Change search
Refine search result
1234567 101 - 150 of 2516
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Andersson, Björn
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Persson, Marie
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Software Reliability Prediction – An Evaluation of a Novel Technique2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Along with continuously increasing computerization, our expectations on software and hardware reliability increase considerably. Therefore, software reliability has become one of the most important software quality attributes. Software reliability modeling based on test data is done to estimate whether the current reliability level meets the requirements for the product. Software reliability modeling also provides possibilities to predict reliability. Costs of software developing and tests together with profit issues in relation to software reliability are one of the main objectives to software reliability prediction. Software reliability prediction currently uses different models for this purpose. Parameters have to be set in order to tune the model to fit the test data. A slightly different prediction model, Time Invariance Estimation, TIE is developed to challenge the models used today. An experiment is set up to investigate whether TIE could be found useful in a software reliability prediction context. The experiment is based on a comparison between the ordinary reliability prediction models and TIE.

  • 102. Andersson, David
    A survey on contactless payment methods for smartphones2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 103.
    Andersson, Elisabeth
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Palo, Catarina
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Systemutveckling med fokus på kreativa processer och lärande2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Med denna uppsats vill vi (författarna) samla ihop 5 år av tankar, teorier och erfarenheter kring systemutveckling och lärande. Uppsatsen presenterar 8 projekt som är genomförda i Blekinge mellan 1995-1999. Med utgångspunkt i projekten behandlas en utvecklingsprocess för IT-system som är baserad på kreativitet och lärande miljöer. Särskilt lyfter uupsatsen fram behovet av att förändra processen för att möta slutanvändare av program och tjänster.

  • 104.
    Andersson, Eskil
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Akrawi, Sirvan
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    CU2: Design av ett PDA-baserat diskussionverktyg med ljud/bildkommunikation2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    I detta arbete framlägger vi ett designförslag på hur ett diskussionsverktyg som stödjer ljud- och bildkommunikation kan se ut. Ett förslag som förbättrar och förenklar den distanskommunikation som idag sker med hjälp av mobiltelefoner, videokonferenssystem samt webbkameror anslutna till persondatorer. Den design vi föreslår möjliggör för mobila användare att visuellt föra flerpartssamtal med hjälp av PDA:er. Vårt designförslag har fått arbetsnamnet CU2 (see you too) och är tänkt att fungera i tredje och/eller fjärde generationens mobila nät. Vi har valt att genomföra vårt magisterarbete på företaget A Brand New World i Kista, Stockholm. Företaget utvecklar och säljer system inom mobilt Internet.

  • 105.
    Andersson, Filip
    et al.
    Blekinge Institute of Technology, School of Computing.
    Norberg, Simon
    Blekinge Institute of Technology, School of Computing.
    Scalable applications in a distributed environment2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    As the amount of simultaneous users of distributed systems increase, scalability is becoming an important factor to consider during software development. Without sufficient scalability, systems might have a hard time to manage high loads, and might not be able to support a high amount of users. We have determined how scalability can best be implemented, and what extra costs this leads to. Our research is based on both a literature review, where we have looked at what others in the field of computer engineering thinks about scalability, and by implementing a highly scalable system of our own. In the end we came up with a couple of general pointers which can help developers to determine if they should focus on scalable development, and what they should consider if they choose to do so.

  • 106.
    Andersson, Fredrik
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Hagström, Stefan
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Dynamic identities for flexible access control2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This thesis will analyse the pros and cons of a module-based approach versus the currently existing certificate schemes and the proposed requirements for a module-based certificate scheme to serve as a plausible identity verification system. We will present a possible model and evaluate it in respect to the existing solutions and our set of identified requirements.

  • 107.
    Andersson, Helena
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Nilsson, Anna
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Nilsson, Johan
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Trouble Ticket "Kommunikationen gav oss vind i seglen"2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Rapporten huvudsyfte är att beskriva hur vi genom användning av språk och kommunikation har kunnat tillgodose våra användares krav på ett ärendehanteringssystem, samt på vilket sätt vi har använt artefakter för att kommunicera. Vi kommer att beskriva olika delar av projektet där språk och kommunikation har haft centrala "roller" och visat sig ha olika betydelse beroende på de personer som medverkar och i vilken miljö situationen har utspelat sig. Rapporten behandlar även hur resultatet av ovanstående har lett oss in i en utvecklingsprocess där vi försökt tillgodose användarens krav på bästa sätt. Vi kommer också att beskriva de kända och tidigare okända metoder som vi använt oss av för att uppnå vår målsättning, att överlämna en första prototyp av ett ärendehanteringssystem.

  • 108.
    Andersson, Jonas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Silhouette-based Level of Detail: A comparison of real-time performance and image space metrics2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Context. The geometric complexity of objects in games and other real-time applications is a crucial aspect concerning the performance of the application. Such applications usually redraw the screen between 30-60 times per second, sometimes even more often, which can be a hard task in an environment with a high number of geometrically complex objects. The concept called Level of Detail, often abbreviated LoD, aims to alleviate the load on the hardware by introducing methods and techniques to minimize the amount of geometry while still maintaining the same, or very similar result.

    Objectives. This study will compare four of the often used techniques, namely Static LoD, Unpopping LoD, Curved PN Triangles, and Phong Tessellation. Phong Tessellation is silhouette-based, and since the silhouette is considered one of the most important properties, the main aim is to determine how it performs compared to the other three techniques.

    Methods. The four techniques are implemented in a real-time application using the modern rendering API Direct3D 11. Data will be gathered from this application to use in several experiments in the context of both performance and image space metrics.

    Conclusions. This study has shown that all of the techniques used works in real-time, but with varying results. From the experiments it can be concluded that the best technique to use is Unpopping LoD. It has good performance and provides a good visual result with the least average amount of popping of the compared techniques. The dynamic techniques are not suitable as a substitute to Unpopping LoD, but further research could be conducted to examine how they can be used together, and how the objects themselves can be designed with the dynamic techniques in mind.

  • 109.
    Andersson, Karl
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Dackemyr, Elisabeth
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Teknikens Under: En problemrapport över arbetet på diariet, Regionens Hus i Mariestad2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Att en dator hänger sig, inte gör som man vill eller bara är obegriplig är inget nytt fenomen. Dock är detta en del av vardagen på diariet i Regionens Hus i Mariestad, där de tre registratorernas arbetsprocesser innehåller ett antal problem som bland annat är datorrelaterade. Rapporten beskriver arbetet på diariet, de problem som finns, vem som äger problemen, och innehåller också en diskussion runt de befintliga problemen. Rapporten tar upp allt från postöppning till sökfel i programmet Diabas och mycket annat som ingår i arbetet som registrator. De problem som finns i arbetet på diariet har hopat sig över registratorerna som känner att det inte finns någon självklar part som de kan vända sig till för att få hjälp. Känslan av maktlöshet är alltid närvarande i arbetet när registratorernas datoriserade hjälpmedel inte gör som de vill. Rapporten är ett steg i att kartlägga problemen och vem som äger dem, och avsedd att bli en hjälp för registratorerna.

  • 110.
    Andersson, Lars
    Blekinge Institute of Technology, School of Computing.
    Inblick i fenomenet webbskrapning2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Föreliggande kandidatarbete har till syfte att undersöka fenomenet Webskrapning. Webbskrapnings-program (också kända som Web Wanderers, Crawlers, Spiders eller skrapare) är program som söker igenom webben automatiskt för att extrahera information från webbsidor. Ett exempel på web skrapning är när ett företag samlar in data om prissättningar på en vara eller en tjänst och sen använder informationen för att producera billigare erbjudanden. Detta ger företaget en fördel så att de kan fokusera mera på att marknadsföra sin sida/tjänster. Utöver detta så blir de utsatta företagens servrar också hårt belastade med trafik (skrapning) från ”icke kunder”. Efter att ha genomsökt både akademiska och allmänna källor via informationsinsamling, av denna information så dras slutsatsen att man inte fullt ut kan hindra skrapning av hemsidor. Detta på samma sätt som man inte fullt ut kan hindra någon IT-attack, det finns inga 100 % vattentäta system. Av utfallet ifrån informationssökningen var det bara ett akademiskt arbete, av de hundra, som genomsöktes som hade inriktat sig på att förhindra skrapningsbotar.

  • 111.
    Andersson, Linda
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Evaluation of HMI Development for Embedded System Control2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Context:The interface development is increasing in complexity and applications with a lot of functionalities that are reliable, understandable and easy to use have to be developed. To be able to compete, the time-to-market has to be short and cost effective. The development process is important and there are a lot of aspects that can be improved. The needs of the development and the knowledge among the developers are key factors. Here code reuse, standardization and the usability of the development tool plays an important role which could have a lot of positive impact on the development process and the quality of the final product. Objectives: A framework for describing important properties for HMI development tools is presented. A representative collection of two development tools are selected, described and based on the experiences from the case study its applicability is mapped to the evaluation framework. Methods: Interviews were made with HMI developers to get information from the field. Following that, a case study of two different development tools were made to highlight the pros and cons of each tool. Results: The properties presented in the evaluation framework are that the toolkit should be open for multiple platforms, accessible for the developer, it should support custom templates, require non-extensive coding knowledge and be reusable. The evaluated frameworks shows that it is hard to meet all the demands. Conclusions: To find a well suited development toolkit is not an easy task. The choice should be made depending on the needs of the HMI applications and the available development resources.

  • 112.
    Andersson, Lukas
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Comparison of Anti-Aliasing in Motion2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Background. Aliasing is a problem that every 3D game has because of the resolutions that monitors are using right now is not high enough. Aliasing is when you look at an object in a 3D world and see that it has jagged edges where it should be smooth. This can be reduced by a technique called anti-aliasing.

    Objectives. The object of this study is to compare three different techniques, Fast approximate anti-aliasing (FXAA), Subpixel Morphological Anti Aliasing (SMAA) and Temporal anti-aliasing (TAA) in motion to see which is a good default for games.

    Methods. An experiment was run where 20 people participated and tested a real-time prototype which had a camera moving through a scene multiple times with different anti-aliasing techniques.

    Results. The results showed that TAA was consistently performing best in the tests of blurry picture quality, aliasing and flickering. Both SMAA and FXAA were only comparable to TAA in the blur area of the test and falling behind all the other parts.

    Conclusions. TAA is a great anti-aliasing technique to use for avoiding aliasing and flickering while in motion. Blur was thought to be a problem but as the test shows most people did not feel that blur was a problem for any of the techniques that were used.

  • 113.
    Andersson, Marcus
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Nilsson, Alexander
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices2014Student thesis
    Abstract [en]

    It is common today in large corporate environments for system administrators to employ centralized systems for log collection and analysis. The log data can come from any device between smart-phones and large scale server clusters. During an investigation of a system failure or suspected intrusion these logs may contain vital information. However, the trustworthiness of this log data must be confirmed. The objective of this thesis is to evaluate the state of the art and provide practical solutions and suggestions in the field of secure logging. In this thesis we focus on solutions that do not require a persistent connection to a central log management system. To this end a prototype logging framework was developed including client, server and verification applications. The client employs different techniques of signing log entries. The focus of this thesis is to evaluate each signing technique from both a security and performance perspective. This thesis evaluates "Traditional RSA-signing", "Traditional Hash-chains"', "Itkis-Reyzin's asymmetric FSS scheme" and "RSA signing and tick-stamping with TPM", the latter being a novel technique developed by us. In our evaluations we recognized the inability of the evaluated techniques to detect so called `truncation-attacks', therefore a truncation detection module was also developed which can be used independent of and side-by-side with any signing technique. In this thesis we conclude that our novel Trusted Platform Module technique has the most to offer in terms of log security, however it does introduce a hardware dependency on the TPM. We have also shown that the truncation detection technique can be used to assure an external verifier of the number of log entries that has at least passed through the log client software.

  • 114.
    Andersson, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Lavesson, Niclas
    Lunds Universitet, Centre for Innovation Research and Competence in the Learning Economy (CIRCLE), SWE.
    Niedomysl, Thomas
    Lunds Universitet, SWE.
    Rural to urban long-distance commuting in Sweden: Trends, characteristics and pathways2018In: Journal of Rural Studies, ISSN 0743-0167, E-ISSN 1873-1392, Vol. 59, p. 67-77Article in journal (Refereed)
    Abstract [en]

    The rise of ICT and the shift toward jobs with more flexibility in working hours and places of work sparked popular debates about potential for a ‘rural renaissance’. A key argument was that there are increasing possibilities to live in the countryside while being employed in large cities. This paper uses data spanning two decades to examine trends in and characteristics of employee–employer ties between rural and urban areas in Sweden. Our main results suggest that rural-to-urban long-distance commuting is rapidly increasing, but not as fast as commuting flows elsewhere. Compared to the rural population at large, rural residents working in large cities constitute a strongly selected group of workers who are well paid, have long educations, are young and also have advanced knowledge-intensive occupations. Only about 30 percent of those who become rural-to-urban long-distance commuters have moved from urban areas; the vast majority constitute those who already lived in rural areas before starting to commute to urban areas. © 2018 Elsevier Ltd

  • 115.
    Andersson, Mikael
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Bengtsson, Patrik
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Holst, Robert
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Pamiro2005Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This report describes the work with creating a CMS Content Manager System). A CMS is a web tool so you easy can publish materials on your web page. With a CM Scan you can without any knowledge of programming web pages create and maintain a web page. This will result in that you and your organisation save time and money. You can also split the responsibility for the webpage in different roles, but still keep the control. We have chosen to create our CMS in a script language called php4 and with the database server MySQL, we have also used JavaScript a lot. User-friendly and simplicity are two words that we have been working against, and that is why we spent some extra time creating a system that is easy to work with. The report also describes the difficulties with our dedicated server, and how we installed it.

  • 116.
    Andersson, Måns
    Blekinge Institute of Technology, School of Computing.
    Data Compression for use in the Short Messaging System2010Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Data compression is a vast subject with a lot of different algorithms. All algorithms are not good at every task and this thesis takes a closer look on compression of small files in the range of 100-300 bytes having in mind that the compressed output are to be sent over the Short Messaging System (SMS). Some well-known algorithms are tested for compression ratio and two of them, the Algorithm Λ, and the Adaptive Arithmetic Coding, are chosen to get a closer understanding of and then implement in the Java language. Those implementations are tested alongside the first tested implementations and one of the algorithms are chosen to answer the question ”Which compression algorithm is best suited for compression of data for use in Short Messaging System messages?”.

  • 117.
    Andersson, Patrik
    Blekinge Institute of Technology, School of Computing.
    Voxelbaserad rendering med "Marching Cubes"-algoritmen2009Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    There are lots of different methods and techniques for three-dimensional rendering, everyone with different advantages and disadvantages that suits different applications. Voxel-based rendering has been used frequently within the scientific area, mainly within medicin for visualization of volumetric data. The technique is now used within many different areas for three-dimensional rendering, e.g. in computer games, in mathematical applications and in geological reconstruction. In this report voxel-based rendering with Marching Cubes algorithm will be researched to see how it suits for real-time applications. The area will partly be dealt with theoretically, but also practically as an implementation of Marching Cubes was done to run some tests to see how the performance was affected. From the tests it appeared cleary that the algorithm is well suited for real-time applications and today's graphics card. Though some optimization is needed to fully take advantage of it.

  • 118.
    Andersson, Patrik
    et al.
    Blekinge Institute of Technology, School of Computing.
    Johansson, Sakarias
    Blekinge Institute of Technology, School of Computing.
    Rendering with Marching Cubes, looking at Hybrid Solutions2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Marching Cubes is a rendering technique that has many advantages for a lot of areas. It is a technique for representing scalar fields as a three-dimensional mesh. It is used for geographical applications as well as scientific ones, mainly in the medical industry to visually render medical data of the human body. But it's also an interesting technique to explore for the usage in computer games or other real-time applications since it can create some really interesting rendering. The main focus in this paper is to present a novel hybrid solution using marching cubes and heightmaps to render terrain; moreover, to find if it’s suitable for real-time applications. The paper will follow a theoretical approach as well as an implementational one on the hybrid solution. The results across several tests for different scenarios show that the hybrid solution works well for today's real-time applications using a modern graphics card and CPU (Central Processing Unit).

  • 119.
    Andersson, Petter
    et al.
    Blekinge Institute of Technology, School of Computing.
    Ericsson, Eric
    Blekinge Institute of Technology, School of Computing.
    Jämförelse av funktionsbibliotek för JavaScript2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    När de traditionella skrivbordsapplikationerna görs om till webbapplikationer, ställer det krav på JavaScript som används mer och mer för att få fram ett responsivt gränssnitt på webben. För att underlätta utvecklingen av JavaScriptapplikationer har ett antal funktionsbibliotek skapats. I vår studie undersöker vi därför vilket av de två populäraste JavaScriptbiblioteken idag, jQuery och Prototype, som presterar bäst i dagens mest använda webbläsare. Dessa tester har utförts i ett testramverk som vi själva utvecklat för att vara webbläsaroberoende och inte kräva något av de bibliotek vi testar. Testerna är uppdelade i fyra testfall som körs 20 gånger för att ge ett mer tillförlitligt resultat. Vi har testat hur varje bibliotek hanterar traversering och manipulation av DOM-trädet, sätter och hämtar stilar och attribut på element i DOM-trädet och hanterar event på element i DOM-trädet. Testerna visade att biblioteket Prototype presterade bättre på alla utom ett testfall i majoriteten av våra utvalda webbläsare; det enda testfallet där jQuery presterade bättre än Prototype var där DOM-trädet skulle manipuleras. Trots att Prototype inte alls är lika omtalat som jQuery, verkar det vara ett bättre bibliotek att använda till webbapplikationer som ska ha ett interaktivt gränssnitt då det i flertalet av våra tester presterar bättre.

  • 120.
    Andersson, Robin
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Analys av Arbetsmiljöverkets tillämpning av enkätverktyget NOSACQ-502013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    År 2013 införde Arbetsmiljöverket ett nytt webbaserat enkätverktyg som skall kunna ge ett mått av säkerhetskulturen hos företag och organisationer. Denna enkät baserades på tidigare forskning som tog fram en enkät, NOSACQ-50, för just detta ändamål. Värt att notera är att Arbetsmiljöverkets version är förkortad där vissa påståenden togs bort och vissa skrevs om. Det är detta som analysen behandlar. Hur påverkas resultaten av dessa förändringar som genomfördes av Arbetsmiljöverket? Analysen undersöker den möjliga felmarginalen på två olika sätt. Först räknas en teoretisk felmarginal ut som påvisar hur mycket resultatet kan skilja sig. Därefter analyseras resultaten från enkätundersökningen med samma variabler som fastställdes i den teoretiska analysen. Det visar sig att Arbetsmiljöverkets version av enkäten kan ge upphov till en felmarginal på närmare 0,8175 poäng. Denna marginal är förvånansvärt stor även om den baserar sig på en väldigt osannolik situation. Vid nästa del av analysen visar det sig att enkätundersökningen har en felmarginal på <0,00 poäng, vilket innebär att resultatet inte påverkas i någon större utsträckning. Detta ger ett intressant slutresultat där det påvisats en stor felmarginal i teorin, men som i praktiken är närmare obefintlig. Hur resultatet skall tolkas är inte helt klart. Det finns ett antal felkällor som måste beaktas, såsom lågt deltagarantal i undersökningen. Analysen bygger även i stor utsträckning på subjektiva bedömningar, vilket minskar trovärdigheten för resultaten. Därav har författaren dragit slutsatsen att det finns en uppenbar skillnad i resultaten mellan analysobjekten i teorin. Dock finns det inte tillräckligt med data för att fastställa någon skillnad i praktiken. Det går inte heller att avgöra huruvida den teoretiska analysen och dess resultat stämmer, endast att skillnaden finns där.

  • 121.
    Andersson, Thomas
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Arnevill, Anita
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    How can business partners establish a relationship of trust in order to share Web Services?2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Introduction Web Services is a relatively new concept to distributed data systems. It provides a new way for companies to easily integrate with other companies. With UDDI, companies are able to host their services in a wider market and also connect to other companies. However, with business expansion also follows trust issues. In order to share Web Services in a business partner relationship it is necessary to have a relation of trust. Purpose The purpose of this thesis is to investigate about this issue, i.e. how Web Services with the use of UDDI can be made as a “network of trust” and additionally obtain an idea about how the use of these two will look like in the future. The question of trust between partners sharing Web Services is still open. There has therefore been an interest to look at this problem. The aim for this thesis is to find possible solutions that can be used to address the problem. Method To investigate this we chose to do a literature study and continue with a survey consisted by interviews and questionnaires. Interviews were used to find which solutions that are available in reality and the questionnaires provide information about to what extent Web services and the found solutions are used. The questionnaire was done on random Swedish companies and was sent by e-mails. The interviews were done on two global Swedish companies, Volvo and Ericsson. This way information was found and could be compared in how the issue is dealt with in the literature and what is actually done in reality. Conclusion The outcome of the entire investigation is that Web Services today, even though it exists in most companies, is still in testing phase. As for this, the use of UDDI has had little attention and so has the issues regarding trust. The solution we found to the most applicable to create a network of trust is the Liberty Alliance Project. Web Services, UDDI, trust

  • 122.
    Andersson, Viktor
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Lindgren, Daniel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Ranking factors to increase your positionon the search engine result page: Theoretical and practical examples2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Search engine optimization (SEO) is the way to improve the visibility of a website on thesearch engine result page (SERP). If the website is not on the first three result, then it will bemissing most of the traffic that could be generated. This report will go into detail on how towork with SEO and how to get a website to rank high. Both On-page, how to work with codeand content, and Off-page, how to get more links, methods will be discussed, with a higherfocus on On-page.This paper strives to find what methods and techniques to use with the results gathered fromscientific databases, interviews and three websites with different levels of SEOimplementation. How to structure the code, where and how to use keywords, domain name,links and much more will be discussed in this paper.

  • 123.
    Andreasson, Mathias
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Ekesrydh, Wynona
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Nielsen, Pia
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Schertell, Mattias
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Ansökan om körkortstillstånd via Internet2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Länsstyrelsen i Stockholms län hade en projektidé som gick ut på att det skulle skapas en Internetbaserad ansökan för körkortstillstånd med behörighet B, inklusive hälsodeklaration. Även en optiker skulle kunna fylla i ett synundersökningsformulär via webben. Dessa skulle sedan knytas ihop för behandling av den Länsstyrelse där den sökande bor. Alla personer som skall använda tjänsten måste inneha ett personligt medborgarcertifikat som används för elektronisk signering av ansökan. Optikern behöver ett företagscertifikat för att identifiera sig. Vi utvecklade två interaktiva användargränssnitt samt ett gränssnitt där administratören kunde hantera all data som inkommit. All data transporterades med hjälp av Web Services (SOAP/XML). För att strukturera upp datan gjordes ett XML-schema som används för validering vid transporten. Allt dvs ansökan, hälsodeklaration och synundersökning landar sedan i en databas där all data knyts ihop som tillhör en sökande. Vi förberedde även användargränssnittet, databasen och XML-strukturen för fortsatt utveckling som t ex ansökan om andra körkortsbehörigheter och läkarintyg. Under utvecklingen använde vi erfarenheter tagna från tidigare lästa kurser och omsatte teorier till praktik, både inom projektledning, -drift, -planering och teknologiska kunskaper. Vi tog tillvara på tidigare kurser samt utforskade nya områden inom vår valda inriktning som är webbprogrammering där Web Services ingår. Via litteratur och Internet sökte vi information som värderades. Hela arbetsprocessen genomfördes efter en iterativ produktutvecklingsmetod. Vi utvärderade och omvärderade resultat och delresultat i en ständigt pågående spiralprocess.

  • 124.
    Andrej, Sekáč
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Performance evaluation based on data from code reviews2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. Modern code review tools such as Gerrit have made available great amounts of code review data from different open source projects as well as other commercial projects. Code reviews are used to keep the quality of produced source code under control but the stored data could also be used for evaluation of the software development process.

    Objectives. This thesis uses machine learning methods for an approximation of review expert’s performance evaluation function. Due to limitations in the size of labelled data sample, this work uses semisupervised machine learning methods and measure their influence on the performance. In this research we propose features and also analyse their relevance to development performance evaluation.

    Methods. This thesis uses Radial Basis Function networks as the regression algorithm for the performance evaluation approximation and Metric Based Regularisation as the semi-supervised learning method. For the analysis of feature set and goodness of fit we use statistical tools with manual analysis.

    Results. The semi-supervised learning method achieved a similar accuracy to supervised versions of algorithm. The feature analysis showed that there is a significant negative correlation between the performance evaluation and three other features. A manual verification of learned models on unlabelled data achieved 73.68% accuracy. Conclusions. We have not managed to prove that the used semisupervised learning method would perform better than supervised learning methods. The analysis of the feature set suggests that the number of reviewers, the ratio of comments to the change size and the amount of code lines modified in later parts of development are relevant to performance evaluation task with high probability. The achieved accuracy of models close to 75% leads us to believe that, considering the limited size of labelled data set, our work provides a solid base for further improvements in the performance evaluation approximation.

  • 125.
    Andréason, Nanna
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Hellman, Camilla
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Wengle, Sara
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Dokumentär om döden2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Vi har som kandidatarbete gjort ett dokumentärfilmsprojekt. Filmen handlar om barns och pensionärers tankar och funderingar om döden. Vi ville göra en annorlunda dokumentär som väcker känslor utan att provocera. Döden är något som man inte ofta talar om och därför kände vi att vi ville ta upp detta ämne i en seriös men ganska lättsam film. Vi bestämde att lägga tyngdpunkten på research för att få en så bra grund som möjligt. Eftersom ämnet kan väcka många känslor ville vi vara förberedda på alla slags reaktioner. Under projektets gång har vi planerat vecka för vecka vad vi ska göra samt följt en övergripande tidsplan. Vi har också varje vecka skrivit en rapport om vad vi har gjort, vilka problem som vi har haft och vad som har fungerat bra. Vi tog kontakt med ett dagcenter och ett dagis och hittade bra människor att intervjua. De var alla mycket hjälpsamma och våra inspelningar gick bra. Vi var mycket nöjda med våra bilder och även ljudet. I klippningen har vi sett dokumentären växa fram och vi har haft lätt att se vilka klipp som passar in och vilka som inte gör det. Projektet har flutit på relativt smidigt och när problem har uppstått har vi lyckats lösa dem efter hand. Vi har lärt oss mycket och blivit säkrare på oss själva. Det har varit nyttigt för oss att arbeta med utomstående och med olika åldersgrupper. Att vi har skapat externa kontakter har också varit en bra erfarenhet. Vi har lärt oss att samarbeta och att lyssna på varandra. Det är viktigt att alla får komma till tals i en så här liten grupp. Vi tycker att det har varit spännande att göra ett sådant här stort projekt. Det har varit skönt att ha mycket tid till förfogande och att vi har fått lägga upp och genomföra projektet helt själva. Vi har utvecklats under projektets gång och vi känner oss nöjda med både projektet och slutresultatet.

  • 126.
    Andrén, Fredrik
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Communication in SOS Alarm and the Possibility of Enhancement2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    When an accident is happening most of the time it is the person on the street that is reporting this to SOS Alarm, the instance that is controlling, for example, the ambulances. To ensure that as few mistakes as possible are made it us crucial that the communication between the caller and the ambulance via the SOS Alarm is as efficient as possible. Communication between the caller to SOS Alarm and the ambulance is done by passing through the operator at the SOS Alarm station and then on to the ambulance. Is this the way that it should be handled or are there optional ways that could be used? The technology has evolved since the system used today was installed and today cellular phones are very common and it is not unusual that it is possible to take pictures with these phones. Is this something that could be used to enhance the way information is sent between the caller and the ambulance? These are questions that this thesis tries to answer by using studies at SOS Alarm and Ambulance centrals as a foundation for the arguments.

  • 127.
    Andrén, Åse Larsen
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mantzakanis, Tove
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Blom, Maria
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Säkerhets lösning för elektronisk faktura2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    We have chosen to look closer at the area of security for electronic invoices. The purpose of this inquest is to provide our case study with a security analysis of three suggestions and a recommendation of the best solution, according to our test. The three solutions are ISDN via a third party, X.25 via Internet bank and Mail server. The company in our case study is in this report referred to as X, has a strong market position and a large clientele and therefore we were interested in analysing and improving X?s electronic invoice system. X was in the position of testing an electronic invoicing system towards a selective group of business customers. The major problem with the system was the security issue regarding transferring the file.

  • 128.
    Angulo, Julio
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    The Emotional Driver: A Study of the Driving Experience and the Road Context2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In modern societies the activity of driving has become almost an essential routine. Vehicles are considered by many as indispensable tools for accomplishing their daily tasks and they are the main form of transportation for millions of people. The average driver spends, voluntarily, considerable amounts of time on the road, using their vehicle to transport himself even for small distances and knowing that its use presents him with some form of comfort and convenience; yet, drivers frequently regard their road experience as tiring and fastidious, but their persistence in using their vehicle at every opportunity serves as proof of a pleasurable experience. So far car manufacturers, traffic authorities and designers of technology have been mainly concerned with aspects of the road that ensure drivers safety, increase power engine, provide more comfort, and maintain better streets, etc; however, the actual feelings of the driver as he travels through the streets has not yet been taken into a great account by the developers of the road environment. For this reason this thesis tries to create awareness on the existence and constant presence of people’s emotions as they drive, which have the mutual power to influence their action on the road and their driving patterns. In order to capture a drivers’ emotional experience this study uses three main methods. One of them is Cultural Probes, consisting of common objects specifically Postcards, Pictures, and Web-logs, to measure unknown factors about the users. The second is the use of Ethnographic studies on the driving activities through the use of observations, the popular talk-aloud-protocol and the shadow method. Finally, the Experience Sampling Method is used, which tries to captures the experience of an individual as it unfolds in its natural context. With the combined used of these three methods some of the main factors of the road’s environment that are commonly able to influence the driver’s emotions in negative or positive ways were discovered, which include the intensity and type of light, the different types and sources of sound, the perceivable landscapes and surrounding architectures and the different kinds of continuously occurring interactions. These are just some of the many factors that can influence emotions on the road, and hopefully this study will open the curiosity for a deeper study of these and other aspects of the emotional driving experience.

  • 129.
    Annavarjula, Vaishnavi
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Computer-Vision Based Retinal Image Analysis for Diagnosis and Treatment2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context- Vision is one of the five elementary physiologial senses. Vision is enabled via the eye, a very delicate sense organ which is highly susceptible to damage which results in loss of vision. The damage comes in the form of injuries or diseases such as diabetic retinopathy and glaucoma. While it is not possible to predict accidents, predicting the onset of disease in the earliest stages is highly attainable. Owing to the leaps in imaging technology,it is also possible to provide near instant diagnosis by utilizing computer vision and image processing capabilities.

    Objectives- In this thesis, an algorithm is proposed and implemented to classify images of the retina into healthy or two classes of unhealthy images, i.e, diabetic retinopathy, and glaucoma thus aiding diagnosis. Additionally the algorithm is studied to investigate which image transformation is more feasible in implementation within the scope of this algorithm and which region of retina helps in accurate diagnosis.

    Methods- An experiment has been designed to facilitate the development of the algorithm. The algorithm is developed in such a way that it can accept all the values of a dataset concurrently and perform both the domain transforms independent of each other.

    Results- It is found that blood vessels help best in predicting disease associations, with the classifier giving an accuracy of 0.93 and a Cohen’s kappa score of 0.90. Frequency transformed images also presented a accuracy in prediction with 0.93 on blood vessel images and 0.87 on optic disk images.

    Conclusions- It is concluded that blood vessels from the fundus images after frequency transformation gives the highest accuracy for the algorithm developed when the algorithm is using a bag of visual words and an image category classifier model.

    Keywords-Image Processing, Machine Learning, Medical Imaging

  • 130.
    Antkowiak, Łukasz
    Blekinge Institute of Technology, School of Computing.
    Parallel algorithms of timetable generation2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Most of the problem of generating timetable for a school belongs to the class of NP-hard problems. Complexity and practical value makes this kind of problem interesting for parallel computing. Objectives: This paper focuses on Class-Teacher problem with weighted time slots and proofs that it is NP-complete problem. Branch and bound scheme and two approaches to distribute the simulated annealing are proposed. Empirical evaluation of described methods is conducted in an elementary school computer laboratory. Methods: Simulated annealing implementation described in literature are adapted for the problem, and prepared for execution in distributed systems. Empirical evaluation is conducted with the real data from Polish elementary school. Results: Proposed branch and bound scheme scales nearly logarithmically with the number of nodes in computing cluster. Proposed parallel simulated annealing models tends to increase solution quality. Conclusions: Despite a significant increase in computing power, computer laboratories are still unprepared for heavy computation. Proposed branch and bound method is infeasible with the real instances. Parallel Moves approach tends to provide better solution at the beginning of execution, but the Multiple Independent Runs approach outruns it after some time.

  • 131.
    Antman, Benjamin
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Cybernetic Social Space: A Theoretical Comparison of Mediating Spaces in Digital Culture2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This essay does a theoretical comparison of the intricate social production in digital and real spaces, proposing a model for the non-technical exploration of the social production of spaces relating to human digital technology. The ‘social space’ proposed by Henri Lefebvre (1974) - responsible for producing material space - and the holistic model of ‘cybernetic space’ proposed by Ananda Mitra and Rae Lynn Schwartz (2001) - responsible for supporting the production of real and digital spaces - are argued as collaboratively producing cybernetic social spaces, serving as the definition of a unified model for the production of spaces in contemporary society. The digital spaces are argued as being a similar analogue to classical ‘social space’. Two native cybernetic spaces are presented and discussed, argued as being responsible for the transitive production of digital and real spaces as they survey and situate the production of cybernetic social space. Finally, two case studies exemplifying the aesthetics and politics of cybernetic space are presented, analyzed and discussed in accordance with the proposed model of cybernetic social space.

  • 132.
    Antonsson, Roger
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Petterson, Lena
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Being at one with the tool: applying flow to usability2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Communication between people has become more and more important in society today and so has the way to communicate. Our work, which this master thesis is based upon, has been to evaluate and redesign an existing web application that works like a communication tool. To carry out this work we have compiled two questions; how to facilitate the interaction for an application that is used as a tool, focusing on interface design, usability and flow; how can the usability be improved in a system, with help of flow theory. To deal with these two questions we have used a number of methods that have had different kinds of influence of our work. The one that has had the greatest impact of the work with the evaluation has been cognitive walkthrough. For the design we have used literature studies along with the result of the evaluation. A problem during our work has been that the user has not been specified the design should work at a generic group of users. The problem has not been to define the target group rather to suit the interface to everybody. This has been the challenge of this semester and we found designing an interface infusing usability with help from flow as interesting.

  • 133.
    Antonsson, Roger
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Petterson, Lena
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Think big: for small - infusing confidence, security and trustworthiness for mobile services2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The use of mobile telephony has over the past years increased and consequently has the development of services over the mobile phone also increased. This semester we have taken part in a large system development project, our contributions have been designing the graphical user interfaces. In doing that we found the problem with how to mediate trust to a user through a graphical user interface interesting. In this thesis we are focusing on how to develop graphical user interfaces for a mobile phone service that radiate and infuse confidence, security and trustworthiness. In order to attain the purpose, we have used the combination of literature studies and to some extent user involvement with Mock-ups and a Think-aloud technique. We are also describing the importance of taking as well usability and usability goals as the needs for the end users into consideration. We have found that more research on how to radiate and infuse trust through a graphical user interface is needed. This thesis is concluded with some aspects on that subject that we think is important to have in mind. It is of great importance to never leave the user in a state of uncertainty and therefore is clear, sincere and informative feedback necessary throughout the service. Also central in designing graphical user interfaces is to make sure that there is no mismatch in the security of the system and the radiated security.

  • 134.
    Anwar, Khurshid
    et al.
    Blekinge Institute of Technology, School of Computing.
    Khan, Asad
    Blekinge Institute of Technology, School of Computing.
    AC and QAR for Provisioning of QoS in MANETs2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Mobile Ad-hoc network (MANET) is a collection of mobile nodes which communicate over wireless channels without any centralized control or existing infrastructure. The freely movement of nodes allow them to join or leave the network independently. Due to node mobility, wireless channels and limited resources makes the provision of Quality of Services (QoS) in MANETs very challenging. With the emerging use of multimedia applications over MANETs which requires different types of QoS provision from the networks. The Admission Control (AC) and QoS-Aware routing (QAR) protocols have made a progress in provision of QoS up to some extents. In this thesis, various AC and QAR protocols are reviewed and their characteristics and limitations are identified. We also make a comparison between DSR and AODV routing protocols in different network scenarios.

  • 135.
    Anwar, Mahwish
    Blekinge Institute of Technology, School of Computing.
    Virtual Firewalling For Migrating Virtual Machines In Cloud Computing2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. During live migration any security lax in VM firewall policy can put the VM data, OS and the applications on it at risk. A malicious VM can pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider’s control. Source VMM-level VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. Considering the potential of VFs there should be a great value in using open source VFs at VM-level for protecting VMs during migration, thereby, reducing the attacker’s slot to gain access to VM. It would enable hardened security for overall VM migration. Objectives. The aim is to investigate VM-level firewalling using open source firewall as a complementary security layer to VMM-level firewalling, to secure migrating VM in the CC domain. The first objective is to identify how virtual firewalls secure migrating VM in CC and to propose VM-level open-source virtual firewalling for protecting VM during migration. Later the VF is implemented to validate and evaluate its intactness or activeness during migration in real Cloud data center. Methods. In the literary review 9 electronic libraries are used, which include IEEE Xplore, ACM Digital Library, SCOPUS, Engineering Village and Web of Knowledge. Studies are selected after querying libraries for 2 key terms ‘virtual machine’ and ‘migration’ (along with other variations/synonyms), in the abstract. Relevant papers on the subject are read and analyzed. Finally, the information gaps are identified. Using a lacuna the experimental solution is designed. To test the potential of VF at VM-level for migrating VM’s security the experimental validation is performed using stratification samples of firewall rules. The VF evaluation is done using continuous ICMP echo packet transmission. The packets are analyzed to determine firewall behavior during migration. To evaluate the validity, the VM migration is performed 8 times in City Network data center. Results. The literary review identified the widespread use of VMM-level firewalling for migrating VM’s security in CC. The VM-level VFs were not researched nor evaluated for intactness during migration. The experiment performed at City Network demonstrated that the VM-level VF secures VM during migration (on average) for 96% of migration time, thereby reducing attack window for attacker during VM mobility. According to the results the average total migration time (TMT) was 16.6 s and average downtime (DT) of firewall was as low as 0.47 s, which means that VF at VM-level protects VM during entire migration span except when VM’s down (4% of migration time). Conclusions. The research concludes that VM-level firewalling using open source VF as an additional security layer in CC for VM migrations is feasible to employ and will enhance the migrating machine’s security by providing hardened firewall service during migration process, thus, reducing the potential attack window. VMM-level VF provides security in post and pre migration phase. Using VM-level VF as a complementary measure to VMM-level VF enables additional protection for VM migration process, thereby reducing the chances for attacker to attack VM during transition.

  • 136. Apell, Maria
    et al.
    Erman, David
    Popescu, Adrian
    Testbed for Advanced Mobile Solutions2010Conference paper (Refereed)
    Abstract [en]

    This paper describes the implementation of an IMS testbed, based on open source technologies and operating systems. The testbed provides rich communication services, i.e., Instant Messaging, Network Address Book and Presence as well as VoIP and PSTN interconnectivity. Our validation tests indicate that the performance of the testbed is comparable to similar testbeds, but that operating system virtualization signi ficantly aff ects signalling delays.

  • 137.
    Arenas, Miguel Tames
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Social Engineering and Internal Threats in Organizations2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulnerable and the best methods to protect our organizations from inside threats.

  • 138.
    Areskoug, Andreas
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Jämförelse av J2EE och .NET från ett Web Services perspektiv.2006Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This thesis compares the performance of Web Services when hosted on either the J2EE or the .NET platform. The thesis will investigate which platform should be choosen to host Web Services mainly based on performance.

  • 139.
    Arikenbi, Temitayo
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Decision Support for Multi-Criteria Energy Generation Problem2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this study, an attempt is made to apply Decision Support Systems (DSS) in planning for the expansion of energy generation infrastructure in Nigeria. There is an increasing demand for energy in that country, and the study will try to show that DSS modelling, using A Mathematical Programming Language (AMPL) as the modelling tool, can offer satisficing results which would be a good decision support resource for motivating how to expend investment for energy generation.

  • 140. Arkoulis, Stamatios
    et al.
    Marias, Giannis
    Frangoudis, Pantelis
    Oberender, Jens
    Popescu, Alexandru
    Fiedler, Markus
    Meer, Hermann de
    Polyzos, George
    Misbehaviour Scenarios in Cognitive Radio Networks2010In: Future Internet, ISSN 1999-5903, E-ISSN 1999-5903, Vol. 2, no 3-4, p. 212-237Article, review/survey (Refereed)
    Abstract [en]

    Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work.

  • 141. Arlos, Patrik
    Application Level Measurement2011In: Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet, Berlin / Heidelberg: Springer , 2011, p. 14-36Chapter in book (Other academic)
    Abstract [en]

    In some cases, application-level measurements can be the only way for an application to get an understanding about the performance offered by the underlying network(s). It can also be that an application-level measurement is the only practical solution to verify the availability of a particular service. Hence, as more and more applications perform measurements of various networks; be that fixed or mobile, it is crucial to understand the context in which the application level measurements operate their capabilities and limitations. To this end in this paper we discuss some of the fundamentals of computer network performance measurements and in particular the key aspects to consider when using application level measurements to estimate network performance properties.

  • 142.
    Arlos, Patrik
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    On the Quality of Computer Network Measurements2005Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Due to the complex diversity of contemporary Internet-services, computer network measurements have gained considerable interest during recent years. Since they supply network research, development and operations with data important for network traffic modelling, performance and trend analysis, etc. The quality of these measurements affect the results of these activities and thus the perception of the network and its services. This thesis contains a systematic investigation of computer network measurements and a comprehensive overview of factors influencing the quality of performance parameters obtained from computer network measurements. This is done using a novel network performance framework consisting of four modules: Generation, Measurement, Analysis and Visualization. These modules cover all major aspects controlling the quality of computer network measurements and thus the validity of all kinds of conclusions based on them. One major source of error is the timestamp accuracy obtained from measurement hardware and software. Therefore, a method is presented that estimates the timestamp accuracy obtained from measurement hardware and software. The method has been used to evaluate the timestamp accuracy of some commonly used hardware (Agilent J6800/J6830A and Endace DAG 3.5E) and software (Packet Capture Library). Furthermore, the influence of analysis on the quality of performance parameters is discussed. An example demonstrates how the quality of a performance metric (bitrate) is affected by different measurement tools and analysis methods. The thesis also contains performance evaluations of traffic generators, how accurately application-level measurements describe network behaviour, and of the quality of performance parameters obtained from PING and J-OWAMP. The major conclusion is that measurement systems and tools must be calibrated, verified and validated for the task of interest before using them for computer network measurements. A guideline is presented on how to obtain performance parameters at a desired quality level.

  • 143. Arlos, Patrik
    et al.
    Fiedler, Markus
    Influence of the Packet Size on the One-Way Delay in 3G Networks2010Conference paper (Refereed)
    Abstract [en]

    We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation process on mobile access links is far less transparent to the user; still, its properties need to be known in order to minimize the impact of the network on application performance. This paper investigates the impact of the packet size on the minimal one-way delay for the uplink in third-generation mobile networks. For interactive and real-time applications such as VoIP, one-way delays are of major importance for user perception; however, they are challenging to measure due to their sensitivity to clock synchronization. Therefore, the paper applies a robust and innovative method to assure the quality of these measurements. Results from measurements from several Swedish mobile operators show that applications can gain significantly in terms of one-way delay from choosing optimal packet sizes. We show that, in certain cases, an increased packet size can improve the one-way delay performance at best by several hundred milliseconds.

  • 144. Arlos, Patrik
    et al.
    Fiedler, Markus
    Influence of the Packet Size on the One-Way Delay on the Down-link in 3G Networks2010Conference paper (Refereed)
    Abstract [en]

    The number of mobile broadband users is increasing. Furthermore, these users have high expectations into the capabilities of mobile broadband, comparable to those in fixed networks. On the other hand, the capacity assignment process on mobile access links is far from transparent to the user, and its properties need to be known in order to minimize the impact of the network on application performance. This paper investigates the impact of the packet size on the characteristics of the one-way delay for the down-link in third-generation mobile networks. For interactive and real-time applications such as VoIP, one-way delays are of major importance for user perception; however, they are challenging to measure due to their sensitivity to clock synchronization. Therefore, the paper applies a robust and innovative method to assure the quality of these measurements. We focus on the down-link as this is still the link that carries the most traffic to the user, and the quality of it will have a significant impact on all IP-based services. Results from measurements from several Swedish mobile operators reveal the possibility to partly control one-way delay and its variability by choosing appropriate packet sizes. In particular, packet sizes leading to the use of WCDMA entail significant but hardly varying one-way delays. On the other hand, we also show that HDSPA networks can deliver large amounts of data at rather high speed, but the cost is a huge variability in the one-way delay.

  • 145. Arlos, Patrik
    et al.
    Fiedler, Markus
    Nilsson, Arne A.
    A Distributed Passive Measurement Infrastructure2005Conference paper (Refereed)
    Abstract [en]

    In this paper we describe a distributed passive measurement infrastructure. Its goals are to reduce the cost and configuration effort per measurement. The infrastructure is scalable with regards to link speeds and measurement locations. A prototype is currently deployed at our university and a demo is online at http://inga.its.bth.se/projects/dpmi. The infrastructure differentiates between measurements and the analysis of measurements, this way the actual measurement equipment can focus on the practical issues of packet measurements. By using a modular approach the infrastructure can handle many different capturing devices. The infrastructure can also deal with the security and privacy aspects that might arise during measurements.

  • 146. Arlos, Patrik
    et al.
    Kommalapati, Ravichandra
    Fiedler, Markus
    Evaluation of Protocol Treatment in 3G Networks2011Conference paper (Refereed)
    Abstract [en]

    In this work, we present a systematic study of how the traffic of different transport protocols (UDP, TCP and ICMP) is treated, in three operational Swedish 3G networks. This is done by studying the impact that protocol and packet size have on the one-way-delay (OWD) across the networks. We do this using a special method that allows us to calculate the exact OWD, without having to face the usual clock synchronization problems that are normally associated with OWD calculations. From our results we see that all three protocols are treated similarly by all three operators, when we consider packet sizes that are smaller than 250~bytes and larger than 1100~bytes. We also show that larger packet sizes are given preferential treatment, with both smaller median OWD as well as a smaller standard deviation. It is also clear that, ICMP is given a better performance compared to TCP and UDP.

  • 147.
    Arneng, Per
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Bladh, Richard
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Performance Analysis of Distributed Object Middleware Technologies2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Each day new computers around the world connects to the Internet or some network. The increasing number of people and computers on the Internet has lead to a demand for more services in different domains that can be accessed from many locations in the network. When the computers communicate they use different kinds of protocols to be able to deliver a service. One of these protocol families are remote procedure calls between computers. Remote procedure calls has been around for quite some time but it is with the Internet that its usage has increased a lot and especially in its object oriented form which comes from the fact that object oriented programming has become a popular choice amongst programmers. When a programmer has to choose a distributed object middleware there is a lot to take into consideration and one of those things is performance. This master thesis aims to give a performance comparison between different distributed object middleware technologies and give an overview of the performance difference between them and make it easier for a programmer to choose one of the technologies when performance is an important factor. In this thesis we have evaluated the performance of CORBA, DCOM, RMI, RMI-IIOP, Remoting-TCP and Remoting-HTTP. The results we have seen from this evaluation is that DCOM and RMI are the distributed object middleware technologies with the best overall performance in terms of throughput and round trip time. Remoting-TCP generally generates the least amount of network traffic, while Remoting-HTTP generates the most amount of network traffic due to it's SOAP-formated protocol.

  • 148.
    Arnesson, Andreas
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Lewenhagen, Kenneth
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Comparison and Prediction of Temporal Hotspot Maps2018Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. To aid law enforcement agencies when coordinating and planningtheir efforts to prevent crime, there is a need to investigate methods usedin such areas. With the help of crime analysis methods, law enforcementare more efficient and pro-active in their work. One analysis method istemporal hotspot maps. The temporal hotspot map is often represented asa matrix with a certain resolution such as hours and days, if the aim is toshow occurrences of hour in correlation to weekday. This thesis includes asoftware prototype that allows for the comparison, visualization and predic-tion of temporal data.

    Objectives. This thesis explores if multiprocessing can be utilized to im-prove execution time for the following two temporal analysis methods, Aoris-tic and Getis-Ord*. Furthermore, to what extent two temporal hotspotmaps can be compared and visualized is researched. Additionally it wasinvestigated if a naive method could be used to predict temporal hotspotmaps accurately. Lastly this thesis explores how different software packag-ing methods compare to certain aspects defined in this thesis.

    Methods. An experiment was performed, to answer if multiprocessingcould improve execution time of Getis-Ord* or Aoristic. To explore howhotspot maps can be compared, a case study was carried out. Another ex-periment was used to answer if a naive forecasting method can be used topredict temporal hotspot maps. Lastly a theoretical analysis was executedto extract how different packaging methods work in relation to defined as-pects.

    Results. For both Getis-Ord* and Aoristic, the sequential implementationsachieved the shortest execution time. The Jaccard measure calculated thesimilarity most accurately. The naive forecasting method created, provednot adequate and a more advanced method is preferred. Forecasting Swedishburglaries with three previous months produced a mean of only 12.1% over-lap between hotspots. The Python package method accumulated the highestscore of the investigated packaging methods.

    Conclusions. The results showed that multiprocessing, in the languagePython, is not beneficial to use for Aoristic and Getis-Ord* due to thehigh level of overhead. Further, the naive forecasting method did not provepractically useful in predicting temporal hotspot maps.

  • 149.
    Aroseus, Zara
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Langeström, Emmie
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Lindberg, Tobias
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Vår utvecklingsprocess: designaspekter på ett befintligt webbsystem2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Den här rapporten är ett resultat av ett kandidatarbete på 20-poäng. Projektet som rapporten handlar om, beskriver hur utvecklingen av ett webbutikssystem åt ett flertal företag gått till. De har i sin tur köpt webbsystemet från företaget Opti Use som givit oss uppgiften. I rapporten diskuteras hur utvecklingsprocessen gått till och hur ett arbete med ett befintligt system upplevts. Rapporten beskriver även hur lösningen på uppgiften har tagit form och hur utvecklingsprocessen påverkat den. Metoderna som används under projektets gång beskrivs utifrån hur de förändrats för att önskat resultat skulle uppnås. Titelns innebörd beskriver projektgruppens utvecklingsprocess under arbetet med projektet i förhållande till tidigare erfarenheter under MDA-utbildningen.

  • 150.
    Arredal, Martin
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Eye Tracking’s Impact on Player Performance and Experience in a 2D Space Shooter Video Game.2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Background. Although a growing market, most of the commercially available gamestoday that features eye tracking support is rendered in a 3D perspective. Games ren-dered in 2D have seen little support for eye trackers from developers. By comparing the differences in player performance and experience between an eye tracker and acomputer mouse when playing a classic 2D genre: space shooter, this thesis aim tomake an argument for the implementation of eye tracking in 2D video games.

    Objectives. Create a 2D space shooter video game where movement will be handledthrough a keyboard but the input method for aiming will alter between a computermouse and an eye tracker.

    Methods. Using a Tobii EyeX eye tracker, an experiment was conducted with fif-teen participants. To measure their performance, three variables was used: accuracy,completion time and collisions. The participants played two modes of a 2D spaceshooter video game in a controlled environment. Depending on which mode wasplayed, the input method for aiming was either an eye tracker or a computer mouse.The movement was handled using a keyboard for both modes. When the modes hadbeen completed, a questionnaire was presented where the participants would ratetheir experience playing the game with each input method.

    Results. The computer mouse had a better performance in two out of three per-formance variables. On average the computer mouse had a better accuracy andcompletion time but more collisions. However, the data gathered from the question-naire shows that the participants had on average a better experience when playingwith an eye tracker

    Conclusions. The results from the experiment shows a better performance for par-ticipants using the computer mouse, but participants felt more immersed with the eyetracker and giving it a better score on all experience categories. With these results,this study hope to encourage developers to implement eye tracking as an interactionmethod for 2D video games. However, future work is necessary to determine if theexperience and performance increase or decrease as the playtime gets longer.

1234567 101 - 150 of 2516
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf