Change search
Refine search result
1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Ahmed, Tanvir Saif
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Markovic, Bratislav
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Distribuerade datalagringssystem för tjänsteleverantörer: Undersökning av olika användningsfall för distribuerade datalagringssystem2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis, a study of three different uses cases has been made within the field of data storage, which are as following: Cold Storage, High Performance Storage and Virtual Machine Storage. The purpose of the survey is to give an overview of commercial distributed file systems and a deeper study of open source codes distributed file systems in order to find the most optimal solution for these use cases. Within the study, previous works concerning performance, data protection and costs were an-alyzed and compared in means to find different functionalities (snapshotting, multi-tenancy, data duplication and data replication) which distinguish modern distributed file systems. Both commercial and open distributed file systems were examined. A cost estimation for commercial and open distrib-uted file systems were made in means to find out the profitability for these two types of distributed file systems.After comparing and analyzing previous works, it was clear that the open source distributed file sys-tem Ceph was proper as a solution in accordance to the objectives that were set for High Performance Storage and Virtual Machine Storage. The cost estimation showed that it was more profitable to im-plement an open distributed file system. This study can be used as guidance to choose between different distributed file systems.

  • 2.
    Andersson, Dan
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Implementation av prototyp för inomhuspositionering2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Development of technology constantly creates new opportunities but it can also mean major chang-es for companies and organizations. Today phones, tablets, laptops, mobile communications and cloud technology make it possible to be no longer bound by the time, location or device in order to work. The change means that a new office type that is more flexible and space efficient due to no fixed workplaces, is becoming more common. A problem with this type of offices that are known as flex-offices is that it is not obvious where or when a colleague is in the office, especially if it is large office with multiple floors.

    The aim of this work is to develop and implement a Location-Based Service for the company Connecta AB. The service will enable users to use their mobile phone to share their current workplace location in an office environment.

    The result of this work is a Location-Based Service that enables a user to use an Android phone with support for Near Field Communcication to share their current workplace position. The cloud-based server solution, Windows Azure is used to store indexed workplace positions.

  • 3.
    Björnström, Tommie
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Cederqvist, Reidar
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Comparison and Implementation of Software Frameworks for Internet of Things2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There is no established standard for how Internet of Things devices are communicating with each other, every manufacturer uses their own proprietary software and protocols. This makes it difficult to ensure the best possible user experience. There are several projects that can become a standard for how devices discovering, communicating, networking etc. The goal for this thesis work was to compare such software frameworks in some areas and investigate how Inteno’s operating system Iopsys OS can be complemented by implement one of these frameworks. A literature study gave two candidates for the comparison, AllJoyn and Bonjour. The result of the comparison showed that AllJoyn was the most appropriate choice for Inteno to implement into their OS. AllJoyn was chosen because it has a potential to become an established standard and includes tools for easy implementation. To make a proof of concept, an AllJoyn application was created. The application together with a JavaScript web page, can show and control options for an AllJoyn Wi-Fi manager application and AllJoyn enabled lamps.

  • 4.
    Camling, Johan
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Lönnegren, Fredrik
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Karttillämpningar för rikstäckande accessnät2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis describes the process of analyzing and evaluating geographic services, and the development of map applications for nationwide networks. The project was performed at DGC, a datacommunications-, telephony- and networks operator which distributes customer access across Sweden where consumers are connected to the backbone network. In whole, the task consisted of an analysis regarding the possibilities of address-to-coordinate lookup for established customer sites, displaying the access network in a map interface and developing one or more tools, aimed at supporting order processes. Architecture patterns, use-cases construed from user requests and analysis of external provider services for geocoding determined the design of the solution. Software was partially integrated in existing systems, and partially distributed as stand-alone applications. The product was finalized with a release. Read further to get a description of the monitoring tool, network mapping with KML, dealing with geographic data, and also the process of fetching coordinates for addresses.

  • 5.
    Moradinia, Pourya
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Haule, Godfrey
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Portabla enheter: Hot, risker, sårbarheter, lösningar och skyddande motåtgärder2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis has been written on behalf of the Swedish Armed Forces (Försvarsmakten). The objective of this thesis is to investigate the threats, risks and vulnerabilities that can be caused by portable devices within an organization. Laptop computers with operative system Windows and Mac, tablet PCs and smart phones with operating system Android, iOS and Windows Phone are the only portable devices that have been selected to be part of this report. Proposals on how to prevent these risks are discussed in this work. The report also discusses today's BYOD solutions. Examples of different products from known companies are admitted to more easily describe the actions of the threats, risks and vulnerabilities caused by the portable devices mentioned. Different methods and security solutions are discussed to simplify the understanding of the severity of problems and security risks caused by the portable devices.

     

    The mobile technology has recently become powerful and as a result large enterprises, government workers, small business and private consumers are all using smart phones or other mobile devices to manage both business and personal interactions. Increased employee productivity, improved client services and reduced IT cost are some of the advantages of using mobile devices in an enterprise. Securing these devices at the enterprise level has become a challenge for many IT security experts due to the fact that mobile devices have limited resources (memory, CPU, hard disk space and battery). Therefore, hackers are discovering the economic potential of attacking mobile devices on a course to compromise both business and personal data contained within mobile.

     

    An ideal mobile security solution would be one that is compatible with all the major mobile platforms on the market. Moreover, it would have the capacity to protect data stored on the device as well as data sent between devices or between a portable device and an enterprise network. This solution should also be tailored to the needs of an authority or any large organization, while it also has to be resource-efficient, given that mobile devices tend to have limited resources. Unfortunately at the moment there is no such solution on the market. Therefore, a company or authority at the moment should look around for two or more appropriate mobile security solutions that can be combined to achieve the best possible security level in accordance with their current security policies.

  • 6.
    Nogén, David
    et al.
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Jonsson, Jennifer
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Matbudgetapplikation2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Multiple new services such as “Mina utgifter” and “Smartbudget” show that there is an increased interest among consumers to plan their economy. Groceries represent a large part of the average households budget and is thereby an important thing that can make a large difference in every households economy.This thesis will examine the possibilities to compare food prices with help of an Android application and by taking pictures of the text on receipts. The text will then be processed and sorted to get the necessary data which later can be saved into a database. Premade algorithms and OCR-engines have been evaluated and implemented directly into the Android application by using so called C-Libraries. This makes it possible without major efforts to further develop the application for IOS or Windows Phone.This project and the Android application show the possibilities to use premade libraries and the phones camera to extract and save the necessary information that is relevant for consumers.

  • 7.
    Nordvall, Andreas
    KTH, School of Technology and Health (STH), Data- och elektroteknik.
    Agile regression system testing2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report describes the work on automating the testing of nodes at CCS (Common Control System) in Ericsson. The goal was to every three hours configure nodes with the latest build and run the tests. This process is to be fully automatic without user in-put. The existing configuration tool CICC (Core Integration node Control Center) is to be used for configuration. Before work started fault reports were analyzed and creating a usecase for testing restarts should reduce some faults.The first step was to make the configuration tool CICC automated. To schedule the test-ing the continuous integration tool Jenkins was used. But Jenkins can’t by itself run CICC nor interpret the result. Therefore a wrapper layer was implemented. When the wrapper is finished it stores the results of the configuration run in a XML (eXtensible Markup Language) file, which Jenkins reads. Results can then be seen in Jenkins through web interface. If there were any failures during configuration or testing the failed step will have an error message.The project shows that automation is possible. Automating the testing reduce the time for correcting errors because they are more likely to be found early in the process. Be-fore implementing this project in production some improvements should be made. The most significant improvement is making the configuration and testing of each node par-allel with each other, in order to make the time limit for configuration and testing less of an issue.

  • 8.
    Villabona, Antonio
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Dietrichson, Fredrik
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Effektivisera generering av parameterfiler för betalterminaler2014Independent thesis Basic level (university diploma), 180 HE creditsStudent thesis
    Abstract [en]

    This thesis describes the process of analyzing and evaluating the structure of data storage and improving the performance for generating parameter files destined for card terminals. The work was done in house at Esplanad AB, a company dealing with security solutions and distribution of settings for payment stations.

    The first task was to evaluate the possibilities for improving the database storing the settings for each card reader. The second task was to improve the structure of the code and also improve the file generating systems performance.

    The thesis describes testing performance, both for Esplanad’s old system for generating parameter files, and the new one constructed. The solution presented includes improved performance of the file generating process and a new structure for the database that increases scalability.

    Tests show that the new system is capable of generating parameter files with TLV-format, about 16 times faster. The proposed solution implements parallel processes and database replication.

  • 9.
    Åkerberg, Mathias
    et al.
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Tibbling, Anders
    KTH, School of Technology and Health (STH), Medical Engineering, Computer and Electronic Engineering.
    Säker identitetshantering på internet: Att minimera bedrägerier och öka konsumentens säkerhet och inflytande vid e-handel2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There's a high risk that an unauthorized party can gain access to and use a consumer's iden-tity. This while the ability to control how and when a personal identity is used is small. The question to be answered were regarding how identity theft and online fraud could be mi-nimized and give the consumers a greater influence and more control over the management of their identity online.

    The goal was to centralize and establish a common approach for identity management on-line, with greater benefits for consumers. Through central service individual consumers would be able to set conditions for which online shops and services would be able to access their identities and grant access in each specific transaction. This would remove the need for non-central control of identities and as a result remove the need for independent storage of identity information.

    The solution would result in a system model with the potential to authenticate the consu-mer, managing conditions for how individual identity documents may be used online and to provide the consumer with a online history by sending notifications of events that has occurred with regard to a specific identity.

    A prototype was developed to demonstrate the basic functionality in practice. This included the functionality to authenticate the consumer with Mobile BankID, send notifications about events and check existing conditions regarding a specific identity. This prototype came to consist of a simplified system according to the model developed, an associated API, and two models representing an online store and a payment provider that would utilize the functionality of the system by calling the API.

    The proposed solution was evaluated through two interviews with experts in the fields of IT Security and e-commerce. The conclusion was that identity fraud would probably drop drastically and the individual consumer influence and awareness would be fortified. The main reason for this was considered to be primarily through the consistent and standardized way for authentication of and communication with the consumer. This would remove the individual risk for online services.

    The challenge with this proposed solution is believed to be getting consumers, online re-tailers and payment providers to accept a central solution instead of relying on internally developed and disconnected solution.

1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf