Change search
Refine search result
28293031323334 1501 - 1550 of 13649
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1501.
    Beygo, Ömer Kerem
    et al.
    Blekinge Institute of Technology, School of Computing.
    Eraslan, Cihan
    Blekinge Institute of Technology, School of Computing.
    Enhancing Security and Usability Features of NFC2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Near Field Communication (NFC) is a short range wireless communication protocol which is primarily intended to be used on mobile phones. Building upon existing infrastructure of RFID, NFC brings simplicity for connection of mobile devices, service initiation, mobile payment and ticketing. However, NFC still remains as a field that number of researches done are limited. The aim of this paper was to provide solutions for the problems of NFC that cause security risks and hurt user experience. To reach this goal we have reviewed the current literature and implemented an NFC application that we have used throughout our user experience tests. This application provides a practical way to store and transfer contact information using NFC. The results of the study indicated that usability and security suffer from lack of user awareness and physical design of the mobile phones.

  • 1502.
    Bhalerao, Akash
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Strategic Sustainable Development.
    Louwerse, Sjaak
    Blekinge Institute of Technology, Faculty of Engineering, Department of Strategic Sustainable Development.
    Quarmyne, Michael Tei
    Blekinge Institute of Technology, Faculty of Engineering, Department of Strategic Sustainable Development.
    Ritchie, Dan
    Blekinge Institute of Technology, Faculty of Engineering, Department of Strategic Sustainable Development.
    Social Innovation Hubs Supporting Social Entrepreneurs: Strategically Adopting the SDGs towards Sustainability2019Independent thesis Advanced level (degree of Master (One Year)), 20 HE creditsStudent thesis
    Abstract [en]

    The United Nations Sustainable Development Goals (SDGs) are a well-known and comprehensive framework for sustainable development. However due to the overlapping and interrelated nature of the goals, action towards one goal can positively or negatively contribute to another.Social innovation hubs including Impact Hub and Centre for Social Innovation use the SDGs to support social entrepreneurs to have a positive impact. Document analysis and interviews with 15 practitioners from these hubs informed the research on how the organizations perceive and contribute to sustainability, how they integrate the SDGs, and the challenges and benefits with using the SDGs. Based on that, this research has developed five recommendations for social innovation hubs to: 1) Define Sustainability; 2) Enhance Visioning; 3) Design co-creative programs; 4) Define Impact;and 5) Communicate Impact. While other elements of the Framework for Strategic Sustainable Development (FSSD) could be used to complement the SDGs, the Sustainability Principles (SPs) of the FSSD are recommended as a definition for sustainability.

  • 1503.
    Bhamidipati, Vasanthi Dwaraka
    et al.
    Blekinge Institute of Technology, School of Computing.
    Kilari, Swetha
    Blekinge Institute of Technology, School of Computing.
    Effect of Delay/Delay Variation on QoE in Video Streaming2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Video streaming has become the most important way to share video and audio over a network. It is being used for video conferencing, e-learning etc. The user‟s quality of experience of watching a video is of utmost importance for the content providers. The video quality is much affected because of packet loss and delay in the network which in turn lowers user‟s perception on quality of the received videos. In our thesis we try to find out the effect of delay/delay variation on the quality of experience of the users. We try to evaluate the quality of experience using mean opinion score. The quality of experience as perceived by the user is analyzed for all the videos that we have taken and are streamed with constant and varying delay. From this we were able to find the threshold level of delay that is acceptable by the users. The user‟s tolerance towards the quality of the video in a network with a varying delay is analyzed. The effect of packet delay has also been investigated and the results have been analyzed using Excel.

  • 1504.
    Bhatia, Ravi
    Blekinge Institute of Technology, School of Management.
    SYNERGY AND DIS-SYNERGY EVALUATION IN MERGER & ACQUISITION PROCESS: A CASE-STUDY OF AN ACQUISITION ATTEMPT BY A MULTI-BUSINESS ‘SERIAL-ACQUIRER’ COMPANY2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    M&As are fraught with dangers of failure. Failures may happen due to misjudgments and mistakes in any of the phases of an M&A process. Over-estimation of Synergy evaluation is cited as one of the most frequent reasons for value destruction in M&A. This paper studies the M&A process of a multi-business company, with particular focus on its Synergy evaluation phase. The presented case follows an actual acquisition bid made by the company. The case-study adopts an explorative approach with data collected through participant-observation and interviews conducted during the course of Synergy evaluation. The paper proposes that big multi-business companies need to be extra careful in selecting their acquisition targets as they may face hidden dangers lurking behind the façade of attractive synergy justifications because an acquisition may have an unforeseen effect on other divisions within the company. This can be prevented as long as these companies do a thorough synergy evaluation and follow well-laid out M&A processes as analyzed in the presented case. Further, the paper also proposes to split the step of Synergy evaluation into analyzing positive synergies and negative synergies and proposes further research into systematically enumerating factors of dis-synergy in various situations of M&A for benefit of future acquisition managers.

  • 1505. Bhattacharyya, Prantik
    et al.
    Rowe, Jeff
    Wu, Felix
    Haigh, Karen
    Lavesson, Niklas
    Johnson, Henric
    Your Best might not be Good enough: Ranking in Collaborative Social Search Engines2011Conference paper (Refereed)
    Abstract [en]

    A relevant feature of online social networks like Facebook is the scope for users to share external information from the web with their friends by sharing an URL. The phenomenon of sharing has bridged the web graph with the social network graph and the shared knowledge in ego networks has become a source for relevant information for an individual user, leading to the emergence of social search as a powerful tool for information retrieval. Consideration of the social context has become an essential factor in the process of ranking results in response to queries in social search engines. In this work, we present InfoSearch, a social search engine built over the Facebook platform, which lets users search for information based on what their friends have shared. We identify and implement three distinct ranking factors based on the number of mutual friends, social group membership, and time stamp of shared documents to rank results for user searches. We perform user studies based on the Facebook feeds of two authors to understand the impact of each ranking factor on the result for two queries.

  • 1506.
    Bhatti, Ansar Malook
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Abdullah, Hafiz Muhammad
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Deciding on Optimum Set of Measures in Software Organizations2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Software measurement process is a significant part of process improvement in software organizations. The organizations usually follow a measurement process that includes measures selection, data collection, and analysis to improve their processes. Most of the software organizations face difficulties in deciding the measures to collect since there is no universal set of measures for all types of organizations and projects. Experience shows that measurement can be more successful if the measures are collected based on the goals of the organization or the project which it will serve. A few methodologies exist to aid the software organizations. Goal Question Metric (GQM) is one of the most widely known and used one. However, one of the major constraints for the organizations is the associated cost when collecting the measures. Therefore, software organizations also require selecting the optimum set of measures which are good enough for the organization. This thesis study aims to provide solution for this problem. We propose a model, named ‗Optimum Measure Set Decision Model (OMSD)‘, which is an extension of GQM paradigm. The model is based on a heuristics approach, which aims to provide the optimum set of measures from a large number of possible measures. To develop the model, we identified the factors which are significant in selecting the optimum set of measures based on the literature survey results. Then, we evaluated those factors by conducting an empirical study. As the empirical research strategy, we used traditional fixed non-experimental design strategy. We performed a survey by distributing a structured questionnaire in order to evaluate the important factors we identified when selecting the optimum number of measures to be collected in an organization. We evaluated the heuristics rules by means of some sample cases we created. Moreover, we provided an idea for an alternative solution to optimize the number of measures to be collected for the future research.

  • 1507. Bhatti, Ansar Malook
    et al.
    Abdullah, Hafiz Muhammad
    Gencel, Cigdem
    A Model for Selecting an Optimum Set of Measures in Software Organizations2009Conference paper (Refereed)
    Abstract [en]

    Most of the software organizations face difficulties in choosing the measures to collect since there is no universal set of measures for all types of organizations and projects. Experience shows that measurement can be more successful if the measures are collected based on the goals of the organization or the project which it will serve. However, one of the major constraints for the organizations is the associated cost for the resources needed when collecting the measures. Therefore, based on their goals, the software organizations require collecting not only as few measures from a large number of possible measures as possible but an optimum set of measures as well. In this paper, we propose a model, called ‘Optimum Measures Set Decision (OMSD) Model’, which is an extension of the well-known Goal Question Metric (GQM) paradigm using a heuristics approach. We performed a survey by distributing a structured questionnaire to a number of people from the industry in order evaluate and get feedback on these factors. We evaluated the rules of the model by means of some sample cases we created. In this paper, we discuss OMSD as well as the empirical studies we conducted in order to develop it.

  • 1508.
    Bhatti, Khurram
    et al.
    Blekinge Institute of Technology, School of Computing.
    Ghazi, Ahmad Nauman
    Blekinge Institute of Technology, School of Computing.
    Effectiveness of Exploratory Testing, An empirical scrutiny of the challenges and factors affecting the defect detection efficiency2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Software testing is an integral part of software development life cycle. To improve the quality of software there are different testing approaches practiced over the years. Traditionally software testing is carried out by following approach focusing on prior test design. While exploratory testing is an approach to test software where the tester does not require to follow a specific test design. But rather, exploratory testing should facilitate the tester in testing the complete system comprehensively. Exploratory testing is seen by some, as a way to conduct simultaneous learning, test design and execution of tests simultaneously. While others point to exploratory testing enabling constant evolution of tests in an easy manner. Objectives: In this study we have investigated the field of exploratory testing in literature and industry to understand its perception and application. Further among the stated claims by practitioners, we selected defect detection efficiency and effectiveness claim for empirical validation through an experiment and survey. Methods: In this study, a systematic literature review, interview, experiment and survey are conducted. In the systematic review a number of article sources are used, including IEEE Xplore, ACM Digital Library, Engineering village, Springer Link, Google Scholar and Books database. The systematic review also includes the gray literature published by the practitioners. The selection of studies was done using two-phase and tollgate approach. A total of 47 references were selected as primary studies. Eight semi-structures interviews were conducted with industry practitioners. Experiment had total 4 iterations and 70 subjects. The subjects were selected from industry and academia. The experimental design used was one factor with two interventions and one response variable. Results: Based on our findings from literature review and interviews, the understanding of exploratory testing has improved over the period but still lacks empirical investigation. The results drawn from experimental and survey data shows that exploratory testing proved effective and efficient in finding more critical bugs in limited time. Conclusions: We conclude that exploratory testing has a lot of potential and much more to offer to testing industry. But more empirical investigation and true facts and figures are required to motivate the testing industry to adapt it. We have reported a number of advantages, disadvantages, challenges and factors in this study. We further investigated the claims stated by the ET practitioners through an experiment and survey. The statistical tests were conducted on the collected data to draw meaningful results. We found statistical significance difference in number of true defects found. Using exploratory testing approach testers found far more defects than test case based testing. Although, there was no statistical significance difference between the two approaches for false defects.

  • 1509.
    Bheri, Sujeet
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Vummenthala, SaiKeerthana
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    An Introduction to the DevOps Tool Related Challenges2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Introduction : DevOps bridges the gap between the development and operations by improving the collaboration while automating the as many as steps from developing the software to releasing the product to the customers. To automate the software development activities, DevOps relies on the tools. There are many challenges associated with the tool implementation such as choosing the suitable tools and integrating tools with existed tools and practices. There must be a clear understanding on what kind of tools are used by the DevOps practitioners and what challenges does each tool create for them.

    Objectives: The main aim of our study is to investigate the challenges faced by the DevOps practitioners related to the tools and compare the findings with the related literature. Our contributions are (i) a comprehensive set of tools used by Developers and Operators in the software industries; (ii) challenges related to tools faced by the practitioners; and (iii) suggested recommendations and its effectiveness to mitigate the above challenges.

    Methods: we adopted case study for our study to achieve our research objectives. We have chosen literature review and semi-structured interviews as our data collection methods. Results: In our study we identified seven tools used by developers and operators which were not reported in the literature such as Intellij, Neo4j, and Postman. We identified tool related challenges from the practitioners such as difficulty in choosing the suitable tools, lack of maturity in tools such as Git, and learning new tools. We also identified recommendations for addressing tool related challenges such as Tech-Talks and seminars using complementary tools to overcome the limitations of other tools. We also identified benefits related to the adoption of such recommendations.

    Conclusion: We expect the DevOps tool landscape to change as old tools either become more sophisticated or outdated and new tools are being developed to better support DevOps and more easily integrate with deployment pipeline. With regard to tool related challenges literature review as well as interviews show that there is a lack of knowledge on how to select appropriate tools and the time it takes to learn the DevOps practices are common challenges. Regarding suggested recommendations, the most feasible one appears to be seminars and knowledge sharing events which educate practitioners how to use better tools and how to possible identify suitable tools.

  • 1510. Bhole, Yogesh
    et al.
    Popescu, Adrian
    Measurement and Analysis of HTTP Traffic2005In: Journal of Network and Systems Management, ISSN 1064-7570, E-ISSN 1573-7705, Vol. 13, no 4, p. 357-371Article in journal (Refereed)
    Abstract [en]

    The usage of Internet is rapidly increasing and a large part of the Internet traffic is generated by the World Wide Web (WWW) and the associated protocol HiperText Transfer Protocol (HTTP). Several important parameters that affect the performance of the WWW are bandwidth, scalability and latency. To tackle these parameters and to improve the overall performance of the system, it is important to understand and to characterize the application level characteristics. This article is reporting on the measurement and analysis of HTTP traffic collected on the student access network at the Blekinge Institute of Technology in Karlskrona, Sweden. The analysis is done on various HTTP traffic parameters, e.g., inter-session timings, inter-arrival timings, request message sizes, response code and number of transactions. The reported results can be useful for building synthetic workloads for simulation and benchmarking purposes.

  • 1511.
    Bhoomgoud, Uday
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    P, Kiran
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    An Empirical Study On Requirements Engineering Core Practices2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Requirements engineering (RE) is the primary task (process) that is done when agreed upon to develop a software product. The success of the software product is gauged on its ability to meet the intended needs of the stakeholders. There is abundant literature emphasizing the significance of RE and its influence on the entire software project, apart from its importance as the first step for a successful development endeavor. There are several established methodologies that are acknowledged to support the RE process and assist in creating a reliable structure of creating software. Despite the availability of such techniques and solutions, it was observed that umpteen number of software product failures are attributed to unsatisfactory RE practices. In this thesis, we have conducted a study with six organizations to emphasize the gap between the state of the art and the state of the practice, and consequently identify the factors that hinder the industrial community to implement state of the art RE. As a result of this empirical research we have found that to a great extent, state of the art practices are unpopular, more specifically in small organizations. Interestingly the majority of the problems associated with RE are associated to non technical issues.

  • 1512.
    Bhuiya, Monirul Islam
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Rakib, Mohammad Ahsan
    Blekinge Institute of Technology, School of Engineering.
    Performance Evaluation of DHTs for Mobile Environment2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Distributed Hash Table (DHT) systems are an important part of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will support the rapid development of a wide variety of Internet-scale applications ranging from naming systems and file systems to application-layer multicast. A lot of research about peer-to-peer systems, today, has been focusing on designing better structured peer-to-peer overlay networks or Distributed Hash Tables (DHTs). As far as we concern, not so many papers, however, have been published in an organized way to check the adaptability of the existing four DHTs namely Content Addressable Network (CAN), Chord, Pastry and Tapestry for mobile environments. This thesis presents an attempt to evaluate the performances of these DHTs including adaptability with mobile environments. For this we survey these DHTs including existing solutions and based on that we decide our own conclusion.

  • 1513.
    Bhuiyan, Raisul Haque Masud
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing. Ericsson AB. Åbo Akademi University..
    LOW DELAY VIDEO TRANSCODING SERVICES ON DISTRUBUTED COMPUTING PLATFORM.2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The demand of digital video with higher resolution is increasing everyday and in amodern world the videos are consumed in all kinds of multimedia devices. The transmissionof higher quality videos over the internet require higher bandwidth, which isnot an acceptable option. So, it is necessary to compress the video to a compact file byremoving redundancies and detail information.

    The process of compressing a video file requires a lot of complex calculations,which is a time consuming process, specially for live telecasting or real-time videoconferencing. In addition videos with higher quality such as higher number of Frameper Second (FPS) or higher resolution like HD and 4k video requires huge redundantdata processing. Hence, this operation causes delays during the video playback. Tominimize the time delay for the video coding, there are coding methods such as losslessand lossy coding which has been around for a long time. However, the idea to increasethe number of processing unit like CPUs and memory for video coding software is anarea that require further research to improve coding techniques.

    Distributed system uses available resources in the network to achieve a commongoal. It explores the available infrastructure so that the task can be done in parallel. Cloud computing is a great example of distributed system which has fully dedicatedresources for such complex jobs.

    This thesis deals with these areas in real-time to lower the video coding delaythrough investigating distributed resources as well as the parallelization in video codingstandards such as AVC and HEVC. It has been carried out with a collaborationwith Ericsson Research in Stockholm.

  • 1514.
    Bhuma, Venkata Srikanth
    et al.
    Blekinge Institute of Technology, School of Computing.
    Balsu, Santosh Kumar
    Blekinge Institute of Technology, School of Computing.
    Evaluation Of Radiation Tolerant Satellite Communication Modem2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The design specification of CubeSat standards by California Polytechnique University has become a major milestone in development and deployment of nano satellites. The number of CubeSats that are being deployed into the orbit has increased in recent years. The design and development have been transformed from traditional hardware devices to software defined radios. However there is a lack of clear understanding and concrete findings on developing proper communication transceivers. The lack of knowledge of proper guidelines to be followed to design and develop communication subsystems prompts and acts as a base for us in understanding the communication subsystem design standards followed by CubeSat projects in various universities. Particular attention is given to those CubeSats that are currently in the orbit and are under development. The main aim of the thesis is to identify the challenges faced by the CubeSat developers and provide guidelines for future developers in order to overcome those challenges to reduce the development time and costs which are major constraints in CubeSat developments. A traditional literature review process was followed in order to identify the potential issues and in parallel a modem was designed and implemented in order to know some more challenges while developing a CubeSat modem. From the literature review method, eight potential issues were identified and an additional two more challenges were experienced while implementing a modem. Potential advantages and disadvantages of using nanoRTU have also been identified as part of the work.

  • 1515.
    Bhutto, Tarique Inayat
    Blekinge Institute of Technology, School of Engineering.
    Root LDPC Codes for Non Ergodic Transmission Channels2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    4 ABSTRACT Tremendous amount of research has been conducted in modern coding theory in the past few years and much of the work has been done in developing new coding techniques. Low density parity check (LDPC) codes are class of linear block error correcting codes which provide capacity performance on a large collection of data transmission and storage channels while Root LDPC codes in this thesis work are admitting implementable decoders with manageable complexity. Furthermore, work has been conducted to develop graphical methods to represent LDPC codes. This thesis implement one of the LDPC kind “Root LDPC code” using iterative method and calculate its threshold level for binary and non-binary Root LDPC code. This threshold value can serve as a starting point for further study on this topic. We use C++ as tool to simulate the code structure and parameters. The results show that non-binary Root LDPC code provides higher threshold value as compare to binary Root LDPC code.

  • 1516.
    Biazen, Hailie Teshale
    Blekinge Institute of Technology, School of Management.
    Ethiopia as a Tourist destination, An exploration of Swedish Tourist Market Demand (Case Study).2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This study aimed at exploring Demand of Swedish Tourists towards Ethiopian tourist destinations. The author has tried his level best in identifying the demands discrepancies of Swedish tourists’ preferences if they are offered a visit tours as same time by Ethiopian Tourism Sector and others African countries namely; Tanzanian, Egyptian, South African and Kenyan Tourism Authority. In caring out this study, both qualitative and quantitative research method is being used and the most important data is sourced by primary data collecting method using interviews, Surveys, and by secondary data utilizing literatures collected from books, Journals, Past researches and Electronic websites. The author also used strategic sampling technique whereby ample potential feedbacks could be gathered from Seven Tours Companies, Five African Embassies and Twenty Five active Swedish Tourists in Stockholm. On the basis of the analysis of the data which was collected during the interview and surveys, the study revealed that majority of Swedish tourists have little demand on Ethiopian Tourism supply(offers) due to the following reasons; 1. Swedish tourists are dominantly more fascinated by Adventure, Safari and Beach types of trips than cultural and Historical Tours. These interests have leaded them to look for few African countries which have rich sources of Adventure, safari and Beach trips. 2. Even though there are few Swedish visitors who are interested in culture and history, they need to get at least one combination from Safari, Beach or Adventure trips. But unlike the rest of others four African Tourist destination countries stated on the above paragraph, the Swedish tourists believe that these combinations are not available in Ethiopian Tourism offers as they thought that Ethiopia is only known by its cultural and Historical Tourism offers. 3. Tour and travel companies, who are running the major Swedish tourists flow to Africa, have very little information and practical experiences on Ethiopian tourism supply. Due to these reasons the information that they knew about Ethiopia and its tourism sites is not coincide with the Ethiopian Tourism potential in reality. 4. Moreover the poor marketing operation of Ethiopian Tourism Authority and its delegates in advertizing and clarifying the above irregularities which are raised by both the tourists and the tour and travel companies. These and others attributed for the failure of Ethiopian tourism Authority to welcome as many Swedish tourists as possible.

  • 1517.
    Bibri, Mohamed
    Blekinge Institute of Technology, School of Computing.
    ICT Design Unsustainability & the Path toward Environmentally Sustainable Technologies2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This study endeavors to investigate the negative environmental impacts of the prevailing ICT design approaches and to explore some potential remedies for ICT design unsustainability from environmental and corporate sustainability perspectives. More specifically, it aims to spotlight key environmental issues related to ICT design, including resource depletion; GHG emissions resulting from energy-intensive consumption; toxic waste disposal; and hazardous chemicals use; and also to shed light on how alternative design solutions can be devised based on environmental sustainability principles to achieve the goals of sustainable technologies. The study highlights the relationship between ICT design and sustainability and how they can symbiotically affect one another. To achieve the aim of this study, an examination was performed through an extensive literature review covering empirical, theoretical, and critical scholarship. The study draws on a variety of sources to survey the negative environmental impacts of the current mainstream ICT design approach and review the potential remedies for unsustainability of ICT design. For theory, central themes were selected for review given the synergy and integration between them as to the topic under investigation. They include: design issues; design science; design research framework for ICT; sustainability; corporate sustainability; and design and sustainability. Findings highlight the unsustainability of the current mainstream ICT design approach. Key environmental issues for consideration include: resource depletion through extracting huge amounts of material and scarce elements; energy-intensive consumption and GHG emissions, especially from ICT use phase; toxic waste disposal; and hazardous substances use. Potential remedies for ICT design unsustainability include dematerialization as an effective strategy to minimize resources depletion, de-carbonization to cut energy consumption through using efficient energy required over life cycle and renewable energy; recyclability through design with life cycle thinking (LCT) and extending ICT equipment’s operational life through reuse; mitigating hazardous chemicals through green design - low or non-noxious/less hazardous products. As to solving data center dilemma, design solutions vary from hardware and software to technological improvements and adjustments. Furthermore, corporate sustainability can be a strategic model for ICT sector to respond to environmental issues, including those associated with unsustainable ICT design. In the same vein, through adopting corporate sustainability, ICT-enabled organizations can rationalize energy usage to reduce GHG emissions, and thereby alleviating global warming. This study provides a novel approach to sustainable ICT design, highlighting unsustainability of its current mainstream practices. Review of the literature makes an advance on extant reviews of the literature by highlighting the symbiotic relationship between ICT design and environmental sustainability from both research and practice perspectives. This study adds to the body of knowledge and previous endeavours in research of ICT and sustainability. Overall, it endeavours to present contributions and avenues for further theoretical and empirical research and development.

  • 1518.
    Bibri, Mohamed
    Blekinge Institute of Technology, School of Computing.
    Sustaining ICT for Sustainability: Towards Mainstreaming De–carbonization–oriented Design & Enabling the Energy–Efficient, Low Carbon Economy2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The study set out to understand and demonstrate the role the ICT sector could play as a critical enabler in the transition and progress towards an energy– efficient, low carbon economy. More specifically, the study of sustaining ICT for sustainability has twofold intent: (2) to investigate the direct footprint of ICT sector and explore how it can be tackled through adopting sustainable design–based solutions; and (2) to highlight the enabling potential of ICT sector to mitigate climate change and massively improve energy efficiency across the economy, identifying and quantifying the global ICT impacts and opportunities in the context of energy and carbon emissions savings. To achieve the aim of this study, a pertinent and extensive literature review covering theoretical, empirical, and critical scholarship was performed to investigate the phenomenon. The study draws on a variety of sources to survey the unsustainability of ICT sector pertaining to energy–intensive consumption and explore potential solutions through espousing environmental design practice, and also to examine the role of ICT in delivering energy–efficient solutions through its products and services. Validity was ensured through using quality academic and industry literature as well as relevant studies carried out by a range of eminent researchers, experts, and stakeholders (i.e. NGOs, research centers). Findings highlight the unsustainability of ICT sector regarding energy– intensive consumption and concomitant GHG emissions associated with its products and services. Of the whole lifecycle, the use phase of ICT is the most critical. Data centers and telecom networks devour energy. Planned obsolescence entrenched in software design shorten upgrade cycle, which makes software utilities a planet killer as to energy consumption. Alternative sustainable design–based solutions entail using renewable energy and most efficient energy required over ICT’s life cycle – de–carbonization strategy. Also, digitization is an effective strategy for ICT sector to slash energy use per unit. To reduce the footprint of data centers and telecom networks, design solutions vary from hardware and software to technological improvements. Designing out built–in obsolescence in software technology is a key factor in the energy equation. As for the enabling role of ICT, the findings are highly illuminating. The ICT sector must step up its efforts in reducing its direct footprint in order to claim a leadership role in an energy–efficient, low carbon economy. Although the ICT sector’s own emissions will increase because of global growing demand for its products and services, the real gains will come from its enabling potential to yield substantial energy efficiency improvements and emissions reductions across the economy. The sheer scale of the climate change challenge presents smart development mitigation opportunities for ICT sector to deliver environmentally sustainable solutions. The largest identified opportunities are: dematerialization; intelligent transport and logistics; intelligent buildings; smart power supply; and efficient industrial processes and systems. This study provides a novel approach into sustainable design in ICT, underlining unsustainable design practices in ICT sector. Review of the literature makes an advance on extant reviews by highlighting the synergic relationship between ICT design, sustainability, and the economy.

  • 1519.
    Bie, Sebastian De
    et al.
    Blekinge Institute of Technology, School of Management.
    Bie, Jenny De
    Blekinge Institute of Technology, School of Management.
    "Jag har ingen reservtank längre" Resultatet av långvarig stress2008Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syftet med detta arbete var att på ett tydligt sätt beskriva respondenternas upplevelse av anställningsotrygghet för ca 7 år sedan. Hur detta har påverkat deras hantering och upplevelse av liknande händelser i efterhand. Förteorierna som vi använde i vår bakgrund var bland annat det faktum att många människors anställningar har blivit osäkra och föränderliga. Ansatsen var kvalitativ med en hermeneutisk tolkningsspiral som transkriberingsmetod. Det psykologiska kontraktet, hantering och upplevelser av stress togs vidare upp i vår fördjupning och konkretisering som till exempel miljöstress, betingning och känslan av sammanhang. Resultatet av vårt arbete är att deltagarna efter ca 7 år fortfarande upplever en sänkt förmåga att hantera stress, respondenterna beskriver en kvardröjande osäkerhet, sänkt tilltro till sin egen förmåga och en ökad känslighet för stress. Ett av de resultat vi fann var att otrygghetens följder gav nyckelord som kunde kategoriseras under utbrändhet. I diskussionen hanteras deltagarnas beskrivning av kvardröjande osäkerhet, sänkt tilltro till sin egen förmåga och misstänksamhet. Avslutningsvis diskuteras bland annat den nya ohälsan, en abstrakt känsla av att inte ha någon kontroll och att inte kunna peka på en konkret orsak till ohälsan.

  • 1520. Biedenbach, Thomas
    et al.
    Svensson, Martin
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Hällgren, Markus
    Blissful ignorance: The transfer of responsibility in response to lack of competence2015Conference paper (Refereed)
  • 1521. Biernacki, Arkadiusz
    et al.
    Tutschku, Kurt
    Blekinge Institute of Technology, School of Computing.
    Comparative Performance Study of LTE Downlink Schedulers2014In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 7, no 2, p. 585-599Article in journal (Refereed)
    Abstract [en]

    Long time evolution (LTE) represents an emerging and promising technology for providing broadband, mobile Internet access. Because of the limitation of available spectrum resource, high spectrum efficiency technologies such as channel-aware scheduling need to be explored. In this work, we evaluate the performance of three scheduling algorithms proposed for LTE downlink transmission. The evaluation takes place in mixed traffic scenarios and aims at exploring strengths and weaknesses of the proposed algorithms. Simulation results illustrate the importance of real-time traffic awareness by schedulers when a specified level of quality of service is required. The research shows that lack of prioritisation of multimedia traffic will lead to severe degradation of video and VoIP services even with a relatively low network load.

  • 1522. Biernacki, Arkadiusz
    et al.
    Tutschku, Kurt
    Blekinge Institute of Technology, School of Computing.
    Performance of HTTP Video Streaming Under Different Network Conditions2014In: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 72, no 2, p. 1143-1166Article in journal (Refereed)
    Abstract [en]

    The Internet video sharing services have been gaining importance and increasing their share in the multimedia market. In order to compete effectively and provide broadcast television with a comparable level of quality, the Internet video should fulfil stringent quality of service (QoS) constraints. However, as the Internet video is based on packet transmission, it is influenced by delays, transmission errors, data losses and bandwidth limitations which can have a devastating influence on the perceived quality of the multimedia content. There are many works which describe the impact of network impairments on the Internet video. Nevertheless, little is known about how network conditions influence the video streamed by the currently popular services such as YouTube, where video is transmitted over reliable TCP/HTTP protocols. Therefore using a network simulator, we conducted an experimental evaluation of theHTTP based video transmission analysing how the network impairments mentioned above influence the streamed video. The experiments were validated against a network emulator supplied with real network traces. As a result of this work, we can state that the buffering strategies implemented by a video player are in many cases able to mitigate unfavourable network conditions what allow to play the streamed video smoothly. The results may serve Internet Service Providers so that they could tune their network characteristics in order to match the demand from HTTP video.

  • 1523. Bigagli, Lorenzo
    et al.
    Sveinsdottir, Thordis
    Wessels, Bridgette
    Smallwood, Rod
    Linde, Peter
    Blekinge Institute of Technology, The Library.
    Sondervan, Jeroen
    Infrastructure and technology challenges2014Report (Refereed)
    Abstract [en]

    In this deliverable, we report on our work on infrastructural and technological barriers to Open Access and preservation of research data as identified by key stakeholder groups. Through a mix of qualitative, quantitative and document review methods, we identified five key barriers to successfully implementing Open Access to research data in Europe: data heterogeneity and issues of standardisation; accessibility and discoverability issues; data preservation and curation; data quality and assessability; and data security. We explore these issues in detail and present existing good practice, and technical and infrastructural solutions used to mitigate such barriers. This work was conducted within the EU FP7 funded project RECODE, which focuses on developing policy recommendations for Open Access to Research Data in Europe. In particular, this work is coordinated by RECODE Work Package 2 (WP2), Infrastructure and technology.

  • 1524.
    Bigun, Christopher
    et al.
    Blekinge Institute of Technology.
    Sjöstrand, Erik
    Blekinge Institute of Technology.
    Den ljudlösa bilen: En undersökning om buller, bång och brummande bilar2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This degree project will examine active sound design for quiet vehicles. Based on former research wether electric cars expose humans living in urban areas to danger due to the absence of auditive information, we will develop suggestions for dynamic eninge sounds which are related to traffic safety, design and reduced noise pollution. Cities’ overall noise levels are far beyond recommended, and the consequences causes health issues in bigger cities. This paper will therefore discuss the problems with noise pollution in cities, and wether the electric car is capable of reducing the overall sound levels while maintaining pedestrians’ and cyclists’ awareness in traffic by auditive information. Our interpretation resulted in engine sounds which not only contains a causionary effect on it’s surroundings, but also could contribute to the reduction of noise pollution in comparison to combustion engines. 

  • 1525.
    Bihl, Erik
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    The captivating use of silence in film: How silence affects the emotional aspect of cinema2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this thesis I use both Dense Clarity - Clear Density as well as qualitative interviewing as methods to guide me through this examination of sound design. Through studying other works and executing personal tests I try to find out if there is a need to use sound and silence in a creative way to evoke emotion. I examine films as well as literature from the 1960s all the way to the 2000s, to see how the use of silence has unfolded over the years. I also create a visual production that strengthens my theory that silence affects narrative more than its credited for. But the essay isn’t just about silence, it’s revolved around sound too, expanding into how sound correlates with emotion and how one can apply it to their production.  

  • 1526.
    Bilal, Adeel Ashfaq and Umer
    Blekinge Institute of Technology, School of Computing.
    Study of Abnormal TCP/HTTP Connection2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Web browsing activities have increased to huge volumes in the last decade, causing more interest in the analysis of Web trac to extract user action. TCP, the transport layer protocol and HTTP, the application layer protocol plays a major role in Web browsing activities. In this thesis an attempt has been made to investigate the anomalies of TCP terminations in an application layer environment. An experimental setup has been devised in in an isolated manner to observe the e ect of di erent Web browsers, Web servers and contents type on the termination of TCP ports. The results in this thesis show that the anomaly of the termination of TCP port with a reset(RST) flag is usually caused by a Web browser. Further we conclude that the amount of RSTs rise while accessing video based contents due to the increased number of ports while accessing the contents of Web page. In this report ,we further describe and quantify the di erent causes and their contribution in generating RSTs during Web browsing.

  • 1527.
    Bilal, Muhammad
    et al.
    Blekinge Institute of Technology, School of Computing.
    Sankar, Ganesh
    Blekinge Institute of Technology, School of Computing.
    Trust & Security issues in Mobile banking and its effect on Customers2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: The invention of mobile phones makes the human life easier. The purpose of this study is to identify security risks in mobile banking and to provide an authentication method for mobile banking transaction by using bio-metric mechanism. Objectives: Current mobile banking authentication is challenging and identified as a major security risk. Literature review shows that customer distrusts mobile banking due to security issues. The authors discuss security risks in current authentication methods in mobile banking. Methods: There are different methods and approaches to handle authentication in mobile banking. In this thesis, we propose a new approach of authentication in mobile banking. The strengths and weaknesses of existing approaches of authentication are identified with the help of Literature Review and interviews. The authors present basic transaction model and include security risks. By Literature Review it is found that finger print mechanism is a suitable method for authentication. Authors focus on authentication method and present a biometric scanning device which can identify the customer’s finger print thus enabling the customer to access mobile banking facility. Results: An authentication model is proposed through design process. The proposed biometric design was validated by conducting a workshop. The analysis of the workshop’s results showed that customer’s trust in security for mobile banking will be increased by finger print mechanism. To promote mobile banking, it is necessary to improve customer trust in terms of security. Conclusions: The authors concluded that, only authorized person will be able to use mobile banking services by incorporating bio-metric finger-print mechanism. By literature review and interview it was found that finger-print mechanism is more suitable than other ordinary mechanisms like login and password mechanism, SMS etc.

  • 1528.
    Bilan, Carolina
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Hedberg, Carl
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Säkerhetshot och lösningar för privatpersoner med bredband2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.

  • 1529.
    Bilker, Anna-Karin
    Blekinge Institute of Technology, School of Health Science.
    Utemiljön på förskolorna i Eksjö kommun: En kartläggning av den fysiska miljöns utformning samt personalens erfarenheter av den fysiska miljön2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Förskolegårdar med inslag av träd, buskar och kullar som är väl integrerade i lekplatser utgör stödjande miljöer för ökad fysisk aktivitet, ökad koncentration samt solskyddad utevistelse. OPEC är ett verktyg utformat för att bedöma förskolegården och dess potential för att fungera som en stödjande miljö på detta sätt. Syftet med studien var att kartlägga aspekter av utemiljön som rörde möjligheten till fysisk aktivitet, koncentration och förekomst av solexponering på förskolegårdarna i en kommun i södra Sverige samt att undersöka förskolepersonalens erfarenheter av den fysiska miljön på förskolegårdarna. Som fokus för studien valdes Eksjö kommun p.g.a. dess tillgänglighet. Data samlades in genom strukturerade observationer av förskolegårdarna med utgångspunkt i OPEC samt kvalitativa semi-strukturerade intervjuer med förskolepersonal som arbetade på förskolorna. Observationsdatan från förskolegårdarna genomgick en kvantitativanalys och datan från intervjuerna analyserades genom en kvalitativinnehållsanalys. Resultatet visade att endast 2 av de 13 förskolegårdarna utgjorde stödjande miljöer enligt OPEC. Brist på tillräckligt solskydd och utmaningar lyftes fram i intervjuerna samt att utvecklingen av gårdarna hämmades av att det rådde osäkerhet kring vilka regler som gällde för utformandet av gården. Det fanns ett stort behov av att gårdarna skulle ses över. De flesta gårdarna klassificerades inte som stödjande miljöer vilket korrelerade med förskolepersonalens upplevelser av att det saknades tillräckligt med utmaningar och solskydd på många av gårdarna. Studien visade på att ansvarsfördelningen kring förskolegårdarna och vilka regler som gäller för underhåll och utveckling behöver ses över så att förskolepersonalens engagemang för gårdarna kan tillvaratas och stödjas.

  • 1530.
    Billemyr Moström, Simon
    et al.
    Blekinge Institute of Technology.
    Månsson, Philip
    Blekinge Institute of Technology.
    Trollscouts: Det visuella samarbetet2015Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    This work is about how we can make use of the visuals in a game to motivate cooperation and attract community. Our interest was to explore around the idea of not imagining a game only as a passive escape from reality, but as a tool that can be used to motivate cooperation. The game that we have chosen to develop was determined to be suitable for children around the age of 10. We chose to use a method called Layered Elaboration as a way to learn about our target audience more clearly, and also as a tool to get ideas and inspiration on how we can adapt a game for this target group. After we had a workshop with the children at a school, where we let the children draw what they came to think of about different themes they received, we developed a playable prototype we then let the children in the same school test to get an evaluation. After the gaming test was over we found out that the graphics in our game must be clear enough that you should know what the goal is, yet still have a certain ambiguity, within certain limits, to force players to cooperate with each other in order to understand how to proceed in order to reach the goal.

  • 1531.
    Billing, Måns
    et al.
    Blekinge Institute of Technology, School of Planning and Media Design.
    Lindh, Jakob
    Blekinge Institute of Technology, School of Planning and Media Design.
    Berättande i digitala spel: En undersökning av monomyten och dess gestaltning2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Den här uppsatsen undersöker monomytens två inledande steg The Ordinary World och The Call to Adventure samt hur dessa kan gestaltas i digitala spel. Syftet är att få insikt i hur spelmediet kan använda sig av de här teorierna om berättelsestrukturer för att skapa mer engagerande upplevelser. För att undersöka problemområdet konkretiserades teorierna i ett ramverk utifrån vilket en spelprototyp utvecklades och två redan existerande digitala spel analyserades. Prototypen jämfördes med de analyserade spelen för att undersöka på vilket sätt teorierna om The Ordinary World och The Call to Adventure gestaltats. Undersökningen visade på att spelmediet erbjuder en mängd olika sätt att gestalta teorierna på och vilka för- och nackdelar dessa gestaltningssätt har. Vidare pekade användandet av monomyten på dess fortsatta relevans inom spelmediet, men även på de problem som reproduktionen av monomytens struktur kan leda till.

  • 1532.
    Bilski, Mateusz
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Migration from blocking to non-blocking web frameworks2014Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The problem of performance and scalability of web applications is challenged by most of the software companies. It is difficult to maintain the performance of a web application while the number of users is continuously increasing. The common solution for this problem is scalability. A web application can handle incoming and outgoing requests using blocking or non-blocking Input/Output operation. The way that a single server handles requests affects its ability to scale and depends on a web framework that was used to build the web application. It is especially important for Resource Oriented Architecture (ROA) based applications which consist of distributed Representational State Transfer (REST) web services. This research was inspired by a real problem stated by a software company that was considering the migration to the non-blocking web framework but did not know the possible profits. The objective of the research was to evaluate the influence of web framework's type on the performance of ROA based applications and to provide guidelines for assessing profits of migration from blocking to non-blocking JVM web frameworks. First, internet ranking was used to obtain the list of the most popular web frameworks. Then, the web frameworks were used to conduct two experiments that investigated the influence of web framework's type on the performance of ROA based applications. Next, the consultations with software architects were arranged in order to find a method for approximating the performance of overall application. Finally, the guidelines were prepared based on the consultations and the results of the experiments. Three blocking and non-blocking highly ranked and JVM based web frameworks were selected. The first experiment showed that the non-blocking web frameworks can provide performance up to 2.5 times higher than blocking web frameworks in ROA based applications. The experiment performed on existing application showed average 27\% performance improvement after the migration. The elaborated guidelines successfully convinced the company that provided the application for testing to conduct the migration on the production environment. The experiment results proved that the migration from blocking to non-blocking web frameworks increases the performance of web application. The prepared guidelines can help software architects to decide if it is worth to migrate. However the guidelines are context depended and further investigation is needed to make it more general.

  • 1533.
    bin Ali, Nauman
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Operationalization of lean thinking through value stream mapping with simulation and FLOW2015Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Background: The continued success of Lean thinking beyond manufacturing has led to an increasing interest to utilize it in software engineering (SE). Value Stream Mapping (VSM) had a pivotal role in the operationalization of Lean thinking. However, this has not been recognized in SE adaptations of Lean. Furthermore, there are two main shortcomings in existing adaptations of VSM for an SE context. First, the assessments for the potential of the proposed improvements are based on idealistic assertions. Second, the current VSM notation and methodology are unable to capture the myriad of significant information flows, which in software development go beyond just the schedule information about the flow of a software artifact through a process. Objective: This thesis seeks to assess Software Process Simulation Modeling (SPSM) as a solution to the first shortcoming of VSM. In this regard, guidelines to perform simulation-based studies in industry are consolidated, and the usefulness of VSM supported with SPSM is evaluated. To overcome the second shortcoming of VSM, a suitable approach for capturing rich information flows in software development is identified and its usefulness to support VSM is evaluated. Overall, an attempt is made to supplement existing guidelines for conducting VSM to overcome its known shortcomings and support adoption of Lean thinking in SE. The usefulness and scalability of these proposals is evaluated in an industrial setting. Method: Three literature reviews, one systematic literature review, four industrial case studies, and a case study in an academic context were conducted as part of this research. Results: Little evidence to substantiate the claims of the usefulness of SPSM was found. Hence, prior to combining it with VSM, we consolidated the guidelines to conduct an SPSM based study and evaluated the use of SPSM in academic and industrial contexts. In education, it was found to be a useful complement to other teaching methods, and in the industry, it triggered useful discussions and was used to challenge practitioners’ perceptions about the impact of existing challenges and proposed improvements. The combination of VSM with FLOW (a method and notation to capture information flows, since existing VSM adaptions for SE are insufficient for this purpose) was successful in identifying challenges and improvements related to information needs in the process. Both proposals to support VSM with simulation and FLOW led to identification of waste and improvements (which would not have been possible with conventional VSM), generated more insightful discussions and resulted in more realistic improvements. Conclusion: This thesis characterizes the context and shows how SPSM was beneficial both in the industrial and academic context. FLOW was found to be a scalable, lightweight supplement to strengthen the information flow analysis in VSM. Through successful industrial application and uptake, this thesis provides evidence of the usefulness of the proposed improvements to the VSM activities.

  • 1534.
    bin Ali, Nauman
    Blekinge Institute of Technology, School of Computing.
    Towards Guidelines for Conducting Software Process Simulation in Industry2013Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Background: Since the 1950s explicit software process models have been used for planning, executing and controlling software development activities. To overcome the limitation of static models at capturing the inherent dynamism in software development, Software Process Simulation Modelling (SPSM) was introduced in the late 1970s. SPSM has been used to address various challenges, e.g. estimation, planning and process assessment. The simulation models developed over the years have varied in their scope, purpose, approach and the application domain. However, there is a need to aggregate the evidence regarding the usefulness of SPSM for achieving its intended purposes. Objective: This thesis aims to facilitate adoption of SPSM in industrial practice by exploring two directions. Firstly it aims to establish the usefulness of SPSM for its intended purposes, e.g. for planning, training and as an alternative to study the real world software (industrial and open source) development. Secondly to define and evaluate a process for conducting SPSM studies in industry. Method: Two systematic literature reviews (SLR), a literature review, a case study and an action research study were conducted. A literature review of existing SLRs was done to identify the strategies for selecting studies. The resulting process for study selection was utilized in an SLR to capture and aggregate evidence regarding the usefulness of SPSM. Another SLR was used to identify existing process descriptions of how to conduct an SPSM study. The consolidated process and associated guidelines identified in this review were used in an action research study to develop a simulation model of the testing process in a large telecommunication vendor. The action research was preceded by a case study to understand the testing process at the company. Results: A study selection process based on the strategies identified from literature was proposed. It was found to systemize selection and to support inclusiveness with reasonable additional effort in an SLR of the SPSM literature. The SPSM studies identified in literature scored poorly on the rigor and relevance criteria and lacked evaluation of SPSM for the intended purposes. Lastly, based on literature, a six-step process to conduct an SPSM study was used to develop a System Dynamics model of the testing process for training purposes in the company. Conclusion: The findings identify two potential directions for facilitating SPSM adoption. First, by learning from other disciplines having done simulation for a longer time. It was evident how similar the consolidated process for conducting an SPSM study was to the process used in simulation in general. Second the existing work on SPSM can at best be classified as strong ``proof-of-concept’’ that SPSM can be useful in the real world software development. Thus, there is a need to evaluate and report the usefulness of SPSM for the intended purposes with scientific rigor.

  • 1535.
    Bin Ali, Nauman
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering. Blekinge Inst Technol, Karlskrona, Sweden..
    Petersen, Kai
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering. Blekinge Inst Technol, Karlskrona, Sweden..
    Nicolau de Franca, Breno Bernard
    Univ Fed Rio de Janeiro, ESE Grp, PESC COPPE, BR-68511 Rio De Janeiro, Brazil..
    Evaluation of simulation-assisted value stream mapping for software product development: Two industrial cases2015In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 68, p. 45-61Article in journal (Refereed)
    Abstract [en]

    Context: Value stream mapping (VSM) as a tool for lean development has led to significant improvements in different industries. In a few studies, it has been successfully applied in a software engineering context. However, some shortcomings have been observed in particular failing to capture the dynamic nature of the software process to evaluate improvements i.e. such improvements and target values are based on idealistic situations. Objective: To overcome the shortcomings of VSM by combining it with software process simulation modeling, and to provide reflections on the process of conducting VSM with simulation. Method: Using case study research, VSM was used for two products at Ericsson AB, Sweden. Ten workshops were conducted in this regard. Simulation in this study was used as a tool to support discussions instead of as a prediction tool. The results have been evaluated from the perspective of the participating practitioners, an external observer, and reflections of the researchers conducting the simulation that was elicited by the external observer. Results: Significant constraints hindering the product development from reaching the stated improvement goals for shorter lead time were identified. The use of simulation was particularly helpful in having more insightful discussions and to challenge assumptions about the likely impact of improvements. However, simulation results alone were found insufficient to emphasize the importance of reducing waiting times and variations in the process. Conclusion: The framework to assist VSM with simulation presented in this study was successfully applied in two cases. The involvement of various stakeholders, consensus building steps, emphasis on flow (through waiting time and variance analysis) and the use of simulation proposed in the framework led to realistic improvements with a high likelihood of implementation. (C) 2015 Elsevier B.V. All rights reserved.

  • 1536.
    bin Ali, Nauman
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Petersen, Kai
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Wohlin, Claes
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    A systematic literature review on the industrial use of software process simulation2014In: Journal of Systems and Software, ISSN 0164-1212, Vol. 97Article in journal (Refereed)
    Abstract [en]

    Context Software process simulation modelling (SPSM) captures the dynamic behaviour and uncertainty in the software process. Existing literature has conflicting claims about its practical usefulness: SPSM is useful and has an industrial impact; SPSM is useful and has no industrial impact yet; SPSM is not useful and has little potential for industry. Objective To assess the conflicting standpoints on the usefulness of SPSM. Method A systematic literature review was performed to identify, assess and aggregate empirical evidence on the usefulness of SPSM. Results In the primary studies, to date, the persistent trend is that of proof-of-concept applications of software process simulation for various purposes (e.g. estimation, training, process improvement, etc.). They score poorly on the stated quality criteria. Also only a few studies report some initial evaluation of the simulation models for the intended purposes. Conclusion There is a lack of conclusive evidence to substantiate the claimed usefulness of SPSM for any of the intended purposes. A few studies that report the cost of applying simulation do not support the claim that it is an inexpensive method. Furthermore, there is a paramount need for improvement in conducting and reporting simulation studies with an emphasis on evaluation against the intended purpose.

  • 1537.
    bin Ali, Nauman
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Unterkalmsteiner, Michael
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Use and evaluation of simulation for software process education: a case study2014Conference paper (Refereed)
    Abstract [en]

    Software Engineering is an applied discipline and concepts are difficult to grasp only at a theoretical level alone. In the context of a project management course, we introduced and evaluated the use of software process simulation (SPS) based games for improving students’ understanding of software development processes. The effects of the intervention were measured by evaluating the students’ arguments for choosing a particular development process. The arguments were assessed with the Evidence-Based Reasoning framework, which was extended to assess the strength of an argument. The results indicate that students generally have difficulty providing strong arguments for their choice of process models. Nevertheless, the assessment indicates that the intervention of the SPS game had a positive impact on the students’ arguments. Even though the illustrated argument assessment approach can be used to provide formative feedback to students, its use is rather costly and cannot be considered a replacement for traditional assessments.

  • 1538.
    Bin, Bai
    et al.
    Blekinge Institute of Technology.
    Ahmad, Allouh
    Blekinge Institute of Technology.
    Study and Analysis of the Electrical and Mechanical Parts in a Wind Turbine2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A wind turbine is a complex electromechanical system. It is important to know how to control it, particularly if high performance and good efficiency are needed. Understanding the rules of nature and the behavior of a wind turbine, especially in its operation, is a subject that requires a number of types of specialized knowledge. We also need to know how to work on them, and then carry out further research and development on their functionality. In this thesis we have studied in different aspects of wind turbine. There are two types of wind turbines (Horizontal axis & Vertical axis). In our thesis we have only focused on the horizontal-axis type.

  • 1539. Binzenhöfer, Andreas
    et al.
    Schlosser, Daniel
    Tutschku, Kurt
    Fiedler, Markus
    An Autonomic Approach to Verify End-to-End Communication Quality2007Conference paper (Refereed)
    Abstract [en]

    -- To come --

  • 1540. Binzenhöfer, Andreas
    et al.
    Tutschku, Kurt
    Graben, Björn auf dem
    Fiedler, Markus
    Arlos, Patrik
    A P2P-based framework for distributed network management2006Conference paper (Refereed)
    Abstract [en]

    In this paper we present a novel framework supporting distributed network management using a self-organizing peer-to-peer overlay network. The overlay consists of several Distributed Network Agents which can perform distributed tests and distributed monitoring for fault and performance management. In that way, the concept is able to overcome disadvantages that come along with a central management unit, like lack of scalability and reliability. So far, little attention has been payed to the quality of service experienced by the end user. Our self-organizing management overlay provides a reliable and scalable basis for distributed tests that incorporate the end user. The use of a distributed, self-organizing software will also reduce capital and operational expenditures of the operator since fewer entities have to be installed and operated.

  • 1541. Binzenhöfer, Andreas
    et al.
    Tutschku, Kurt
    Graben, Björn auf dem
    Fiedler, Markus
    Arlos, Patrik
    DNA, a P2P-based framework for distributed network management2005Conference paper (Refereed)
    Abstract [en]

    N/A

  • 1542.
    Birbiglia, Veronica
    Blekinge Institute of Technology, School of Management.
    Sociala media och arbete: Relationen mellan psykologiskt arbetsklimat och nyttjande av sociala media i arbetet2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Genom att studera relationen mellan upplevt psykologiskt arbetsklimat och anställdas användande av sociala media i arbetet söktes stöd för studiens huvudsyfte: om anställda använder sig av sociala media i arbetet om arbetsklimatet inte upplevs som positivt, samt om sociala media används, hur anställda då uppfattar sociala media som hjälp och stöd i arbetet. Genom en webbaserad enkät samlades data in från deltagarna (N = 27), vilka härrörde från tre IT-avdelningar i en kommunal organisation i Mellansverige. Analyser av ackumulerad data skedde till övervägande del genom Spearmans korrelationstest och Mann-Whitney U-test. Resultatet indikerade stöd för två av studiens tre hypoteser vad gäller samband mellan upplevelse av psykologiskt arbetsklimat och användande av sociala media, samt skillnader mellan anställdas upplevelse av relationer till kollegor offline och användande av sociala media. Däremot hittades inga signifikanta skillnader för hur anställda, beroende på hur de ser på kunskap, tar stöd från relationer online och offline.

  • 1543.
    Birbiglia, Veronica
    et al.
    Blekinge Institute of Technology, School of Management.
    Jansson, Camilla
    Blekinge Institute of Technology, School of Management.
    Chefskapets betydelse för etablerandet av en lärandemiljö: Livslångt lärande i pedagogisk verksamhet2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Dagens ledord skulle kunna sägas vara förändring. Medarbetare börjar och slutar sina anställningar, verksamheter omorganiseras, nya företag etableras och gamla kommunala funktioner avknoppas och blir privata. En annan kultur tar plats där medarbetarnas lärande och utveckling ses som ett av företagens viktigaste konkurrensmedel och blir därigenom något att fokusera på, synliggöra och utveckla. Vikten av en gynnsam lärandemiljö för medarbetarna står därför i centrum för att möjliggöra för deras livslånga lärande. Med utgångspunkt från det sociokulturella perspektivet samt hur förutsättningar för lärande uppstår och skapas blev syftet med studien således att få förståelse för chefens betydelse för lärandemiljön på en nyetablerad arbetsplats. Studien genomfördes på ett företag med två nystartade förskolor där deltagarna utgjordes av två chefer och deras medarbetare. Undersökningen utgick från en etnografisk ansats där materialinsamlingen till största del baserades på deltagande observationer men där även loggböcker samt djupintervjuer med cheferna användes som kompletterande metoder. Resultatet visade att chefens medvetenhet om samt förståelse och engagemang för medarbetarnas lärande på arbetsplatsen är av största vikt för att en lärandemiljö ska kunna skapas samt att goda relationer och öppen kommunikation har stor betydelse för att få trygga och delaktiga medarbetare.

  • 1544.
    Birgersson, Frida
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Onomatopoesi i skönlitteratur: - gemensamma tolkningar av ljudhärmande ord2016Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Previous and recent studies shows that onomatopoeia is presented in fictionstories but the studies lack valid information within the subject. Moredetailed research can be found within language studies. The purpose of thisstudy is to enlighten onomatopoeia, how it is presented in fictionproductions and if people share a mutual vision of sounds imitating wordsthat might be used in these productions. The study was conducted with aqualitative method and with a phenomenological perspective. 36 individualsparticipated in a questionnaire that was conducted. A number of sounds waspresented to the participants who then had to type the sound in text. BONKand SPLOOSH showed a mutual vision and the result was presented astables. A product was created to unite the previous and recent studies withthe result from the questionnaire. This resulted in an interactive book thatwith help of digital tool create an ordiginal product.

  • 1545. Birgersson, Tommy
    et al.
    Gynnerstedt, Kerstin
    Öresjö, Eva
    Blekinge Institute of Technology, Department of Spatial Planning and Civil Engineering.
    Vem bestämmer: om medborgarinflytande och kommunal planering. Erfarenheter från Sydlänsprojektet.1998Book (Other academic)
    Abstract [en]

    Boverket och Folkrörelserådet Hela Sverige ska leva tog 1995 initiativ till Sydlänsprojektet. Syftet var att finna former för hur lokalt utvecklingsarbete kan få bättre stöd av kommunal planering men också hur medborgarinflytandet kan komma till tydligare uttryck. Denna rapport redovisar resultatet från utvärderingen av Sydlänsprojektet. Den innehåller iakttagelser och relexioner kring de processer som har ägt rum mellan nio kommuner och lika många lokala utvecklingsarbeten i deras försök att förbättra medborgarinflytandet i kommunal planering. Rapporten vänder sig till de personer som har varit involverade i Sydlänsprojektet men också till andra kommuner och grupper av medborgare som står i beredskap att starta eller befinner sig mitt i ett liknande arbete. Slutsatserna från utvärderingen och de förslag som presenteras bör även kunna tjäna som underlag för en allmän diskussion om hur medborgarnas delaktighet i samhällsplaneringen ska kunna förbättras. Det kan gälla förändringsarbte i såväl mindre samhällen som storskaliga bostadsområden. Erfarenheter från Sydlänsprojektet kan dessutom vara nyttiga för de personer som arbetar med att genomföra FN-initiativen Agenda 21 och Habitatagendan.

  • 1546.
    Birkestedt, Sara
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Hansson, Andreas
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Can web-based statistic services be trusted?2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    A large number of statistic services exist today, which shows that there is a great interest in knowing more about the visitors on a web site. But how reliable is the result the services are giving? The hypothesis examined in the thesis is: Web-based statistic services do not show an accurate result The purpose of the thesis is to find out how accurate the web-based statistic services are regarding unique visitors and number of pages viewed. Our hope is that this thesis will bring more knowledge about the different statistic services that exists today and the problems surrounding them. We will also draw attention to the importance of knowing how your statistic software works to be able to interpret the results correctly. To investigate this, we chose to do practical tests on a selection of web-based statistic services. The services registered the traffic from the same web site during a test period. During the same period a control program registered the same things and stored the result in a database. In addition to the test, we have done an interview with a person working with web statistics. The investigation showed that there are big differences between the results from the web-based statistic services in the test and that none of them showed an accurate result, neither for the total number of page views nor unique visitors. This led us to the conclusion that web-based statistic services do not show an accurate result, which verifies our hypothesis. Also the interview confirmed that there is a problem with measuring web statistics.

  • 1547.
    Bisong, Ayambe
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Social Sustainability in Africa: The case of Cameroon2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The aim of this research is to examine how Africa can become a socially sustainable society by the year 2030 using a strategic leadership approach with Cameroon as a case study. Using a generic and whole systems view, the study would examine the possibility of a transition from a socially un-sustainable society to sustainable society. The study analyses the current political, economic, social and environmental operations that undermines people’s ability to meet their basic needs. It also highlights some of the strengths and opportunities of the Cameroonian society that can help accelerate this transition. Threats and weaknesses are also identified and corrective measures are proposed. Agriculture and social capacity building amongst others stand out as prominent opportunities which could be use to further strategic progress towards sustainability. The study concludes that, with a well defined vision, it is possible for Cameroon to strategically progress towards a socially sustainable society.

  • 1548.
    BISWAS, KALLOL KUMAR
    Blekinge Institute of Technology, School of Planning and Media Design.
    Changing Climate; Bangladesh Facing the Challenge of Severe Flood Problems; A Comparison of Flood Management between Bangladesh and the Netherlands2010Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Both Bangladesh and the Netherlands are the most flood prone countries in two continents Asia and Europe. Bangladesh is known to be highly vulnerable to floods. Frequent floods have put enormous constraints on its development potential. Unfortunately, the frequency of high intensity floods is increasing every year. So far the country has struggled to put a sizeable infrastructure in place to prevent flooding in many parts of the country with limited success. Where, the Netherlands has developed a massive success in their flood management. The paper will represents the present flood management situation of the two countries Bangladesh and the Netherlands and by making comparison of flood management between these two countries, give some recommendation for further flood management. Historically Bangladesh has developed the flood management laws but lack of implementation and continuous inconsistencies of these laws make Bangladesh backward in their flood management, in compare to the Netherlands. Bangladesh has been practicing the construction of earthen flood control embankments is an established practice for protecting people’s lives and homes, agriculture and infrastructures since the beginning of flood management. Where, the Netherlands has developed spatial construction to control flood and different strategies have been implementing to minimize the flood hazards according to their needs. On the basis of overall present situation in Bangladesh, the paper also tried to suggests some solutions to minimize the extent of flood hazards in the long run.

  • 1549.
    Biswas, Kamanashis
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Ali, Md. Liakat
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Security Threats in Mobile Ad Hoc Network2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

  • 1550.
    Biswas, Md Abdul Matin
    Blekinge Institute of Technology, School of Engineering.
    Exploiting the Direct Communication Link for Enhancing Effective Capacity Performance of Cognitive Radio Relay Networks2014Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Nowadays, cognitive radio (CR) is a promising concept to improve the radio spectrum exploitation. CR has tremendous ability to enhance spectrum efficiency by allowing secondary users (SUs) to access licensed radio spectrum resource which is currently not being used by primary users (PUs). One basic challenge of that paradigm is securing the quality of service (QoS) of the primary link transmission while increasing the rate of the secondary links transmission. Cooperative relaying is an encouraging technology which offers the opportunity to maximize the transmission diversity gain significantly in the rapid development growth of wireless communication which contains cognitive radio networks. On the other hand, effective capacity (EC) which is designed to provide a maximum constant arrival rate that a statistical wireless channels can support while satisfying statistical QoS requirements. In this thesis, the performance enhancement analysis of cognitive radio relay network (CRRN) by exploiting the direct communication link has been investigated in Rayleigh fading channel where peak interference power constraint is taken into consider. A spectrum sharing technique is considered in this thesis where a restriction of spectrum sharing is applied by the PUs. Here, an SU can coexist simultaneously with the PU for transmitting data as long as a certain threshold on the peak interference power applied on the primary receiver is not overstepped by the SUs transmission. In addition, it is supposed that there are multiple intermediate relay nodes available to transmit their signal to the destination along with a direct communication link for secondary transmission. Moreover, the SU transmission has to meet a random delay QoS constraint. By providing this QoS constraint, the maximum arrival data rate of SUs can be achieved with small error of probability. Specifically, this thesis also acquires closed-form expressions of EC for CRRN. It is evident that if the channel quality and the interference threshold set by the PU are changed, then the capacity of the channel is also to be changed. In addition, it is also verified that the direct communication link together with multiple relay nodes has significantly higher capacity gains compare to non-direct communication link for CRRN. Matlab simulations are presented to find out theoretical results and Monte-Carlo simulations are carried out to support these numerical results. Both the simulation results and the analytical results match very well.

28293031323334 1501 - 1550 of 13649
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf