Digitala Vetenskapliga Arkivet

Change search
Refine search result
567891011 351 - 400 of 6272
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 351.
    Andersson, Daniel
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Integrated Test Environment2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    To implement a command line interpreter is normally an easy task. The task getsharder when adding requirements of multi instance functions and the system is torun on a multi-processor security critical embedded system. This thesis describesa first iteration of the system development. The project behind the thesis consistsof requirement elicitation, design, implementation and unit testing. The resultfrom the project is a working first version of the system.

    Download full text (pdf)
    Integrated Test Environment
  • 352.
    Andersson, Dennis
    et al.
    Blekinge Institute of Technology.
    Artale, Jacques
    Blekinge Institute of Technology.
    Tracing Integration Errors to Upstream Development Activities: An exploratory study2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The Eiffel Protocol provides traceability downstream and upstream of all activities that transpire inside the CI/CD pipeline. The traceability achieved by the Eiffel Protocol comes with great benefits even though it does not cover all development activities as it pertains only to the CI/CD pipeline. Our research aims to explore the idea of extending the Eiffel Protocol to cover all activities and discuss what benefits could be seen, especially in the scope of reducing the number of integration failures. A literature study was first carried out to find the root causes of these failures. After the literature study, we conducted a focus group session to gather data about the potential benefits and problems of an extension, what analyses could be drawn, and how it can affect integration errors. Our results show that an extension is beneficial as analyses that can be made with the generated data can tackle some of the biggest issues found in software development teams, especially in larger organizations. The complexity, cost involved and the time needed to see a return on investment does however weigh it down. Thus, while it is beneficial it is not enough for organizations to consider it as a priority to integrate with their environments when thinking of the costs involved to do so. Further implementation solutions need to be researched before it shows its worth.

    Download full text (pdf)
    Tracing Integration Errors to Upstream Development Activities - An exploratory study
  • 353.
    Andersson, Erik Olov Mårten
    Linköping University, Department of Computer and Information Science.
    A Gameful Quest to Make Second Language Acquisition Fun2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This study explores the application of principles from game design, and the motivational psychology it is founded upon, to the domain of second language acquisition. A gameful design process based on playtesting andanalysis with design lenses is adapted and used to iteratively design and develop a system for conversation practice with the goal of creating a motivating and engaging experience.The results indicate effectiveness of the process, but generalizing the results would require further research with bigger sample sizes and studies with varied core activities.

    Download full text (pdf)
    fulltext
  • 354.
    Andersson, Filip
    Linköping University, Department of Computer and Information Science, Software and Systems.
    Fault Diagnosis in Distributed Simulation Systems over Wide Area Networks using Active Probing2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The domain of distributed simulation is growing rapidly. This growth leads to larger and more complex supporting network architectures with high requirements on availability and reliability. For this purpose, efficient fault-monitoring is required. This work is an attempt to evaluate the viability of an Active probing approach in a distributed simulation system in a wide area network setting. In addition, some effort was directed towards building the probing-software with future extensions in mind. The Active probing approach was implemented and tested against certain performance requirements in a simulated environment. It was concluded that the approach is viable for detecting the health of the network components. However, additional research is required to draw a conclusion about the viability in more complicated scenarios that depend on more than the responsiveness of the nodes. The extensibility of the implemented software was evaluated with the QMOOD-metric and not deemed particularly extensible.

    Download full text (pdf)
    fulltext
  • 355.
    Andersson, Filip
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computing.
    Flyckt, Jonatan
    Jönköping University, School of Engineering, JTH, Department of Computing.
    Explaining rifle shooting factors through multi-sensor body tracking: Using transformers and attention to mine actionable patterns from skeleton graphs2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    There is a lack of data-driven training instructions for sports shooters, as instruction has commonly been based on subjective assessments. Many studies have correlated body posture and balance to shooting performance in rifle shooting tasks, but most of them have focused on single aspects of postural control. This thesis has focused on finding relevant rifle shooting factors by examining the entire body over sequences of time. We performed a data collection with 13 human participants who carried out live rifle shooting scenarios while being recorded with multiple biometric sensors, including several body trackers. An experiment was conducted to identify what aspects of rifle shooting could be predicted and explained using these data. We employed a pre-processing pipeline to produce a novel skeleton sequence representation, and used it to train a transformer model. The predictions from this model could be explained on a per sample basis using the attention mechanism, and visualised in an interactive format for humans to interpret. It was possible to separate the different phases of a shooting scenario from body posture with a high classification accuracy (81%). However, no correlation could be shown between shooting performance and body posture from our data. Future work could focus on novel feature engineering, and on examining alternative machine learning approaches. The dataset and pre-processing pipeline, as well as the techniques for generating explainable predictions presented in this thesis has laid the groundwork for future research in the sports shooting domain.

    Download full text (pdf)
    fulltext
  • 356.
    Andersson, Fredrik
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Storing and structuring big data with businessintelligence in mind2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Sectra has a customer database with approximately 1600 customers across the world. In this system there exists not only medical information but alsoinformation about the environment which the system runs in, usage  pattern and much more.

    This report is about storing data received from log les into a suitable database. Sectra wants to be able to analyze this information so that they can make strategic decisions and get a better understanding of their customers' needs. The tested databases are MongoDB, Cassandra, and MySQL. The results shows that MySQL  is not suitable for storing large amount of data with the current conguration. On the other hand, both MongoDB and Cassandra performed well with the growing amount of data.

    Download full text (pdf)
    fulltext
  • 357.
    Andersson, Fredrik
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management.
    Utveckling av GIS-applikation för effektivisering av planeringsarbeten för infrastruktur2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Planeringsarbeten för infrastruktur sker ofta med hjälp av speciella programvaror som CAD för att skapa ritningar på kartor över områden där tänkta infrastrukturer skall utvecklas. Som en effektivisering för dessa arbeten handlar denna studie om implementering av en GIS-applikation för att motivera fördelar med GIS och sättet för hantering samt visualisering av geografisk information. En webbapplikation som hanterar baskartor samt överliggande vektorlager för infrastruktur utvecklas, samt även att samma kartdata över infrastrukturen kopplas till en mobilapplikation för att effektivisera eventuella inventeringsarbeten av infrastrukur med hjälp av GPS för att kunna positionera infrastruktur på ett bra sätt. Tekniken bakom utvecklingen bygger på HTML, CSS och JavaScript samt molntjänstlagrin av infrastruktursdata i en geodatabas . GIS-applikationen sammanställer svar på frågor som bevisar hur GIS på ett tillfredställande sätt mycket väl skulle kunna implementeras och användas praktiskt i ett utvecklingsarbete för infrastruktur i dagens morderna samhälle. 

    Download full text (pdf)
    fulltext
  • 358.
    Andersson Granberg, Tobias
    et al.
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering.
    Nguyen, Ngoc Hien Thi
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering.
    SIMULATION BASED PREDICTION OF THE NEAR-FUTURE EMERGENCY MEDICAL SERVICES SYSTEM STATE2018In: 2018 WINTER SIMULATION CONFERENCE (WSC), IEEE , 2018, p. 2542-2553Conference paper (Refereed)
    Abstract [en]

    An ambulance dispatcher decides which ambulances to allocate to new calls, and how to relocate ambulances in order to maintain a good coverage. Doing this, it is valuable to have information about the future expected response times in different parts of the area of responsibility, as well as the expected number of available ambulances. We present a simulation model that can be used to predict this, and compare the results to a naive forecasting model. The results show that while it is difficult to accurately predict the future system state, the simulation based prediction manages this better than the naive model.

  • 359.
    Andersson, Gustaf
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    En Kvalitativ studie om förändringsarbete vid ett IT-projekt: En fallstudie på en segelflygklubb2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Organisationer och ledare saknar ofta en förståelse om kärnan i ett förändringsarbete, förståelsen om hur människor fungerar. Förändring leder ofta till starka känslor och vissa drabbas hårdare än andra, medarbetare kan lätt omvandlas till motståndare om ledningen inte möter personalen rätt.

     

    Syftet med denna uppsats är att ge en kunskapsbas i hur en projektgrupp ska arbeta mot användare för att motivera dem till en positiv inställning inför förändringen. Den ger en förståelse för människors behov, drivkrafter och olika orsaker till varför motstånd till förändring kan uppstå hos de berörda.

    Datainsamlingen har skett genom en litteraturstudie inom området för att sedan samla in empiri genom halvstrukturerade intervjuer. Samtliga respondenter kommer från en segelflygsförening och syftet med det var att ta reda på hur föreningen hanterat olika förändringsarbeten. Dels ett redan avslutat förändringsarbete då de övergick till ett system för internetbokning av flygplan och även ett förändringsarbete som inte realiserats än, en digital lösning till deras tidsrapportering.

     

    Det finns flera olika alternativ som en ledare kan applicera för att motivera sina anställda vid ett förändringsarbete. Dessa tillvägagångssätt kan vara effektiva på sina egna vis, mycket beroende på sammanhanget och det specifika fallet. För att effektivisera momentet motivation gäller det att välja rätt tillvägagångssätt vid rätt tillfälle. Något som förutsätter att ledare har en förståelse för individen och de reaktioner denne har gentemot förändringen.

    Download full text (pdf)
    fulltext
  • 360.
    Andersson, Gustav
    Linköping University, Department of Computer and Information Science, Human-Centered systems. Linköping University, The Institute of Technology.
    Implementing touch interaction in a casual mobile game2014Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    This thesis is to help developers in the touch design of casual games. The thesis work was made on the development platform Gideros Mobile and much of the thesis theory and methods will be based on that work. The purpose of the report is to show what one should think about when making a casual game in a touch design perspective, like taking into account that most people are used to one type of input design (like swiping or tapping), that you should design the game with the purpose to reach out to as a large audience as possible (taking into account people with disabilities) and some small notes on what should be avoided so not to deter people from wanting to play the game. It is important to note that this thesis is built for the purpose of mobile casual games, others will probably not find this thesis relevant.

    Download full text (pdf)
    fulltext
  • 361.
    Andersson, H. Robert H.
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    de Blanche, Andreas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Flipping the Data Center Network: Increasing East-West Capacity Using Existing Hardware2017In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 9-12 Oct. 2017, IEEE, 2017, p. 211-214, article id 8109355Conference paper (Refereed)
    Abstract [en]

    In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they are better suited for the north-southbound traffic between hosts and the Internet. One suggested solution for this capacity problem is to adopt a folded CLOS topology, also known as spine-leaf, which often relies on software defined network (SDN) controllers to manage traffic. This paper shows that it is possible to implement a spine-leaf network using commodity-ofthe-shelf switches and thus improve the east-west traffic capacity. This can be obtained using low complexity configuration and edgerouting for load balancing, eliminating the need for a centralized SDN controller.

  • 362.
    Andersson Holmström, Simon
    Linköping University, Department of Electrical Engineering, Computer Engineering.
    Adaptive TDC: Implementation and Evaluation of an FPGA2015Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    Time to digital converter (TDC) is a digital unit that measures the time interval between two events.This is useful to determine the characteristics and patterns of a signal or an event. In this thesis ahybrid TDC is presented consisting of a tapped delay line and a clock counter principle.

    The TDC is used to measure the time between received data in a QKD application. If the measuredtime does not exceed a certain value then data had been sent without any interception. It is alsopossible to use TDCs in other fields such as laser-ranging and time-of-flight applications.

    The TDC consists of two carry chains, an encoder, a FIFO and a counter for each channel, anAXI-module and a control unit to generate command signals to all channels that are implemented.The time is measured by sampling the signal that has propagated through the carry chain and from thissample encode the propagation length.

    In this thesis a TDC is implemented that has a 10 ns dead time and a resolution below 28 psin a four channel mode. The propagation variation is approximately two percent of the total valueduring testing. For the implementation an FPGA-board with a Zynq XC7Z020 SoC is used withSystemVerilog that is a hardware describing language (HDL).

    Download full text (pdf)
    fulltext
  • 363.
    Andersson, Håkan
    et al.
    Linköping University, Department of Management and Engineering, Solid Mechanics. Linköping University, Faculty of Science & Engineering. Construct Tools PC AB, Sweden.
    Nordin, Peter
    Linköping University, Department of Management and Engineering, Fluid and Mechatronic Systems. Linköping University, Faculty of Science & Engineering.
    Borrvall, Thomas
    DYNAmore Nordic AB, Brigadgatan 5, S-58758 Linkoping, Sweden.
    Simonsson, Kjell
    Linköping University, Department of Management and Engineering, Solid Mechanics. Linköping University, Faculty of Science & Engineering.
    Hilding, Daniel
    DYNAmore Nordic AB, Brigadgatan 5, S-58758 Linkoping, Sweden.
    Schill, Mikael
    DYNAmore Nordic AB, Brigadgatan 5, S-58758 Linkoping, Sweden.
    Krus, Petter
    Linköping University, Department of Management and Engineering, Fluid and Mechatronic Systems. Linköping University, Faculty of Science & Engineering.
    Leidermark, Daniel
    Linköping University, Department of Management and Engineering, Solid Mechanics. Linköping University, Faculty of Science & Engineering.
    A co-simulation method for system-level simulation of fluid-structure couplings in hydraulic percussion units2017In: Engineering with Computers, ISSN 0177-0667, E-ISSN 1435-5663, Vol. 33, no 2, p. 317-333Article in journal (Refereed)
    Abstract [en]

    This paper addresses a co-simulation method for fluid power driven machinery equipment, i.e. oil hydraulic machinery. In these types of machinery, the fluid-structure interaction affects the end-product performance to a large extent, hence an efficient co-simulation method is of high importance. The proposed method is based on a 1D system model representing the fluid components of the hydraulic machinery, within which structural 3D Finite Element (FE) models can be incorporated for detailed simulation of specific sub-models or complete structural assemblies. This means that the fluid system simulation will get a more accurate structural response, and that the structural simulation will get more correct fluid loads at every time step, compared to decoupled analysis. Global system parameters such as fluid flow, performance and efficiency can be evaluated from the 1D system model simulation results. From the 3D FE-models, it is possible to evaluate displacements, stresses and strains to be used in stress analysis, fatigue evaluation, acoustic analysis, etc. The method has been implemented using two well-known simulation tools for fluid power system simulations and FE-simulations, respectively, where the interface between the tools is realised by use of the Functional Mock-up Interface standard. A simple but relevant model is used to validate the method.

    Download full text (pdf)
    fulltext
  • 364.
    Andersson, Jan-Olof
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Larsson, Samuel
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Tobias, Sjöholm
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Implementation of the NEAT Policy Manager2019Report (Refereed)
    Abstract [en]

    The NEAT system was developed in 2017 to increase flexibility in the choice of network transport protocol being used. One of the most important components of the NEAT system is the Policy Manager (PM), which determines what protocol is to be utilized by the application. The PM is written in Python while the rest of the NEAT system is C-based, so a natural evolution of the PM is to perform a functional translation of it to C. While the main goal was solely to develop a fully functional C-based PM, the difference in programming languages in the end also brought a performance increase of 28 times compared with the Python-based PM. There are still a few improvements left to do in the PM, but it is already a notable improvement for the NEAT system as a whole.

    Download full text (pdf)
    fulltext
  • 365.
    Andersson, Jesper
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Caporuscio, Mauro
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Aligning Architectures for Sustainability2016In: ACM Proccedings of the 10th European Conference on Software Architecture Workshops (ECSA-W) / [ed] Rami Bahsoon and Rainer Weinreich, ACM Press, 2016, article id 13Conference paper (Refereed)
    Abstract [en]

    The digitization of industry has drastically changed the competitive landscape by requiring a higher degree of specialization and shorter time to delivery that affect the design properties a software platform should satisfy. The platform architecture must sustain continuous and rapid change to the organizational architecture, which in turn is affected by external forces: i.e., forces drive the velocity of change. In this paper, we explore the effects of digitization, characterizing internal and external forces that impact on business strategies and trigger the continuous realignment of the platform, and outline a research agenda to mitigate the effects.

  • 366.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Huselius, Joel
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics. ABB Corporate Research, Västerås, Sweden.
    Extracting Simulation Models from Complex Embedded Real-Time Systems2006In: Proceedings of the 2006 International Conference on Software Engineering Advances, ICSEA'06, Tahiti, French Polynesia, 2006, p. Article number 4031792-Conference paper (Refereed)
    Abstract [en]

    A modeling process is presented for extracting timingaccurate simulation models from complex embedded real-time systems. The process is supported by two complementary methods for tool-supported model extraction, Model Synthesis and Hybrid Model Extraction. The generated models enable impact analysis for complex real-time systems with respect to dynamic system properties, such as timing and resource usage. This can make software maintenance more predictable with respect to time-to-market and development costs, since timing errors can be identified early and avoided. The contribution of the paper is the modeling process, the Hybrid Model Extraction method and an interactive modeling tool, MASS, designed to support Hybrid Model Extraction of large implementations in C.

  • 367.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    A Framework for Analysis of Timing and Resource Utilization targeting Complex Embedded Systems2006In: ARTES - A network for Real-Time research and graduate Education in Sweden 1997 - 2006, Uppsala: Department of Information Technology , 2006, p. 297-329Chapter in book (Other academic)
    Abstract [en]

    A problem in common of many complex software systems embedded in industrial

    products is the absence of analyzability as formal models of the system

    behavior does not exist. When performing maintenance of such systems it is

    hard to predict how changes will impact specific system properties related to

    timing and resource utilization and there is therefore a significant risk of running

    into problems with unexpected side-effects of the changes made, which

    increases development time required and costs.

    In this paper we present the ART Framework, a set of methods and tools

    that enable behavior impact analysis for existing industrial real-time systems.

    The ART Framework enables developers of complex software systems to identify

    problematic side-effects of a proposed design before vast resources have

    been invested in implementation and testing. This reduces the risk of expensive

    and time-consuming problems discovered late in a development project

    and also reduces the risk releasing software containing latent critical errors.

  • 368.
    Andersson, Jonathan
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Birgersson, Alexander
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    IPv4 vs. IPv6: Vilket ska du surfa med?2020Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report addresses latency and response-time comparisons between the IPv4 and IPv6 protocols. These protocols are necessary to deliver data to the right recipient on the Internet as it is the TCP/IP model that is used. IPv6 is a newer version of IPv4 and was created in the late 1990's because the IPv4 addresses will not be enough for all devices that will come to need it. In association with the transition to IPv6, an opportunity was taken to optimize the protocol with fewer fields in the header and thus try to increase the latency and response times over IPv4.

    The report shows similarities and differences in latency and response times between IPv4 and IPv6 when browsing popular websites, a relevant use case that occurs daily. Measurements are made by downloading the web pages with the http protocol with both the IPv4 and the IPv6 protocols and then analyzing the different response times between them. This is done for three different internet providers: Telia, Bahnhof and Sunet. Telia also uses a different IPv6 solution than the other two, which will be another factor in the analysis.

    The results of the measurements show that IPv4 performs somewhat faster for all internet providers but does not make a directly noticeable difference for an end user. The traffic takes largely the same route regardless of which of the two protocols is used. The time for DNS lookups takes considerably longer for Sunet as an Internet provider than for the other two. The difference in route choice depending on which protocol is used is most noticeable for Bahnhof. 6RD performs a better average time than Sunets native IPv6.

  • 369.
    Andersson, Jonathan
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science. student.
    Hu, Yan
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Exploring the Impact of Menu Systems, Interaction Methods, and Sitting or Standing Posture on User Experience in Virtual Reality2023In: 2023 IEEE Gaming, Entertainment, and Media Conference, GEM 2023 / [ed] Gittens C., Hogue A., Cannavo A., Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    Virtual Reality (VR) has become an increasingly crucial aspect in both commercial and industrial settings. However, the user experience of the user interfaces and interaction methods in the VR environment is often overlooked. This paper aims to explore different menu systems, interaction methods, and the user’s sitting or standing posture on user experience and cybersickness in VR applications. An experiment with two menu systems and two interaction methods in an implemented VR application was conducted with 20 participants. The results found that traditional, top-down, panel menus with motion controls are the best combination regarding the user experience. Sitting posture provides less severe simulator sickness symptoms than standing.

  • 370.
    Andersson, Leon
    University West, Department of Engineering Science.
    En undersökning om Linux förmåga att hantera processer som överkonsumerar minnet2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Minneshanteringen i operativsystemet Linux för processer som överkonsumerar minnet kan variera beroende på vilken Linux baserad distribution som används. Detta innebär att systembelastningen av ett minnestungt program kan ha olika effekt på olika system. I denna rapport presenteras två typer av systemlösningar med avsikten att hantera scenarion då minneskonsumtionen är ohållbar för att undersöka och jämföra respektive systems agerande och betydelsen detta har för det fullständiga systemet. En lösning agerar i kernel space och en som agerar i user space hos systemet. Av dessa agerar user space lösningen som ett komplement till kernel space lösningen. Inte alla Linux distributioner använder denna konfiguration. Genom att skapa ett program som medvetet överkonsumerar systemets minne testas båda lösningar. Programmet agerar som ett stresstest där resurskonsumtion berörande programmet samt totala systemet undersöks. Resultat indikerar att user space lösningen komplimenterar kernel space lösningen på ett noterbart sätt genom att agera proaktivt och förebyggande genom att förhindra överkonsumtion av systemets minne. Medans kernel space lösningen enbart agerar som en nödlösning när systemets totala minnesresurser har förbrukats.

  • 371.
    Andersson Nyrén, Martina
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Pilotstudier avanvändargränssnitt till app för smärtpatienter2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Experio Lab i Landstinget i Värmland, Karolinska Institutet och Kungliga TekniskaHögskolan håller i dag på med att utveckla en digital tjänst i form av en app försmärtpatienter. Målet är att genom en digital tjänst kunna lära sig mer om hur patienter kankartlägga sina besvär inför ett möte med sjukvården.

    Uppsatsen syftar till att inför kommande användbarhetstester på riktiga patienterundersöka hur väl prototypen fungerar när det kommer till gränssnittet och ge förslag somskulle kunna förbättra appen inför de kommande användbarhetstesterna.

    Undersökningen genomfördes i två steg: Först testades appen som en pappersprototyp.Därefter genomfördes användbarhetstester med hjälp av studenter och experter inomtjänstedesign på en ipad-platta, där både intervjuer och observationer gjordes. Resultatetvisade att flera av testpersonerna hade samma sorts svårigheter när det kom till att interageramed appen. Svårast var att rita sina besvär på besvärsteckningen samt att veta var i processenman befann sig. Efter genomförande av studien uppgav de flesta testpersonerna att de skullerekommendera appen till någon de kände. Majoriteten såg även behov av att appensanvändargränssnitt blir tydligare för användaren.

    Download full text (pdf)
    fulltext
  • 372.
    Andersson, Philip
    Mälardalen University, School of Innovation, Design and Engineering.
    P-cores and E-cores in virtual machines2023Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In 2021, Intel released a new generation of consumer processors that had two different types of cores; they called them the efficiency-cores and the performance-cores, or for short, the E-cores and the P-cores. The release of these processors sparked interest in the potential impact if they were introduced into the enterprise market. Therefore tests were made on the I5-13600k on its power consumption and how it performs in virtual machines. Since the architecture is so new, there have not been any tests on the power usage in different configurations, which is a hot topic with today's power prices. The first question to be answered was: "How can one get the new architecture to function in virtual machines without mixing the various types of cores?" To solve that, the command “virsh edit” was used and then the name of the virtual machine to choose which threads to use for the virtual machine. The second question was: “how different is the power consumption between different configurations?” And to answer that, a power meter was used to measure the power consumption, which resulted in the Linux virtual machines drawing less power than the Windows 10 virtual machines. The third question was: “what is the performance of the processor in virtual machines?” To answer that, a benchmarking tool called Geekbench was used, which showed that the P-core only machine performed best as expected. The fourth and last question was: "What is the use case for having different types of cores?" From the tests, these processors shouldn’t be produced for the enterprise market, but small companies and enthusiasts can use them for servers when they need more cores

    Download full text (pdf)
    fulltext
  • 373.
    Andersson, Rikard
    et al.
    Linköping University, Department of Computer and Information Science.
    Emberg, Johan
    Linköping University, Department of Computer and Information Science.
    Hazell, Sofie
    Linköping University, Department of Computer and Information Science.
    Laestander, Hjalmar
    Linköping University, Department of Computer and Information Science.
    Norberg, Gustaf
    Linköping University, Department of Computer and Information Science.
    Elmfeldt Rönnmark, Maximilian
    Linköping University, Department of Computer and Information Science.
    Buciuto Sundelin, Bruno
    Linköping University, Department of Computer and Information Science.
    Törngren, Erik
    Linköping University, Department of Computer and Information Science.
    Heat n' Eat: Utvecklingen av en användbar e-butik med fokus på navigerbarhet2017Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [en]

    Students today lack both time and money. At the same time e-commerce is increasing, and especially food sales over the internet. This report aims to explore the possibilities of a service that offers students a simple alternative for high quality food within their budget in the form of a web application. Students at Campus Valla expressed the need for such a service through a market research. The study was conducted by researching theories regarding usability and navigability. Students as a group often lack time and are used to getting fast and clear information; this is ensured by good navigability. After the researching of theories, several user tests were conducted on the targeted group. The result following this was the development of the web application Heat n' Eat. In order to achieve good navigability, the application was implemented with a simple layout, focusing on the products. A final user test showed that the application could be considered usable with focus on navigability.

    Download full text (pdf)
    fulltext
  • 374.
    Andersson, Robin
    Malmö University, Faculty of Technology and Society (TS).
    Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus: A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models very confident of detecting malicious activity, however only on activities that has been previously learned by this model. The second approach is very good at constructing models for detecting any type of malicious activity, even if never studied by the model before, but with less confidence. In this thesis, a new approach is suggested with a redesigned architecture for an intrusion detection system called Multi-mixed IDS. Where we take a middle ground between the two standardized approaches, trying to find a combination of both sides strengths and eliminating its weaknesses. This thesis aims to deliver a proof of concept for a new approach in the current state of the art in the CAN-bus security research field. This thesis also brings up some background knowledge about CAN and intrusion detection systems, discussing their strengths and weaknesses in further detail. Additionally, a brief overview from a handpick of research contributions from the field are discussed. Further, a simple architecture is suggested, three individual detection models are trained and combined to be tested against a CAN-bus dataset. Finally, the results are examined and evaluated. The results from the suggested approach shows somewhat poor results compared to other suggested algorithms within the field. However, it also shows some good potential, if better decision methods between the individual algorithms that constructs the model can be found. 

    Download full text (pdf)
    fulltext
  • 375.
    Andersson, Roland
    Halmstad University, School of Information Technology.
    Utvinning av data ur mobiltelefoner: En valideringsstudie av forensiska verktyg2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones.

    This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.

    Download full text (pdf)
    fulltext
  • 376.
    Andersson, Samuel
    et al.
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Ekberg, Björn
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Prestandaoptimering av spelet Go Supernova2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Som underlag för den här rapporten använder vi oss av vårtspel Go Supernova. Det är skrivet i Java med hjälp avramverket LibGDX. Vi har undersökt hur man kan optimeraspelet för att kunna hantera så många objekt som möjligt menändå hålla ett bra spelflöde utan att förstöra den vision vihade när vi skapade spelet från första början. Vi har kommitfram till att ljusmotorn box2dlights använder sig av mycketprocessorkraft och användningen av den behövde justeras föratt tillfredsställa våra krav. Vi kommer även att tala omdesignval av spelets interna delar som gjorde att vi kundeundvika prestandaförluster.

    Download full text (pdf)
    rapport
  • 377.
    Andersson, Sara
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Mänsklig faktor: hur kan man få den svagaste länken inom IT-säkerhet starkare?2018Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In today´s IT environments, the role of the users becomes more important. In 2016 there were 200,000 crimes in Sweden that could be linked to social engineering attacks. These attacks are targeting the users and it is therefore important that users are aware of what they look like. This report is conducted in cooperation with a municipality in Västergötland, Sweden, and investigate four different methods to use when sharing IT information to their users. The methods differ not only in implementation but also in difficulty in the choice of words and expressions. The first method is a document of information taken from the municipality´s intranet. The second is also a document but is rewritten to simplify for the users. The third method is a video presentation and the fourth was made as a lecture with the possibility of interaction between the lecturer and the users. To evaluate these four methods two surveys were conducted. The first survey was performed before the users received IT information to create a baseline. After one and a half month the second survey was made. The surveys are compared to see how much the users remember and which method was most effective. The results indicate that the information on the municipality´s intranet is difficult to understand for the users. The other three methods provide a greater positive change in the user’s questionnaire response, indicating that users need a different form and structure when information is to be provided for them.

  • 378.
    Andersson Svensson, Albin
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Supervision: Object motion interpretation using hyperdimensional computing based on object detection run on the edge2022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis demonstrates a technique for developing efficient applications interpreting spacial deep learning output using Hyper Dimensional Computing (HDC), also known as Vector Symbolic Architecture (VSA). As a part of the application demonstration, a novel preprocessing technique for motion using state machines and spacial semantic pointers will be explained. The application will be evaluated and run on a Google Coral edge TPU interpreting real time inference of a compressed object detection model.

    Download full text (pdf)
    fulltext
  • 379.
    Andersson, Tobias
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Analysis and quantitative comparison of storage, management, and scalability of data in Core Data system in relation to Realm2018Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    When developing applications for iOS devices it is very common to use Apple’s own Core Data database system which is a framework handling database persistence for iOS devices among other things, but since there so many different kinds of applications it might not be the best option to use the same database system every time. Realm is another database system for iOS devices, it is very lightweight and a big rival to Core Data. This work was conducted with the goal of finding differences between the database systems Core Data and Realm that might show that one or the other is better used in some cases. The comparison between the systems was divided into two different parts, one theoretical comparison focused on reading and analyzing documentation and development of a test application. The test application tested time of create, read, update and delete operations in relation to increasing number of objects and increased number of properties in each object. The tests on Core Data were made with two different implementations to get the aspect of time difference based on implementation included. The results were fairly similar on the different operations with a slight advantage to Core Data. The big difference was seen in implementation difficulty and usability. The included features in the database system were also considered. Realm included more of commonly used and important features but Core Data gives the user the ability to add most of these in the implementation, this results in a question of user case.

    Download full text (pdf)
    fulltext
  • 380.
    Andersson, Tom
    et al.
    Mälardalen University.
    Persson, Niklas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fattouh, Anas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ekström, Martin C.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A loop shaping method for stabilising a riderless bicycle2019In: 2019 European Conference on Mobile Robots, ECMR 2019 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2019, article id 8870965Conference paper (Refereed)
    Abstract [en]

    Several control methods have been proposed to stabilise riderless bicycles but they do not have sufficient simplicity for practical applications. This paper proposes a practical approach to model an instrumented bicycle as a combination of connected systems. Using this model, a PID controller is designed by a loop shaping method to stabilise the instrumented riderless bicycle. The initial results show that the bicycle can be stabilised when running on a roller. The work presented in this paper shows that it is possible to self stabilise a riderless bicycle using cascade PI/PID controllers.

  • 381.
    Andersson, Viktor
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    A Proposal and Implementation of a Novel Architecture Model for Future IoT Applications: With focus on fog computing2022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The number of IoT devices and their respective data is increasing for each day impacting the traditional architecture model of solely using the cloud for processing and storage in a negative way. This model may therefore need a supporting model to alleviate the different challenges for future IoT applications. Several researchers have described and presented algorithms and models with focus on distributed architecture models. The main issues with these however is that they fall short when it comes to the implementation and distribution of tasks. The former issue is that they are not implemented on actual hardware but simulated in a constrained environment. The latter issue is that they are not considering sharing a single task but to distribute a whole task. The objective of this thesis is therefore to present the different challenges regarding the traditional architecture model, investigate the research gap for the IoT and the different computing paradigms. Together with this implementing and evaluating a future architecture model capable of collaboration for the completion of a generated task on multiple off-the-shelf hardware. This model is evaluated based on task completion time, data size, and scalability. The results show that the different testbeds are capable communicating and splitting a single task to be completed on multiple devices. They further show that the testbeds containing multiple devices are performing better regarding completion time and do not suffer from noticeable scalability issues. Lastly, they show that the completion time drops remarkably for tasks that are split and distributed.

    Download full text (pdf)
    fulltext
  • 382.
    Andersson, Viktor
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Machine Learning in Logistics: Machine Learning Algorithms: Data Preprocessing and Machine Learning Algorithms2017Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Data Ductus is a Swedish IT-consultant company, their customer base ranging from small startups to large scale cooperations. The company has steadily grown since the 80s and has established offices in both Sweden and the US.

    With the help of machine learning, this project will present a possible solution to the errors caused by the human factor in the logistic business.A way of preprocessing data before applying it to a machine learning algorithm, as well as a couple of algorithms to use will be presented.

    Download full text (pdf)
    fulltext
  • 383.
    Andersson, Wilmer
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Sjöström, Erik
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    A Study on Enhancing Recommendation Systems for Experience Goods2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study examines the design and trustworthiness factors of recommendation systems forexperience goods in the e-commerce industry. Experience goods are products that involvesensory experiences and pose challenges for consumers to assess and select online. Theresearch adopts a mixed method approach, combining exploratory and interpretive researchmethods to gain insights into users' interpretations and meanings attached to their experiences.The methodology includes analyzing publications, conducting a survey, and objectivelydocumenting recommendation systems in the alpine industry. The survey collects opinions fromparticipants who have used various recommendation systems, covering aspects such as usermodel, item model, recommendation algorithm, user interface, evaluation, and trustworthiness.A thematic analysis is employed to identify patterns and meaningful themes in the data. Thefindings emphasize the importance of understanding user preferences, balancingrecommendations, improving accuracy, enhancing interface usability, incorporating feedback,and addressing recommendation diversity to enhance trustworthiness. A hybrid filteringapproach with feature-based systems and integrated behavior-based techniques is identified aseffective. While the survey's convenience sampling and limited sample size may limitgeneralizability, the findings provide insights for designing effective recommendation systems forexperience goods in e-commerce. By considering the strengths and limitations of differenttechniques, vendors can create systems that assist customers in purchasing these uniqueproducts. However, recommendation systems should be viewed as a valuable tool rather thanthe sole determinant in purchase decisions for alpine equipment. Further research with a largerand more diverse sample is recommended to validate the findings and improve generalizability.

    Download full text (pdf)
    fulltext
  • 384.
    Andlovic, Mihael
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    How real-world IP-distribution affects load balancing2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This essay looks at how IP addresses on the last octet are distributed and how they are balanced by different load balancer algorithms. We collected the data from a data center in Sweden to get real data. The IP addresses we collected were used with a load balancer using IP source algorithms. We used 4 different algorithms in different scenarios: the entire IP address, the first 3 octets, and the last octet with and without hash between two to five links/servers. The results were that the efficiency of the algorithm depends on the setup that is being used. Each of these algorithms did not have an even distribution, when comparing between two to five links/servers. The best overall distribution that did not have any weaknesses compared to the other algorithms was Nginx that uses the Bob Jenkins hash algorithm.

  • 385.
    Andras, Balla
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    A comparison between serverless and Docker container deployments: In the cloud2018Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    Designing an application from top to bottom is a challenge for any software architect. Designing an application to be deployed in the cloud adds extra complexity and a variety of questions to the task. One of these questions is how to deploy an application? The most popular choices at this time are either Docker containers or serverless functions. This report presents a comparison between the two deployment methods based on cost and performance. The comparison did not yield a conclusive winner but it did offer some key pointers to help with the decision. Docker containers offer a standardized deployment method for a low price and with good performance. Before choosing Docker the intended market needs to be evaluated given that for each region Docker needs to serve, the price also increases. Serverless functions offer auto-scaling and easy global deployments but suffer from high complexity, slower performance, and an uncertain monthly price tag.

    Download full text (pdf)
    fulltext
  • 386.
    Andreasson, Henrik
    et al.
    Örebro University, Örebro, Sweden.
    Bouguerra, Abdelbaki
    Örebro University, Örebro, Sweden.
    Åstrand, Björn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Gold-fish SLAM: An application of SLAM to localize AGVs2014In: Field and Service Robotics: Results of the 8th International Conference / [ed] Kazuya Yoshida & Satoshi Tadokoro, Heidelberg: Springer, 2014, p. 585-598Conference paper (Refereed)
    Abstract [en]

    The main focus of this paper is to present a case study of a SLAM solution for Automated Guided Vehicles (AGVs) operating in real-world industrial environments. The studied solution, called Gold-fish SLAM, was implemented to provide localization estimates in dynamic industrial environments, where there are static landmarks that are only rarely perceived by the AGVs. The main idea of Gold-fish SLAM is to consider the goods that enter and leave the environment as temporary landmarks that can be used in combination with the rarely seen static landmarks to compute online estimates of AGV poses. The solution is tested and verified in a factory of paper using an eight ton diesel-truck retrofitted with an AGV control system running at speeds up to 3m/s. The paper includes also a general discussion on how SLAM can be used in industrial applications with AGVs. © Springer-Verlag Berlin Heidelberg 2014.

  • 387.
    Andres, Bustamante
    et al.
    Tecnológico de Monterrey, MEX.
    Cheddad, Abbas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Jimenez-Perez, Julio Cesar
    Tecnológico de Monterrey, MEX.
    Rodriguez-Garcia, Alejandro
    Tecnológico de Monterrey, MEX.
    Digital Image Processing and Development of Machine Learning Models for the Discrimination of Corneal Pathology: An Experimental Model2021In: Photonics, ISSN 2304-6732, Vol. 8, no 4, article id 118Article in journal (Refereed)
    Abstract [en]

    Machine learning (ML) has an impressive capacity to learn and analyze a large volume of data. This study aimed to train different algorithms to discriminate between healthy and pathologic corneal images by evaluating digitally processed spectral-domain optical coherence tomography (SD-OCT) corneal images. A set of 22 SD-OCT images belonging to a random set of corneal pathologies was compared to 71 healthy corneas (control group). A binary classification method was applied where three approaches of ML were explored. Once all images were analyzed, representative areas from every digital image were also extracted, processed and analyzed for a statistical feature comparison between healthy and pathologic corneas. The best performance was obtained from transfer learning-support vector machine (TL-SVM) (AUC = 0.94, SPE 88%, SEN 100%) and transfer learning-random forest (TL- RF) method (AUC = 0.92, SPE 84%, SEN 100%), followed by convolutional neural network (CNN) (AUC = 0.84, SPE 77%, SEN 91%) and random forest (AUC = 0.77, SPE 60%, SEN 95%). The highest diagnostic accuracy in classifying corneal images was achieved with the TL-SVM and the TL-RF models. In image classification, CNN was a strong predictor. This pilot experimental study developed a systematic mechanized system to discern pathologic from healthy corneas using a small sample.

    Download full text (pdf)
    fulltext
  • 388.
    Andres, Bustamante
    et al.
    Tecnológico de Monterrey, MEX.
    Cheddad, Abbas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Rodriguez-Garcia, Alejandro
    Tecnológico de Monterrey, MEX.
    Digital Image Processing and Development of Machine Learning Models for the Discrimination of Corneal Pathology: An Experimental Model2019Conference paper (Other academic)
  • 389.
    André, Samuel
    et al.
    Jönköping University, School of Engineering, JTH, Industrial Product Development, Production and Design.
    Elgh, Fredrik
    Jönköping University, School of Engineering, JTH, Industrial Product Development, Production and Design.
    Modeling of transdisciplinary engineering assets using the design platform approach for improved customization ability2018In: Advanced Engineering Informatics, ISSN 1474-0346, E-ISSN 1873-5320, Vol. 38, p. 277-290Article in journal (Refereed)
    Abstract [en]

    Original equipment suppliers (OES) that develop unique products are continuously faced with changing requirements during both the quotation and product development processes. This challenge is a different reality from companies that develop off-the-shelf products for the end consumer, which use fixed specifications and where product platforms have been a strong enabler for efficient mass customization. However, product platforms cannot adequately support companies working as OES. The reason is that a high level of customization is required which means that interfaces cannot be standardized, the performance is not negotiable, requirements are not initially fixed, and the specific system interacts with, is affected by, or affects other systems that are simultaneously developed in a transdisciplinary environment. The design platform (DP) approach provides a coherent environment for heterogeneous and transdisciplinary design resources to be used in product development by supporting both designing and off-the-shelf solutions. This research describes the introduction, application and further development of the DP approach at an automotive supplier to support the development of customized solutions when traditional modularity or platform scalability do not suffice. A computer tool called Design Platform Manager has been developed to support the creation and visualization of the DP. The support tool has a connection to a product data management database to link the platform model to the various kinds of engineering assets needed or intended to support variant creation. Finally, the support tool was evaluated by the case company representatives showing promising results. 

    Download full text (pdf)
    Fulltext
  • 390.
    Andréasson, Kim
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Hagberg, Daniel
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Undersökning av iBeaconannonsering via smartphoneapplikation: Objective c och ASP.NET2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This degree project is performed together with the company Sigma in relation with the education Datateknisk Systemutveckling at Högskolan Väst in Trollhättan. The purpose of this project is to examine the new technology iBeacon and study if it is to prefer over simi-lar technologies when developing a system to use for advertisement. To accomplish this, a smartphone application is developed aswell as an administration interface, to be able to perform a user test of the product with a random selection of people.

    The goal with the project is to develop a working product that can be tested and used for the examination of the hypothesis. This report explains how the project is performed and in the end, the result that the user test shows is discussed.

  • 391. Andrén, Börje
    et al.
    Wang, Kun
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Brunnström, Kjell
    Characterizations of 3D TV: Active vs passive2012In: SID Symposium Digest of Technical Papers 2012, Blackwell Publishing Ltd , 2012, p. 137-140Conference paper (Refereed)
    Abstract [en]

    Two different techniques are dominating the 3D TV market today i.e. active shutter glasses and passive film patterned retarder. Both the techniques have their pros and cons. In this paper we compare these two types of 3D TV3D TV by evaluating them with respect to some important visual ergonomic parameters such as angle dependent cross talk, luminance levels, flicker and resolution.

  • 392.
    ANGELONE, MARIA LAURA
    Örebro University, School of Science and Technology.
    AndroidOS- Robot Command Interface2011Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
  • 393.
    Angelsmark, Ola
    et al.
    Department of Computer Science, Lund University, Lund, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Lund, Sweden.
    Nilsson, Klas
    Department of Computer Science, Lund University, Lund, Sweden.
    Nowaczyk, Sławomir
    Department of Computer Science, Lund University, Lund, Sweden.
    Prosperi, Leonardo
    Department of Computer Science, Lund University, Lund, Sweden.
    Knowledge Representation for Reconfigurable Automation Systems2007Conference paper (Refereed)
    Abstract [en]

    This article describes the work in progress on knowledge representation formalisms chosen for use in the European project SIARAS. Skill-Based Inspection and Assembly for Reconfigurable Automation Systems has a goal of creating intelligent support system for reconfiguration and adaptation of assembly systems. Knowledge is represented in an ontology expressed in OWL, for generic reasoning in Description Logic, and in a number of special-purpose reasoning modules, specific for the application domain.

  • 394.
    Angström, Fredrik
    et al.
    Linköping University, Department of Computer and Information Science.
    Faber, Petra
    Linköping University, Department of Computer and Information Science.
    Evaluating the personalisation potential in local news2021Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    Personalisation of content is a frequently used technique intended to improve user engagement and provide more value to users. Systems designed to provide recommendations to users are called recommender systems and are used in many different industries. This study evaluates the potential of personalisation in a media group primarily publishing local news, and studies how information stored by the group may be used for recommending content. Specifically, the study focuses primarily on content-based filtering by article tags and user grouping by demographics. This study first analyses the data stored by a media group to evaluate what information, data structures, and trends have potential use in recommender systems. These insights are then applied in the implementation of recommender systems, leveraging that data to perform personalised recommendations. When evaluating the performance of these recommender systems, it was found that tag-based content selection and demographic grouping each contribute to accurately recommending content, but that neither method is sufficient for providing fully accurate recommendations.

    Download full text (pdf)
    fulltext
  • 395.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Designing for Usable Privacy and Transparency in Digital Transactions2015Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. With every transaction, people take decisions and make disclosures of personal data. Despite the possible benefits of collecting data about a person or a group of people, massive collection and aggregation of personal data carries a series of privacy and security implications which can ultimately result in a threat to people's dignity, their finances, and many other aspects of their lives. For this reason, privacy and transparency enhancing technologies are being developed to help people protect their privacy and personal data online. However, some of these technologies are usually hard to understand, difficult to use, and get in the way of people's momentary goals.

    The objective of this thesis is to explore, and iteratively improve, the usability and user experience provided by novel privacy and transparency technologies. To this end, it compiles a series of case studies that address identified issues of usable privacy and transparency at four stages of a digital transaction, namely the information, agreement, fulfilment and after-sales stages. These studies contribute with a better understanding of the human-factors and design requirements that are necessary for creating user-friendly tools that can help people to protect their privacy and to control their personal information on the Internet.

    Download full text (pdf)
    Avhandling_Angulo
    Download (jpg)
    presentationsbild
  • 396.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable Transparency through network representations and analyses2015In: The Future of Networked Privacy: Challenges and opportunities, 2015Conference paper (Refereed)
    Abstract [en]

    We explore how concepts from the field of network science can be employed to inform Internet users about the way their personal identifiable information (PII) is being used and shared by online services. We argue that presenting users with graphical interfaces that display information about the network structures that are formed by PII exchanges can have an impact on the decisions users take online, such as the services they choose to interact with and the information they decide release.

  • 397.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ulrich, König
    HCI for Policy Display and Administration2011In: Privacy and Identity Management for Life / [ed] Jan Camenish, Simone Fischer-Hübner and Kai Rannenberg, Berlin: Springer Berlin/Heidelberg, 2011, 1, p. 261-277Chapter in book (Refereed)
    Abstract [en]

    The PrimeLife Policy Language (PPL) has the objective of helping end users make the data handling practices of data controllers more transparent, allowing them to make well-informed decisions about the release of personal data in exchange for services. In this chapter, we present our work on user interfaces for the PPL policy engine, which aims at displaying the core elements of a data controller's privacy policy in an easily understandable way as well as displaying how far it corresponds with the user's privacy preferences. We also show how privacy preference management can be simplified for end users.

  • 398.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Towards Usable Privacy Policy Display & Management: The PrimeLife Approach2011In: Proceedings of 5th International Symposium on Human Aspects of Information Security & Assurance / [ed] Steven Furnell, Plymouth: University of Plymouth , 2011, p. 108-118Conference paper (Refereed)
  • 399.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Social and Psychological Studies.
    Identity Management through “Profiles”: Prototyping an Online Information Segregation Service2013In: Human-Computer Interaction. Users and Contexts of Use: 15th International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings, Part III / [ed] Masaaki Kurosu, Springer Berlin/Heidelberg, 2013, Vol. 8006, p. 10-19Conference paper (Refereed)
    Abstract [en]

    Whereas in real everyday life individuals have an intuitive approach at deciding which information to disseminate to others, in the digital world it becomes difficult to keep control over the information that is distributed to different online services. In this paper we present the design of a user interface for a system that can help users decide which pieces of information to distribute to which type of service providers by allowing them to segregate their information attributes into various personalized profiles. Iterative usability evaluations showed that users understand and appreciate the possibility to segregate information, and revealed possible improvements, implications and limitations of such an interface.

  • 400.
    Anjomshoae, Sule
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Context-based explanations for machine learning predictions2022Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    In recent years, growing concern regarding trust in algorithmic decision-making has drawn attention to more transparent and interpretable models. Laws and regulations are moving towards requiring this functionality from information systems to prevent unintended side effects. Such as the European Union's General Data Protection Regulations (GDPR) set out the right to be informed regarding machine-generated decisions. Individuals affected by these decisions can question, confront and challenge the inferences automatically produced by machine learning models. Consequently, such matters necessitate AI systems to be transparent and explainable for various practical applications.

    Furthermore, explanations help evaluate these systems' strengths and limitations, thereby fostering trustworthiness. As important as it is, existing studies mainly focus on creating mathematically interpretable models or explaining black-box algorithms with intrinsically interpretable surrogate models. In general, these explanations are intended for technical users to evaluate the correctness of a model and are often hard to interpret by general users.  

    Given a critical need for methods that consider end-user requirements, this thesis focuses on generating intelligible explanations for predictions made by machine learning algorithms. As a starting point, we present the outcome of a systematic literature review of the existing research on generating and communicating explanations in goal-driven eXplainable AI (XAI), such as agents and robots. These are known for their ability to communicate their decisions in human understandable terms. Influenced by that, we discuss the design and evaluation of our proposed explanation methods for black-box algorithms in different machine learning applications, including image recognition, scene classification, and disease prediction.

    Taken together, the methods and tools presented in this thesis could be used to explain machine learning predictions or as a baseline to compare to other explanation techniques, enabling interpretation indicators for experts and non-technical users. The findings would also be of interest to domains using machine learning models for high-stake decision-making to investigate the practical utility of proposed explanation methods.

    Download full text (pdf)
    fulltext
    Download (pdf)
    spikblad
567891011 351 - 400 of 6272
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf