Change search
Refine search result
1234567 1 - 50 of 805
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Oldest first
  • Newest first
Select all
  • 1.
    Abbasi, Abdul Ghafoor
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
    Hotamov, I.
    Web contents protection, secure execution and authorized distribution2010In: Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010, 2010, 157-162 p.Conference paper (Refereed)
    Abstract [en]

    This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources in PKCS#7, extended secure execution environment for Java Web Server, eXtensible Access Control Markup Language (XACML) based authorization policies, and secure Web proxy. Design and implementation of our system is based on the concepts of generic security objects and component-based architecture that makes it compatible with exiting Web infrastructures without any modification.

  • 2.
    Abdelraheem, Mohamed Ahmed
    et al.
    SICS Swedish ICT AB, SWE.
    Gehrmann, Christian
    SICS Swedish ICT AB, SWE.
    Lindström, Malin
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Nordahl, Christian
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Executing Boolean queries on an encrypted Bitmap index2016In: CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016, Association for Computing Machinery (ACM), 2016, 11-22 p.Conference paper (Refereed)
    Abstract [en]

    We propose a simple and efficient searchable symmetric encryption scheme based on a Bitmap index that evaluates Boolean queries. Our scheme provides a practical solution in settings where communications and computations are very constrained as it offers a suitable trade-off between privacy and performance.

  • 3.
    Abrahamsson, Andreas
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.
    Pettersson, Rasmus
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.
    Smoothing of initial conditions for high order approximations in option pricing2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this article the Finite Difference method is used to solve the Black Scholes equation. A second order and fourth order accurate scheme is implemented in space and evaluated. The scheme is then tried for different initial conditions. First the discontinuous pay off function of a European Call option is used. Due to the nonsmooth charac- teristics of the chosen initial conditions both schemes show an order of two. Next, the analytical solution to the Black Scholes is used when t=T/2. In this case, with a smooth initial condition, the fourth order scheme shows an order of four. Finally, the initial nonsmooth pay off function is modified by smoothing. Also in this case, the fourth order method shows an order of convergence of four. 

  • 4.
    Adamov, Alexander
    et al.
    Kharkiv Natl Univ Radio Elect, NioGuard Secur Lab, Kharkov, Kharkiv Oblast, Ukraine..
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    A Sandboxing Method to Protect Cloud Cyberspace2015In: PROCEEDINGS OF 2015 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), IEEE Communications Society, 2015Conference paper (Refereed)
    Abstract [en]

    This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted attacks have been discovered by Kaspersky Lab. One of them - Duqu2 - successfully attacked the Lab itself. In this context, security researchers show rising concern about protecting corporate networks and cloud infrastructure used by large organizations against such type of attacks. This article describes a possibility to apply a sandboxing method within a cloud environment to enforce security perimeter of the cloud.

  • 5.
    Afram, Rabi
    Gotland University, School of Game Design, Technology and Learning Processes.
    Puzzle Design in Adventure Games2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates the level of difficulty of puzzles in the adventure games and the implications thereof. The thesis contains an in-depth background, and a brief history about the genre. It brings up the main problem of the genre and looks into both the cause and effect that follows. To support this process, an analysis has been made of design documents and a survey was issued on the subject of adventure game puzzles.

  • 6.
    AGALOMBA, CHRISTINE AFANDI
    Örebro University, Orebro University School of Business, Örebro University, Sweden.
    Factors contributing to failure of egovernment projects in developing countries: a literature review2012Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 7.
    Agnesson, Daniel
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Önder, Necip Yener
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Customer Maturity Analysis Tool: A case study in designing a Customer MaturityAnalysis Tool2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The IT consultancy industry is characterized by knowledge intensive implementationprojects related to varying levels of standardized information system software. When faced with a large implementation project at a previously unknown customer various assessmentsis usually conducted to identify the level of fit between the software and organizationin order to plan and structure the implementation process. However, there are several aspects of the customer organization that potentially can affect the end result as well as the implementation process that is unrelated to the fit between the software and the implementation organization as well as the potency of the implementation method. By conducting measurements of these maturity factors within the customer organization the implementing procedure can be modified based on the customer maturity level in order to become more aligned with the capabilities present in the customer organization.

    Research question: Which aspects need to be covered by a Customer Maturity Analysis Tool (CMAT) in order to evaluate the pre implementation maturity for potential customersof our case company and how should these aspects be organized and measured? The first task of the research process was to create an underlying model of maturity perspectives and aspects to structure the literature review as well as the empirical data collection. It was decided to adhere to a deductive approach where the theoretical model would be validated and if necessary modified in accordance to feedback from potential users of the CMAT within the case company. This procedure was repeated in the creation of measurements and maturity levels for the aspects to be used in the tool. The research process would therefore transition from a general model based on literature review, through a iterative feedback loop to a final model tailored to the specific requirementsof the case company. The final CMAT ended up containing four main perspectives of customer maturity; ITi nfrastructure, Culture, Process and Business Governance. These four perspectives were in turn divided into subgroups in order to be able to aggregate and compare differentaspects of the perspectives with each other.

  • 8.
    Ahlgren, Per
    et al.
    Department of e-Resources, University Library, Stockholm University.
    Colliander, Cristian
    Umeå University, Faculty of Social Sciences, Department of Sociology.
    Persson, Olle
    Umeå University, Faculty of Social Sciences, Department of Sociology.
    Field normalized citation rates, field normalized journal impact and Norwegian weights for allocation of university research funds2012In: Scientometrics, ISSN 0138-9130, E-ISSN 1588-2861, Vol. 92, no 2, 767-780 p.Article in journal (Refereed)
    Abstract [en]

    We compared three different bibliometric evaluation approaches: two citationbased approaches and one based on manual classification of publishing channels into quality levels. Publication data for two universities was used, and we worked with two levels of analysis: article and department. For the article level, we investigated the predictive power of field normalized citation rates and field normalized journal impact with respect to journal level. The results for the article level show that evaluation of journals based on citation impact correlate rather well with manual classification of journals into quality levels. However, the prediction from field normalized citation rates to journal level was only marginally better than random guessing. At the department level, we studied three different indicators in the context of research fund allocation within universities and the extent to which the three indicators produce different distributions of research funds. It turned out that the three distributions of relative indicator values were very similar, which in turn yields that the corresponding distributions of hypothetical research funds would be very similar.

  • 9.
    Ajuzie, Peter
    University of Skövde, School of Informatics.
    Utilization of information and communication technology and educational games in senior secondary schools in Owerri, Imo state Nigeria: Challenges and prospects2016Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Use of information and communication technology in formal education settings is a fundamental issue in management of education across the globe. But in Africa the issues takes a different turn as it regards to how to apply and utilize technology in education. Facility and technology experts have been on debate across board as the literature implies. Thus, understanding the digital native factors behind individuals’ application and utilization is central to the development of ICT in Nigeria and Africa in general. The main goal of this thesis was to explore factors influencing effective utilization of computer and ICT (Computer laboratories) in the secondary school level. However, in the literature the thesis identify issues affecting utilization of computer and ICT facilities in Sub-Sahara Africa (SSA), Nigeria and secondary schools (SS). The thesis proposed the use of educational games to drive the concept of utilization of computer and ICT facilities in the educational sector. In addition to the main goal of the thesis, use of computer and ICT facilities in secondary schools are explored alongside teachers and students interest in educational games. Qualitative interviews and a questionnaire survey were used in conduct of the study. Thematic and descriptive analysis was used to analyze the qualitative and quantitative data respectively.

    The results indicate that computer and ICT facilities (Computer laboratories) were poorly utilized by teachers and students due to lack of funds, poor infrastructure and technology knowledge. The results also demonstrate that teachers and students have knowledge about educational games and are willing to apply it in teaching and learning. But the issues of application of educational games into the mainstream could be hindered by Government curriculum policy and infrastructural facilities. The study indicates the relevance of applying educational games in secondary schools to reduce the level of digital divide among graduates. This thesis further argues that the inclusion of educational games would encourage teachers and students to effectively utilization of computer and ICT Facilities (Computer laboratory).

  • 10.
    Aksit, Kaan
    et al.
    Koç University, Turkey.
    Kade, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Özcan, Oguzhan
    Koç University, Turkey.
    Ürey, Hakan
    Koç University, Turkey.
    Head-worn Mixed Reality Projection Display Application2014In: ACM International Conference Proceedings Series (ICPS), 2014Conference paper (Refereed)
    Abstract [en]

    The main goal of this research is to develop a mixed real- ity (MR) application to support motion capture actors. This application allows seeing and exploring a digital environment without occluding the actor’s visual field. A prototype is built by combining a retro-reflective screen covering surrounding walls and a headband consisting of a laser scanning projector with a smartphone. Built-in sensors of a smartphone provide navigation capabilities in the digital world. The integrated system has some unique advantages, which are collectively demonstrated for the first time: (i) providing fixed field-of- view (50o in diagonal), fixed retinal images at full-resolution, and distortion-free images that are independent of the screen distance and shape; (ii) presenting different perspectives to the users as they move around or tilt their heads, (iii) allow- ing a focus-free and calibration-free display even on non-flat surfaces using laser scanning technology, (iv) enabling mul- tiple users to share the same screen without crosstalk due to the use of retro-reflectors, and (v) producing high brightness pictures with a projector of only 15 lm; due to a high-gain retro-reflective screen. We demonstrated a lightweight, com- fortable to wear and low cost head-mounted projection dis- play (HMPD) which acts as a stand-a-lone mobile system. Initial informal functionality tests have been successfully per- formed. The prototype can also be used as a 3D stereo system using the same hardware by additionally mounting polarized glasses and an active polarization rotator, while maintaining all of the advantages listed above. 

  • 11. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    De Martino, Monica
    Demšar, Urška
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Hauska, Hans
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Visual and Automatic Data Mining for Exploration of Geographical MetadataManuscript (Other academic)
  • 12. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    Demšar, Urška
    KTH, Superseded Departments, Infrastructure.
    De Martino, Monica
    Hauska, Hans
    KTH, Superseded Departments, Infrastructure.
    Knowledge Extraction by Visual Data Mining of Metadata in Site PlanningManuscript (Other academic)
    Abstract [en]

    The paper describes a tool designed within the first stage of the European project INVISIP in order to explore geographical metadata in the site planning process. A visual data mining approach is applied to a database of geographical metadata to help the user find an optimal subset of the existing geographical datasets for his particular planning task. It allows the user to perform both confirmative and explorative analysis. The approach is implemented in the Visual Data Mining tool, which integrates different types of visualisations with various interaction functionalities. It includes the interactive communication with the user and the brushing and linking process between different visualisations. The paper also presents an example of an application on a test metadatabase which was created for this purpose.

  • 13.
    Al-Dabbagh, Mustafa
    Örebro University, Swedish Business School at Örebro University.
    Electronic Government in Iraq: Challenges of development and implementation2011Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
  • 14. Alexanderson, Petter
    et al.
    Tollmar, Konrad
    Department of Informatics, HCID Group.
    Being and mixing: designing interactive soundscapes2006In: Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, 2006, 252-261 p.Conference paper (Refereed)
    Abstract [en]

    This paper describes a study of the auditory environment in a chemical factory, and how a group of process operators ascribe meaning to a selection of sound clips from their daily work environment. We argue for a design-oriented phenomenological approach to soundscape studies, and suggest an approach based on an exploration of how already occurring sounds are used. This knowledge will be used to inform the design of new useful auditory environments. Our study shows that the richness of the auditory environment is a crucial aspect of the distributed work environment. An important part of the design process is the operator’s contribution to the concepts suggested. From design workshops several design concepts aiming to explore and test different approaches for making sound affordances available have been developed. This has led us to a new understanding of how interactive soundscapes enable distributed awareness – what we refer to as ’Being and Mixing’.

  • 15.
    Allalou, Amin
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Centre for Image Analysis. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis and Human-Computer Interaction.
    Curic, Vladimir
    Pardo-Martin, Carlos
    Massachusetts Institute of Technology, USA.
    Yanik, Mehmet Fatih
    Massachusetts Institute of Technology, USA.
    Wählby, Carolina
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Centre for Image Analysis. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis and Human-Computer Interaction.
    Approaches for increasing throughput andinformation content of image-based zebrafishscreens2011In: Proceeding of SSBA 2011, 2011Conference paper (Other academic)
    Abstract [en]

    Microscopy in combination with image analysis has emerged as one of the most powerful and informativeways to analyze cell-based high-throughput screening (HTS) samples in experiments designed to uncover novel drugs and drug targets. However, many diseases and biological pathways can be better studied in whole animals, particularly diseases and pathways that involve organ systems and multicellular interactions, such as organ development, neuronal degeneration and regeneration, cancer metastasis, infectious disease progression and pathogenesis. The zebrafish is a wide-spread and popular vertebrate model of human organfunction and development, and it is unique in the sense that large-scale in vivo genetic and chemical studies are feasible due in part to its small size, optical transparency,and aquatic habitat. To improve the throughput and complexity of zebrafish screens, a high-throughput platform for cellular-resolution in vivo chemical and genetic screens on zebrafish larvae has been developed at Yanik lab at Research Laboratory of Electronics, MIT, USA. The system loads live zebrafish from reservoirs or multiwell plates, positions and rotates them for high-speed confocal imaging of organs,and dispenses the animals without damage. We present two improvements to the described system, including automation of positioning of the animals and a novel approach for brightfield microscopy tomographic imaging of living animals.

  • 16.
    Allalou, Amin
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Centre for Image Analysis. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis.
    van de Rijke, Frans
    Jahangir Tafrechi, Roos
    Raap, Anton
    Wählby, Carolina
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Centre for Image Analysis. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis.
    Image based measurements of single cell mtDNA mutation load MTD 20072007In: Medicinteknikdagarna 2007, 2007Conference paper (Other (popular science, discussion, etc.))
    Abstract [en]

    Cell cultures as well as cells in tissue always display a certain degree of variability,and measurements based on cell averages will miss important information contained in a heterogeneous population. These differences among cells in a population may be essential to quantify when looking at, e.g., protein expression and mutations in tumor cells which often show high degree of heterogeneity.

    Single nucleotide mutations in the mithochondrial DNA (mtDNA) can accumulate and later be present in large proportions of the mithocondria causing devastating diseases. To study mtDNA accumulation and segregation one needs to measure the amount of mtDNA mutations in each cell in multiple serial cell culture passages. The different degrees of mutation in a cell culture can be quantified by making measurements on individual cells as an alternative to looking at an average of a population. Fluorescence microscopy in combination with automated digital image analysis provides an efficient approach to this type of single cell analysis.

    Image analysis software for these types of applications are often complicated and not easy to use for persons lacking extensive knowledge in image analysis, e.g., laboratory personnel. This paper presents a user friendly implementation of an automated method for image based measurements of mtDNA mutations in individual cells detected with padlock probes and rolling-circle amplification (RCA). The mitochondria are present in the cell’s cytoplasm, and here each cytoplasm has to be delineated without the presence of a cytoplasmic stain. Three different methods for segmentation of cytoplasms are compared and it is shown that automated cytoplasmic delineation can be performed 30 times faster than manual delineation, with an accuracy as high as 87%. The final image based measurements of mitochondrial mutation load are also compared to, and show high agreement with, measurements made using biochemical techniques.

  • 17.
    Allander, Karl
    et al.
    Mälardalen University, Department of Innovation, Design and Product Development.
    Svanberg, Jim
    Mälardalen University, Department of Innovation, Design and Product Development.
    Klittmark, Mattias
    Mälardalen University, Department of Innovation, Design and Product Development.
    Intresseväckande Animation: Utställningsmaterial för Mälsåkerprojektet2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [sv]

    Under sommaren 2006 öppnar Mälsåker Slott för allmänheten och ett av de planerade projekten är en multimedial utställning om norrmän som tränades där i hemlighet under andra världskriget.

    Författarna till denna rapport är alla studenter av informationsdesign, med inriktning mot illustration på Mälardalens Högskola. Då vi har ett stort intresse av animation föreföll detta projekt mycket intressant.

    Vi ingick i en projektgrupp som innefattade dataloger, textdesigners samt illustratörer. Illustratörernas del av projektet var att skapa det visuella materialet på ett intresseväckande sätt. I rapporten undersöks möjliga lösningar för animation, manér, bilddramaturgi samt de tekniska förutsättningar som krävs för att skapa ett lyckat slutresultat. Rapporten beskriver tillvägagångssättet för att uppnå dessa mål vilket inkluderar metoder som litteraturstudier, diskussioner samt utprovningar. Utställningsformen är experimentell och arbetet har därför givit ett slutresultat som kan ses som en

    fallstudie i sig.

    Utprovningar av det färdiga materialet visar att vi efter förutsättningarna lyckats uppnå ett gott resultat. Animerat bildspel fungerar i sammanhanget bra som informativt utställningsmaterial.

  • 18.
    Alm, Ilkoo
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Johansson, Ingegerd
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Cognitive aspects in visualisation of complex data2001In: CISST'2001: proceedings of the International Conference on Imaging Science, Systems, and Technology : Las Vegas, Nevada, USA, June 25-28, 2001 / [ed] Arabnia, H.R., Avalon, Athens, USA: CSREA Press, 2001, 633-638 p.Conference paper (Refereed)
    Abstract [en]

    Information Visualization applications are dealing with fundamental difficulties related to overlap in cognitive models between designers and users, goal ambiguity, and accuracy in search strategies These difficulties are more obvious in applications aimed at reducing information overload by general users, than in applications aimed at visualising scientific data. General users have very likely quite different cognitive reference for approaching an abstract complex task, than designers. This can result in designs which can unintentionally increase information overload by users. In visualisation of scientific data the overlap of cognitive reference between specialists and designs is very likely much higher, but we need methods which can facilitate data exploration in real-time interaction. One possibility to facilitate exploration in a more or less systematic way is by means of metaphors which can support human perception in searching for patterns.

  • 19.
    Alm, Kristin
    et al.
    Mälardalen University, Department of Innovation, Design and Product Development.
    Öberg, Alice
    Mälardalen University, Department of Innovation, Design and Product Development.
    Logotyper och företagsmärken: Att lägga märke till märkliga märken2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Bachelor theses with the main purpose to investigate how well people recognize corporate brands without the logotype being present. We have achieved our results by using a mixture of both qualitative and quantitative methodology, and all of our collected data has been gathered through a survey. Our theoretical perspectives come from a variety of disciplines, such as psychology and information design, including perception, object recognition, symbolism and the importance of colours. After analysing our gathered data, we feel quite confident in claiming that there are no simple answers when it comes to our abilities to recognize corporate brands. We noticed that the gender of our respondents had none or very little impact when it comes to recognition, but age on the other hand was quite a large factor. We came to the conclusion that our older respondents recognized far more corporate brands than our younger respondents.

  • 20.
    Almquist, Martin
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.
    Numerical wave propagation in large-scale 3-D environments2012Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    High-order accurate finite difference methods have been applied to the acoustic wave equation in discontinuous media and curvilinear geometries, using the SBP-SAT method. Strict stability is shown for the 2-D wave equation with general boundary conditions. The fourth-order accurate method for the 3-D wave equation has been implemented in C and parallelized using MPI. The implementation has been verified against an analytical solution and runs efficiently on a large number of processors.

  • 21.
    Altosaar, Toomas
    et al.
    Aalto Univ. School of Science and Tech., Dept. of Signal Proc. & Acoustics.
    ten Bosch, Louis
    Radboud University Nijmegen, Language and Speech unit.
    Aimetti, Guillaume
    Univ. of Sheffield, Speech & Hearing group, Dept. of Computer Science.
    Koniaris, Christos
    KTH, School of Electrical Engineering (EES), Sound and Image Processing.
    Demuynck, Kris
    K.U.Leuven - ESAT/PSI.
    van den Heuvel, Henk
    Radboud University Nijmegen, Language and Speech unit.
    A Speech Corpus for Modeling Language Acquisition: CAREGIVER2010In: 7th International Conference on Language Resources and Evaluation (LREC) 2010, Valletta, Malta / [ed] Nicoletta Calzolari (Conference Chair) and Khalid Choukri and Bente Maegaard and Joseph Mariani and Jan Odijk and Stelios Piperidis and Mike Rosner and Daniel Tapias, European Language Resources Association (ELRA) , 2010, 1062-1068 p.Conference paper (Refereed)
    Abstract [en]

    A multi-lingual speech corpus used for modeling language acquisition called CAREGIVER has been designed and recorded within the framework of the EU funded Acquisition of Communication and Recognition Skills (ACORNS) project. The paper describes the motivation behind the corpus and its design by relying on current knowledge regarding infant language acquisition. Instead of recording infants and children, the voices of their primary and secondary caregivers were captured in both infant-directed and adult-directed speech modes over four languages in a read speech manner. The challenges and methods applied to obtain similar prompts in terms of complexity and semantics across different languages, as well as the normalized recording procedures employed at different locations, is covered. The corpus contains nearly 66000 utterance based audio files spoken over a two-year period by 17 male and 17 female native speakers of Dutch, English, Finnish, and Swedish. An orthographical transcription is available for every utterance. Also, time-aligned word and phone annotations for many of the sub-corpora also exist. The CAREGIVER corpus will be published via ELRA.

  • 22.
    Amin, Mahgol
    et al.
    Mälardalen University, School of Business, Society and Engineering.
    Kubo, Tomomi
    Mälardalen University, School of Business, Society and Engineering.
    KANBAN Implementation from a Change Management Perspective: A Case Study of Volvo IT2014Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this thesis is to investigate and analyze the implementation process of KANBAN, a lean technique, into a section of Volvo IT (i.e. BEAT). The KANBAN implementation into BEAT when ‘resistance for change’ and ‘forces for change’ arise is also analyzed. This implementation of KANBAN is equivalent to change taking place in the Volvo IT’s operational process. The thesis follows theories and literature on change management and lean principles in order to support the research investigation.

    How has KANBAN, with respect to change management, been implemented into an IT organization for its service production? How has KANBAN changed the operational process of the organization?

     The research conducted in the thesis is based on qualitative case study. Focused and in-depth interviews, combined with observations, are carried out to obtain the primary data for the case study. The collected primary and secondary data stems from the literature reviewed, which covers the lean principles, KANBAN, and change management. Moreover, the thesis adopts an abductive approach that goes back-and-forth between the theory and the empirical findings in order to develop a model.

    Due to various factors already existing in the BEAT, minimal resistance to change implementation was found to be present in Volvo IT. This finding indicates that change initiatives found a way to implementation because the predominance of the ‘forces for change’, as compared to, the ‘resistance to change’ is higher in BEAT. The KANBAN implementation into the IT service production is identified to be aligned with Volvo IT’s change implementation objectives. The visualization of the ‘intangible service’ workflow on the Kanban board contributes to identify the source of bottlenecks, which has been removed through effective communication in the BEAT team and better linkages between tasks. The KANBAN effectively deals with change implementation by modifying the way team members work.

  • 23.
    Anani, Adi
    Umeå University, Faculty of Science and Technology, Department of Applied Physics and Electronics.
    M-learning in review: Technology, standard and evaluation2008In: Journal of Communication and Computer, ISSN 1548-7709, Vol. 5, no 11, 1-6 p.Article in journal (Refereed)
    Abstract [en]

    Nowadays E-learning as a form of learning depending on networks and computer devices has been expanding by leaps and bounds. As a special kind of E-learning, M-learning (mobile learning) aims at the use of mobile devices anywhere at anytime by anybody. In this paper, the technologies to develop a M-learning system is deeply analyzed according to the layer model at first. Secondly, from the view of application, the standardization in M-learning is researched in order to accelerate the development and popularization of M-learning. Finally, quality estimation of M-learning system is discussed from the view of QoE (quality of experiences). The experience form end-user is the sole effective norm to judge the result of M-learning technology. It is no doubt that technologies, standardization and evaluation will play very important parts in the course of M-learning development.

  • 24.
    Anderson, Karen
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Bastian, Jeanette
    Graduate School of Library and Information, Simmons College, 300 The Fenway, Boston, MA 02115, United States.
    Harvey, Ross
    Graduate School of Library and Information, Simmons College, 300 The Fenway, Boston, MA 02115, United States.
    Plum, Terry
    Graduate School of Library and Information, Simmons College, 300 The Fenway, Boston, MA 02115, United States.
    Samuelsson, Göran
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Teaching to trust: How a virtual archives and preservation curriculum laboratory creates a global education community?2011In: Archival Science, ISSN 1389-0166, E-ISSN 1573-7519, Vol. 11, no 3-4, 349-372 p.Article in journal (Refereed)
    Abstract [en]

    Building virtual archives and preservation curriculum laboratories centered around born-digital and digitized records is a collaborative project currently underway between Simmons College (US) and Mid-Sweden University. In this virtual environment, issues of trust are central to the process, in terms of the both archival curriculum and the collaborative education process itself. The article describes the project, the collaboration, and offers a range of scenarios that demonstrate how the laboratories work within curriculum.

  • 25.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Purpose driven value model design2009In: CEUR Workshop Proceedings, 2009Conference paper (Refereed)
    Abstract [en]

    It is increasingly recognized that value models offer an abstraction that is useful for the exploration of new business networks and their properties. Among others, value models can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, as value models can be used for many different purposes, there is a risk that they become overloaded and difficult to understand. In this paper we claim that the form and contents of a value model should be governed by its purpose. We identify a number of basic purposes of value models and outline how a value model is affected by those. The approach builds on an analysis and classification of resources and resource exchanges.

  • 26.
    Andersson, Birger
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bider, I.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Perjons, Erik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Towards a formal definition of goal-oriented business process patterns2005In: Business Process Management Journal, ISSN 1463-7154, E-ISSN 1758-4116, Vol. 11, no 6, 650-662 p.Article in journal (Refereed)
    Abstract [en]

    Purpose - Organizations of today are becoming ever more focused on their business processes. This has resulted in an increasing interest in using best practices for business process re-engineering. Two problems arise in connection to using best practices: how to find a best practice that suits particular purposes, and how to ensure that the process from the best practice has the same nature as the process under re-engineering. The purpose of this paper is to address these issues. Design/methodology/approach - The paper suggests using business process patterns, i.e. relatively high level business process models, for making near formal comparison of business processes. The paper analyzes widespread modeling techniques to find out which of them suits the task of building patterns for comparison. Based on this analysis, the state-flow modeling technique is chosen and first steps towards formal definition of business process patterns based on this technique are suggested. Findings - A pattern is defined based on the notions of state space, goal, as a surface in the state space, and valid movements towards the goal. A thinkable procedure of constructing patterns is demonstrated on two real-life examples. A hypothetical procedure for comparing process is suggested but it still needs to be verified in practice. Originality/value - The originality of the paper is the way the patterns are formulated and the underlying model, the state-flow view of processes, upon which the patterns are founded.

  • 27.
    Andersson, Emilia
    University of Skövde, School of Informatics.
    Brustna digitala hjärtan: Om nobbning i spel2016Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
  • 28.
    Andersson, Martin
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Transport and Economics (closed 20110301).
    Ejermo, Olof
    How does Accessibility to Knowledge Sources Affect the Innovativeness of Corporations?: Evidence from Sweden2005In: The annals of regional science, ISSN 0570-1864, E-ISSN 1432-0592, Vol. 39, no 4, 741-765 p.Article in journal (Refereed)
    Abstract [en]

    This paper studies the innovative performance of 130 Swedish corporations during 1993-1994. The number of patents per corporation is explained as a function of the accessibility to internal and external knowledge sources of each corporation. A coherent way of handling accessibility measures, within and between corporations located across regions, is introduced. We examine the relative importance of intra- and interregional knowledge sources from 1) the own corporation, 2) other corporations, and 3) universities. The results show that there is a positive relationship between the innovativeness of a corporation and its accessibility to university researchers within regions where own research groups are located. Good accessibility among the corporation's research units does not have any significant effects on the likelihood of generation of patents. Instead the size of the R&D staff of the corporation seems to be the most important internal factor. There is no indication that intraregional accessibility to other corporations' research is important for a corporation's innovativeness. However, there is some indication of reduced likelihood for own corporate patenting when other corporate R&D is located in nearby regions. This may reflect a negative effect from competition for R&D labor.

  • 29.
    Andersson, Sanna
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013).
    Stålhult, Sandra
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013).
    Hospitals exposed to flooding in Manila City, Philippines: GIS analyses of alternative emergency routes and allocation of emergency service and temporary medical centre2014Independent thesis Basic level (professional degree), 180 HE creditsStudent thesis
    Abstract [en]

    Every year the Philippines get affected by a number of typhoons, which cause severe damage, sometimes due to flooding. The capital, Manila, is located on a flood plain that is partly at, and even below sea level and with several rivers crossing the area. These are some of the factors that contribute to that Manila often is affected by severe flooding.

    During ten weeks of the spring semester in 2014, this thesis was conducted as a completion of the bachelor program Geographic Information System (GIS) at Karlstad University, Sweden. Eight weeks were spent in Manila in the Philippines at the University of the Philippines Diliman, School of Urban and Regional Planning (UP SURP).

    The aim of the study was to investigate how hospitals in Manila City get affected during flooding. GIS was used to perform network analyses, in order to calculate the shortest route for the emergency service to travel from a station via a barangay to a hospital. The shortest alternative route during a 5-year flood was also calculated in order to compare the distance differences that might be due to flood.

    During a 100-year flood another type of analysis was performed, where suggestions for suitable locations for placing emergency service and temporary medical centre were presented. These suggestions on suitable locations were placed in an area that will not be affected during a 100-year flood.

    Results from the analyses showed that Manila City is a very exposed area during flood. During a 5-year flood some parts of Manila City will be highly exposed and about 1/4 of the population will be affected. The shortest alternative route for the emergency service to use during flood will generally be longer than in normal situations. Some hospitals cannot be accessed from some barangays due to impassable roads.

    During a 100-year flood the area gets gravely affected, almost 2/3 of the population will be affected and many roads become impassable, which limits the accessibility in Manila City.

  • 30.
    Andersson, Tim
    Linköping University, Department of Computer and Information Science, Human-Centered systems. Linköping University, The Institute of Technology.
    Bluetooth Low Energy and Smartphones for Proximity-Based Automatic Door Locks2014Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    Bluetooth Low Energy is becoming increasingly popular in mobile applications due to the possibility of using it for proximity data. Proximity can be estimated by measuring the strength of the Bluetooth signal, and actions can then be performed based on a user's proximity to a certain location or object. One of the most interesting applications of proximity information is automating common tasks; this paper evaluates Bluetooth Low Energy in the context of using smartphones to automatically unlock a door when a user approaches the door. Measurements were performed to determine signal strength reliability, energy consumption and connection latency. The results show that Bluetooth Low Energy is a suitable technology for proximity-based door locks despite the large variance in signal strength.

  • 31.
    Andreasson, Henrik
    et al.
    Örebro University, School of Science and Technology.
    Lilienthal, Achim J.
    Örebro University, School of Science and Technology.
    6D scan registration using depth-interpolated local image features2010In: Robotics and Autonomous Systems, ISSN 0921-8890, E-ISSN 1872-793X, Vol. 58, no 2, 157-165 p.Article in journal (Refereed)
    Abstract [en]

    This paper describes a novel registration approach that is based on a combination of visual and 3D range information.To identify correspondences, local visual features obtained from images of a standard color camera are compared and the depth of matching features (and their position covariance) is determined from the range measurements of a 3D laserscanner. The matched depth-interpolated image features allows to apply registration with known correspondences.We compare several ICP variants in this paper and suggest an extension that considers the spatial distance betweenmatching features to eliminate false correspondences. Experimental results are presented in both outdoor and indoor environments. In addition to pair-wise registration, we also propose a global registration method that registers allscan poses simultaneously.

  • 32.
    Andreasson, Rebecca
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Riveiro, Maria
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Effects of Visualizing Missing Data: An Empirical Evaluation2014In: 18th International Conference on Information Visualisation (IV) / [ed] Ebad Banissi, Mark W. McK. Bannatyne, Francis T. Marchese, Muhammad Sarfraz, Anna Ursyn, Gilles Venturini, Theodor G. Wyeld, Urska Cvek, Marjan Trutschl, Georges Grinstein, Vladimir Geroimenko, Sarah Kenderdine & Fatma Bouali, IEEE conference proceedings, 2014, 132-138 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents an empirical study that evaluates the effects of visualizing missing data on decision-making tasks. A comparison between three visualization techniques: (1) emptiness, (2) fuzziness, and (3) emptiness plus explanation, revealed that the latter technique induced significantly higher degree of decision-confidence than the visualization technique fuzziness. Moreover, emptiness plus explanation yield the highest number of risky choices of the three. This result suggests that uncertainty visualization techniques affect the decision-maker and the decisionconfidence. Additionally, the results indicate a possible relation between the degree of decision-confidence and the decision-maker's displayed risk behavior.

  • 33.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Exploring Touch-Screen Biometrics for User Identification on Smart Phones2011In: Privacy and Identity Managementfor Life: Proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School 2011 / [ed] an Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, and Giovanni Russello, Springer, 2011, 130-143 p.Conference paper (Refereed)
    Abstract [en]

    The use of mobile smart devices for storing sensitive informationand accessing online services is increasing. At the same time, methods for authenticating users into their devices and online services that are not only secure, but also privacy and user-friendly are needed. In this paper, we present our initial explorations of the use of lock pattern dynamics as a secure and user-friendly two-factor authentication method. We developed an application for the Android mobile platform to collect data on the way individuals draw lock patterns on a touchscreen. Using a Random Forest machine learning classier this method achieves an average Equal Error Rate (EER) of approximately 10.39%, meaning that lock patterns biometrics can be used for identifying users towards their device, but could also pose a threat to privacy if the users' biometric information is handled outside their control.

  • 34.
    Arding, Petter
    et al.
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Hedelin, Hugo
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Computer virus: design and detection2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Computer viruses uses a few different techniques, with various intentions, toinfect files. However, what most of them have in common is that they wantto avoid detection by anti-malware software. To not get detected and stay unnoticed,virus creators have developed several methods for this. Anti-malwaresoftware is constantly trying to counter these methods of virus infections withtheir own detection-techniques. In this paper we have analyzed the differenttypes of viruses and their infection techniques, and tried to determined whichworks the best to avoid detection. In the experiments we have done we havesimulated executing the viruses at the same time as an anti-malware softwarewas running. Our conclusion is that metamorphic viruses uses the best methodsto stay unnoticed by anti-malware software’s detection techniques.

  • 35.
    Ardizzone, Nicole
    Mälardalen University, Department of Innovation, Design and Product Development.
    Lättlästa instruktioner: Enligt riktlinjer för lättläst och informationsdesign2006Independent thesis Basic level (professional degree), 10 points / 15 hpStudent thesis
    Abstract [sv]

    Rapporten presenterar riktlinjer för lättläst och informationsdesign, och hur de har använts för att utforma ett instruktionsblad till lättläst.

    Syftet med arbetet har varit att bearbeta ett befintligt instuktionsblad så att det når ut till grupper med lässvårigheter.

    De metoder som använts under utformningen har varit litteraturstudier och kvalitativa studier i form av utprovningar.

  • 36. Arribas-Bel, D.
    et al.
    Kourtit, Karima
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Urban and Regional Studies. Mickiewicz University, Poznan, Poland.
    Nijkamp, P.
    Steenbruggen, J.
    Cyber Cities: Social Media as a Tool for Understanding Cities2015In: Applied Spatial Analysis and Policy, ISSN 1874-463X, Vol. 8, no 1, 231-247 p.Article in journal (Refereed)
    Abstract [en]

    ‘Big’ urban data are increasingly becoming accessible for scientific research and policy use. They may enhance the intelligence that is needed for understanding and mapping out social connectivity phenomena (in the sense of Jane Jacobs) in modern smart cities. The present paper aims to highlight and demonstrate the rich potential of information based on digital technology in modern cities. As a case study example of the power of social media data as a support tool in smart cities, we consider Twitter data in the municipality of Amsterdam. We use machine learning techniques to identify temporal patterns that we then relate back to their spatial dimension, effectively connecting the digital with physical aspect of cities. We also show that analysis of geo-referenced tweets can shed significant light on physical aspects of the city and on the spatial distribution of urban functions.

  • 37.
    Arvidsson, Martin
    et al.
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Paulsson, Eric
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Utveckling av beslutsstöd för kreditvärdighet2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim is to develop a new decision-making model for credit-loans. The model will be specific for credit applicants of the OKQ8 bank, becauseit is based on data of earlier applicants of credit from the client (the bank). The final model is, in effect, functional enough to use informationabout a new applicant as input, and predict the outcome to either the good risk group or the bad risk group based on the applicant’s properties.The prediction may then lay the foundation for the decision to grant or deny credit loan.

    Because of the skewed distribution in the response variable, different sampling techniques are evaluated. These include oversampling with SMOTE, random undersampling and pure oversampling in the form of scalar weighting of the minority class. It is shown that the predictivequality of a classifier is affected by the distribution of the response, and that the oversampled information is not too redundant.

    Three classification techniques are evaluated. Our results suggest that a multi-layer neural network with 18 neurons in a hidden layer, equippedwith an ensemble technique called boosting, gives the best predictive power. The most successful model is based on a feed forward structure andtrained with a variant of back-propagation using conjugate-gradient optimization.

    Two other models with a good prediction quality are developed using logistic regression and a decision tree classifier, but they do not reach thelevel of the network. However, the results of these models are used to answer the question regarding which customer properties are importantwhen determining credit risk. Two examples of important customer properties are income and the number of earlier credit reports of the applicant.

    Finally, we use the best classification model to predict the outcome of a set of applicants declined by the existent filter. The results show that thenetwork model accepts over 60 % of the applicants who had previously been denied credit. This may indicate that the client’s suspicionsregarding that the existing model is too restrictive, in fact are true.

  • 38.
    Askfelt, Simone
    et al.
    Halmstad University, School of Information Technology.
    Arbenita, Osmani
    Halmstad University, School of Information Technology.
    Ekologiskt hållbar med Business Intelligence: Stöd från BI vid ekologiskt hållbart arbete2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Working ecologically sustainable is in some cases essential for a business to continue to be active on the market. There is a larger demand on businesses today to work ecologically sustainable. This has led to businesses reviewing the way they work in order to reduce their environmental impact. The demand on businesses to reduce their environmental impact has led to implementations of new systems with the purpose of supporting their ecological sustainability. A system that is able to support working with ecological sustainability is BI. With the support from BI, businesses can collect, store and analyze data and hence become more informed about how their processes affect the ecological sustainability. However, studies regarding the relationship between BI and ecological sustainability are few. In many cases businesses overview their work with ecological sustainability separate from remaining part of the business. The main purpose of the study is to identify and map how businesses work with ecological sustainability in practice with support from BI. This is mapped in order to finally compose and present proposals on how BI could strengthen the way businesses work with ecological sustainability. The empirical data for this study were collected through semi-structured interviews. The result of the study shows that manufacturing businesses do not take full support from BI regarding their work with ecological sustainability. The study presents proposals of how BI could strengthen businesses work with ecological sustainability

  • 39.
    Asplund, Teo
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Visual Information and Interaction. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computerized Image Analysis and Human-Computer Interaction.
    Luengo Hendriks, Cris L.
    Flagship Biosci Inc, Westminster, CO 80021 USA.
    A Faster, Unbiased Path Opening by Upper Skeletonization and Weighted Adjacency Graphs2016In: IEEE Transactions on Image Processing, ISSN 1057-7149, E-ISSN 1941-0042, Vol. 25, no 12, 5589-5600 p.Article in journal (Refereed)
    Abstract [en]

    The path opening is a filter that preserves bright regions in the image in which a path of a certain length L fits. A path is a (not necessarily straight) line defined by a specific adjacency relation. The most efficient implementation known scales as O(min(L, d, Q)N) with the length of the path, L, the maximum possible path length, d, the number of graylevels, Q, and the image size, N. An approximation exists (parsimonious path opening) that has an execution time independent of path length. This is achieved by preselecting paths, and applying 1D openings along these paths. However, the preselected paths can miss important structures, as described by its authors. Here, we propose a different approximation, in which we preselect paths using a grayvalue skeleton. The skeleton follows all ridges in the image, meaning that no important line structures will be missed. An H-minima transform simplifies the image to reduce the number of branches in the skeleton. A graph-based version of the traditional path opening operates only on the pixels in the skeleton, yielding speedups up to one order of magnitude, depending on image size and filter parameters. The edges of the graph are weighted in order to minimize bias. Experiments show that the proposed algorithm scales linearly with image size, and that it is often slightly faster for longer paths than for shorter paths. The algorithm also yields the most accurate results- as compared with a number of path opening variants-when measuring length distributions.

  • 40.
    Assad, Muhammad Imran
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Ahmad, Mian Abbas
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Guidelines for ITIL Implementation: A Framework for IT Service Management2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Information Technology Infrastructure Library (ITIL) is the most popular andthe influential framework for IT Service Management (ITSM). It is used for ITgovernance, management and control of IT services. It comprises of definedand best practices, developed in 1980’s by British Government Central ComputerTelecommunication Agency. The purpose of this thesis is to present theguidelines to implement ITIL. Available literature on ITIL discusses the importanceof ITIL, its benefits, facilitating and challenging factors associatedwith implementation. But the steps to implement ITIL have so far not beendiscussed. We take the opportunity to explore empirical data from industry andliterature to get to know different strategies and approaches used by IT professionalsfor implementing the ITIL framework.To fulfil the purpose, we stated three research questions: “What are facilitatingfactors for the ITIL Implementation?”, “What are the challenging factors forthe ITIL Implementation?”, and “Based on facilitating factors and barriers,what are the guidelines for a successful ITIL implementation?”. Literature wasreviewed to extract required factors and senior IT professionals from two organisationswere interviewed to get to know what factors had been facilitators and barriers for them. The extracted factors were compiled, grouped and analysedto develop implementation steps. The result of this thesis is a framework developed implementation steps, which any organisation can use as guidelineto adapt ITIL framework. These steps consist of four phases highlighting significantfactors needed for the successful implementation. Among the highlighted factors were top management support, ITIL skills of implementer, resistanceto change, financial support, staff training, process mapping, documentation,project management and governance are the most important factors which influence the implementation process.

  • 41. Atserias, Albert
    et al.
    Lauria, Massimo
    Nordström, Jakob
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Narrow Proofs May Be Maximally Long2016In: ACM Transactions on Computational Logic, ISSN 1529-3785, E-ISSN 1557-945X, Vol. 17, no 3, 19Article in journal (Refereed)
    Abstract [en]

    We prove that there are 3-CNF formulas over n variables that can be refuted in resolution in width w but require resolution proofs of size n(Omega(w)). This shows that the simple counting argument that any formula refutable in width w must have a proof in size n(O(w)) is essentially tight. Moreover, our lower bound generalizes to polynomial calculus resolution and Sherali-Adams, implying that the corresponding size upper bounds in terms of degree and rank are tight as well. The lower bound does not extend all the way to Lasserre, however, since we show that there the formulas we study have proofs of constant rank and size polynomial in both n and w.

  • 42.
    Azam, Khwaja Mehedi
    et al.
    Örebro University, Orebro University School of Business, Örebro University, Sweden.
    Munim, Md Fazle
    Örebro University, Orebro University School of Business, Örebro University, Sweden.
    Measurement of E-Service Quality: Study on Jessor DC Office, Bangladesh2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
  • 43.
    Azhari, Mohammad
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    Raghothama, Jayanth
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    Meijer, Sebastiaan
    KTH, School of Technology and Health (STH), Health Systems Engineering, Health Care Logistics.
    A Design and Implementation of Interactive Visualizations and Simulation in Transportation2014In: The Shift from Teaching to Learning: Individual, Collective and Organizational Learning Through Gaming Simulation: Proceedings of the 45th Conferenceof the International Simulation and Gaming Association, 2014Conference paper (Refereed)
    Abstract [en]

    Transportation Planners have a long history of using Geographical Information Systems, Simulation Models and Visualizations for decision support. A frame-work that integrates all three can provide enhanced decision support, opportuni-ties for training and planning future scenarios. In the current paper, we describe the concept of such a framework and the first steps toward its development.

  • 44.
    Baalsrud Hauge, Jannicke Madeleine
    et al.
    University of Bremen, Bremer Institut für Produktion und Logistik, Germany.
    Stanescu, Ioana
    Carol I National Defence University, Romania.
    Arnab, Sylvester
    Disruptive Media Learning Lab, Coventry University, UK.
    Moreno Ger, Pablo
    Universidad Complutense de Madrid, Spain.
    Lim, Theodore
    Herriot-Watt University, UK.
    Serrano-Laguna, Angel
    Universidad Complutense de Madrid, Spain.
    Lameras, Petros
    Serious Games Institute, Coventry University, UK.
    Hendrix, Maurice
    School of Science and Technology, University of Northampton, UK.
    Kiili, Kristian
    Tampere University of Technology, Finland.
    Ninaus, Manuel
    University of Graz, Austria.
    de Freitas, Sara
    Curtin University, Australia.
    Mazzetti, Alessandro
    Gruppo SIGLA S.r.l, Italy.
    Dahlbom, Anders
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Degano, Cristiana
    Gruppo SIGLA S.r.l, Italy.
    Learning Analytics Architecture to Scaffold Learning Experience through Technology-based Methods2015In: International Journal of Serious Games, ISSN 2384-8766, Vol. 2, no 1, 29-44 p.Article in journal (Refereed)
    Abstract [en]

    The challenge of delivering personalized learning experiences is often increased by the size of classrooms and online learning communities. Serious Games (SGs) are increasingly recognized for their potential to improve education. However, the issues related to their development and their level of effectiveness can be seriously affected when brought too rapidly into growing online learning communities. Deeper insights into how the students are playing is needed to deliver a comprehensive and intelligent learning framework that facilitates better understanding of learners' knowledge, effective assessment of their progress and continuous evaluation and optimization of the environments in which they learn. This paper discusses current SOTA and aims to explore the potential in the use of games and learning analytics towards scaffolding and supporting teaching and learning experience. The conceptual model (ecosystem and architecture) discussed in this paper aims to highlight the key considerations that may advance the current state of learning analytics, adaptive learning and SGs, by leveraging SGs as an suitable medium for gathering data and performing adaptations.

  • 45. Badashian, A. S.
    et al.
    Afzali, Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Khalkhali, I.
    Delcheh, M. A.
    Shafiei, M. S.
    Mahdavi, M.
    CFM: A file manager with multiple categorization support2010In: SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, 2010, 748-751 p.Conference paper (Refereed)
    Abstract [en]

    This paper introduces a new file manager to support multiple categorization. The proposed file manager is designed based on a subtle idea named Conceptual File Management (CFM). According to this approach, files are not contained by folders; nevertheless, each file can be a member of one or more folders (concepts). A prototype file manager is designed and implemented based on the new approach. Filtering by set operations and also manual concept selection improves retrieval of the files. CFM improves file system's clarity and avoids ambiguity and redundancy. As a result, it reduces the size of file system and enhances file access.

  • 46. Badashian, A. S.
    et al.
    Afzali, Seyyed Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Delcheh, M. A.
    Mahdavi, M.
    Alipour, M.
    Conceptual file management: Revising the structure of classificationbased information retrieval2010In: 2010 5th International Conference on Digital Information Management, ICDIM 2010, 2010, 108-113 p.Conference paper (Refereed)
    Abstract [en]

    This paper addresses the Information Retrieval issues by today's hierarchical systems such as file systems. They usually contain substantial amount of redundant items. Maintaining the structure becomes difficult when large amount of items exist and ambiguity occurs in the structure. In this study, a conceptual method is presented that replaces the " containment" principle involved in current systems by " membership" principle. The proposed Conceptual File Management (CFM) method allows a file to be accessed from multiple folders; furthermore, it keeps the current hierarchical structure with minor changes. CFM reduces the ambiguity and redundancy, therefore the quality of information retrieval is improved. A Conceptual File Manager based on the above-mentioned principle has been developed. Experiments show that it improves the quality of the system in terms of maintaining the structure and retrieving the desired items easier and faster based on users' viewpoints. CFM is applicable to not only traditional file systems on computers, but also file systems on cell phones (and message storage systems), site maps in Web sites, Content Management Systems, taxonomies, and in general, classification based structures.

  • 47. Badashian, A. S.
    et al.
    Firouzabadi, A. D.
    Delcheh, M. A.
    Afzali, Seyyed Hamidreza
    KTH, School of Information and Communication Technology (ICT).
    Mahdavi, M.
    Designing a collaborative educational system: A competitive approach to e-learning2010In: 2010 5th International Conference on Digital Information Management, ICDIM 2010, 2010, 478-483 p.Conference paper (Refereed)
    Abstract [en]

    Tens of thousands of universities are today educating students with different methods for a vast variety of majors. This paper aims to introduce Knowledge Tree (KT) as an integrated virtual structure to be used in the educational systems. A collaborative structure is utilized to define a universal curriculum for various university majors worldwide to maximize e-learning capabilities. Then, a collaborative competitive approach is introduced to enrich the contents of course topics offered based on the mentioned structure. The results based on both educational facts fetched from the search engines and a questionnaire filled by a group of academics from different universities show that this system performs well in educational systems in terms of time, effort and cost.

  • 48.
    Bakibinga, Stella
    Örebro University, Swedish Business School at Örebro University.
    User Acceptance of Information Systems among Local Governments in Uganda: The Pilot of the Education Management Information System in Jinja District.2011Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 49.
    Balasooriya, Isuru
    Örebro University, Orebro University School of Business, Örebro University, Sweden.
    The Road to One-to-one Computing: An empirical study in Sri Lanka2012Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 50.
    Ban, Yifang
    et al.
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Jacob, Alexander
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geodesy and Geoinformatics.
    Gamba, Paolo
    University of Pavia, Pavia, Italy.
    Spaceborne SAR Data for Global Urban Mapping at 30m Resolution Utilizing a Robust Urban Extractor2015In: ISPRS journal of photogrammetry and remote sensing (Print), ISSN 0924-2716, Vol. 103Article in journal (Refereed)
    Abstract [en]

    With more than half of the world population now living in cities and 1.4 billion more people expected to move into cities by 2030, urban areas pose significant challenges on local, regional and global environment. Timely and accurate information on spatial distributions and temporal changes of urban areas are therefore needed to support sustainable development and environmental change research. The objective of this research is to evaluate spaceborne SAR data for improved global urban mapping using a robust processing chain, the KTH-Pavia Urban Extractor. The proposed processing chain includes urban extraction based on spatial indices and Grey Level Co-occurrence Matrix (GLCM) textures, an existing method and several improvements i.e., SAR data preprocessing, enhancement, and post-processing. ENVISAT Advanced Synthetic Aperture Radar (ASAR) C-VV data at 30m resolution were selected over 10 global cities and a rural area from six continents to demonstrated robustness of the improved method. The results show that the KTH-Pavia Urban Extractor is effective in extracting urban areas and small towns from ENVISAT ASAR data and built-up areas can be mapped at 30m resolution with very good accuracy using only one or two SAR images. These findings indicate that operational global urban mapping is possible with spaceborne SAR data, especially with the launch of Sentinel-1 that provides SAR data with global coverage, operational reliability and quick data delivery.

1234567 1 - 50 of 805
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf