Change search
Refine search result
56575859606162 2901 - 2950 of 3401
Cite
Citation style
• apa
• ieee
• modern-language-association-8th-edition
• vancouver
• Other style
More styles
Language
• de-DE
• en-GB
• en-US
• fi-FI
• nn-NO
• nn-NB
• sv-SE
• Other locale
More languages
Output format
• html
• text
• asciidoc
• rtf
Rows per page
• 5
• 10
• 20
• 50
• 100
• 250
Sort
• Standard (Relevance)
• Author A-Ö
• Author Ö-A
• Title A-Ö
• Title Ö-A
• Publication type A-Ö
• Publication type Ö-A
• Issued (Oldest first)
• Created (Oldest first)
• Last updated (Oldest first)
• Disputation date (earliest first)
• Disputation date (latest first)
• Standard (Relevance)
• Author A-Ö
• Author Ö-A
• Title A-Ö
• Title Ö-A
• Publication type A-Ö
• Publication type Ö-A
• Issued (Oldest first)
• Created (Oldest first)
• Last updated (Oldest first)
• Disputation date (earliest first)
• Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
• 2901.
Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
Utveckling av prototyp för e-tjänst till överklagningar2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis

This report describes an examination project that has been performed at the Swedish Board of Agriculture in Jönköping. The task was to develop a prototype of an e-service to appeals with focus on usability.

The Swedish Board of Agriculture is a public authority who works to fulfil the general goals of agricultural and food policy in Sweden. One of their main tasks is to administrate EU funding to the agricultural sector.

However, they have noticed problems with appeals from agriculturalist who wants to appeal different decisions to their agriculture. The appeals aren’t always complete and it takes more work and time to handle them.

Swedish Board of Agriculture wants to investigate the possibility to introduce an e-service for appeals. The e-service will guide a user through an appeal and ask about necessary information to make the appeal as correct and complete as possible.

The users have different experiences of appealing and computer usage and therefore the purpose of this study have been to develop a prototype of an e-service that will focus on the usability.

The main research question is:

• How can you develop a usable e-service with consideration to graphical and functional interface to the users?

The goal with this study is to develop a prototype of an e-service that follows the requirements from Swedish Board of Agriculture and the research for the study on usability.

The project has followed Swedish Board of Agricultures working process. Different steps has been planning, specification of requirements, develop a prototype and evaluation of the prototype.

The study has resulted in a prototype of an e-service for appeals that has been developed with support from specifications of requirements and the research about usability. The result shows different parts of how the prototype can look like with a development focus on theories about usability.

A conclusion of this work is that studies and theories about usability are important when you are developing web pages. This is because the web page is being designed to increase the understanding for users on how to use it. Usability is necessary to consider such that a developer does not make any assumptions about the users experience about Internet usage.

• 2902.
Linköping University, Department of Computer and Information Science, Software and Systems.
Testing Safety Critical Avionics Software Using LBTest2016Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis

A case study for the tool LBTest illustrating benets and limitations of the tool along the terms of usability, results and costs. The study shows the use of learning based testing on a safety critical application in the avionics industry. While requiring the user to have the oretical knowledge of the tools inner workings, the process of using the tool has benefits in terms of requirement analysis and the possibility of finding design and implementation errors in both the early and late stages of development

• 2903.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
Skadereglering med fokus på kund: Försäkringsbolag arbetar med ständiga förbättringar2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

• 2904.
Lund university.
Lund university.
An adaptive cache coherence protocol optimized for migratory sharing1993Conference paper (Refereed)

Parallel programs that use critical sections and are executed on a shared-memory multiprocessor with a write-invalidate protocol result in invalidation actions that could be eliminated. For this type of sharing, called migratory sharing, each processor typically causes a cache miss followed by an invalidation request which could be merged with the preceding cache-miss request. The authors propose an adaptive protocol that invokes this optimization dynamically for migratory blocks. For other blocks, the protocol works as an ordinary write-invalidate protocol. They show that the protocol is a simple extension to a write-invalidate protocol. Based on a program-driven simulation model of an architecture similar to the Stanford DASH, and a set of four benchmarks, they evaluate the potential performance improvements of the protocol. They find that it effectively eliminates most single invalidations which improves the performance by reducing the shared access penalty and the network traffic.

• 2905.
University of Skövde, School of Humanities and Informatics.
I jakten på flow: Gameplay Progression i Pervasive Games2013Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis

Hur kan svårighetsprogression användas i skapandet av Puzzlehunts med syfte att uppnå en ökad upplevd känsla av flow hos spelaren? Denna frågeställning behandlas i uppsatsen och problemet som måste lösas är hur man kan bygga upp en ackumulerad kunskap om något vars syfte är att hela tiden tvinga dig att hitta nya lösningar på problem. I mer traditionella spel kan upprepning lära spelaren hur spelmekaniken fungerar. I puzzlehunts kan upprepning av spelmekanik inte användas eftersom målet för varje pussel är att hitta mekaniken som löser problemet. Uppsatsen visar att man genom inlärning av hur man skall tänka för att hitta lösningarna till pusslen kan bygga upp en ackumulerad kunskap hos spelaren och därmed även ha en svårighetsprogression och öka upplevd nivå av flow hos spelaren.

• 2906.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
The practice of enterprise modeling:First IFIP WG 8.1 working conference, poem 2008 stockholm, sweden, november 12-13, 2008 proceedings2008In: 1st IFIP WG 8.1 Working Conference on Practice of Enterprise Modeling, PoEM 2008, 2008Conference paper (Refereed)
• 2907.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
Joint Research Centre of the European Commission.
A Cognitive access framework for privacy protection in mobile cloud computing2014In: Mobile Computing over Cloud: Technologies, Services, and Applications / [ed] Joel J.P. Rodrigues, Kai Lin and Jaime Lloret, Hershey: Information Science Reference (an imprint of IGI Global) , 2014, p. 92-117Chapter in book (Refereed)

Information systems and wireless communications are becoming increasingly present in the everyday life of citizens both from a personal and business point of view. A recent development in this context is Mobile Cloud Computing (MCC), which is the combination of Cloud Computing and pervasive mobile networks. Ensuring the preservation of privacy can be difficult in MCC. Therefore, this chapter provides an overview of the main challenges in ensuring privacy in MCC and surveys the most significant contributions from the research community. The second objective of the chapter is to introduce and describe a new framework for privacy protection based on the concepts of Virtual Object (VO) and Composite Virtual Object (CVO), where data are encapsulated and protected using a sticky policy approach and a role-based access model. The proposed iCore framework is compared to the privacy challenges described in the first objective.

• 2908.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
The MobiLeak Project: Forensics Methodology for Mobile Application Privacy Assessment2012In: 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012, ICITST , 2012, p. 297-303Conference paper (Refereed)

When talking about privacy, we talk about infor- mation, about data. There are several aspects that have to be considered when aiming to assess the privacy level of an application. These aspects are the states in which data can exist: data at rest, data in use and data in transit. Each of these require different methodologies and technologies in order to be properly addressed. This paper focuses on the state where data are at rest. It will be shown how common mobile forensics methodologies and tools can be used to assess the privacy level of mobile applications, and therefore how mobile applications store and manage personal information.

• 2909.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
Joint Research Centre of the European Commission.
Secure Bluetooth for Trusted m-Commerce2013In: International Journal of Communications, Network and System Sciences (IJCNS), ISSN 1913-3723, Vol. 6, no 6, p. 277-288Article in journal (Refereed)

Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe conse- quences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.

• 2910.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Network Systems Laboratory (NS Lab).
Joint Research Centre of the European Commission. KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Network Systems Laboratory (NS Lab).
Data-in-use leakages from Android memory - Test and analysis2013In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, IEEE , 2013, p. 701-708Conference paper (Refereed)

Due to their increasing pervasiveness, smartphones and more in general mobile devices are becoming the citizen’s companions in the daily life activities. Smartphones are today the repositories of our secrets (photos, email), of our money (online e-commerce) and of our identities (social networks accounts). Therefore mobile applications have the responsibility of handling such sensitive and personal information in a proper, secure way. This paper present the second phase of the MobiLeak project, analysing how mobile applications manage users data when these are loaded in the volatile memory of the device. Scope of this work is to raise the awareness of the research and development communities on the poor attention that is generally paid in the secure development of mobile applications.

• 2911.
University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management.
Kommuner och myndigheters DNSSEC och IPv6 status1983Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis

IP-adresserna under IPv4 är inte tillräckliga och har på många delar i världen redan tagit slut. IPv6 erbjuder många fler tillgängliga adresser och övergången till protokollet har redan börjat. Det Gävlebaserade företaget Interlan erbjuder en tjänst som kontrollerar om kommuner och myndigheter i de nordiska länderna är nåbara via IPv6 samt om de är säkrade med DNSSEC. Denna rapport beskriver jobbet med att förbättra och göra deras tjänst anpassningsbar för flera länder. Processen som beskrivs är parametriseringen av skripten som samlar data, skapandet av en databas att lagra data i, och ändringar till hur data presenteras så att det går att lägga till flera länder.

• 2912.
Mälardalen University, School of Innovation, Design and Engineering.
Reconstructing the Architecture Model for a Sustainable Software Architecture2008Conference paper (Refereed)

Sustainable software architecture which has evolved over more than ten years and is to live and change for at least another decade is very difficult to capture in an architecture model. The architecture is often a mixture of old and new tactics and the system use cases which were once valid do not longer capture the essence of all of the system's functionality and business goals.

The presentation will discuss how an architecture team was to document a sustainable software architecture according to a model so that the architecture could be communicated among its stakeholders. The team started from the SEI books; "Documenting Software Architecture: Views and Beyond" and "Software Architecture in Practice".

The team vision was to capture all domain specific issues as trends and experiences, quality attribute specific issues and business goals issues which influence the architecture at enterprise-, system- and software level in one model.

The effects of changing business goals and software quality attributes on system architecture and software design should be made visible in the model. By making the relationships visible the architects would be able to see what effect a changing business goal could have on the architecture or even predict how a shift in technology would affect the system and software architecture. The model would then serve as a decision guiding tool and be used in an active fashion instead of merely being a blueprint of the software architecture construction of today.

The vision of documenting the different architecture levels in one model was more complex to realize than expected. What the case study ended up in was a conflict between the common approach of dividing the architecture into different views and the need of sustainable systems to accommodate changes in business goals, technology environment, and enterprise constructions affecting the architecture in one adaptive architecture model.

This presentation aims at open up the discussion on how to document continuously changing architecture at enterprise-, system- and software level in one and the same model.

• 2913.
ABB Corporate Research, Sweden.
Carnegie Mellon University, USA. Carnegie Mellon University, USA. Carnegie Mellon University, USA.
Integrating Usability-Supporting Architecture Patterns in a Product Line Systems Architecture2009Conference paper (Refereed)

This presentation will describe the application of Usability Supporting Architectural Patterns (USAPs) to the architecture design of a product line of systems. The patterns were delivered by a web enabled prototype tool. The tool prompted the designers with architecture responsibilities specific to their chosen usability scenarios, then required the designers to respond to each responsibility and additionally provided the designer with implementation instructions in a textual, rather than a component, form. The designers used the USAP delivery tool in the early design phase and were extremely positive. Two designers using the USAP delivery tool for five hours discovered 14 major issues related to usability support in the core architecture not previously incorporated in the architecture design. Two potential new subsystems were identified during this exercise.

• 2914.
KTH, School of Information and Communication Technology (ICT).
Utveckling av GUI utifrån en given affärsprocess2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

Preem is a Swedish company that operates in the oil industry, which is controlled by very high sales and with relatively small margins. It’s therefore essential with a well working stock control. Today they are looking for a better way of monitoring the stock with a higher precision and therefore they need a new system for that.

My role at Preem was to take a closer look at the GUI and the processes behind that. It resulted in this thesis that includes the user interface for the new system and the business processes that are linked to this. The work will focus on how these two methods are produced in relation to each other, and the methods that are used to construct them. The thesis includes illustrations of as-is and to-be process models of the BPMN specification, wireframes and a sitemap.

This report shows a proposal of an integrating system and an intuitive GUI with new processes, at Preem, and how the balance is between creating business processes and a graphical user interface out of each other, depending on the people who are involved in the project.

• 2915.
KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
Power-supply noise attributed timing jitter in nonoverlapping clock generation circuits2006Conference paper (Refereed)

This work describes an analysis of timing jitter induced by power-supply noise in nonoverlapping clock generation circuits typically used in switched-capacitor sigma-delta modulators. Substrate noise effects are also included but not treated as a separate phenomenon since the MOSFET bulk contacts are connected to the power-supply or ground. Two different nonoverlapping clock generation circuits have been compared and treated independently: the NOR based and the NAND based architectures. Furthermore, all possible connection topologies of the circuit blocks in the clock generation circuits are investigated. Monte Carlo simulations have been performed in Spectre at BSIM3v3 transistor model level using parameters from a 0.18μm process to show which of the topologies is most suitable as clock generator for wideband applications. In terms of timing jitter sensitivity to power-supply noise, the NOR based architecture is slightly more robust and suitable for providing a timing reference to a sampling circuit.

• 2916.
Westermo Research and Development, Sweden.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Automated System Level Regression Test Prioritization in a Nutshell2017In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 34, no 4, p. 30-37, article id 7974685Article in journal (Refereed)

Westermo Research and Development has developed SuiteBuilder, an automated tool to determine an effective ordering of regression test cases. The ordering is based on factors such as fault detection success, the interval since the last execution, and code modifications. SuiteBuilder has enabled Westermo to overcome numerous regression-testing problems, including lack of time to run a complete regression suite, failure to detect bugs in a timely manner, and repeatedly omitted tests. In the tool's first two years of use, reordered test suites finished in the available time, most fault-detecting test cases were located in the first third of suites, no important test case was omitted, and the necessity for manual work on the suites decreased greatly.

• 2917.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Westermo R & D AB, Sweden.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Decision Making and Visualizations Based on Test Results2018In: Empirical Software Engineering and Measurement, 12th International Symposium on ESEM18, 2018Conference paper (Refereed)

Background: Testing is one of the main methods for quality assurance in the development of embedded software, as well as in software engineering in general. Consequently, test results (and how they are reported and visualized) may substantially influence business decisions in software-intensive organizations. Aims: This case study examines the role of test results from automated nightly software testing and the visualizations for decision making they enable at an embedded systems company in Sweden. In particular, we want to identify the use of the visualizations for supporting decisions from three aspects: in daily work, at feature branch merge, and at release time. Method: We conducted an embedded case study with multiple units of analysis by conducting interviews, questionnaires, using archival data and participant observations. Results: Several visualizations and reports built on top of the test results database are utilized in supporting daily work, merging a feature branch to the master and at release time. Some important visualizations are: lists of failing test cases, easy access to log files, and heatmap trend plots. The industrial practitioners perceived the visualizations and reporting as valuable, however they also mentioned several areas of improvement such as better ways of visualizing test coverage in a functional area as well as better navigation between different views. Conclusions: We conclude that visualizations of test results are a vital decision making tool for a variety of roles and tasks in embedded software development, however the visualizations need to be continuously improved to keep their value for its stakeholders.

• 2918.
Westermo Research and Development AB, Västerås, Sweden.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Experience Report: Automated System Level Regression Test Prioritization Using Multiple Factors2016In: 27th International Symposium on Software Reliability Engineering ISSRE'16, 2016Conference paper (Refereed)

We propose a new method of determining an effective ordering of regression test cases, and describe its implementation as an automated tool called SuiteBuilder developed by Westermo Research and Development AB. The tool generates an efficient order to run the cases in an existing test suite by using expected or observed test duration and combining priorities of multiple factors associated with test cases, including previous fault detection success, interval since last executed, and modifications to the code tested. The method and tool were developed to address problems in the traditional process of regression testing, such as lack of time to run a complete regression suite, failure to detect bugs in time, and tests that are repeatedly omitted. The tool has been integrated into the existing nightly test framework for Westermo software that runs on large-scale data communication systems.  In experimental evaluation of the tool, we found significant improvement in regression testing results. The re-ordered test suites finish within the available time, the majority of fault-detecting test cases are located in the first third of the suite, no important test case is omitted, and the necessity for manual work on the suites is greatly reduced.

• 2919.
Mälardalen University, School of Innovation, Design and Engineering.
Model-based Testing on Generated C Code2015Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis

In this master thesis we investigated whether it is possible to use automatically generated C code from Function Block Diagram models as an input to the CPAchecker model checker in order to generate automated test cases. Function Block Diagram is a non-executable programming and modeling language. Consequently, we need to transform this language to an executable language that can be model checked. A tool that achieves this is the MITRAC tool, a proprietary development tool used in the embedded system domain, for engineering programmable logic controllers. The purpose of this research was to investigate to what extent the generated C code using MITRAC can be reused as an input to the CPAchecker tool for automated test case generation. In order to achieve this we needed to perform certain transformations steps on the existing code. In addition, necessary instrumentations were needed in order to trigger CPAtiger, an extension of CPAchecker which generates test cases, to achieve maximum condition coverage. We showed that by performing the required modifications it is feasible to reuse the generated C code as an input to CPAchecker tool. We also showed an approach for mapping the generated test cases with the actual Function Block Diagram. We performed mutation analysis in order to evaluate the quality of the generated test cases in terms of the number of injected faults they detect. Test case generation with CPAchecker could be improved in the future in terms of reducing the number of transformations and instrumentations that are currently needed. In order to achieve this we need to add to CPAchecker tool support for structures that are used in C, such as structs. Finally we can extend the type of logic coverage criteria we can use with CPAchecker by adding additional support of FQL language.

• 2920.
Bombardier Transportation, Sweden.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
A Practical Approach towards Validating HIL Simulation of a Safety-critical System2017In: The 28th International Symposium on Software Reliability Engineering (ISSRE) - IEEE ISSRE 2017, 2017, p. 40-43Conference paper (Refereed)

In order to perform efficient testing of software intensive safety-critical products, organisations often utilise hardware-in-the-loop simulation of the system under test surrounding environment. This way, the system could be invoked and its behaviour could be observed in a controlled setting rather than in the field. However, what effect simulation quality might have on the effectiveness of the testing process still remains an open question. An answer to such a question is rather critical for organisations who are obliged to safety certify their products. In this paper, we are presenting an approach used by Bombardier Transportation to validate their hardware-in-the-loop simulation of a safety-critical system, by executing test cases both in the control setting (lab) and on the real product (train). The process is intended to be used when certifying the simulation which is a necessary step in order to certify the complete system. In addition, we are also presenting some observations from the pilot study and lessons learned.

• 2921.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Space Technology.
Crowdsourcing GNSS Jamming Detection and Localization2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

Global Navigation Satellite Systems (GNSS) have found wide adoption in various applications, be they military, civilian or commercial. The susceptibility of GNSS to radio-frequency interference can, thus, be very disruptive, even for emergency services, therefore threatening people's lives. An early prototype of a system providing relatively cheap widescale GNSS jamming detection, called J911, is explored in this thesis.

J911 is smartphone-based crowdsourcing of GNSS observations, most interesting of which are carrier-to-noise-density ratio ($\frac{C}{N_0}$) and Automatic Gain Control (AGC) voltage. To implement the prototype, an Android application to provide the measurements, a backend to parse and store the measurements, and a frontend to visualize the measurements were developed. In real-world use, the thesis argues, the J911 system would best be implemented over existing Enhanced 9-1-1 (E911) infrastructure, becoming a standardized part of the Public Switched Telephone Network (PSTN).

The Android application, running on a smartphone, would periodically construct messages to be sent to the backend over an Internet connection. The messages would include: current location from all location providers available in Android OS, observed satellites from all supported constellations, the satellites' $\frac{C}{N_0}$, and a timestamp. Once a message is received on the backend, the data would be extracted and stored in a database. The frontend would query the database and produce a map with the collected datapoints overlaid on top of it, whose color indicates received signal strength at that point. When a jammer gets close enough to a few smartphones, they will all be jammed, which is easily observed on the map. On top of that, if enough samples are gathered, a Power Difference of Arrival localization algorithm can be used to localize the jammer.

The smartphones that the system was planned to be tested with did not support AGC level readings, therefore in order to obtain AGC levels over time, a few SiGe GN3S Samplers, which are radio-frequency frontends, were used. In eastern Idaho, United States, over three nights in July 2017, an exercise, named 2017 DHS JamX, was performed with the help of the US Department of Homeland Security. Sadly, the approval for the publication of the test results did not come in time to be included in this thesis.

• 2922.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Computer and System science.
Rapporteringsfunktion i Moodle2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

Maincon AB is a company that among other things develops courses togetherwith other companies and then teach these courses via Moodle which is aplatform for e-learning. The company wanted help to improve a report-functionfor a plugin in Moodle so they could get a better overview of the situation in acourse. This project is a continuation of a previous project that implemented achart that visually improved the overview. In this project, the method toimprove the overview was to create a new version of the previous PHP solutionthat lacked the functionality. A new and improved version was created withJavaScript where more information could be shown and filtered in HTML, andthe same information could be exported to CSV and then imported to Excel.

• 2923.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology. Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, Database and information techniques.
Using Statistical Information for Efficient Design and Evaluation of Hybrid XML Storage2011In: International Journal On Advances in Software, ISSN 1942-2628, E-ISSN 1942-2628, Vol. 4, no 3-4, p. 389-400Article in journal (Refereed)

Modern relational database management systems provide hybrid XML storage, combining relational and native technologies. Hybrid storage offers many design alternatives for XML data. In this paper we explore how to aid the user in effective design of hybrid storage. In particular we investigate how the XML schema and statistical information about the data can support the storage design process. In our previous work, we presented our tool HShreX that uses statistical information about a data set to enable fast evaluation of alternative hybrid design solutions. In this paper, we extend this work by presenting more details about the tool and results of an extended evaluation. In particular, this paper gives a detailed presentation on how the tool aids in the storage design and evaluation process.

• 2924.
KTH, School of Electrical Engineering (EES), Communication Networks.
KTH, School of Electrical Engineering (EES), Communication Networks. KTH, School of Electrical Engineering (EES), Communication Networks.
Android privacy C(R)ache: Reading your external storage and sensors for fun and profit2016In: PAMCO 2016 - Proceedings of the 2nd MobiHoc International Workshop on Privacy-Aware Mobile Computing, Association for Computing Machinery (ACM), 2016, p. 1-10Conference paper (Refereed)

Android's permission system empowers informed privacy decisions when installing third-party applications. However, examining the access permissions is not enough to assess privacy exposure; even seemingly harmless applications can severely expose user data. This is what we demonstrate here: an application with the common READ-EXTERNAL-STORAGE and the INTERNET permissions can be the basis of extracting and inferring a wealth of private information. What has been overlooked is that such a "curious" application can prey on data stored in the Android's commonly accessible external storage or on unprotected phone sensors. By accessing and stealthily extracting data thought to be unworthy of protection, we manage to access highly sensitive information: user identifiers and habits. Leveraging data-mining techniques, we explore a set of popular applications, establishing that there is a clear privacy danger for numerous users installing innocent-looking and but, possibly, "curious" applications.

• 2925.
Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM). Linnaeus University.
Measurement of interactive manual effectiveness: How do we know if our manuals are effective?2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

Multimedia learning is today a part of everyday life. Learning from digital sources on the internet is probably more common than printed material. The goal of this project is to determine if measuring user interaction in a interactive manual can be of use to evaluate the effectiveness of the manual. Since feedback of multimedia learning materials is costly to achieve in face-to-face interaction, automatic feedback data might be useful for evaluating and improving the quality of multimedia learning materials.

In this project an interactive manual was developed for a real-world report generating application. The manual was then tested on 21 test users. Using the k-nearest neighbour machine learning algorithm the results shows that time taken on each step and the number of views on each step did not provide for good evaluation of the manual. Number of faults done by the user was good at predicting if the user would abort the manual and in combination with the number of acceptable interactions the usability data did provide for a better classification then ZeroR classification. The conclusions can be questioned by the small dataset used in this project.

• 2926.
Mälardalen University, School of Innovation, Design and Engineering.
Mälardalen University, School of Innovation, Design and Engineering.
Proportional Cache-fair Scheduling for Multi-core Systems2008In: Proceedings Work-In-Progress Session of the 20th Euromicro Conference on Real-Time Systems, 2008, p. 48-51Conference paper (Refereed)

In this paper we present a cache-aware real-time scheduling algorithm for multi-core platforms. It uses the standard timing constrains of the tasks together with the hardware counter statistics to yield unique task priorities. Scheduling according to timing constraints criterion enforces timely completion of the tasks while the cache-fair thread scheduling ensures that tasks to which shared caches are unequally allocated are compensated by assigning more or less processor time.

• 2927.
Linköping University, Department of Electrical Engineering.
An Analysis and Comparison of The Security Features of Firewalls and IDSs2011Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the main devices used for the network security are the firewalls and IDS/IPS that provide perimeter defense. Both devices provide many overlapping security features but they have different aims, different protection potential and need to be used together. A firewall is an active device that implements ACLs and restricts unauthorized access to protected resources. An IDS only provides information for further necessary actions, not necessarily perimeter related, but some of these needed actions can be automated, such as automatic blocking in the firewall of attacking sites, which creates an IPS. This thesis report analyzed some common firewall and IDS products, and described their security features, functionalities, and limitations in detail. It also contains the comparison of the security features of the both devices. The firewall and IDS perform different functions for the network security, so they should be used in layered defense architecture. The passwords, firewalls, IDSs/IPSs and physical security all together provide a layered defense and complement each other. The firewall and IDS alone cannot offer sufficient network protection against the network attacks, and they should be used together to enhance the defense-in-depth or layered approach.

• 2928. Sulewski, Patryk
Experimental Investigation of Container-based Virtualization Platforms For a Cassandra Cluster2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

• 2929.
Mälardalen University, School of Innovation, Design and Engineering.
Mälardalen University, School of Innovation, Design and Engineering.
Applying Model Checking for Verifying the Functional Requirements of a Scania’s Vehicle Control System2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

Model-based development is one of the most significant areas in recent research and development activities in the field of automotive industry. As the field of software engineering is evolving, model based development is gaining more and more importance in academia and industry. Therefore, it is desirable to have techniques that are able to identify anomalies in system models during the analysis and design phase instead of identifying them in development phase where it is difficult to detect them and a lot of time, effort and resources are required to fix them. Model checking is a formal verification technique that facilitates the identification of defects in system models during early stages of system development. There are a lot of tools in academia and industry that provide the automated support for model checking.

In this master thesis a vehicle control system of Scania the Fuel Level Display System is modeled in two different model checking tools; Simulink Design Verifier and UPPAAL. The requirements that are to be satisfied by the system model are verified by both tools. After verifying the requirements against the system model and checking the model against general design errors, it is established that the model checking can be effectively used for detecting the design errors in early development phases and can help developing better systems. Both the tools are analyzed depending upon the features supported. Moreover, relevance of model checking is studied with respect to ISO 26262 standard.

• 2930.
University of Freiburg.
University of Freiburg. University of Freiburg.
Decentralized Hash Tables For Mobile Robot Teams Solving Intra-Logistics Tasks2010In: 9th Int. Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2010), International Foundation for Autonomous Agents and , 2010, p. 923-930Conference paper (Refereed)

• 2931.
Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Xian, China.
Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Xian, China. Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Xian, China. Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Xian, China. Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Xian, China. Department of Production, University of Vaasa, Vaasa, Finland.
Evaluation method of productâservice performance2012In: International journal of computer integrated manufacturing (Print), ISSN 0951-192X, E-ISSN 1362-3052, Vol. 25, no 2, p. 150-157Article in journal (Refereed)

In order to analyse productâservice performance (PSP) during productâservice systems’ (PSSs) running time, a PSP evaluation method is proposed. Interrelationship between a PSS’s provider and accepter is defined as productâservice relationship (PSR). Concepts of productâservice network and productâservice chain are put forward to describe interrelationship among PSRs from different perspectives. The concept of PSP is proposed to evaluate interrelationship among PSR. Detailed evaluation indexes are designed to measure the five factors of PSP, including time, quality, cost, stability and reliability. A case study is provided to test the validity and efficiency of the evaluation model of PSP. The analysis results show that the evaluation model can make good efforts in benefiting productâservice platform’s running, monitoring and optimising.

• 2932.
Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China.;Northeastern Univ, Shenyang, Liaoning, Peoples R China..
Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China.. Northeastern Univ, Shenyang, Liaoning, Peoples R China.. Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China.. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Northeastern Univ, Shenyang, Liaoning, Peoples R China..
Real-Time Scheduling and Analysis of OpenMP Task Systems with Tied Tasks2017In: 2017 IEEE Real-Time Systems Symposium (RTSS), IEEE, 2017, p. 92-103Conference paper (Refereed)

• 2933.
Blekinge Institute of Technology.
Can gameification motivate exercise: A user experiment regarding a normal exercise app compared to a gamiﬁed exercise app2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

Background. Regularly exercising is diﬃcult, some people stop exercising either due to it not being fun or they might not see any results of the eﬀort they put in. Exercise and gaming or also know as exergaming, is a way to combine the fun entertainment of games with the health beneﬁts of exercise. Objectives. The objective of this study is to conduct an experiment to ﬁnd out if people are more interested in an exercising app which has been gamiﬁed compared to a normal exercising app. Gamifyingsomethingsuggeststhatsomethingwhichisnotconsideredagamemedium is taken, and then inﬂuence with game related aspects. Methods. A prototype was created to show the participants both sides of the exercise apps, one normal app which resembles an everyday exercising app, and one gamiﬁed app which shows the user their progress in a fashion similar to role-playing games with levels and quests. The participants of the test will try both apps and later vote in a survey whichever they liked the most. Results. While only about 60% of the participants had prior experience with exercise apps, 90% would rather choose the gamiﬁed app over the normal app. 95% of the participants were regular gamers. Conclusions. The vast majority of the participants preferred the gamiﬁed version of the app over the normal one. Speciﬁcally mentioning that they ﬁnd it more interesting and that they enjoy the upfront progression system a lot more since they are used to it from the games they play on their free time

• 2934.
KTH, School of Computer Science and Communication (CSC), Human - Computer Interaction, MDI (closed 20111231).
Simula: Mother Tongue for a Generation of Nordic Programmers2010In: History of Nordic Computing 3 / [ed] John Impagliazzo, Per Lundin, Benkt Wangler, Berlin, London: Springer, 2010, p. 416-424Conference paper (Refereed)

With Simula 67 Ole-Johan Dahl and Kristen Nygaard invented object-oriented programming. This has had an enormous impact on program development tools and methods in the whole world, well accounted for in conferences and books on Programming Languages and on Object-Oriented Programming and on Software Pioneers. Early influenced were computer scientists in the Nordic countries who from about 1970 had Simula as the main programming tool, “mother tongue”. In this paper I give first hand account of experience of a uniquely early introduction of object-oriented programming for higher education in computer science and in computer programming, which gave us these powerful program development tools long before other educations, especially as it coincided with introduction of powerful interactive systems. I also want to challenge the misconception that Simula is primarily a tool for simulation, by illustrating how it was used to teach general computer science and programming concepts, with more general purpose constructs than most contemporary languages, except maybe Lisp.

• 2935.
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
Backdoor creativity: collaborative creativity in technology supported teams2004In: Cooperative systems design: senario-based design of collaborative systems / [ed] Francoise Darses, Rose Dieng, Carla Simone, Manuel Zacklad, Amsterdam: IOS Press, 2004, p. 99-114Conference paper (Refereed)
• 2936.
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
Parallel pursuit for distributed compressed sensing2013In: 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings, IEEE conference proceedings, 2013, p. 783-786Conference paper (Refereed)

We develop a greedy (pursuit) algorithm for a distributed compressed sensing problem where multiple sensors are connected over a de-centralized network. The algorithm is referred to as distributed parallel pursuit and it solves the distributed compressed sensing problem in two stages; first by a distributed estimation stage and then an information fusion stage. Along with worst case theoretical analysis for the distributed algorithm, we also perform simulation experiments in a controlled manner. We show that the distributed algorithm performs significantly better than the stand-alone (disconnected) solution and close to a centralized (fully connected to a central point) solution.

• 2937.
Mälardalen University, Department of Computer Science and Electronics.
Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics.
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis2007Report (Other academic)

Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program faults causing memory corruption can be detected by analyzing the relations between defines and uses of variables (DU-based testing). However, such methods are insufficient in preemptive systems, since they lack the ability to detect inter-task shared variable dependencies. In this paper, we propose the use of a system level shared variable DU analysis of preemptive multi-tasking real-time software. By deriving temporal attributes of each access to shared data using WCET analysis, and combining this information with the real-time schedule information, our method also detects inter-task shared variable dependencies

• 2938.
Mälardalen University, Department of Computer Science and Electronics.
Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics. Mälardalen University, Department of Computer Science and Electronics.
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis2007In: OpenAccess Series in Informatics, Volume 6, 2007Conference paper (Refereed)

Memory corruption is one of the most common software failures. For sequential software and multi-tasking software with synchronized data accesses, it has been shown that program faults causing memory corruption can be detected by analyzing the relations between defines and uses of variables (DU-based testing). However, such methods are insufficient in preemptive systems, since they lack the ability to detect inter-task shared variable dependencies. In this paper, we propose the use of a system level shared variable DU analysis of preemptive multi-tasking real-time software. By deriving temporal attributes of each access to shared data using WCET analysis, and combining this information with the real-time schedule information, our method also detects inter-task shared variable dependencies.

• 2939.
Mälardalen University.
Mälardalen University. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Knightec AB, Sweden. Knightec AB, Sweden.
Towards Attack Models in Autonomous Systems of Systems2018In: 2018 13th System of Systems Engineering Conference, SoSE 2018, 2018, p. 583-585, article id 8428701Conference paper (Refereed)
• 2940.
Mälardalen University, School of Innovation, Design and Engineering.
Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering.
Validating the Design Model of an Autonomous Truck System2009Conference paper (Refereed)

Model driven approaches have become effective solutions for the development of embedded systems. In particular, models across various abstraction layers, e.g., application, design, and implementation, provide the opportunity for applying different analysis techniques appropriate at various phases of system development. In this paper, we informally show how to validate the design model of an {em Autonomous Truck} embedded system, by comparing its trajectories with the trajectories of the corresponding application model. In the comparison, we also correlate the corresponding time scales of the two different models. The autonomous truck system is designed in the integrated modeling environment of SaveIDE. The system's functional and timing requirements verification is carried out on the truck's design model. Our work can be regarded as a preliminary step towards developing a general solution to the problem of bridging the gap between application and design models of embedded systems.

• 2941.
Birla Institue of Technology and Science.
Tata Institute of Fundamental Research, India.
cmUML - A Precise UML for Abstract Specification of Concurrent Components2006In: Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems2006, 2006, p. 141-146Conference paper (Refereed)

Unified Modeling Language (UML) has become a de facto industry standard graphical language for design specification of object oriented systems. But, due to lack of formal semantics UML models are not suitable for rigorous formal analysis. This paper defines a UML subset language (cmUML) with formal semantics for precise and abstract specification of concurrent components independent of implementation issues. The approach provides modular specification and verification of larger systems. An integrated multi-view operational semantics of cmUML is defined using symbolic transition systems. This highly expressive language provides constructs to specify explicit parallelism, conditional synchronization, mutual exclusion, safety, and liveness notions as well as the behavior of the interacting environment.

• 2942.
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
Halmstad University, School of Information Technology.
Suggesting a Common Framework for the Classification of Military Training and Computer Game Simulators2003In: Simulation Series, ISSN 0735-9276, E-ISSN 1562-384X, Vol. 35, no 3, p. 271-276Article in journal (Refereed)

Many similarities can be found between military training and computer game simulators. A review of definitions and classifications of military training simulators suggests that an adoption of DoD terminology also would suit game industry requirements. Similarities between applications are exemplified. Adhering to a common standard could possibly impose a challenge to both sectors because of (a) the rapid development of new concepts in the games sector, (b) the crossover between genres, and (c) the increasingly unclear distinction between "live" applications and simulations. The conclusion proposes further investigation into possible category dimensions that may emanate from research. © Emerald Publishing Limited 2017

• 2943.
KTH, Superseded Departments, Electronic Systems Design.
Univ. of Queensland. KTH, Superseded Departments, Electronic Systems Design.
Modelling and Syn­thesis of Operational and Management System (OAM) of ATM Switch Fabrics1995Conference paper (Refereed)
• 2944.
University of Skövde, School of Informatics.
Software Defined Networking: Virtual Router Performance2016Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis

Virtualization is becoming more and more popular since the hardware that is available today often has theability to run more than just a single machine. The hardware is too powerful in relation to the requirementsof the software that is supposed to run on the hardware, making it inefficient to run too little software ontoo powerful of machines. With virtualization, the ability exists to run a lot of different software on thesame hardware, thereby increasing the efficiency of hardware usage.Virtualization doesn't stop at just virtualizing operating systems or commodity software, but can also beused to virtualize networking components. These networking components include everything from routersto switches and are possible to set up on any kind of virtulized system.When discussing virtualization of networking components, the experssion “Software Defined Networking”is hard to miss. Software Defined Networking is a definition that contains all of these virtualized networkingcomponents and is the expression that should be used when researching further into this subject. There'san increasing interest in these virtualized networking components now in relation to just a few years ago.This is due to company networking becoming much more complex now in relation to the complexity thatcould be found in a network a few years back. More services need to be up inside of the network and a lotof people believe that Software Defined Networking can help in this regard.This thesis aim is to try to find out what kind of differences there are between multiple different softwarerouters. Finding out things like, which one of the routers that offer the highest network speed for the leastamount of hardware cost, are the kind of things that this thesis will be focused on. It will also look at somedifferent aspects of performance that the routers offer in relation to one another in order to try toestablish if there exists any kind of “best” router in multiple different areas.The idea is to build up a virtualized network that somewhat relates to how a normal network looks insmaller companies today. This network will then be used for different types of testing while having thesoftware based router placed in the middle and having it take care of routing between different local virtualnetworks. All of the routers will be placed on the same server and their configuration will be very basicwhile also making sure that each of the routers get access to the same amount of hardware.After initial testing, all routers that perform bad will be opted out for additional testing. This is done tomake sure that there's no unnecessary testing done on routers that seem to not be able to keep up withthe other ones. The results from these tests will be compared to the results of a hardware router with thesame kind of tests used with it in the middle in relation to the tests the software routers had to go through.The results from the testing were fairly surprising, only having one single router being eliminated early onas the remaining ones continued to “battle” one another with more tests. These tests were compared tothe results of a hardware router and the results here were also quite surprising with a much betterperformance in many different areas from the software routers perspective.

• 2945.
Umeå University, Faculty of Science and Technology, Department of Applied Physics and Electronics.
Cross platform applicationswith HTML52013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

This thesis was made for Cybercom in Ostersund. They wanted an evaluation of HTML5 cross platform applications which studied HTML5 features as well as JavaScript libraries and frameworks. The resources put into mobile application development can be reduced bymaking applications that can work on all platforms instead of only natively. These types ofapplications are called cross platform applications and can be developed with specic tools.One way to develop cross platform applications is by using HTML5, which can either beused as a web application or packed into native applications using plug-ins. The purpose ofthis thesis was to create a mobile web app that can save maps to be used oine. The workwas done by evaluating frameworks for web applications. Frameworks that provide userinterface elements and features similar to those in native applications, and libraries that render maps served by map servers. Development environments for web development were also tested and evaluated. The results of the research and development were documented experience, and a HTML5 application that shows a map, has GPS functionality and can beused oine.

• 2946.
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Engineering Sciences, Signals and Systems Group.
Measurement setup for High Power Impulse Magnetron Sputtering2011Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis

Recently material physics group at Science Institute of University of Iceland has been using reactive sputtering to grow thin films used in various research projects at the institute. These films have been grown using dc sputtering which has been proven a very successful method. High power impulse magnetron sputtering or HiPIMS is an new pulsed power sputtering method where shorter but high power pulses are used to sputter over lower steady power.

The project resulted in a functional system capable of growing thin films using HiPIMS. Thin films grown with high power pulses have a higher film density and other more preferable properties compared to films grown using direct current magnetron sputtering.

• 2947.
KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
Hifab.
A Heat Re-Use System for the Cray XE6 and Future Systems at PDC, KTH2012In: Cray User Group Final Proceedings: Greengineering the Future, Cray User Group , 2012Conference paper (Refereed)

The installation of a 16 cabinet Cray XE6 in 2010 at PDC was expected to increase the total power consumption from around 800 kW to 1300 kW, an increase of 500 kW. The intention was to refund some of the power cost and become more environmentally friendly by re-using the energy from the Cray to heat nearby buildings. The custom made system, which makes it possible to heat nearby buildings at the campus without using heat-pumps, is described in detail. The principle of the system is that hot air from the Cray is sent through industrial heat exchangers placed above the Cray racks. This makes it possible to heat the water to more than 30 °C. The problems encountered and the experiences gained are described as well as projection for the savings. A method of describing a mix of different cooling requirements shows the way for future improvements and addition of future systems.

• 2948.
Linnaeus University, Faculty of Technology, Department of Computer Science.
Linnaeus University, Faculty of Technology, Department of Computer Science.
Generisk Felkodsfunktionalitet2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis

BSR Svenska AB have developed a diagnostic device for cars and the task at hand is to develop this device called PPC diagnostic to make it compatible with generic OBDII codes. This will make it easier for the ordinary person to control their cars and check if there is anything wrong, that is contained in the generic protocol. This includes mostly a lot of probes weather they are ok or not and also a lot of values for temperature and similar stuff, but the most important part of the generic fault codes is the environmental fault codes.

• 2949.
Halmstad University, School of Information Technology.
Halmstad University, School of Information Technology.
Trådlös Övervakning av Inomhusklimat och PIR-baserad Passageräkning: En Demonstrationsanläggning åt Sweco Position AB2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis

This report is a technical complement to Johanna Hernnäs and Linnea Martinssons bachelor work paper AerQ - Ett produktutvecklingsprojekt för att läsa av inomhusklimatet. This report describes the design of an indoor climate and people counting demo facility consisting of two wireless and battery-powered units for indoor climate and people counting and a mobile application to which the data is presented. The climate unit measures temperature, relative humidity and carbon dioxide, and communicates via Wi-Fi and BLE and visually via RGB LEDs. The people counter detects a passage with a PIR sensor and communicates via BLE. The report presents the implementation of the demo facility and a investigation of PIR sensors. The result shows that it is possible to detect direction with a PIR sensor as well as a long-term battery operation of a sensor node equipped with RGB LEDs, Wi-Fi and VOC Sensor (MEMS Metal Oxide Sensor). The system's role may be to feedback demand-driven ventilation and / or to alert users about their indoor climate.

• 2950.
Linköping University, Department of Computer and Information Science, Database and information techniques.
Evaluation of quantitative assessment extensions to a qualitative riskanalysis method2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis

The usage of information systems (IS) within organizations has become crucial. Information is one of the most vulnerable resources within an enterprise. Information can be exposed, tampered or made non-accessible, where the integrity, confidentiality or availability becomes affected. The ability to manage risks is therefore a central issue in enterprises today. In order to manage risks, the risks need to be identified and further evaluated. All kind of threats with the possibility to negatively affect the confidentiality, integrity, or availability of the organization need to be reviewed. The process of identifying and estimating risks and possible measures is called risk analysis. There are two main categories of risk analysis, qualitative and quantitative. A quantitative method involves interpreting numbers from data and is based on objective inputs. A qualitative method involves interpreting of subjective inputs such as brainstorming and interviews. A common approach is to apply a qualitative method, however a lot of criticism has been raised against using subjective inputs to assessing risks. Secure State is a consulting company with specialist expertise in the field of information security. They help their customers to build trust in the customers systems and processes, making their customers businesses operate with consideration to information security. One service offered by Secure State is risk analysis, and currently they perform qualitative risk analysis. Given all criticisms against a qualitative approach for assessing risks, this study developed a quantitative risk analysis method for Secure State. According to participants, who attended at a risk analysis where the developed quantitative risk analysis method was used, the quantitative risk analysis method improved the risk assessment. Since risks and their effects are decomposed into smaller components in the proposed quantitative risk analysis method, interpretations of risks and their meaning during assessments less likely differed. Therefore, the common understanding of a risk increases, which makes the quality of the evaluation of risks increase. Furthermore, the usage of statistical data increases in the developed quantitative risk analysis method. Additionally, the quantitative method handles the fact that all data used is imperfect. The data is imperfect since it is used to describe the future, and the future has not happened yet.

56575859606162 2901 - 2950 of 3401
Cite
Citation style
• apa
• ieee
• modern-language-association-8th-edition
• vancouver
• Other style
More styles
Language
• de-DE
• en-GB
• en-US
• fi-FI
• nn-NO
• nn-NB
• sv-SE
• Other locale
More languages
Output format
• html
• text
• asciidoc
• rtf
v. 2.35.4
|