Change search
Refine search result
3456789 251 - 300 of 48265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 251.
    Abrahamsson, Björn
    Linköping University, Department of Electrical Engineering.
    Architectures for Multiplication in Galois Rings2004Independent thesis Basic level (professional degree)Student thesis
    Abstract [en]

    This thesis investigates architectures for multiplying elements in Galois rings of the size 4^m, where m is an integer.

    The main question is whether known architectures for multiplying in Galois fields can be used for Galois rings also, with small modifications, and the answer to that question is that they can.

    Different representations for elements in Galois rings are also explored, and the performance of multipliers for the different representations is investigated.

  • 252.
    Abrahamsson, Charlotte
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Wessman, Mattias
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    WLAN Security: IEEE 802.11b or Bluetooth - which standard provides best security methods for companies?2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Which security holes and security methods do IEEE 802.11b and Bluetooth offer? Which standard provides best security methods for companies? These are two interesting questions that this thesis will be about. The purpose is to give companies more information of the security aspects that come with using WLANs. An introduction to the subject of WLAN is presented in order to give an overview before the description of the two WLAN standards; IEEE 802.11b and Bluetooth. The thesis will give an overview of how IEEE 802.11b and Bluetooth works, a in depth description about the security issues of the two standards will be presented, security methods available for companies, the security flaws and what can be done in order to create a secure WLAN are all important aspects to this thesis. In order to give a guidance of which WLAN standard to choose, a comparison of the two standards with the security issues in mind, from a company's point of view is described. We will present our conclusion which entails a recommendation to companies to use Bluetooth over IEEE 802.11b, since it offers better security methods.

  • 253.
    Abrahamsson, Claes
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Videokompression och användarnytta2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Digital video är ett område som expanderat kraftigt senaste åren. På grund av avancerade videokompressionsmetoder kan numera en hel långfilm rymmas på mobiltelefonen eller den handhållna videospelaren. Men hur fungerar videokompression och hur hårt kan man komprimera en viss filmsekvens med bibehållen användarnytta? I denna uppsats görs en genomgång för grunderna inom videokompression. Dess förhållande till användarnyttan undersöks genom ett experiment. I detta experiment testas tre videosekvenser komprimerade med tre olika kodekar i tre olika datahastigheter för tre olika experimentgrupper. Slutsatsen av

    denna studie är att det är svårt att hitta en exakt brytpunkt där användaren finner videokvaliteten oacceptabel. Dock kan det konstateras att den högsta datahastigheten(256 kbit/s) genererar hög användarnytta medan den lägsta datahastigheten genererar låg användarnytta. Mellanhastigheten 128 kbit/s får knappt godkänt av testpersonerna.

  • 254.
    Abrahamsson, David
    Linköping University, Department of Computer and Information Science.
    Security Enhanced Firmware Update Procedures in Embedded Systems2008Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer.

    This thesis work focuses on creating a security enhanced firmware update procedure that is suitable for use in embedded systems. The common elements of embedded systems are described and various candidate algorithms are compared as candidates for firmware verification. Patents are used as a base for the proposal of a security enhanced update procedure. We also use attack trees to perform a threat analysis on an update procedure.

    The results are a threat analysis of a home office router and the proposal of an update procedure. The update procedure will only accept approved firmware and prevents reversion to old, vulnerable, firmware versions. The firmware verification is performed using the hash function SHA-224 and the digital signature algorithm RSA with a key length of 2048. The selection of algorithms and key lengths mitigates the threat of brute-force and cryptanalysis attacks on the verification algorithms and is believed to be secure through 2030.

  • 255.
    Abrahamsson, Emil
    University of Gävle, Department of Mathematics, Natural and Computer Sciences.
    Digitalt arkiv2008Student paper second term, 10 points / 15 hpStudent thesis
    Abstract [sv]

    Grunden för detta arbete har varit att förenkla hantering och sökning bland ritningar och förteckningar i ett ritningsarkiv. Lösningen har blivit ett webbaserat datasystem som bygger på en databas där all information lagras och är sökbar. Resultatet har blivit ett system som man oavsett var man befinner sig inom företagets nätverk ha tillgång till alla ritningar och förteckningar på ett snabbt och effektivt sätt.

  • 256. Abrahamsson, Emil
    et al.
    Forni, Timothy
    Skeppstedt, Maria
    Kvist, Maria
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Medical text simplification using synonym replacement: adapting assessment of word difficulty to a compounding language2014In: Proceedings of the 3rdWorkshop on Predicting andImproving Text Readability for Target Reader Populations(PITR) / [ed] Sandra Williams, Stroudsburg: Association for Computational Linguistics , 2014, p. 57-65Conference paper (Refereed)
  • 257. Abrahamsson, H
    et al.
    Hagsand, Olof
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Marsh, Ian
    TCP over high speed variable capacity links: A simulation study for bandwidth allocation2002Conference paper (Refereed)
    Abstract [en]

     New optical network technologies provide opportunities for fast, controllable bandwidth management. These technologies can now explicitly provide resources to data paths, creating demand driven bandwidth reservation across networks where an applications bandwidth needs can be meet almost exactly. Dynamic synchronous Transfer Mode (DTM) is a gigabit network technology that provides channels with dynamically adjustable capacity. TCP is a reliable end-to-end transport protocol that adapts its rate to the available capacity. Both TCP and the DTM bandwidth can react to changes in the network load, creating a complex system with inter-dependent feedback mechanisms. The contribution of this work is an assessment of a bandwidth allocation scheme for TCP flows on variable capacity technologies. We have created a simulation environment using ns-2 and our results indicate that the allocation of bandwidth maximises TCP throughput for most flows, thus saving valuable capacity when compared to a scheme such as link over-provisioning. We highlight one situation where the allocation scheme might have some deficiencies against the static reservation of resources, and describe its causes. This type of situation warrants further investigation to understand how the algorithm can be modified to achieve performance similar to that of the fixed bandwidth case.

  • 258.
    Abrahamsson, Henrik
    Mälardalen University, School of Innovation, Design and Engineering.
    Internet Traffic Management2008Licentiate thesis, comprehensive summary (Other scientific)
  • 259.
    Abrahamsson, Henrik
    Mälardalen University, School of Innovation, Design and Engineering.
    Network overload avoidance by traffic engineering and content caching2012Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet traffic volume continues to grow at a great rate, now driven by video and TV distribution. For network operators it is important to avoid congestion in the network, and to meet service level agreements with their customers.  This thesis presents work on two methods operators can use to reduce links loads in their networks: traffic engineering and content caching.

    This thesis studies access patterns for TV and video and the potential for caching.  The investigation is done both using simulation and by analysis of logs from a large TV-on-Demand system over four months.

    The results show that there is a small set of programs that account for a large fraction of the requests and that a comparatively small local cache can be used to significantly reduce the peak link loads during prime time. The investigation also demonstrates how the popularity of programs changes over time and shows that the access pattern in a TV-on-Demand system very much depends on the content type.

    For traffic engineering the objective is to avoid congestion in the network and to make better use of available resources by adapting the routing to the current traffic situation. The main challenge for traffic engineering in IP networks is to cope with the dynamics of Internet traffic demands.

    This thesis proposes L-balanced routings that route the traffic on the shortest paths possible but make sure that no link is utilised to more than a given level L. L-balanced routing gives efficient routing of traffic and controlled spare capacity to handle unpredictable changes in traffic.  We present an L-balanced routing algorithm and a heuristic search method for finding L-balanced weight settings for the legacy routing protocols OSPF and IS-IS. We show that the search and the resulting weight settings work well in real network scenarios.

  • 260.
    Abrahamsson, Henrik
    RISE, Swedish ICT, SICS. School of Innovation, Design and Engineering.
    Network overload avoidance by traffic engineering and content caching2012Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The Internet traffic volume continues to grow at a great rate, now driven by video and TV distribution. For network operators it is important to avoid congestion in the network, and to meet service level agreements with their customers. This thesis presents work on two methods operators can use to reduce links loads in their networks: traffic engineering and content caching. This thesis studies access patterns for TV and video and the potential for caching. The investigation is done both using simulation and by analysis of logs from a large TV-on-Demand system over four months. The results show that there is a small set of programs that account for a large fraction of the requests and that a comparatively small local cache can be used to significantly reduce the peak link loads during prime time. The investigation also demonstrates how the popularity of programs changes over time and shows that the access pattern in a TV-on-Demand system very much depends on the content type. For traffic engineering the objective is to avoid congestion in the network and to make better use of available resources by adapting the routing to the current traffic situation. The main challenge for traffic engineering in IP networks is to cope with the dynamics of Internet traffic demands. This thesis proposes L-balanced routings that route the traffic on the shortest paths possible but make sure that no link is utilised to more than a given level L. L-balanced routing gives efficient routing of traffic and controlled spare capacity to handle unpredictable changes in traffic. We present an L-balanced routing algorithm and a heuristic search method for finding L-balanced weight settings for the legacy routing protocols OSPF and IS-IS. We show that the search and the resulting weight settings work well in real network scenarios.

  • 261.
    Abrahamsson, Henrik
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Traffic measurement and analysis1999Report (Other academic)
    Abstract [en]

    Measurement and analysis of real traffic is important to gain knowledge about the characteristics of the traffic. Without measurement, it is impossible to build realistic traffic models. It is recent that data traffic was found to have self-similar properties. In this thesis work traffic captured on the network at SICS and on the Supernet, is shown to have this fractal-like behaviour. The traffic is also examined with respect to which protocols and packet sizes are present and in what proportions. In the SICS trace most packets are small, TCP is shown to be the predominant transport protocol and NNTP the most common application. In contrast to this, large UDP packets sent between not well-known ports dominates the Supernet traffic. Finally, characteristics of the client side of the WWW traffic are examined more closely. In order to extract useful information from the packet trace, web browsers use of TCP and HTTP is investigated including new features in HTTP/1.1 such as persistent connections and pipelining. Empirical probability distributions are derived describing session lengths, time between user clicks and the amount of data transferred due to a single user click. These probability distributions make up a simple model of WWW-sessions.

  • 262.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Temporal Characteristics of Large IP Traffic Flows2003Report (Other academic)
    Abstract [en]

    Several studies of Internet traffic have shown that it is a small percentage of the flows that dominate the traffic. This is often referred to as the mice and elephants phenomenon. It has been proposed that this might be one of very few invariants of Internet traffic and that this property could somehow be used for traffic engineering purposes. The idea being that one in a scalable way could control a major part of the traffic by only keeping track of a small number of flows. But for this the large flows must also be stable in the meaning that they should be among the largest flows during long periods of time. In this work we analyse packet traces of Internet traffic and study the temporal characteristics of large aggregated traffic flows defined by destination address prefixes.

  • 263.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Using empirical distributions to characterize web client traffic and to generate synthetic traffic2000Conference paper (Refereed)
  • 264.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Alonso, Juan
    RISE - Research Institutes of Sweden, ICT, SICS.
    Andersson, Anders
    RISE - Research Institutes of Sweden, ICT, SICS.
    Kreuger, Per
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    A Multi Path Routing Algorithm for IP Networks Based on Flow Optimisation.2002Conference paper (Refereed)
  • 265.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Alonso, Juan
    RISE - Research Institutes of Sweden, ICT, SICS.
    Andersson, Anders
    RISE - Research Institutes of Sweden, ICT, SICS.
    Kreuger, Per
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    From QoS provisioning to QoS charging2002In: Proceedings of the Second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, 2002, 1, Vol. Lectures Notes in Computer Science (LNCS) no. 2511, p. 135-144Conference paper (Refereed)
  • 266.
    Abrahamsson, Henrik
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ahlgren, Bengt
    RISE - Research Institutes of Sweden, ICT, SICS.
    Lindvall, Patrik
    TeliaSonera, Sweden.
    Nieminen, Johanna
    TeliaSonera, Sweden.
    Tholin, Per
    TeliaSonera, Sweden.
    Traffic Characteristics on 1Gbit/s Access Aggregation Links2017Conference paper (Refereed)
    Abstract [en]

    Large network operators have thousands or tens of thousands of access aggregation links that they need to manage and dimension properly. Measuring and understanding the traffic characteristics on these type of links are therefore essential. What do the traffic intensity characteristics look like on different timescales from days down to milliseconds? How do the characteristics differ if we compare links with the same capacity but with different type of clients and access technologies? How do the traffic characteristics differ from that on core network links? These are the type of questions we set out to investigate in this paper. We present the results of packet level measurements on three different 1Gbit/s aggregation links in an operational IP network. We see large differences in traffic characteristics between the three links. We observe highly skewed link load probability densities on timescales relevant for buffering (i.e. 10-milliseconds). We demonstrate the existence of large traffic spikes on short timescales (10-100ms) and show their impact on link delay. We also found that these traffic bursts often are caused by only one or a few IP flows.

  • 267.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Ahlgren, Bengt
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Tholin, Per
    Delay and Traffic Intensity Monitoring in an Operational IP Network2015Conference paper (Refereed)
  • 268.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science, Kista, Sweden.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    Caching for IPTV distribution with time-shift2013In: 2013 International Conference on Computing, Networking and Communications, ICNC 2013, IEEE , 2013, p. 916-921Conference paper (Refereed)
    Abstract [en]

    Today video and TV distribution dominate Internet traffic and the increasing demand for high-bandwidth multimedia services puts pressure on Internet service providers. In this paper we simulate TV distribution with time-shift and investigate the effect of introducing a local cache close to the viewers. We study what impact TV program popularity, program set size, cache replacement policy and other factors have on the caching efficiency. The simulation results show that introducing a local cache close to the viewers significantly reduces the network load from TV-on-Demand services. By caching 4% of the program volume we can decrease the peak load during prime time by almost 50%. We also show that the TV program type and how program popularity changes over time can have a big influence on cache hit ratios and the resulting link loads

  • 269.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Caching for IPTV distribution with time-shift2013Conference paper (Refereed)
  • 270.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Robust Traffic Engineering using L-balanced Weight-Settings in OSPF/IS-IS2009Conference paper (Refereed)
  • 271.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    Simulation of IPTV caching strategies2010In: Proceedings of the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2010, p. 187-193Conference paper (Refereed)
    Abstract [en]

    IPTV, where television is distributed over the Internet Protocol in a single operator network, has become popular and widespread. Many telecom and broadband companies have become TV providers and distribute TV channels using multicast over their backbone networks. IPTV also means an evolution to time-shifted television where viewers now often can choose to watch the programs at any time. However, distributing individual TV streams to each viewer requires a lot of bandwidth and is a big challenge for TV operators. In this paper we present an empirical IPTV workload model, simulate IPTV distribution with time-shift, and show that local caching can limit the bandwidth requirements significantly.

  • 272.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Björkman, Mats
    Simulation of IPTV caching strategies2010Conference paper (Refereed)
    Abstract [en]

    IPTV, where television is distributed over the Internet Protocol in a single operator network, has become popular and widespread. Many telecom and broadband companies have become TV providers and distribute TV channels using multicast over their backbone networks. IPTV also means an evolution to time-shifted television where viewers now often can choose to watch the programs at any time. However, distributing individual TV streams to each viewer requires a lot of bandwidth and is a big challenge for TV operators. In this paper we present an empirical IPTV workload model, simulate IPTV distribution with time-shift, and show that local caching can limit the bandwidth requirements significantly.

  • 273.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Gunnar, Anders
    RISE, Swedish ICT, SICS.
    Traffic engineering in ambient networks: challenges and approaches2004In: Swedish National Computer Networking Workshop, 2004, 1Conference paper (Refereed)
    Abstract [en]

    The focus of this paper is on traffic engineering in ambient networks. We describe and categorize different alternatives for making the routing more adaptive to the current traffic situation and discuss the challenges that ambient networks pose on traffic engineering methods. One of the main objectives of traffic engineering is to avoid congestion by controlling and optimising the routing function, or in short, to put the traffic where the capacity is. The main challenge for traffic engineering in ambient networks is to cope with the dynamics of both topology and traffic demands. Mechanisms are needed that can handle traffic load dynamics in scenarios with sudden changes in traffic demand and dynamically distribute traffic to benefit from available resources. Trade-offs between optimality, stability and signaling overhead that are important for traffic engineering methods in the fixed Internet becomes even more critical in a dynamic ambient environment.

  • 274.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Hagsand, Olof
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    TCP over High Speed Variable Capacity Links: A Simulation Study for Bandwidth Allocation2002Conference paper (Refereed)
  • 275.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Kreuger, Per
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    A case for resource management in IPTV distribution2008Conference paper (Refereed)
  • 276.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Kreuger, Per
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Resource Management for IPTV distribution2009In: ERCIM News, Vol. 77Article in journal (Other academic)
  • 277.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    DTMsim - DTM channel simulation in ns2001Report (Other academic)
    Abstract [en]

    Dynamic Transfer Mode (DTM) is a ring based MAN technology that provides a channel abstraction with a dynamically adjustable capacity. TCP is a reliable end to end transport protocol capable of adjusting its rate. The primary goal of this work is investigate the coupling of dynamically allocating bandwidth to TCP flows with the affect this has on the congestion control mechanism of TCP. In particular we wanted to find scenerios where this scheme does not work, where either all the link capacity is allocated to TCP or congestion collapse occurs and no capacity is allocated to TCP. We have created a simulation environment using ns-2 to investigate TCP over networks which have a variable capacity link. We begin with a single TCP Tahoe flow over a fixed bandwidth link and progressively add more complexity to understand the behaviour of dynamically adjusting link capacity to TCP and vice versa.

  • 278.
    Abrahamsson, Henrik
    et al.
    Swedish Institute of Computer Science, Kista, Sweden.
    Nordmark, Mattias
    TeliaSonera AB, Stockholm, Sweden .
    Program popularity and viewer behaviour in a large TV-on-Demand system2012In: IMC '12 Proceedings of the 2012 ACM conference on Internet measurement conference, New York: ACM , 2012, p. 199-210Conference paper (Refereed)
    Abstract [en]

    Today increasingly large volumes of TV and video are distributed over IP-networks and over the Internet. It is therefore essential for traffic and cache management to understand TV program popularity and access patterns in real networks.

    In this paper we study access patterns in a large TV-on-Demand system over four months. We study user behaviour and program popularity and its impact on caching. The demand varies a lot in daily and weekly cycles. There are large peaks in demand, especially on Friday and Saturday evenings, that need to be handled.

    We see that the cacheability, the share of requests that are not first-time requests, is very high. Furthermore, there is a small set of programs that account for a large fraction of the requests. We also find that the share of requests for the top most popular programs grows during prime time, and the change rate among them decreases. This is important for caching. The cache hit ratio increases during prime time when the demand is the highest, and aching makes the biggest difference when it matters most.

    We also study the popularity (in terms of number of requests and rank) of individual programs and how that changes over time. Also, we see that the type of programs offered determines what the access pattern will look like.

  • 279.
    Abrahamsson, Henrik
    et al.
    RISE, Swedish ICT, SICS, Decisions, Networks and Analytics lab.
    Nordmark, Mattias
    Program Popularity and Viewer Behaviour in a Large TV-on-Demand System2012Conference paper (Refereed)
  • 280.
    Abrahamsson, Jimmy
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Nätverksoptimering: Bästa möjliga tillgänglighet till lägsta möjliga länkkostnad2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Denna uppsats behandlar nätverksoptimering, med fokus på att få fram den bästa möjliga tillgängligheten till lägsta möjliga kostnad, i form av länkar. I studien tas en teoretiskt grundad hypotes om en metod fram för att lösa detta problemet. Samt genomförs ett test där metoden appliceras på ett studieobjekt för att bekräfta huruvida metoden verkar fungerar eller inte.

    Resultatet blir slutligen en metod som genom att analysera tillgängligheten, länk redundansen samt beräkna antal oberoende vägar mellan noder i ett nätverk. Kan genom att jämföra resultat från före en förändring med resultat från efter en förändring lyfta fram de förändringar som medför förbättringar. Varpå ett nätverk kan optimeras till bästa möjliga tillgänglighet till lägsta möjliga kostnad, i form av länkar.

  • 281.
    Abrahamsson, Johan
    et al.
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Sjöberg, Robin
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    E-tjänstutveckling ur ett medborgarperspektiv: Att skapa beslutsunderlag baserat på medborgarärendens lämplighet för olika kommunikationskanaler2009Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Citizens’ interaction with governments is an area with unique implications for channel management. Governments need to take the citizens perspective into further consideration in order to be successful in delivering high-quality e-services. This paper aims to determine if a categorization of citizen-initiated contacts from a citizen-centric perspective can be a valuable basis for decisions regarding e-service development. The study consisted of three steps. The first step was an examination of the existing related literature, which resulted in the uncovering of the most important aspects of citizens channel choice. The second step consisted of an elaboration of a classification based on perceived task characteristics and a subsequent matching of the categories to desirable channel characteristics. The third and final step consisted of an application of the proposed categorization on a content management system containing all citizen-initiated contacts in a Swedish municipality. The application indicated that the proposed categorization could possibly be used to guide investments in e-services towards a channel-appropriate direction.

  • 282.
    Abrahamsson, Jonas
    University of Skövde, Department of Computer Science.
    Metoder vid implementation av affärssystem: en studie om anpassning2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Dagens företag är i stort behov av information. Företag som har många avdelningar behöver möjligheter för att enkelt och smidigt kunna samordna information för hela företaget. Affärssystem erbjuder denna möjlighet genom en modulbaserad konstruktion som integrerar ett företags samtliga avdelningar i ett enda system. Problem kan dock uppstå då ett valt affärssystem inte passar företagets verksamhet. En kompromiss mellan system och verksamhet måste då försöka uppnås.

    Ett affärssystem implementeras ofta i samband med en metod, vilken ger detaljerade beskrivningar för hur implementeringen ska gå till. På vilka grunder väljer företagen att arbeta efter en specifik metod då system och verksamhet behöver anpassas till varandra?

    Detta arbete bygger på en undersökning som har utförts genom en survey där fem företag har medverkat. Resultatet av undersökningen visar ett antal metoder samt presenterar orsaker till varför dessa metoder används.

  • 283.
    Abrahamsson, Lars
    Linköping University, Department of Electrical Engineering.
    A portal based system for indoor environs2006Independent thesis Basic level (professional degree), 20 points / 30 hpStudent thesis
    Abstract [en]

    The purpose of this thesis is to document the development of the graphics part of an extremely pluggable game engine/lab environment for a course in advanced game programming. This thesis is one out of five, and concerns indoor, realtime computer 3D graphics. It covers state-of-the-art techniques such as GLSL - the OpenGL Shading Language - and more well known techniques such as portal based rendering.

  • 284.
    Abrahamsson, Lisa
    et al.
    Blekinge Institute of Technology.
    Lagerqvist, Amelie
    Blekinge Institute of Technology.
    Att formas och att formge: Normkritisk mönsterformgivning2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Our society is made up of norms that say how we should look, behave and live our lives. Many of these norms focuses on how you as a man or woman should behave in relation to your gender. Gender norms are reflected in design and what we design in products, furniture and buildings. With a gender specified norm critical approach, we examine how gender norms are reflected in design and how we as designers can design with norm criticism. With pattern design as an exploratory approach, we want to highlight and examine how gender norms affect and is repeated in what we design, just like a pattern is defined by lines and shapes that are repeated or experienced to be repeated.

    During our investigation it appears that patterns can contribute with discussion and stance that will work in multiple forums. We examine how unisex and male and female can be embodied in patterns, and how norm criticism works as an approach in a design process.

  • 285. Abrahamsson, M.
    et al.
    Sundberg, Johan
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Music Acoustics.
    Subglottal pressure variation in actors’ stage speech2007In: Voice and Gender Journal for the Voice and Speech Trainers Association / [ed] Rees, M., VASTA Publishing , 2007, p. 343-347Chapter in book (Refereed)
  • 286.
    Abrahamsson, Marcus
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
    A platform for third-party applications on the web2013Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    A trend seen on the web today is to create a platform where externally developed applications can run inside some kind of main application. This is often done by providing an API to access data and business logic of your service and a sandbox environment in which third-party applications can run. By providing this, it is made possible for external developers to come up with new ideas based on your service. Some good examples on this are Spotify Apps, Apps on Facebook and SalesForce.com.

    Ipendo Systems AB is a company that develops a web platform for intellectual properties. Currently most things on this platform are developed by developers at Ipendo Systems AB. Some interest has though risen to enable external developers to create applications that will in some way run inside the main platform.

    In this thesis an analysis of already existing solutions has been done. These solutions were Spotify Apps and Apps on Facebook. The two have different approaches on how to enable third-party applications to run inside their own service. Facebook’s solution builds mainly on iframe embedded web pages where data access is provided through a web API. Spotify on the other hand hosts the third-party applications themselves but the applications may only consist of HTML5, CSS3 and JavaScript.

    In addition to the analysis a prototype was developed. The purpose of the prototype was to show possible ways to enable third-party applications to run inside your own service. Two solutions showing this were developed. The first one was based on Facebook’s approach with iframing of external web pages. The second was a slightly modified version of Spotify’s solution with only client-side code hosted by the main application. To safely embed the client side code in the main application a sandboxing tool for JavaScript called Caja was used.

    Of the two versions implemented in the prototype was the Iframe solution considered more ready to be utilized in a production environment than Caja. Caja could be seen as an interesting technique for the future but might not be ready to use today. The reason behind this conclusion was that Caja decreased the performance of the written JavaScript as well as adding complexity while developing the third-party applications.

  • 287.
    Abrahamsson, Peder
    Linköping University, Department of Computer and Information Science.
    Mer lättläst: Påbyggnad av ett automatiskt omskrivningsverktyg till lätt svenska2011Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [sv]

    Det svenska språket ska finnas tillgängligt för alla som bor och verkar i Sverige. Därförär det viktigt att det finns lättlästa alternativ för dem som har svårighet att läsa svensktext. Detta arbete bygger vidare på att visa att det är möjligt att skapa ett automatisktomskrivningsprogram som gör texter mer lättlästa. Till grund för arbetet liggerCogFLUX som är ett verktyg för automatisk omskrivning till lätt svenska. CogFLUXinnehåller funktioner för att syntaktiskt skriva om texter till mer lättläst svenska.Omskrivningarna görs med hjälp av omskrivningsregler framtagna i ett tidigare projekt.I detta arbete implementeras ytterligare omskrivningsregler och även en ny modul förhantering av synonymer. Med dessa nya regler och modulen ska arbetet undersöka omdet är det är möjligt att skapa system som ger en mer lättläst text enligt etableradeläsbarhetsmått som LIX, OVIX och Nominalkvot. Omskrivningsreglerna ochsynonymhanteraren testas på tre olika texter med en total lägnd på ungefär hundra tusenord. Arbetet visar att det går att sänka både LIX-värdet och Nominalkvoten signifikantmed hjälp av omskrivningsregler och synonymhanterare. Arbetet visar även att det finnsfler saker kvar att göra för att framställa ett riktigt bra program för automatiskomskrivning till lätt svenska.

  • 288.
    Abrahamsson, Richard
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Automatic control.
    Kay, Steven M.
    Stoica, Peter
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Automatic control.
    Estimation of the parameters of a bilinear model with applications to submarine detection and system identification2007In: Digital signal processing (Print), ISSN 1051-2004, E-ISSN 1095-4333, Vol. 17, no 4, p. 756-773Article in journal (Refereed)
    Abstract [en]

    In this work we study the problem of estimating the parameters of a bilinear model describing, e.g., the amplitude modulation of extremely low frequency electromagnetic (ELFE) signatures of submarines. A similar problem arises in estimation of a nonlinear dynamic system using a Hammerstein–Wiener model, where two nonlinear static blocks surround a linear dynamic block. For these purposes a new method is derived. It is also shown in the same context that a two-stage method for parameter estimation of Hammerstein–Wiener models can be interpreted as an approximate least squares method. We also show the similarities with the problem of weighted low-rank approximation and the fact that these problems can be solved exactly in finite time using solvers for global optimization of systems of polynomials based on self dual optimization.

  • 289.
    Abrahamsson, Robin
    et al.
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Berntsen, David
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Comparing modifiability of React Native and two native codebases2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Creating native mobile application on multiple platforms generate a lot of duplicate code. This thesis has evaluated if the code quality attribute modifiability improves when migrating to React Native. One Android and one iOS codebase existed for an application and a third codebase was developed with React Native. The measurements of the codebases were based on the SQMMA-model. The metrics for the model were collected with static analyzers created specifically for this project. The results created consists of graphs that show the modifiability for some specific components over time and graphs that show the stability of the platforms. These graphs show that when measuring code metrics on applications over time it is better to do this on a large codebase that has been developed for some time. When calculating a modifiability value the sum of the metrics and the average value of the metrics between files should be used and it is shown that the React Native platform seems to be more stable than native.

  • 290.
    Abrahamsson, Sofie
    et al.
    Södertörn University College, School of Communication, Media and it.
    Eriksson, Emelie
    Södertörn University College, School of Communication, Media and it.
    En utvärdering av synthesizern OP-1 utifrån ett användbarhetsperspektiv2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report is based on results given from usability testing of the synthesizer OP-1 developed by the company Teenage Engineering. The study has involved potential end users during the development process and aims only to look at the first experience the user gets from the interaction with the synthesizer. The meaning of the usability tests is to find out how the user can understand how to use OP-1, how intuitive the different modes are and how this affects the initial user experience.

    Nine people, out of a total amount of fourteen asked, participated in these usability tests. The selection of participants is based on their previous knowledge and experience of synthesizers. The theoretical frame of reference includes Jonas Löwgren and Erik Stoltermans theories of use qualities and are combined with chosen parts of Donald Normans ” Seven Stages of Actions as Design Aids”.

    The shown results indicate that the users quickly understand how to use the basic modes and features of the synthesizer. All of the participated users think OP-1 is entertaining, finds the design of OP-1 attractive and appriciates its portability, in which they see potential for both travelling and live performances. The users do not always fully understand the graphical elements but reckon that it is not always necessary to, neither in the display, nor on the buttons, since this clearifies after further usage. The users show some difficulties interacting with functions such as the pattern sequencer and some editing in tape mode. The users also sometimes show difficulties determining which mode the synthesizer is in.

    All of the usability tests were performed on a pre beta version of the OP-1. The final version of the synthesizer has been updated with changes influenced by the results of this report.

     

  • 291.
    Abrahamyan, Lilit
    et al.
    University of Amsterdam.
    Schaap, Jorrit A.
    Hoekstra, Alfons G.
    Shamonin, Denis
    M.A.Box, Frieke
    Van der Geest, Rob J.
    H.C. Reiber, Johan
    M.A. Sloot, Peter
    A Problem Solving Environment for Image-Based Computational Hemodynamics2005Conference paper (Refereed)
    Abstract [en]

    We introduce a complete problem solving environment designed for pulsatile flows in 3D complex geometries, especially arteries. Three-dimensional images from arteries, obtained from e.g. Magnetic Resonance Imaging, are segmented to obtain a geometrical description of the arteries of interest. This segmented artery is prepared for blood flow simulations in a 3D editing tool, allowing to define in- and outlets, to filter and crop part of the artery, to add certain structures ( e.g. a by-pass, or stents ), and to generate computational meshes as input to the blood flow simulators. Using dedicated fluid flow solvers the time dependent blood flow in the artery during one systole is computed. The resulting flow, pressure and shear stress fields are then analyzed using a number of visualization techniques. The whole environment can be operated from a desktop virtual reality system, and is embedded in a Grid computing environment.

  • 292.
    Abrate, Matteo
    et al.
    CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Bacciu, Clara
    CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Hast, Anders
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Visual Information and Interaction. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis and Human-Computer Interaction. CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Marchetti, Andrea
    CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Minutoli, Salvatore
    CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Tesconi, Maurizio
    CNR Natl Res Council, Inst Informat & Telemat, I-56124 Pisa, Italy.
    Geomemories - A Platform for Visualizing Historical, Environmental and Geospatial Changes of the Italian Landscape2013In: ISPRS International Journal of Geo-Information. Special issue: Geospatial Monitoring and Modelling of Environmental Change, ISSN 2220-9964, Vol. 2, no 2, p. 432-455Article in journal (Refereed)
    Abstract [en]

    The GeoMemories project aims at publishing on the Web and digitally preserving historical aerial photographs that are currently stored in physical form within the archives of the Aerofototeca Nazionale in Rome. We describe a system, available at http://www.geomemories.org, that lets users visualize the evolution of the Italian landscape throughout the last century. The Web portal allows comparison of recent satellite imagery with several layers of historical maps, obtained from the aerial photos through a complex workflow that merges them together. We present several case studies carried out in collaboration with geologists, historians and archaeologists, that illustrate the great potential of our system in different research fields. Experiments and advances in image processing technologies are envisaged as a key factor in solving the inherent issue of vast amounts of manual work, from georeferencing to mosaicking to analysis.

  • 293.
    Abreu, Rodrigo
    et al.
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis, NA (closed 2012-06-30).
    Jansson, Niclas
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis, NA (closed 2012-06-30).
    Hoffman, Johan
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis, NA (closed 2012-06-30).
    Adaptive computation of aeroacoustic sources for a rudimentary landing gear using lighthill's analogy2011In: 17th AIAA/CEAS AeroacousticsConference 2011: 32nd AIAA Aeroacoustics Conference, 2011Conference paper (Refereed)
    Abstract [en]

    We present our simulation results for the benchmark problem of the ow past a Rudimentary Landing Gear (RLG) using a General Galerkin (G2) nite element method, also referred to as Adaptive DNS/LES. In G2 no explicit subgrid model is used, instead the compuational mesh is adaptively re ned with respect to an a posteriori error es-timate of a quantity of interest in the computation, in this case the drag force on the RLG. Turbulent boundary layers are modeled using a simple wall layer model with the shear stress at walls proportional to the skin friction, which here is assumed to be small and, therefore, can be approximated by zero skin friction. We compare our results with experimental data and other state of the art computations, where we nd good agreement in sound pressure levels, surface velocities and ow separation. We also compare with detailed surface pressure experimental data where we nd largely good agreement, apart from some local dierences for which we discuss possible explanations.

  • 294.
    Abrishambaf, Reza
    et al.
    Department of Engineering Technology Miami University Hamilton, OH.
    Bal, Mert
    Department of Engineering Technology Miami University Hamilton, OH.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Distributed Home Automation System Based on IEC 61499 Function Blocks and Wireless Sensor Networks2017In: 2017 IEEE International Conference on Industrial Technology (ICIT), Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 1354-1359Conference paper (Refereed)
    Abstract [en]

    In this paper, a distributed home automation system will be demonstrated. Traditional systems are based on a central controller where all the decisions are made. The proposed control architecture is a solution to overcome the problems such as the lack of flexibility and re-configurability that most of the conventional systems have. This has been achieved by employing a method based on the new IEC 61499 function block standard, which is proposed for distributed control systems. This paper also proposes a wireless sensor network as the system infrastructure in addition to the function blocks in order to implement the Internet-of-Things technology into the area of home automation as a solution for distributed monitoring and control. The proposed system has been implemented in both Cyber (nxtControl) and Physical (Contiki-OS) level to show the applicability of the solution.

  • 295.
    Abrishambaf, Reza
    et al.
    Department of Engineering Technology, Miami University, Hamilton, OH.
    Bal, Mert
    Department of Engineering Technology, Miami University, Hamilton, OH.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Distributed home automation system based on IEC61499 function blocks and wireless sensor networks2017In: Proceedings of the IEEE International Conference on Industrial Technology, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 1354-1359, article id 7915561Conference paper (Refereed)
    Abstract [en]

    In this paper, a distributed home automation system will be demonstrated. Traditional systems are based on a central controller where all the decisions are made. The proposed control architecture is a solution to overcome the problems such as the lack of flexibility and re-configurability that most of the conventional systems have. This has been achieved by employing a method based on the new IEC 61499 function block standard, which is proposed for distributed control systems. This paper also proposes a wireless sensor network as the system infrastructure in addition to the function blocks in order to implement the Internet-of-Things technology into the area of home automation as a solution for distributed monitoring and control. The proposed system has been implemented in both Cyber (nxtControl) and Physical (Contiki-OS) level to show the applicability of the solution

  • 296. Abu Bakar, Sakhinah
    et al.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Characterization of essential proteins in proteins interaction networks2013In: Journal of Quality Measurement and Analysis, ISSN 1823-5670, Vol. 9, no 2, p. 11-26Article in journal (Refereed)
  • 297.
    Abu Baker, Mohamed
    Linköping University, Department of Computer and Information Science, PELAB - Programming Environment Laboratory.
    Agile Prototyping: A combination of different approaches into one main process2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Software prototyping is considered to be one of the most important tools that are used by software engineersnowadays to be able to understand the customer’s requirements, and develop software products that are efficient,reliable, and acceptable economically. Software engineers can choose any of the available prototyping approaches tobe used, based on the software that they intend to develop and how fast they would like to go during the softwaredevelopment. But generally speaking all prototyping approaches are aimed to help the engineers to understand thecustomer’s true needs, examine different software solutions and quality aspect, verification activities…etc, that mightaffect the quality of the software underdevelopment, as well as avoiding any potential development risks.A combination of several prototyping approaches, and brainstorming techniques which have fulfilled the aim of theknowledge extraction approach, have resulted in developing a prototyping approach that the engineers will use todevelop one and only one throwaway prototype to extract more knowledge than expected, in order to improve thequality of the software underdevelopment by spending more time studying it from different points of view.The knowledge extraction approach, then, was applied to the developed prototyping approach in which thedeveloped model was treated as software prototype, in order to gain more knowledge out of it. This activity hasresulted in several points of view, and improvements that were implemented to the developed model and as a resultAgile Prototyping AP, was developed. AP integrated more development approaches to the first developedprototyping model, such as: agile, documentation, software configuration management, and fractional factorialdesign, in which the main aim of developing one, and only one prototype, to help the engineers gaining moreknowledge, and reducing effort, time, and cost of development was accomplished but still developing softwareproducts with satisfying quality is done by developing an evolutionary prototyping and building throwawayprototypes on top of it.

  • 298.
    Abu Khousa, Eman
    et al.
    UAE University, Al Ain, United Arab Emirates.
    Atif, Yacine
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Social network analysis to influence career development2017In: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Article in journal (Refereed)
    Abstract [en]

    Social network analysis techniques have shown a potential for influencing gradu-ates to meet industry needs. In this paper, we propose a social-web driven solutions to bridge formal education and industry needs. The proposed career development frame-work utilizes social network analytics, influence diffusion algorithms and persuasive technology models along three phases: (1) career readiness to measure and visualize the general cognitive dispositions required for a successful career in the 21st Century, (2) career prediction to persuade future graduates into a desired career path by clustering learners whose career prospects are deemed similar, into a community of practice; and (3) career development to drive growth within a social network structure where social network analytics and persuasive techniques are applied to incite the adoption of desired career behaviors. The process starts by discovering behavioral features to create a cognitive profile and diagnose individual deficiencies. Then, we develop a fuzzy clustering algorithm that predicts similar patterns with controlled constraint-violations to construct a social structure for collaborative cognitive attainment. This social framework facilitates the deployment of novel influence diffusion approaches, whereby we propose a reciprocal-weighted similarity function and a triadic clo-sure approach. In doing so, we investigate contemporary social network analytics to maximize influence diffusion across a synthesized social network. The outcome of this social computing approach leads to a persuasive model that supports behavioral changes and developments. The performance results obtained from both analytical and experi-mental evaluations validate our data-driven strategy for persuasive behavioral change.

  • 299.
    Abu Khousa, Eman
    et al.
    UAE University, United Arab Emirates.
    Atif, Yacine
    UAE University, United Arab Emirates.
    Mohammad M., Masud
    UAE University, United Arab Emirates.
    A social learning analytics approach to cognitive apprenticeship2015In: Smart Learning Environments, ISSN 2196-7091, Vol. 2, no 14Article in journal (Refereed)
    Abstract [en]

    The need for graduates who are immediately prepared for employment has been widely advocated over the last decade to narrow the notorious gap between industry and higher education. Current instructional methods in formal higher education claim to deliver career-ready graduates, yet industry managers argue their imminent workforce needs are not completely met. From the candidates view, formal academic path is well defined through standard curricula, but their career path and supporting professional competencies are not confidently asserted. In this paper, we adopt a data analytics approach combined with contemporary social computing techniques to measure, instil, and track the development of professional competences of learners in higher education. We propose to augment higher-education systems with a virtual learning environment made-up of three major successive layers: (1) career readiness, to assert general professional dispositions, (2) career prediction to identify and nurture confidence in a targeted domain of employment, and (3) a career development process to raise the skills that are relevant to the predicted profession. We analyze self-declared career readiness data as well as standard individual learner profiles which include career interests and domain-related qualifications. Using these combinations of data sources, we categorize learners into Communities of Practice (CoPs), within which learners thrive collaboratively to build further their career readiness and assert their professional confidence. Towards these perspectives, we use a judicious clustering algorithm that utilizes a fuzzy-logic objective function which addresses issues pertaining to overlapping domains of career interests. Our proposed Fuzzy Pairwise-constraints K-Means (FCKM) algorithm is validated empirically using a two-dimensional synthetic dataset. The experimental results show improved performance of our clustering approach compared to baseline methods.

  • 300.
    Abu Nijmeh, Jonas
    et al.
    KTH, School of Computer Science and Communication (CSC).
    Catalan Canales, Diego
    KTH, School of Computer Science and Communication (CSC).
    Prokrastinering i form av medieanvändning: En jämförelsestudie kring kön och sysselsättning2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Procrastination has long been a problem for many. Whether it is school work, training or something else, most individuals have experienced that they deliberately postpone a task for a later occasion. This phenomenon has in recent time been integrated into our society in a negative way. In our media-centered society we are becoming more connected where nowadays almost all of Sweden's population has access to the internet. Technology has brought many opportunities, but it has also opened up for new ways to procrastinate.

    This study aimed to investigate procrastination in the form of media usage by a large target group. We intended to find out eventual differences in procrastination habits between the sexes, but also between workers and students. Previous research has already shown that procrastination differs with age and occupation. With this in mind we seek to answer the question: Which digital media does people use when they procrastinate and on which technical platforms does this happen? In order to answer this question, we conducted a preliminary study on a smaller group of people to get a better understanding of what matters were relevant in this context. This preliminary study then formed the basis for a survey of 91 participants.

    The results showed clear differences between both men and women and between students and workers. Differences regarding both media usage and procrastination habits were seen where some differences were more notable than others. The result confirms previous studies in several aspects and gives us some insight into how different procrastination habits might look.

3456789 251 - 300 of 48265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf