Change search
Refine search result
1 - 28 of 28
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Ahmed, Olfet
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Saman, Nawar
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Utvärdering av nätverkssäkerheten på J Bil AB2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim of this project is to evaluate the network security at J Bil AB. The focus will be on both social and technical issues. For the employees to be able to con-nect to remote servers and external services and perform their daily work tasks, secure connections is needed. J Bil Ab has no IT manager who actively maintains and monitors the network; rather they consult a computer company when changes and implementations are required. The projects’ goal is to identify gaps, come up with suggestions for improvement and to some extent implement so-lutions. To do this, an observation of the employees hav been made, an inter-view have been held, and several attacks on the network have been performed. Based on the data collected, it was concluded that the company has shortcom-ings in IT security. Above all, the social security appeared to have major gaps in it and that is mainly because the lack of knowledge among the employees and they have never been informed of how to manage their passwords, computers and IT issues in general. Suggestions for improvement have been given and some implementations have been performed to eliminate the deficiencies.

  • 2.
    Ahmed, Tanvir Saif
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Markovic, Bratislav
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Distribuerade datalagringssystem för tjänsteleverantörer: Undersökning av olika användningsfall för distribuerade datalagringssystem2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis, a study of three different uses cases has been made within the field of data storage, which are as following: Cold Storage, High Performance Storage and Virtual Machine Storage. The purpose of the survey is to give an overview of commercial distributed file systems and a deeper study of open source codes distributed file systems in order to find the most optimal solution for these use cases. Within the study, previous works concerning performance, data protection and costs were an-alyzed and compared in means to find different functionalities (snapshotting, multi-tenancy, data duplication and data replication) which distinguish modern distributed file systems. Both commercial and open distributed file systems were examined. A cost estimation for commercial and open distrib-uted file systems were made in means to find out the profitability for these two types of distributed file systems.After comparing and analyzing previous works, it was clear that the open source distributed file sys-tem Ceph was proper as a solution in accordance to the objectives that were set for High Performance Storage and Virtual Machine Storage. The cost estimation showed that it was more profitable to im-plement an open distributed file system. This study can be used as guidance to choose between different distributed file systems.

  • 3.
    Araya, Cristian
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Singh, Manjinder
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Web API protocol and security analysis2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security.

    The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certain protocols could be ruled out. During the work, the platform’s backend was also developed, which needed to implement chosen web API protocols that would later be tested. The performed tests measured the APIs’ connection time and their response time with and without load. The results were analyzed and showed that the protocols had both pros and cons. Finally, a protocol was chosen that was suitable for the platform because it offered high security and fast connection. In addition, the server was not affected negatively by the number of connections. Reactive REST was the web API protocol chosen for this platform.

  • 4.
    Brejcha, Kevin
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Prestandaanalys av HTTP/22015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Swedbank is one of Sweden’s biggest banks with estimated four million private customers and they are constantly trying to improve their services so they become more user-friendly and faster. To satisfy their customer’s need of fast and easy services Swedbank wants to lower the loading times on the web services to the user experience is faster and smoother, especially for the users doing their banking on a smartphone. The mission is to do a per-formance analysis of the new HTTP protocol HTTP/2 and take out the most essential parts so Swedbank knows what to take advantage of when installing the new versions on their servers to achieve optimal services.The results showed that after implementing HTTP/2’s new features, Swedbank’s website performance increased with 44% in total loading time. The tests were performed in a local experimental environment where the earlier HTTP versions was installed and the perfor-mance metrics was documented.

  • 5.
    Chavez Alcarraz, Erick
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Moraga, Manuel
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Linked data performance in different databases: Comparison between SQL and NoSQL databases2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Meepo AB was investigating the possibility of developing a social rating and recommendation service. In a recommendation service, the user ratings are collected in a database, this data is then used in recommendation algorithms to create individual user recommendations.

    The purpose of this study was to find out which  demands are put on a DBMS, database management system, powering a recommendation service, what impact the NoSQL databases have on the performance of recommendation services compared to traditional relational databases, and which DBMS is most suited for storing the data needed to host a recommendation service.

    Five distinct NoSQL and Relational DBMS were examined, from these three candidates were chosen for a closer comparison.

    Following a study of recommendation algorithms and services, a test suite was created to compare DBMS performance in different areas using a data set of 100 million ratings.

    The results show that MongoDB had the best performance in most use cases, while Neo4j and MySQL struggled with queries spanning the whole data set.

    This paper however never compared performance for real production code. To get a better comparison, more research is needed. We recommend new performance tests for MongoDB and Neo4j using implementations of recommendation algorithms, a larger data set, and more powerful hardware.

  • 6.
    Dilén, Erik
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Lundmark, Emil
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    En utvärdering av Windows 8 Store applikationer som plattform för VOD-tjänster2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    As an effect of Video On Demand (VOD)-usage growing fast June, as a software provider for the television industry, wants to acquire skills and evaluate Windows 8 applications as a platform for VOD services. June already delivers a web-based solution for VOD and now wants a comparison and evaluation of particular knowledge required, time, complexity, data caching, advantages and disadvantages of a Windows 8 application set against this web solution.

    The objectives of the thesis can be divided into three parts: one in which complexity and work effort in Windows 8 application development is evaluated, one in which the tools required to develop a VOD application is evaluated and finally implementing a Windows 8 application for VOD.

    A Windows 8 application was developed and the selected solution methods were documented. Documentation and knowledge acquired during the development phase was then used as a basis for the analysis and evaluation objectives. The result is a Windows 8 application meeting the objectives set for the development part followed by an analysis and evaluation answering the given issues.

    Matters that are central through the report are Microsoft, WinRT, VOD, PlayReady, Smooth Streaming, Windows 8 application Development, data caching and interface development in Windows 8.

  • 7.
    Foitzik, John
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Comparison between two methods for 3D imaging of machine parts2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today the production time is shortened when components are made with additive manufac- turing and the finished products typically have very few defects. If the components quality is to be validated, it’s done with a Non-destructive testing method. In this thesis a test piece made of Inconel 939, that is used in high temperature application was examined with a non- destructive testing technique (NDT), computed tomography (CT) and with destructive test- ing (DT) by grinding the test piece down to a given position and taking images of the ex- posed surface. The purpose was to validate computed tomography images by doing a two- dimensional correlation between images from CT and DT using MATLAB. Due to tech- nical problems the resulting images were however not showing the same par of the test piece. Therefore the correlation method was instead validated. Modifying a 2D image from CT and running it in the code written in MATLAB could quantify the distortions in the images. Results are presented in figures and in tables. The table shows more detailed in- formation with exact coordinates and what correlation each area has. The figure shows the movements and direction of the changes. The result shows that the method can detect changes and does what was intended. 

  • 8.
    Hammer, Joakim
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Lind, Olle
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Scalable platform for health service integrations2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis was performed at the company ShapeUp Club located in Stockholm, Sweden. ShapeUp Club offers a digital calorie counter service for the web, iOS and Android with data synchronization across the platforms.

    ShapeUp Club wants to provide their users with the option to synchronize data between ShapeUp Club and external health services. The objective for this thesis has been to develop an extension to ShapeUp Clubs current backend platform where new external health services can be plugged-in quickly and scalable. External partner APIs will be examined and implemented in the system to validate the functionality of the system. The amount of code needed to plug-in a service should be as minimal as possible for a developer to quickly add another service. To allow for scalability the platform also needs to adapt logic for how often users should be allowed to poll for data from their connected services, to minimize the database load for all parts.

    To handle these demands, an extension to ShapeUp Club’s current backend solution was built using the Django framework for Python. By providing a generic base class that new services inherit from, the amount of code necessary for implementing a new service is reduced to methods for API- requests, authorization and serialization of data. To reduce the number of redundant poll requests, users are placed into groups. Each group is a cluster of users with similar frequency of updates. Django’s cache framework is used to handle the concurrency of the sync tasks, which locks a user from syncing the same partner in parallel. 

  • 9.
    Harch, Gais
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Ullström, Robin
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Automatiserad matchning av relaterad data från olika datakällor2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Social media today contains a lot of information that can add a great value for applications and products by achieve an improved user experience. In some cases, such information cannot be obtained without matching data from one or several data sources through a data fusion.

     

    Eniro Initiatives AB wants to explore opportunities to implement an automated data fusion model by matching companies from its own API to the corresponding company on social media. The problem is that the only completely secured data of matching of all Swedish companies is its corporate identity, which is data that is not available with APIs that origin from foreign companies. The aim was to explore possibilities for the automated way to match related data from different data sources.

     

    In this thesis, a prototype was developed to match companies from Eniro’s API with company pages from Facebook's API. The results from the tests of this prototype shows small deficiencies where redundant information made the prototype able to approve unofficial pages with links to the relevant company, which was not desirable.

  • 10.
    Hassan, Waleed
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Hellström, Martin
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Realtidsövervakning av multicastvideoström2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The enormous increase in multicast services has shown the limitations of traditional network management tools in multicast quality monitoring. There is a need for new monitoring technologies that are not hardware-based solutions such as increased link throughput, buffer length and capacity to enhance the quality of experience. This paper examines the use of FFmpeg, and OpenCV as well the no-reference image quality assessment algorithm BRISQUE to improve the quality of service as well as the quality of experience. By detecting image quality deficiencies as well as bit errors in the video stream, the QoS and QoE can be improved. The purpose of this project was to develop a monitoring system that has the ability to detect fluctuations in image quality and bit errors in a multicast video stream in real time and then notify the service provider using SNMP traps. The tests performed in this paper shows positive results when using the hybrid solution proposed in this paper, both BRISQUE and FFmpeg alone are not sufficiently adapted for this purpose. FFmpeg has the ability to detect decoding errors that usually occurs due to serious bit errors and the BRISQUE algorithm was developed to analyse images and determine the subjective image quality. According to the test results BRISQUE can be used for multicast video analysis because the subjective image quality can be determined with good reliability. The combination of these methods has shown good results but needs to be investigated and developed further.

  • 11.
    Hermansson, Rickard
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Hellström, Johan
    KTH, School of Technology and Health (STH).
    Discretionary Version Control: Access Control for Versionable Documents2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments.This paper shows different systems and models for access control, version control,and distribution of the documents that can be used to create asystem that solves theseproblems.One requirement for this system was a user interface where users can upload, down-load and manage access to their documents. Another requirement was a service thathandles version control for the documents, and a way to quickly connect and distributethe documents. The system also needed to be able to handle access control of the ver-sioned documents on document level, referred to as "fine grained access control" in thispaper.These models and systems were evaluated based on aspects of the access control mod-els, version control systems, and distribution systems andprotocols. After evaluating,appropriate selections were made to create a prototype to test the system as a whole.The prototype ended up meeting the goals that Nordicstationset for the project butonly with basic functionality. Functionality for retrieving any version from a docu-ments history, controlling access for the documents at document level, and a simpleweb based user interface for managing the documents.

  • 12.
    Ibrahim, Goran
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Ek, Leonard
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    En processbeskrivning för utveckling av webbaserade system och gränssnitt: En fallstudie av utvecklingsprocesser på GMP-Systems AB2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Business systems lacking a clear interface and subsequently a diminished usability, can lead to limited usage or no usage of parts of the system. It may therefore be critical to have a process outlined for the development of such system and its interface to ensure that all parts of the system are used.   The objective of this case study was to investigate whether it is possible to develop a process description for IT projects at the initial stages of the development phase of a new interface in a system. More specifically, the question investigated in this report follows: 

    “How should a development method or development process for IT systems look to seize scientific, theoretical and technical aspects of Human Computer Interaction (HCI)?”

    A case study of the project was carried out at the company GMP-Systems AB. A literature-study on aspects of Human-Computer Interaction (HCI) was carried out to arrive at a result and answer the question. Further, an analysis was conducted to consider whether the technical implementation of such process can be accomplished by adopting frameworks. In addition, interviews were conducted with users that have interacted with the system, and an analysis was carried out on the feedback provided to develop prototypes for the system. A development method and process description linked to the literature and the experience gained from the projects case study is outlined in the result section. To the client, GMP-Systems, a prototype, a use-case model[1] with user-stories[2] and a sequential diagram[3] will be delivered. 

    Keywords: HCI, evaluation method, Angular JS, Knockout JS, React, Moqups, process description, development method.

    [1] Use-Case model is a description of actions that a user can perform and defines the interaction between the roles of a system to accomplish a goal[2] User stories are a tool in system development to provide a description of the desired functionality, often from an end user perspective.[3] A sequential diagram shows how objects operate with one another and in what order.

     

  • 13.
    Klint, Cristopher
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Integration av system till en supportportal2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report aims to describe how the company Parera AB should be able to integrate three different computer systems into a support site belonging to their remote support service called Fjärrdrift. The service Fjärrdrift is based on remote support and operational monitoring of computing environments. The task in this thesis was based on the desire from Parera to be able to share information about the service itself and to provide status information on monitored devices as well as giving the customers the ability to manage their support cases in one place. To implement this, an investigation regarding the three systems APIs and general functionality had to be done and in connection with this a proposal on a suitable platform for the implementation had to be submitted. A milestone in the investigation was to consider if Parera could obtain any value by migrating their customer relationship management system to the cloud instead of running it on-premises.

    The work was to test and evaluate the systems in daily use and to figure out what information was needed from the systems to integrate them with the support site by using their APIs. Another important thing was to find out about the customers interest in a support site and what functions they requested.

    Recommendations that describe how Parera can get started with the development of the support site and recommendations regarding if their customer relationship management system should be migrated to the cloud or not are given in this report. To find out about the customers’ requests they were asked to do a survey. Responses to the survey have been collected and are presented in this report.

  • 14.
    Kljakic, Danijel
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Carlsson, Pontus
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Automatisk detektering av skillnader av Androidenhetersanvändargränssnitt2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    User interfaces can look different on different Android devices and it is difficult to tailor anapplication to all Android devices. The goal with this project was to develop a tool that canuse a correct image of a user-interface and find differences in other images taken from otherAndroid devices. A tool was developed from scratch and it proved accurate in most cases.The tool could both find differences and report how large the difference was.

  • 15.
    Lundmark, Magnus
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Dahlman, Carl-Johan
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Differential privacy and machine learning: Calculating sensitivity with generated data sets2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Privacy has never been more important to maintain in today’s information society. Companies and organizations collect large amounts of data about their users. This information is considered to be valuable due to its statistical usage that provide insight into certain areas such as medicine, economics, or behavioural patterns among individuals.

    A technique called differential privacy has been developed to ensure that the privacy of individuals are maintained. This enables the ability to create useful statistics while the privacy of the individual is maintained. However the disadvantage of differential privacy is the magnitude of the randomized noise applied to the data in order to hide the individual.

    This research examined whether it is possible to improve the usability of the privatized result by using machine learning to generate a data set that the noise can be based on. The purpose of the generated data set is to provide a local representation of the underlying data set that is safe to use when calculating the magnitude of the randomized noise.

    The results of this research has determined that this approach is currently not a feasible solution, but demonstrates possible ways to base further research in order to improve the usability of differential privacy. The research indicates limiting the noise to a lower bound calculated from the underlying data set might be enough to reach all privacy requirements. Furthermore, the accuracy of the machining learning algorithm and its impact on the usability of the noise, was not fully investigated and could be of interest in future studies. 

  • 16.
    Maan, Narbir Singh
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Hanchi, Hamza
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Secure Access for Public Clients to Web API:s with Minimum Performance Loss2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A lot of information nowadays is made available through Web APIs on the Internet and without security and encryption; it is very easy for malicious users to access confidential information.

    The goal was to find out what different mechanisms that are available for providing a safe communication with a web API from web clients and mobile applications with little as possible impact on the performance. Learning, implementing and maintaining the mechanisms are also im- portant aspects looked at in the evaluation.

    Many mechanisms are available for use to secure the communication but not all are suitable for public clients. The suitable mechanisms are Digest authentication and OAuth 2.0. The chosen mechanisms were developed, tested and evaluated in regard to safety, performance impact and usabil- ity from a company perspective.

    The authentication and authorization mechanism, which was the most suitable, was OAuth 2.0as it has least impact on performance and better security features than the other mechanisms.

  • 17.
    Niemelä, Jimmy
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Impostor Rendering with Oculus Rift2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report studies impostor rendering for use with the virtual reality head mounted display Oculus Rift. The technique is replacing 3D models with 2D versions to speed up rendering, in a 3D engine. It documents the process of developing a prototype in C++ and DirectX11 and the required research needed to complete the assignment. Included in this report are also the steps involved in getting Oculus Rift support to work in a custom 3D engine and measuring the impact of impostor rendering when rendering to two screens of the head mounted display. The goal was to find the maximum models the engine could draw, while keeping the frame rate locked at 60 frames per second. 2 testers at Nordicstation came to the conclusion that 40-50 meters was the optimal distance for impostor rendering. Any closer and the flatness was noticeable. The results showed a clear improvement in frame rate when rendering a graphically intensive scene. The end result showed that the goal could be achieved at a maximum of 3000 trees with 1000 leaves. Impostor rendering was deemed effective when drawing beyond 500 trees at a time. Less than that and the technique was not needed to achieve 60 frames per second.

  • 18.
    Palm, Emanuel
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Graphics’ Card Utility withWebGL and N-Buffering: Improving performance using N-buffer strategies with WebGL2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis covers the utilization of N buffers in order to reduce resource contention on an abstract WebGL machine, and subsequently freeing up machine processing time. The buffers touched are frame buffers and vertex buffers.

    The paper also briefly covers the purpose and function of N buffering in relation to graphics and the function of a WebGL machine, the research and production of benchmark prototypes, some relevant benchmark results, and analysis and conclusions.

    The conclusion is made that the use of N>1 buffering is a potentially viable strategy for increasing WebGL performance, and some theories are outlined and suggestions given for further research to be made for the resolving of how this performance gain may be improved.

  • 19.
    Paunovic, Stefan
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Hiwa Kader, Baran
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Optimering av 1177 Vårdguidens teletjänstcentraler2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Call centers are used today in many areas of customer service of various kinds with the objective of providing the best service possible. The problem is when multiple instances provide the same services, but where each instance is responsible for its own geographical area. A frequent problem that arises is that the load of these call centers varies drastically, some call centers might have too much to do while others will not have anything to do at all.

    It is therefore of interest to analyze the interaction between these centers and review any changes in efficiency. The solution of 1177 Vårdguiden system today is that the system handles the call flow in a fashion where a phone call is sent to the nearest call center, in the same region.

    Softronic had earlier a mission to analyze and optimize the call system of 1177 Vårdguiden by streamline and enhance the quality of call handling in the form of faster response times and calls answered in the same region they were calling from. Softronic has developed two models, with promising results, however not fully in line with the objectives. This is the basis for this thesis.

    After thorough analysis six unique models were used were 3 of these were developed in the thesis. These models were designed according to several parameters and took into account for example competence, which is based on where a call is answered geographically as well as how long a call is placed in the queue. These models were simulated using a tool developed for this purpose, and these results were compared. The results of these simulations revealed that the best model was with a combination of collaboration between a local and national queue.

  • 20.
    Poyraz, Furkan
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Sakalouski, Pavel
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Vilken metod kan användas för att bredda IT-system mot nya marknader?: Framtagning av en utvecklingsprocess med tillämpning i en fallstudie.2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Within each activity, there is always some kind of project planning when you want to do business in a new market. These types of preparation are done in different ways and the challenge for companies is to make use of the right establishment strategy. To succeed in implementing a project, on the respective market that organizations are working on, one of the success factors is to have a clear and thoughtful approach.

    The company Beta offers cloud-based customs management services, which provide solutions that help other companies handle their customs issues. Beta is established in the Swedish market and wants to try to offer their IT solutions in Norway. The company therefore has a need to investigate how the Norwegian market looks, if there is an opportunity to broaden their existing system solutions and, if so, how they should go about getting a working system that can communicate with the Norwegian customs office.

    The report proposes a method that can be used as a basis for expanding a business to new markets. The development process presented should also be generalized, serve as a basis, and used by other companies facing the same challenge as Beta. This report also contains an analysis of the Norwegian market. There is a comparison between parts of the Swedish and Norwegian customs system and a presentation of the changes that need to be made based on differences.

    As a result, the report provides a clear picture of how one might possibly be able to address similar problems. The project members also present a result describing a solution to Beta's problems. 

  • 21.
    Rådeström, Johan
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Skoog, Gustav
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Realtidssammanställning av stora mängder data från tidsseriedatabaser2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Large amounts of time series data are generated and managed within management systems and industries with the purpose to enable monitoring of the systems. When the time series is to be acquired and compiled for data analysis, the expenditure of time is a problem. This thesis was purposed to determine how the extraction of time series data should be performed to give the systems the best response time possible.

    To make the extraction and compilation as effective as possible, different techniques and methods were tested and evaluated. The areas that techniques and methods were compared for were compilation of data inside and outside the database, caching, usage of in-memory databases compared to other databases, dataformats, data transfer, and precalculation of data.

    The results showed that the best solution was to compile data in parallel outside the database, to use a custom built-in in-memory database, to use Google Protobuf as data format, and finally to use precalculated data.

  • 22.
    Sakhi, Imal
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Database security in the cloud2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim of the thesis is to get an overview of the database services available in cloud computing environment, investigate the security risks associated with it and propose the possible countermeasures to minimize the risks. The thesis also analyzes two cloud database service providers namely; Amazon RDS and Xeround. The reason behind choosing these two providers is because they are currently amongst the leading cloud database providers and both provide relational cloud databases which makes the comparison useful. The focus of the analysis has been to provide an overview of their database services as well as the available security measurements. A guide has been appended at the end of the report to help with technical configurations of database migration and connecting applications to the databases for the two mentioned cloud database providers.

    The thesis has been conducted on behalf of the Swedish Armed Forces and after reviewing the security risks associated with cloud databases, it is recommended that the Armed Forces should refrain from public cloud database services. Security deficiencies such as vague physical security and access control procedures, unavailability of preferred monitoring tools and most importantly the absence of proper encryption and key management schemes make the public database services useless for an authority such as the Armed Forces.  The recommended solutions are therefore to either use a jointly-owned community cloud database solution for less confidential data only or to use on-premise private cloud database solution for all but the TOP SECRET classified data.  

     

    Keywords: Cloud computing, cloud database services, Swedish Armed Forces, security risks, Xeround, Amazon RDS 

  • 23.
    Soto Trujillo, Fernando
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Grehnik, Mattias
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Optimering av budgivning i Google AdWords2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Google allows companies to buy ad space on Googles search engine, which goes by the name AdWords. Docklin Digital creates ads and buys ad space for the company’s clients with the help of AdWords. Google AdWords lets companies input bids that will affect the ad space an ad will receive. Docklin Digital inputs these bids manually and is searching for a way to optimize the bidding process with the help of JavaScript. To solve this problem a pilot study was conducted into earlier works in the field, facts about Google AdWords and appropriate methods to test and analyse a procedure for automatic changing of bids. The pilot study resulted in two developed scripts. One of the scripts was developed by applying a theory from a thesis. The other script was based on the company’s manual way of configuring bids. In the analysis stage of this thesis, the script that was developed from the thesis was found to perform marginally better but to an increased cost of 36 %. In the end the script that was based on the company’s manual way of working was deemed to perform better, the reason being the lower total costs and performing in an almost similar way.

  • 24.
    Stahl, Alexander
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    nsAnalyser: Speech quality testing application for telephone service2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This degree project was made in collaboration with Nordicstation. The project task was to develop a testing application for a self-developed telephone survey service, which uses third party software. This third party software showed to be unreliable at higher loads. The purpose of the application is to analyse the speech quality of clients connected to the service. This report gives an introduction to the speech quality algorithms Perceptual Evaluation of Speech Quality (PESQ) and Single Sided Speech Quality Measure (3SQM). It also gives descriptions of the methods used to develop the application. The final chapters in this report are about the testing of the telephone service. The primary result of the testing was that the telephone service is unable to acceptably handle 80+ clients and recommendations to Nordicstation is to set a maximum of parallel connected clients to 80 or find an alternative to the third party software currently in use.

  • 25.
    Stråle, Johan
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Lindén, Helena
    KTH, School of Technology and Health (STH).
    An evaluation of platforms for open government data2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Municipalities and government agencies are producers of information that may be of interest to the public concerning areas such as population statistics, weather data and policy decisions. In the Digital Agenda, the Swedish Government emphasizes the importance for data to be spread and promotes the development and innovation of new e-services created by other parties than government agencies. Various development initiatives of platforms have been taken around the world but there are no specific standards regarding how data should be made public.

    Softronic currently offer their customers a proprietary platform for the publication of open data. In order to improve or alternatively replace this, Softronic wanted an evaluation of a number of already existing platforms.

    This report contains an evaluation of the Softronic platform along with three other candidates: CKAN, Socrata and OpenDataSoft. The included aspects in the evaluation were selected based on requests from Softronic, covering among other things the installation process, performance and upgrades. To assess the API function of the platforms and demonstrate how an application using open data can be implemented, a graphical client was developed.

    Socrata received the highest score in the evaluation, followed by in turn OpenDataSoft, CKAN and Softronic. Socrata is recommended as a platform for publishing open government data mainly because it offered extensive functionality, required few technical skills and provided plenty of support services.

  • 26.
    Torenius, Tommy
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Metod för att identifiera redundant logik i en SQL Server-miljö2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
  • 27.
    Vikström, Emil
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Generera mallar för insamling av statistikdata över SNMP2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
  • 28.
    Wass, Anton
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Löwenborg Forsberg, Eddie
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Augmented reality i en industriell tillverkningsprocess2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With the digitization that is happening right now in the industrial world, there is a lot of curiosity about how future technologies like Augmented Reality can be applied in industrial manufacturing processes. The aim of the thesis was to investigate whether and how augmented reality technology can be utilized in industries to improve current work processes. Two prototypes were developed for the augmented reality glasses Microsoft HoloLens and evaluated by comparing previous working methods with new ones. Tests of the prototypes showed that efficiency, production quality and mobility increased for the user at the expense of worse ergonomics.

1 - 28 of 28
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf