to-speech system is a complex system consisting of several different modules such as grapheme-to-phoneme conversion, articulatory and prosodic modelling, voice modelling etc.

    This dissertation is aimed at the creation of the initial part of a text-to-speech system, i.e. the grapheme-to-phoneme conversion, designed for Swedish. The problem area at hand is the conversion of orthographic text into a phonetic representation that can be used as a basis for a future complete text-to speech system.

    The central issue of the dissertation is the grapheme-to-phoneme conversion and the elaboration of rules and algorithms required to achieve this task. The dissertation aims to prove that it is possible to make such a conversion by a rule-based algorithm with reasonable performance. Another goal is to find a way to represent phonotactic rules in a form suitable for parsing. It also aims to find and analyze problematic structures in written text compared to phonetic realization.

    This work proposes a knowledge-based grapheme-to-phoneme conversion system for Swedish. The system suggested here is implemented, tested, evaluated and compared to other existing systems. The results achieved are promising, and show that the system is fast, with a high degree of accuracy.

  • 45144.
    Thorsén, Cecilia
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    TV-kanalers intäktsmöjligheter på Internet – En marknadsanalys av den svenska TV-marknaden ur ett konsultbolags perspektiv.2011Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Detta examensarbete är en studie av den svenska TV-marknaden som görs för konsultbolaget Capgemini. Syftet är att ge en bild av den svenska TV-marknadens problem, utmaningar, förutsättningar och tankar kring övergångsfasen mellan fysiska (linjära) och digitala produkter. Studien resulterar också i en sammanställning av litteratur i hur man slår mynt av innehåll online, och ger en bild av Capgeminis möjligheter på den svenska TV-marknaden med grund av befintliga ramverk.

    Examensarbetet visar bland annat på att dagens TV-marknad är turbulent och föränderlig. Framtiden är högst osäker och kräver att både TV-bolag och konsultföretag som ämnar ge stöd måste ha en god kännedom om marknadens utveckling. Konsumenterna står idag i centrum och man måste lägga fokus på enkla betalningslösningar då sådana ska användas, och kloka reklammodeller för övriga intäkter.

  • 45145.
    Thorvald, Peter
    Högskolan i Skövde, Institutionen för kommunikation och information.
    Kontextuell analys av monteringsbana på Volvo Powertrain i Skövde2005Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Kontexten har en stor inverkan på en produkts användbarhet och på utförande av arbete. Både den sociala och den fysiska kontexten kan leda till kraftiga problem i form av kognitiv överbelastning och i slutändan påverka hur en montör utför sitt arbete. Studien har undersökt hur den fysiska och den sociala omgivningen påverkar arbete och vilka möjligheter som kontexten ger användaren att hantera sin kognitiva belastning. Undersökningen har genomförts som en fallstudie på Volvo Powertrain och resultatet pekar på flera faktorer som samverkar och kan leda till att montörerna monterar fel detaljer. För att reducera den kognitiva belastningen hos montörer föreslås ett antal åtgärder som kan stödja montören i sitt informationsbeteende.

  • 45146.
    Thorvald, Peter
    Högskolan i Skövde, Institutionen för kommunikation och information.
    Triggers, Entry Points, and Affordances: How to Improve Their Cognitive Congeniality2006Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    At the core of this thesis lies the concept of triggers and how a trigger’s general purpose is to raise attention to something. We discuss the similarities of triggers, entry points, and affordances in terms of medium dependency and information value, and how they can co-exist. As a basis of our trigger discussion we consider active and passive attention along with the use of tools as triggers. A number of problems are identified in trigger use, including continuous or discrete triggers and information value. Finally, suggestions are made regarding the handling of triggers, entry points, and affordances from a designer’s point of view. We discuss and suggest that triggers and their contextual elements can be handled and designed on the basis of their type, information demand, cognitive congeniality, and characteristics.

    Key words: Trigger, entry point, affordance, cognitive congeniality, attention, task transformations, information demand, medium dependency, information value.

  • 45147.
    Thorvaldsson, Deniesé
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Industriell organisation och produktion.
    Svensson, Emma
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Industriell organisation och produktion.
    Kulturkrock: Vad ett svenskt företag bör ta hänsyn till vid etablering i Kina2013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Idag lockas företag från andra länder att etablera sig på den kinesiska marknaden, eftersom Kina genom sin ökade ekonomi nu är en av de ledande länderna i världen. I samband med detta ökar utbudet av marknadsföring för företagen i Kina. Som svenskt företag möter man viss svårighet med att etablera sig på den nya marknaden, eftersom den visuella kommunikationen och marknadsföringen skiljer sig åt från svenskt marknaden. På grund av den bristfälliga kunskap och misstag vid marknadskommunikation i Kina. Kan vi konstatera att svenska företag utformar sin marknadsföring för den kinesiska marknaden med för liten kännedom om den kinesiska kulturen. Det finns därför ett behov av att få en större insikt i hur man som svenskt företag bör marknadsföra sig till den kinesiska konsumenten och marknaden, med rätt typ av kommunikation är därför viktigt.

     

    Syftet med examensarbetet var att utreda och få en större förståelse för vad svenska företag behöver ta hänsyn till vid utformning av sitt grafiska- och visuella uttryck och i sin kommunikation vid etablering i Kina. Med denna kunskap tror vi att företag kommer att ha stor nytta av detta när de försöker etablera sig i Kina och som kan leda till nya karriärmöjligheter för framtiden. Detta bröt vi ner i frågeställning:

     

    • Vad bör ett svenskt företag ta hänsyn till vid utformning av sitt grafiska- och visuella uttryck och i sin kommunikation vid etablering i Kina?

     

    Arbetet har utförts baserat på empirisk data i form av intervjuer med svenska grafiska och kommunikationsbyråer, företag som kommer att och arbetar i Kina samt personer som är uppväxta och jobbat i Kina inom grafisk design och undervisar om den kinesiska kulturen här i Sverige. Teorin är hämtad från litteraturstudier för att få en ökad kunskap om symbolik- och färgkunskap, kulturella och estetiska skillnader, kunskap om webbdesign samt hur man etablerar sig i Kina som internationell företag. Observationer av reklam och marknadsföring i Kina har även gjorts tillsammans med en respondent som är uppväxt i Kina.

     

    Det resultat vi kom fram till och drog slutsatser av, är att ett svenskt företag bör specificera sin målgrupp så noggrant det går. Eftersom marknadsföringen påverkas stort av detta. Man bör se över målgruppens estetik, vad de har för ekonomi och vad de har för klass, varifrån de kommer geografiskt sätt i Kina, samt vilken ålder och kön som målgruppen befinner sig i är viktigt att ta hänsyn till. Man bör även beakta vidskepligheten då symboler, färger och siffror påverkar det grafiska och visuella uttrycket i kommunikationen.

     

    Att den kinesiska befolkningen lägger stor vikt på gruppsamhörighet och relationer i form av Guanxi. Gör att det gäller att bygga ett starkt Guanxiwang (kontaktnät), i Kina för att få en gynnad framtid inom affärer. Även om en stor del av den kinesiska befolkningen inte har kunskap inom det engelska språket, kan det vara bra att ha namnet både på engelska och kinesiska. Eftersom det vid anpassning är viktigt att man behåller sina rötter, då tradition ses som en viktig del i Kina. Vid översättning av produktens namn bör man se över översättningen, så att den blir positiv och även att den kinesiska befolkningen kan se en direkt koppling till produktens funktioner i namnet. Det är viktigt att hålla sig uppdaterad om den rådande politiken i Kina eftersom staten kontrollerar marknadsutsläppet.

     

    Slutligen finns det förslag på fortsatt arbete med detta examensarbete som kan ge ytterligare kunskap för vad ett svenskt företag för att ta hänsyn till.

  • 45148.
    Thorén, Claes
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Creating Real Imaginary Worlds: Mythopoeic Interaction and Immersion in Digital Games2007Rapport (Refereegranskat)
    Abstract [en]

    Mythopoeia is a term that refers to the making and renewal of myths. Myth is in itself a complicated concept that delicately balances concepts of truth and fiction. Myth refuses the designations of fact or lie, and instead operates beyond those terms. Rather, myths are metaphors, articulations of that which transcends the human psyche, of a type of knowledge that cannot be explained or contested. Throughout mankind's history, mythmaking, or mythopoeia, has been an important part of the legacy passed on between cultures and civilizations. The creation of narratives that are based on, or within particular mythologies, have the power to affect us and move us, in ways that non-fictional stories cannot, simply because myths are fictional truths. The impact of these kinds of stories can be gauged by examining their longevity and spread. What that tells us is that the way something is told is perhaps even more important than what is told. Currently, mythopoeic digital games not only offer the possibility of reading and hearing about faraway lands and galaxies, but a chance of partaking in the sustaining and making of new myths.



    This dissertation will explore and answer the question: how does the constrained nature of digital games, together with the improvised chaos of make believe, interact with, and benefit from (or become inhibited by) the further constraint of mythology? As new narrative technologies are introduced, they affect how myths are written, sustained and should be interacted with. Furthermore, with new visual media the level of detail has risen exponentially. No longer are myths carried by oral tradition, textual accounts, or even photography. The new myths come superimposed at us with photorealism, 24 photos per second, with full Dolby Digital 5.1 Surround Sound, and with vibrating haptic game controllers for true interactive affect and immersion. Altogether, the combination of mythopoeia and narrative technology becomes a very powerful medium for interactive storytelling of which we are only beginning to grasp the full potential

  • 45149.
    Thorén, Claes
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Finding a Usable Vocabulary for Privacy Enhancing Technology2003Ingår i: / [ed] Constantine Staphanidis, 2003Konferensbidrag (Refereegranskat)
    Abstract [en]

    The main purpose of the study was to assess the degree of understanding of privacy-related words among non-specialists. A major part of the test consisted of terms in English, because this language is dominant on most interntional sites. The results reveal not only a lack of understanding of some basic consepts but also a lack of understanding of the English language as such. The study should inform the design of user interfaces based on the Platform for Privacy Preferences Prototcol, P3P

  • 45150.
    Thorén, Claes
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Privacy negotiations in WAP browsing - some results based on Wizard-of-Oz tests2003Rapport (Refereegranskat)
900901902903904905906 45101 - 45150 av 50609
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf