Change search
Refine search result
1234567 151 - 200 of 13556
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151. Agnefeldt, Anton
    et al.
    Heidarsson, Atle
    Att kommunicera och förstå gränser: Om territorialitet, semiotik och tolkning2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This essay seeks to examine the role of territorial boundaries and why they can be interpretable. In the essay, the divided residential city block, and its intention to eliminate barriers to create courtyards that are both semi-private and semi-public, is problematized. The division of the block does not mean that barriers cease to exist, but that they enter a more complex state where people themselves must interpret the territorial extents. This has led to conflicts between residents and outsiders, which raises the idea that they have interpreted the territorial boundaries differently. 

    To analyze how boundaries can be interpreted, the essay includes field studies at two residential city blocks of divided character and where territorial conflicts have occurred. The study is carried out with a semiotic framework: by likening boundaries to semiotic sign system, social and cultural qualities can be read. With the help of geosemiotics and landscape semiotics we can conclude that boundaries can be more than just physical barriers, but also social codes that are active in the entire mental world.

  • 152.
    Agnesson, Anders
    et al.
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Sandell, Joacim
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    En jämförelse mellan materiella investeringar och investeringar i kompetensutveckling2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Skillnaden i bedömning och uppföljning av kompetensutveckling och materiella investeringar ligger i graden av kvantifierbarhet. Materiella investeringar som maskiner, kan oftast bedömas och följas upp genom objektiva metoder, medan kompetensutveckling kräver subjektiva metoder. I de företag vi studerat finns en ambition att finna en mer objektiv metod för kompetensutveckling men det anses ta för mycket resurser i anspråk relaterat till den nytta som eventuellt skulle uppstå. En annan faktor som vi fann var att i den dynamiska miljö företagen verkar är det inte motiverat att utvärdera kompetensutveckling eftersom det anses vara en färskvara. Miljön företagen verkar i och själva syftet med kompetensutvecklingen påverkar också om man ska anse kompetensutveckling vara en investering eller inte.

  • 153.
    Agnevall, Paula
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Berättarteknik i J.M. Coetzees Disgrace2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    While Disgrace seems to be written from a single perspective, it is in fact multi-layered. In order to support this claim, this essay investigates what the novel's protagonist sees, how he sees it and who is narrating the story, using respectively the narratological key concepts of internal focalization, fallible filter and covert narration. The essay thereafter studies how the novel has affected readers in South Africa and how it is neccessary to challenge the perspective presented in the novel in order to fully understand the text.

  • 154.
    Agota, Daniel
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Olsson, Rasmus
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Designing customer rewards programs for repeated purchase using optimization methods2015Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    A Customer Rewards Program (CRP) or a loyalty program is characterized by customers being rewarded for repeated purchases. The goal of these programs is to increase sales and profit through offering purchase incentives in the form of delayed rewards, as a result influencing customer behavior and in the end increasing company profit. It is an open debate in the literature if such reward programs are truly profitable for the company running it. This thesis therefore proposes a new approach to designing a CRP based on optimization methods with a focus on maximizing the expected profitability of the program. The key finding of the thesis is that such an approach can be applied to CRPs in order to increase the profitability of the companies running such programs. The approach offers promising results towards applicability to specific business segments and as a result towards maximizing the expected profits resulting from customer rewards programs. Since a largescale CRP may require significant developments on existing infrastructure and can pose high costs through the rewards redeemed during the program, the perspective of being able to maximize profits through fine-tuning the program parameters could be of great help. It can even be crucial to a company considering large investments on necessary developments or aiming to increase the returns on an existing CRP infrastructure. As part of the thesis we have analyzed the – at the time of writing – running CRP programs of several major companies present on the Hungarian market based on publicly available data in order to evaluate the applicability of the proposed optimization approach to real-world CRP designs. The analysis done on these real-world CRP designs indicates that the proposed optimization approach is applicable to a class of CRP designs witnessed to be popular among companies operating in various business segments. We have also investigated Hungary’s largest pharmacy-chain to gain insight into real-world CRP design considerations. Based on guided interviews conducted with the head of marketing at the aforementioned pharmacy-chain we conclude that the relevant information needed for our proposed optimization approach can be available to a company from business data (e.g. through billing and accounting information) readily available in an integrated IT infrastructure. We also conclude that the proposed theoretical results on CRP design are based on valid mathematical assumptions and correlate to accounting considerations related to the introduction of a CRP program.

  • 155.
    Aguilar, David
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Karimibabak, Rozbeh
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Enabling strategic change through business and IT alignment: Challenges for an organization’s management and leadership2014Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The main objective for this thesis is to identify a set of challenges imposed on an organization undergoing strategic change impacting their IT Landscape. Organizations most embark on strategic change initiatives in order to remain competitive and create business value. It is important to understand these challenges imposed during the change process in order to be prepared and able to minimize the negative impact they may have if not handle properly. For this purpose within the scope of this thesis the aim is to identify challenge areas and the specific challenges they may impose. These identified challenges can be used as a baseline for organizations in order to understand which areas to address in order to minimize negative impact during a strategic change related to their IT Landscape. A case study methodology was used in this thesis and relevant research through literature review in identified topics was conducted. Communication, leadership, business value and strategy realization, knowledge management and change management are examined through the theoretical framework and identified as areas in need of attention during a strategic change initiative. Also within the theoretical framework this thesis identifies Enterprise Architecture as an enabler for succeeding with the change initiative related to the IT Landscape. The qualitative empirical data for this thesis was collected through the interview of ten professionals within four different organizations. Based on the above approach, within the scope for this thesis, a set of challenge areas and specific challenges were identified and the conclusion was that these areas are important to address during a strategic change initiative impacting IT Landscape within an organization in order to ensure a successful outcome.

  • 156.
    Agushi, Camrie
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Innovation inom Digital Rights Management2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The thesis deals with the topic of Digital Rights Management (DRM), more specifically the innovation trends within DRM. It is focused on three driving forces of DRM. Firstly, DRM technologies, secondly, DRM standards and thirdly, DRM interoperability. These driving forces are discussed and analyzed in order to explore innovation trends within DRM. In the end, a multi-facetted overview of today’s DRM context is formed. One conclusion is that the aspect of Intellectual Property Rights is considered to be an important indicator of the direction DRM innovation is heading.

  • 157.
    Ahl, Niklas
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Foong, Yingwai
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Mörk, Victor
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Social Marknadsföring: Konsumenters prioritering av funktionella och symboliska värden kopplade till konsumtionenav nötkött.2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Title: Social Marketing: Consumers’ priorities of functional and symbolic values with regards to consumption of beef.

     

    Authors: Ahl Niklas, Foong Yingwai, Mörk Victor

     

    Supervisor: Henrik Sällberg

     

    Department: School of Management, Blekinge Institute of Technology

    Course: Bachelor’s thesis in Business Administration, 15 credits

     

    Purpose: Purpose of this paper is to analyze the circumstances under which social marketing affect the consumer's priority of functional and symbolic values with regards to the consumption of beef.

     

    Method: Written survey followed by interview session with focus on the three different segments of regular consumers of beef, flexitarians and vegetarians. These segments include both consumers and non- consumers of beef. All respondents who activly chose to restrict or refrain beef consumption has to base their decision on reasons which are other than religious.

     

    Results: This paper found possible situations where social marketing influenced the consumer behaviour with regard to beef consumption. This conclusion is based on the fact that all segments included in this paper mainly based their consumer behaviour on social information sources. The result also showed a tendency for the respondents in the segment of flexitarians to both influence and to be influenced by each other's consumer behavior.

     

    Keywords: Social Marketing, Consumption of Beef, Consumer behaviour

  • 158.
    Ahl, Viggo
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    An experimental comparison of five prioritization methods: Investigating ease of use, accuracy and scalability2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Requirements prioritization is an important part of developing the right product in the right time. There are different ideas about which method is the best to use when prioritizing requirements. This thesis takes a closer look at five different methods and then put them into an controlled experiment, in order to find out which of the methods that would be the best method to use. The experiment was designed to find out which method yields the most accurate result, the method’s ability to scale up to many more requirements, what time it took to prioritize with the method, and finally how easy the method was to use. These four criteria combined will indicate which method is more suitable, i.e. be the best method, to use in prioritizing of requirements. The chosen methods are the well-known analytic hierarchy process, the computer algorithm binary search tree, and from the ideas of extreme programming come planning game. The fourth method is an old but well used method, the 100 points method. The last method is a new method, which combines planning game with the analytic hierarchy process. Analysis of the data from the experiment indicates that the planning game combined with analytic hierarchy process could be a good candidate. However, the result from the experiment clearly indicates that the binary search tree yields accurate result, is able to scale up and was the easiest method to use. For these three reasons the binary search tree clearly is the better method to use for prioritizing requirements

  • 159.
    Ahlberg, Mårten
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Liedstrand, Peter
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    24-timmarsmyndighetens användbarhet2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Kommunikationen med myndigheter och förvaltningar via Internet har ökat under de senaste åren. Därför har vi valt att fokusera vårt kandidatarbete på detta områ-de, samt på behovet av användbara webbtjänster för medborgarna. I detta kandi-datarbete studerar vi en växande grupp användare, denna grupp är äldre medbor-gare. Under studien har vi analyserat 24-timmarsmyndighetens användbarhet ge-nom användartester. Kombinationen av samtal och möten med individer, iaktta-gelser av interaktioner och litteraturstudier ger oss möjligheten att utforska använ-darnas behov. Behovet hos användarna är det som är centralt i hur de uppfattar och interagerar med 24-timmarsmyndigheten. Webbplatserna vi har använt oss av vid våra användartester har anknytning till 24-timmarsmyndigheten. Genom att analytiskt studera informationen har vi kommit fram till fem viktiga designförslag och riktlinjer, som vi anser behövs när e-tjänster inom 24-timmarsmyndigheten utvecklas.

  • 160.
    Ahlberg, Tomas
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Anti-Legionella system för tappvarmvatten system2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This thesis contains the product development work towards a, for Alfa Laval Lund AB, alternative product to eradicate Legionella bacteria from domestic hot water systems. The existing product at Alfa Laval Lund AB, the AquaProtect, is having problems to reach costumers with small and medium size systems. The product developed in this thesis should be in a much more attractive price range for small and medium size systems. It should also work in any domestic heating system with circulation. Making it possible for, for example, the vulnerable people at elderly care housings to have Legionella bacteria free water.

  • 161.
    Ahlgren, Emilie
    et al.
    Blekinge Institute of Technology, School of Health Science.
    Bergenmalm, Pamela
    Blekinge Institute of Technology, School of Health Science.
    Äldre personers upplevelser av att leva med cancer: En litteraturstudie2012Student thesis
    Abstract [sv]

    Bakgrund: Cancer drabbar alla ålderskategorier men ses ändå som en åldersrelaterad sjukdom då största delen av de diagnostiserade fallen är personer över 65 år. En äldre person som insjuknar och tvingas leva med cancer ter sig inte på samma sätt som hos en ung människa, då de äldre ofta har ett annorlunda synsätt på sjukdomen än vad yngre personer har. Syfte: Syftet med studien var att belysa äldre personers upplevelser av att leva med cancer. Metod: En litteraturstudie med kvalitativa artiklar användes. Sju vetenskapliga artiklar granskades genom ett granskningsprotokoll och analyserades. Dessa artiklar utgjorde studiens resultat. Resultat: Studien resulterade i fyra teman, existentiella, sociala, fysiska och psykologiska upplevelser. Det visade sig att upplevelserna av att leva med cancer som äldre var många. Bland annat visade det sig att ett socialt stöd, både från anhöriga och hälso- och sjukvården var av stor vikt för att hantera den nya vardag som nu kantades av en cancersjukdom. Även strategier för att hantera sin sjukdom var återkommande i resultatet. Tanken på att största delen av sitt liv låg bakom dem, gjorde sjukdomen mer hanterbar. Slutsats: Upplevelsen av att leva med cancer som äldre är högst individuell. Det sociala stödet är en viktig del i de äldre personernas liv. Många äldre personer upplever även diskriminering på grund av deras höga ålder. Det är därför viktigt att alla behandlas med respekt och värdighet, för att kunna upprätthålla en så god livskvalitet som möjligt. Vi är alla individer med unika personligheter och behov, oavsett ålder.

  • 162.
    Ahlgren, Filip
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Local And Network Ransomware Detection Comparison2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Background. Ransomware is a malicious application encrypting important files on a victim's computer. The ransomware will ask the victim for a ransom to be paid through cryptocurrency. After the system is encrypted there is virtually no way to decrypt the files other than using the encryption key that is bought from the attacker.

    Objectives. In this practical experiment, we will examine how machine learning can be used to detect ransomware on a local and network level. The results will be compared to see which one has a better performance.

    Methods. Data is collected through malware and goodware databases and then analyzed in a virtual environment to extract system information and network logs. Different machine learning classifiers will be built from the extracted features in order to detect the ransomware. The classifiers will go through a performance evaluation and be compared with each other to find which one has the best performance.

    Results. According to the tests, local detection was both more accurate and stable than network detection. The local classifiers had an average accuracy of 96% while the best network classifier had an average accuracy of 89.6%.

    Conclusions. In this case the results show that local detection has better performance than network detection. However, this can be because the network features were not specific enough for a network classifier. The network performance could have been better if the ransomware samples consisted of fewer families so better features could have been selected.

  • 163.
    Ahlgren, Johan
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Karlsson, Robert
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    En studie av inbyggda brandväggar: Microsoft XP och Red Hat Linux2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Detta kandidatarbete utreder hur väl två operativsystems inbyggda brandväggar fungerar i symbios med en användares vanligaste tjänsteutnyttjande på Internet, samt att se hur likartade de är i sitt skydd från hot. De två operativsystemen som vi utgick ifrån var Microsoft Windows XP samt Red Hat Linux 8.0. Den hypotes vi arbetat kring lyder enligt följande: De två inbyggda brandväggarna är i stort likartade rörande skydd från hot på Internet och uppfyller användarnas tjänsteutnyttjande. De metoder vi använt, för att svara på vår frågeställning, har delats upp i ett funktionalitetstest och ett säkerhetstest. I funktionalitetstestet provades de vanligaste Internettjänsterna med den inbyggda brandväggen och ifall det uppstod några komplikationer eller ej. De två inbyggda brandväggarna genom gick i säkerhetstestet skannings- och svaghetskontroll via ett flertal verktyg. Genom resultatet kan vi konstatera att de inbyggda brandväggarna klarar av de vanligaste tjänsterna på Internet, men att en skillnad föreligger hos dem vad gäller exponeringen ut mot Internet. Windows XP ligger helt osynligt utåt, medan Red Hats inbyggda brandvägg avslöjar en mängd information om värddatorn, som kan komma att användas i illvilliga syften. Slutsatsen blev att vi avslutningsvis falsifierade vår hypotes då de två inbyggda brandväggarna ej var jämlika i sitt skydd mot yttre hot på Internet.

  • 164.
    Ahlgren, Lisa
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Vindkraft i Sveriges inland: Vindkraftsplan för Hylte kommun2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Vindkraftsetableringar i Sverige har tidigare endast varit aktuella vid kusten. Stormarna Gudrun och Per visade att det även finns god vindpotential i inlandet. Vindkarteringar över inlandet saknades och därför gjordes en kartering över hela Sverige. Denna visade att det blåser ordentligt på högre höjder även i inlandet. Tack vare ny teknik kan denna vind utnyttjas och därför kan områden som tidigare inte varit aktuella för vindbruk komma ifråga. Riksdagen har satt upp målet att 10 TWh skall komma från vindkraften år 2015. Hylte kommun ligger i Hallands inland och är en brukskommun med ca 10 000 invånare. Karteringar visar att vindkraft lämpar sig väl i stora delar av kommunen. För att undvika en ostrukturerad vindkraftsetablering samt underlätta vid framtida ärenden behöver Hylte en vindkraftsplan. Det finns inget generellt avstånd där vindkraftverken slutar dominera, samverka eller underordna sig landskapet. Lokala förutsättningar tillsammans med anläggningens utformning bestämmer hur stor påverkan ett vindkraftverk har i ett landskap. Vid en vindkraftsetablering finns därför inga generella regler för skyddsavstånd mellan vindkraftverk och byggnader utan varje kommun beslutar hur långt avståndet skall vara. Dock använder de flesta kommunerna ett avstånd på 500-750 m till enstaka hus och 1000 m till samlad bebyggelse. Etablering av vindkraft regleras genom Miljöbalken (MB) samt Plan- och bygglagen (PBL). Styrningen enligt PBL görs i allmänhet av kommunerna medan MB regleras av Länsstyrelsen. Arbetet är uppbyggt i olika delar där bakgrundsdelen ger den grundfakta som gäller generellt för vindkraft vid etableringar. Informationen appliceras på en inlandskommun – Hylte kommun, för att sedan komma fram till ett planförslag.

  • 165.
    Ahlin, Filip
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    Wahlbom, Theodor
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    Bevarandevärd natur i en svensk kontext: En fallstudie i hur landets kommuner hanterar bevarandevärda naturområden i förhållande till Sveriges miljökvalitetsmål.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Detta arbetet utgår från en teori som grundar sig i begreppet “hållbar utveckling” som accepterades ioch med Brundtlandrapporten under senare delen av 80-talet. Denna teori kommer fungera som eninfallsvinkel för hur vi förhåller oss till dagens kunskap och forskning i ämnet, vilket vidare påverkarvårt förhållningssätt till uppsatsens ämne.

    Forskningsöversikten utgår framförallt från Lars Emmelin och Peggy Lermans forskningsrapportStyrning av mark och miljö , där målstyrning i förhållande till Sveriges miljökvalitetsmål läggergrunden för den breda förståelsen för målen som system och begrepp. Forskningsöversikten följs uppav en områdesöversikt vilken inleds med Ekosystemansatsen av Naturvårdsverket, där tolvvägledande principer i arbetet mot ett hållbart nyttjande med naturresurser presenteras. Vi följer sedanupp Naturvårdsverkets rapport med att beskriva vad myndigheterna Boverket, Jordbruksverket,Naturvårdsverket och Skogsstyrelsen verkar för rent deskriptivt i ämnet.

    Vi följer upp områdesöversikten med ett omfattande avsnitt om styrdokument där vi beskriver hur tillexempel avtal, planer och program har påverkat och format dagens planering från Rio de Janeiro 1992till Agenda 2030. Anledningen till detta är att beskriva hur stora delar av händelseförloppet har gåtttill från dess begynnelse till där vi är idag - vilket resulterar i de globala målen och således Sveriges16 miljökvalitetsmål.

    Vår analysdel utgår från att jämföra de översiktsplaner som Gävle, Åre och Lund kommun harsammanställt via tre fallstudier där specifika fall med olika förutsättningar ligger till grund föranalysen och slutsatsen. Resultaten presenteras avslutningsvis i en slutsats där vi genom en tabell(Bild 9) visar på för- och nackdelar med kommunernas arbete i förhållande till våra forskningsfrågoroch syftet för uppsatsen.

  • 166. Ahlin, Kjell
    Comparison of Test Specifications and Measured Field Data2006In: Sound and Vibration, ISSN 0022-460X , Vol. 40, no 9, p. 22-25Article in journal (Refereed)
    Abstract [en]

    It is not always obvious how to compare a given test specification with measured field data. This article presents a systematic method based on the shock response spectrum and the fatigue damage spectrum. A random-on-random test specification for tracked vehicles, AECTP 400, is used as an example.

  • 167. Ahlin, Kjell
    et al.
    Granlund, Johan
    Lindström, Fredric
    Comparing Road Profiles with Vehicle Perceived Roughness2004In: International Journal of Vehicle Design, ISSN 0143-3369, E-ISSN 1741-5314, Vol. 36, no 2-3, p. 270-286Article in journal (Refereed)
    Abstract [en]

    Accurate road profiles are useful in vehicle design, such as for simulation of durability and ride quality. Laser/inertial profilometers typically record I mm wide profiles. The question is how well such a profile matches perceived vehicle wheel roughness. The objective here was to create a more representative wheel track longitudinal profile. Simulated and measured wheel vibration was compared on a 6km long road. Simulations were made for several definitions of the profile. Results for single laser sensor profiles showed reasonable likeness to truck perceived roughness. By far the best likeness (14.5% better) was achieved when the profile was based on triangular 25%-50%-25% weighted data from three sensors in the wheel track. Clearly, vehicle engineers can benefit from using multiple laser profile sensors, instead of a single sensor. This will improve test accuracy, thus reducing vehicle design project lead times and costs.

  • 168. Ahlin, Kjell
    et al.
    Magnevall, Martin
    Josefsson, Andreas
    Simulation of forced response in linear and nonlinear mechanical systems using digital filters2006Conference paper (Refereed)
    Abstract [en]

    There exist many methods to calculate forced response in mechanical systems. Some methods are slow and the errors introduced are unknown. The paper presents a method that uses digital filters and modal superposition. It is shown how aliasing can be avoided as well as phase errors. The parameters describing the mechanical system are residues and poles, taken from FEA models, from lumped MCK systems, from analytic solutions or from experimental modal analysis. Modal damping may be used. The error in the calculation is derived and is shown to be only a function of the sampling frequency used. When the method is applied to linear mechanical systems in MATLAB it is very fast. The method is extended to incorporate nonlinear components. The nonlinear components could be simple, like hardening or stiffening springs, but may also contain memory, like dampers with hysteresis. The simulations are used to generate test data for development and evaluation of methods for identification of non-linear systems.

  • 169.
    Ahlin, Lina
    et al.
    Lund Univ, SWE.
    Andersson, Martin
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Thulin, Per
    Swedish Entrepreneurship Forum, SWE.
    Human capital sorting: The "when" and "who" of the sorting of educated workers to urban regions2018In: Journal of regional science, ISSN 0022-4146, E-ISSN 1467-9787, Vol. 58, no 3, p. 581-610Article in journal (Refereed)
    Abstract [en]

    The sorting of high-ability workers is often advanced as one source of spatial disparities in economic outcomes. There are still few papers that analyze when human capital sorting occurs and whom it involves. Using data on 16 cohorts of university graduates in Sweden, we demonstrate significant sorting to urban regions on high school grades and education levels of parents, i.e., two attributes typically associated with latent abilities that are valued in the labor market. A large part of this sorting has already occurred in deciding where to study, because the top universities in Sweden are predominantly located in urban regions. The largest part of directed sorting on ability indicators occurs in the decision of where to study. Even after controlling for sorting prior to labor market entry, the best and brightest are still more likely to start working in urban regions. However, this effect appears to be driven by Sweden's main metropolitan region, Stockholm. We find no influence of our ability indicators on the probability of starting to work in urban regions after graduation when Stockholm is excluded. Studies of human capital sorting need to account for selection processes to and from universities, because neglecting mobility prior to labor market entry is likely to lead to an underestimation of the extent of the sorting to urban regions.

  • 170.
    Ahlquist, Nina
    Blekinge Institute of Technology, School of Health Science.
    Familjens upplevelser av sin vardag när ett barn i familjen har autism: En litteraturstudie2013Student thesis
    Abstract [sv]

    Bakgrund: Autism är en funktionsnedsättning som påverkar hjärnans kognitiva funktioner. Familjemedlemmar som tillbringar sin vardag tillsammans med ett barn i familjen som har autism, lever i en värld full av utmaningar. Familjerna kan behöva genomgå många livsförändringar, där tid, energi samt välplanerade rutiner är ett krav för att få vardagen att fungera. Syfte: Syftet med studien var att belysa familjens upplevelser av sin vardag när ett barn i familjen har autism. Metod: Studien genomfördes som en litteraturstudie med kvalitativ ansats där åtta kvalitativa artiklar analyserades med en manifest innehållsanalys. Resultat: Analysprocessen resulterade i sex kategorier och sex underkategorier. Resultatet visade att familjerna upplevde att deras vardagliga liv kretsade kring barnet med autism och noggrann planering samt strikta rutiner var nödvändiga för att vardagslivet skulle fungera. Känslor som stress, oro, skuld, rädsla och fråntagande av naturliga upplevelser och framtidsdrömmar, var ständigt närvarande. Familjerna upplevde att autismen bland annat hade inverkan på deras relationer samt hämmade dem i sin vardag gällande medverkan i aktiviteter. Familjerna upplevde även en oförståelse från omgivningen kring barnets autism, vilket gav upphov till en känsla av isolering. Trots dagliga utmaningar upplevde familjerna att autismen gjorde dem mer omtänksamma, förstående och tålmodiga. Slutsats: Familjens liv kretsar kring barnet med autism och inverkar i högsta grad på alla faktorer och situationer som familjen dagligen upplever och möter. En ökad kunskap och förståelse för familjens vardagliga liv kan bidra till en mer familjefokuserad omvårdnad där alla familjemedlemmar bemöts på ett tillfredsställande sätt, involveras i vården av sitt barn eller syskon samt ges stöd och information för att lättare kunna hantera sin livssituation. Utöver ett behov av fler studier inom området är ytterligare förslag på vidare forskning att undersöka hur familjerna hanterar sin vardagliga livssituation, hur de upplever stöd från sin omgivning samt hur de upplever möten med vården.

  • 171.
    Ahlqvist, Christian
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Hedlund, Tobias
    Blekinge Institute of Technology, School of Engineering.
    Hållfasthetsanalys och optimering av pressplatta i balpressar2013Student thesis
    Abstract [sv]

    Nättraby Verktygs AB i Ronneby konstruerar och producerar balpressar vars funktion är att pressa samman kartong, plast eller liknande material till kompakta balar. Dessa balar medför underlättad hantering av material som kan återvinnas för företag. Balpressarna används främst inom verksamhetsområden med stor åtgång av återvinningsbart material, exempelvis livsmedelsaffärer. Problemställningen vid detta examensarbete är att i en äldre version av en balpress har sprickbildning på pressplattan upptäckts efter en viss tids användning. Huvuduppgiften för detta examensarbete har därför varit att utföra hållfasthetsanalyser på pressplattorna för tre olika balpressar i deras sortiment. Denna rapport beskriver momenten samt arbetsgången för att genomföra dessa analyser och beskriver utförligt metoderna som använts. Hållfasthetsanalyserna är uppdelade i två delar, en statisk FEM-analys och en utmattningsanalys av konstruktionen. I den första delen av rapporten genomförs en FEM-analys på den gamla varianten av pressplattan för att se om analysen påvisar samma kritiska områden som företaget upptäckt. Resultatet visade att spänningen var högre i dessa områden än i övriga konstruktionen men under sträckgränsen för materialet. Därför beskriver nästa del av rapporten utförandet av en utmattningsanalys av pressplattan. Denna analys består av en svetsanalys för de svetsförband som finns i de kritiska områdena. Som metod vid svetsanalysen har “hot spot-metoden” använts vilken ger en uppskattning av hur många lastcykler dessa svetsförband kan belastas innan sprickbildning sker. Därefter har samma analyser genomförts på den nuvarande pressplattan och en pressplatta för en kommande modell. I sista delen av rapporten tas ett koncept av en möjlig framtida pressplatta fram där fokus ligger på minskad vikt, minskat antalet detaljer samt ökad hållfasthet. Det framtagna konceptet analyseras på samma sätt som de tidigare tre pressplattorna för att verifiera om detta koncept har ökad hållfasthet och livslängd.

  • 172.
    Ahlqvist, Josephine
    et al.
    Blekinge Institute of Technology, School of Health Science.
    Karlsson, Marike
    Blekinge Institute of Technology, School of Health Science.
    Patienters upplevelser efter att ha insjuknat i sjukdomen stroke: En litteraturstudie2011Student thesis
    Abstract [sv]

    Bakgrunden beskriver att varje år får 30 000 personer i Sverige stroke och det är en sjukdom som kan ge bestående funktionsnedsättningar. Som sjuksköterska är det av betydelse att ha förståelse för hur den enskilda personens upplevelser kan påverkas efter en stroke. Det är viktigt att sjuksköterskan försöker sätta sig in i patientens situation för att kunna samverka för en god och trygg omvårdnad. Vidare är det av vikt att se människan bakom sjukdomen och inte sjukdomen i sig. Syftet med studien var att belysa patienters upplevelser efter att ha insjuknat i sjukdomen stroke. Metoden i studien är en litteraturstudie där åtta vetenskapliga artiklar med kvalitativ ansats utgör studiens resultat. De åtta vetenskapliga artiklarna analyserades utifrån Graneheim och Lundmans (2004) beskrivning av Krippendorffs (1980) innehållsanalys. I Resultatet framkom tre kategorier: Upplevelsen utav träning, Upplevelsen av en främmande kropp och Upplevelsen av ett nytt liv. Dessa tre kategorier beskriver upplevelser som patienter med sjukdomen stroke kan uppleva. Den Slutsats som kan dras är att patienter med sjukdomen stroke kan uppleva träning som en viktig del utav sin återhämtning. Patienter med sjukdomen stroke kunde också uppleva att de är främlingar i sin egen kropp. Det tedde sig som om att det var först när patienterna accepterat sin situation som de kunde gå vidare med sina liv.

  • 173.
    Ahlqvist, Robin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Raymond, Djerf
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    En posthumanistisk animerad framtid2018Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This Bachelor Thesis examines how animation and sound design in a design process can illustrate an equal and responsible technological future, based on post-humanist theories and philosophies. During the work we have examined animation methods, participatory design, sound design and technology as well as technological developments. In this thesis, we present the processes and methods we used to create our conformation, which is an animated short film.

  • 174.
    Ahlstedt, Mikael
    et al.
    Blekinge Institute of Technology, School of Management.
    Linde, Jonas
    Blekinge Institute of Technology, School of Management.
    Open innovation as a strategy for small high–tech companies2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Little academic research has been conducted in the area of open innovation as a strategy used by SMEs in their innovation process. In addition, small companies are subjected to liabilities to smallness and newness, for which open innovation could be the solution. This thesis focuses on two small Swedish high– tech companies. On the one hand we concentrate our studies on a software consultancy company providing programming services, on the other hand, the thesis also look on a small nano–technology company creating their product around material science innovation. The purpose of this study is to investigate what strengths, weaknesses, opportunities and threats these specific high-tech companies perceive in using open innovation in their business model. For accomplishing the investigations we have conducted two case studies. Through a review of relevant literature, a theoretical framework was first constructed, up on which we based the formulation of open-ended questions, to serve as a foundation for further data gathering. For the first case study, data was collected by interviewing the case firm’s CEO and for the second case study we used the participant observation method. The collected data was analysed and discussed in comparison to the literature. Additionally, the findings of each case were schematically evaluated by performing a SWOT analysis on open innovation, as observed by each of our two case firms and related to literature findings. Conclusions. We conclude that small firms are hampered in their innovation and commercialisation process is limitations related to smallness and newness. It was identified that, although limited by financial and structural constrains, small companies are able to use a considerable amount of open innovation aspects in their business model. These being especially those that are less resource demanding, such as employee involvement and co-creation with the customer or with other sources to innovation, like universities. It was also recognized that, while being open when capitalizing on certain aspects of open innovation to boost their innovation and commercialization process, the case firms also recognize the importance for especially small firms to protect the core technology knowledge from being leaked externally, as this is the vital component of their existence.

  • 175.
    Ahlstrand, Anna
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Swang, Heléne
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Prim, Stadsförnyelse i Barcelona2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    This final project discusses renewal and upgrading of the area of Prim. It is discussed how this industrial area can be an attractive neighborhood with a varied range of services and commercial trade. Prim is located 2km north-east of the center of Barcelona. The area boarders to a deep railway valley that historically has separated Prim from its neighboring districts. At present there is almost no housing, services or commercial trade within the area and the industry is discontinued or the existing industrial buildings are derelict. There is also a lack of green recreational areas. Prim is ripe for redevelopment since the municipality of Barcelona is planning to cover the existing railway tracks and build a new train and bus station between the districts. The new station and the covering of the railway lines is a part of the municipality’s future high-speed train project (El AVE). The train is expected to pass Barcelona and Prim by the year 2012 starting in Sevilla/Malaga via Madrid continuing north to Paris. The proposal is preceded by inventory and two analyses: Realistisk Byanalyse and a SWOT-analysis. On the basis of these analyses, areas were identified as the prime needs in the future development of Prim. These elements were: green environments, ecological sustainability, safety and security. These aspects were divided between the authors, by individual interests, into separate segments and makes up the basis for the joint proposal.

  • 176.
    Ahlström, Catharina
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Fridensköld, Kristina
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    How to support and enhance communication: in a student software development project2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This report, in which we have put an emphasis on the word communication, is based on a student software development project conducted during spring 2002. We describe how the use of design tools plays a key role in supporting communication in group activities and to what extent communication can be supported and enhanced by tools such as mock-ups and metaphors in a group project. We also describe a design progress from initial sketches to a final mock-up of a GUI for a postcard demo application.

  • 177.
    Ahlström, Ellinor
    et al.
    Blekinge Institute of Technology, School of Health Science.
    Sjögren, Susanne
    Blekinge Institute of Technology, School of Health Science.
    Vårdande undervisning2005Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Bakgrund: Vid livslång sjukdom ställs den sjuke inför kravet att förändra sitt levnadssätt för att kunna leva ett så bra liv som möjligt med sjukdomen. Patienten måste lära sig klara av den egenvård som sjukdomen kräver. För att patienten skall lära sig och sköta sin egen behandling helt eller delvis blir undervisning ett viktigt inslag. Vid patientundervisning ska patienten uppnå anpassning och handlingskraft, d v s skall lära sig nya sätt att klara av och anpassa sig till dem ändrade levnadsförhållanden och behöver då få ny kunskap och nya färdigheter. Vårdarens uppgift är att göra det möjligt och underlätta lärandet samt att hjälpa patienten att åter bli självständig. Syfte: Syftet med studien är att belysa patienters upplevelser av undervisningens betydelse för egenvård i samband med livslånga sjukdomstillstånd. Metod: Metoden som använts var en litteraturstudie med kvalitativ ansats och baserades på sju vetenskapliga artiklar. Analysmodellen inspirerades av Graneheim & Lundman (2004) latenta innehållsanalys. Resultat: Resultatet visade att patienterna ville vara delaktiga och bli sedda och hörda som enskilda individer i undervisningen. Det ansågs vara mycket viktigt att undervisaren hade ett bra förhållningssätt gentemot patienten. Undervisningen skulle bygga på patienternas individuella behov och informationen skulle uppdateras kontinuerligt. Patienterna ville få så mycket information och kunskap som möjligt for att kunna lära sig sköta sin egenvård och fatta egna beslut for att uppnå självständighet. Diskussion: För att en patient med livslång sjukdom ska kunna lära sig något så krävs det att det finns tillgång till information och kunskap, samt en undervisare som kan göra det möjligt for patienten att lära sig. Undervisarens förhållningssätt är av stor betydelse for att patienten ska känna sig delaktig i den vårdande undervisningen. Slutsats: Undervisningen ska utgå ifrån patientens individuella behov och anpassas efter patientens uppsatta mål. Målet är att patienten skall kunna ta självständiga beslut kring sin egenvård och bli sin egen vårdare.

  • 178.
    Ahlström, Eric
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Holmqvist, Lucas
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Goswami, Prashant
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Comparing Traditional Key Frame and Hybrid Animation2017In: SCA '17 Proceedings of the ACM SIGGRAPH / Eurographics Symposium on Computer Animation, ACM Digital Library, 2017, article id nr. a20Conference paper (Refereed)
    Abstract [en]

    In this research the authors explore a hybrid approach which usesthe basic concept of key frame animation together with proceduralanimation to reduce the number of key frames needed for an animationclip. The two approaches are compared by conducting anexperiment where the participating subjects were asked to ratethem based on their visual appeal.

  • 179.
    Ahlström, Evelina
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Svanberg, Therese
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Att vara kvinna och leva med Multipel Skleros: En litteraturstudie baserad på patografier2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Bakgrund: Multipel skleros är en kronisk sjukdom som påverkar det centrala nervsystemet genom att nervcellsutskotten blir inflammerade. Det är nästan dubbelt så många kvinnor än män som insjuknar i sjukdomen. När sjukdomen bryter ut är de flesta mitt i livet och sjukdomen kan orsaka många år av lidande och funktionshinder. 

    Syfte: Syftet med studien var att beskriva kvinnors upplevelser av att leva med Multipel Skleros.

    Metod: En kvalitativ litteraturstudie baserad på tre patografier. Innehållsanalysen utfördes manifest med latenta inslag utifrån Lundman och Hällgren Graneheims tolkning av innehållsanalys. 

    Resultat: Analysen resulterade i fyra kategorier. I kategorin Kroppsliga förändringar framkom att kvinnor med sjukdomen Multipel skleros upplever att deras kropp förändrades med sjukdomen. I kategorin Emotionella konsekvenser av sjukdomen framkom att kvinnor upplever en känsla av skam, rädsla och sorg. I kategorin Tankar om framtiden framkom att kvinnor upplever positiva tankar om framtiden och tankar om döden. I sista kategorin Omgivningens betydelse framkom kvinnors upplevelser av att vara beroende av andra och att de kände tacksamhet till omgivningen. 

    Slutsats: Genom att öka kunskapen och förståelsen för kvinnors upplevelse av att leva med sjukdomen MS, kan sjuksköterskan ge en mer personcentrarad vård och hjälpa till att stärka kvinnornas välbefinnande. Sjuksköterskan bör ta hänsyn till kvinnor med sjukdomen MS behov av hjälp och stöd för att bedriva en god omvårdnad utifrån det individuella behovet. Deras anhöriga kan också vara i behov av stöd och deras delaktighet i omvårdnaden bör även tas hänsyn till. Sjuksköterskan bör även se till så att de anhöriga blir avlastade om det behövs och att deras delaktighet i vården ska vara på kvinnor med sjukdomen MS egna villkor.

  • 180.
    Ahlström, Robert
    et al.
    Blekinge Institute of Technology.
    Ahnlund, Anna-Ella
    Blekinge Institute of Technology.
    Att kommunicera med personer med demenssjukdom: En litteraturstudie om alternativa kommunikationsmetoder2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Bakgrund: I takt med att allt fler människor lever längre ökar också antalet personer som insjuknar i demenssjukdom. Språklig och kognitiv svikt är typiska symtom vid demenssjukdom och på grund av detta upplever sjuksköterskor i många fall svårigheter i kommunikationen. Brister i kommunikationen kan påverka omvårdnaden negativt. Genom en ökad kunskap om alternativa kommunikationsmetoder, som kan främja kommunikationsförmågan, kan vården av personer med demenssjukdom underlättas och bli mer personcentrerad. Tidigare studier visar att alternativa kommunikationsmetoder kan påverka kommunikationsförmågan positivt. En litteraturstudie som sammanfattar forskningen inom området kan ge en tydligare bild av alternativa kommunikationsmetoders olika möjligheter.

    Syfte: Syftet med studien var att beskriva på vilket sätt alternativa kommunikationsmetoder kan främja och ta tillvara kommunikationsförmågan hos personer med demenssjukdom.

    Metod: En litteraturstudie baserad på nio vetenskapliga artiklar med kvalitativ design genomfördes. Artiklarnas resultat analyserades utifrån Graneheim och Lundmans beskrivning av innehållsanalys.

    Resultat: Resultatet visar att alternativa kommunikationsmetoder kan bidra till att öka kommunikationsförmågan för personer med demenssjukdom. Både förmågan att uttrycka sig verbalt och icke verbalt förbättrades, men även samspel och samspelsförmågan ökade. När alternativa kommunikationsmetoder användes i grupp bidrog de även till att öka möjligheten till social kommunikation och fördjupade relationer mellan deltagarna.

    Slutsats: En ökad kunskap om alternativa kommunikationsmetoders påverkan på kommunikationsförmågan kan leda till ökade möjligheter för sjuksköterskor och annan vårdpersonal att kommunicera med personer med demenssjukdom.

  • 181. Ahmad, A
    et al.
    Shahzad, Aamir
    Padmanabhuni, Kumar
    Mansoor, Ali
    Joseph, Sushma
    Arshad, Zaki
    Requirements prioritization with respect to Geographically Distributed Stakeholders2011Conference paper (Refereed)
    Abstract [en]

    Requirements selection for software releases can play a vital role in the success of software product. This selection of requirements is done by different requirements prioritization techniques. This paper discusses limitations of these Requirements Prioritization Techniques (100$ Method and Binary Search Tree) with respect to Geographical Distribution of Stakeholders. We conducted two experiments, in this paper, in order to analyze the variations among the results of these Requirements Prioritization Techniques. This paper also discusses attributes that can affect the requirements prioritization when dealing with Geographically Distributed Stakeholders. We conducted first experiment with 100$ Dollar method and Binary Search Tree technique and second experiment has been conducted with modified 100$ Dollar method and Binary search tree technique. Results of these experiments have been discussed in this paper. This paper provides a framework that can be used to identify those requirements that can play an important role in a product success during distributed development.

  • 182.
    Ahmad, Arshad
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Khan, Hashim
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    The Importance of Knowledge Management Practices in Overcoming the Global Software Engineering Challenges in Requirements Understanding2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Going offshore has become a norm in current software organizations due to several benefits like availability of competent people, cost, proximity to market and customers, time and so on. Despite the fact that Global Software Engineering (GSE) offers many benefits to software organizations but it has also created several challenges/issues for practitioners and researchers like culture, communication, co-ordination and collaboration, team building and so on. As Requirements Engineering (RE) is more human intensive activity and is one of the most challenging and important phase in software development. Therefore, RE becomes even more challenging when comes to GSE context because of culture, communication, coordination, collaboration and so on. Due to the fore mentioned GSE factors, requirements’ understanding has become a challenge for software organizations involved in GSE. Furthermore, Knowledge Management (KM) is considered to be the most important asset of an organization because it not only enables organizations to efficiently share and create knowledge but also helps in resolving culture, communication and co-ordination issues especially in GSE. The aim of this study is to present how KM practices helps globally dispersed software organizations in requirements understanding. For this purpose a thorough literature study is performed along with interviews in two industries with the intent to identify useful KM practices and challenges of requirements understanding in GSE. Then based on the analysis of identified challenges of requirements understanding in GSE both from literature review and industrial interviews, useful KM practices are shown and discussed to reduce requirements understanding issues faced in GSE.

  • 183. Ahmad, Azeem
    et al.
    Göransson, Magnus
    Shahzad, Aamir
    Limitations of the analytic hierarchy process technique with respect to geographically distributed stakeholders2010In: Proceedings of World Academy of Science, Engineering and Technology, ISSN 2010-376X, E-ISSN 2070-3740, Vol. 70, no Sept., p. 111-116Article in journal (Refereed)
    Abstract [en]

    The selection of appropriate requirements for product releases can make a big difference in a product success. The selection of requirements is done by different requirements prioritization techniques. These techniques are based on pre-defined and systematic steps to calculate the requirements relative weight. Prioritization is complicated by new development settings, shifting from traditional co-located development to geographically distributed development. Stakeholders, connected to a project, are distributed all over the world. These geographically distributions of stakeholders make it hard to prioritize requirements as each stakeholder have their own perception and expectations of the requirements in a software project. This paper discusses limitations of the Analytical Hierarchy Process with respect to geographically distributed stakeholders' (GDS) prioritization of requirements. This paper also provides a solution, in the form of a modified AHP, in order to prioritize requirements for GDS. We will conduct two experiments in this paper and will analyze the results in order to discuss AHP limitations with respect to GDS. The modified AHP variant is also validated in this paper.

  • 184.
    Ahmad, Azeem
    et al.
    Blekinge Institute of Technology, School of Computing.
    Kolla, Sushma Joseph
    Blekinge Institute of Technology, School of Computing.
    Effective Distribution of Roles and Responsibilities in Global Software Development Teams2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Industry is moving from co-located form of development to a distributed development in order to achieve different benefits such as cost reduction, access to skillful labor and around the clock working etc. This transfer requires industry to face different challenges such as communication, coordination and monitoring problems. Risk of project failure can be increased, if industry does not address these problems. This thesis is about providing the solutions of these problems in term of effective roles and responsibilities that may have positive impact on GSD team. Objectives. In this study we have developed framework for suggesting roles and responsibilities for GSD team. This framework consists of problems and casual dependencies between them which are related to team’s ineffectiveness, then suggestions in terms of roles and responsibilities have been presented in order to have an effective team in GSD. This framework, further, has been validated in industry through a survey that determines which are the effective roles and responsibilities in GSD. Methods. We have two research methods in this study 1) systematic literature review and 2) survey. Complete protocol for planning, conducting and reporting the review as well as survey has been described in their respective sections in this thesis. A systematic review is used to develop the framework whereas survey is used for framework validation. We have done static validation of framework. Results. Through SLR, we have identified 30 problems, 33 chains of problems. We have identified 4 different roles and 40 different responsibilities to address these chains of problems. During the validation of the framework, we have validated the links between suggested roles and responsibilities and chains of problems. Addition to this, through survey, we have identified 20 suggestions that represents strong positive impact on chains of problems in GSD in relation to team’s effectiveness. Conclusions. We conclude that implementation of effective roles and responsibilities in GSD team to avoid different problems require considerable attention from researchers and practitioners which can guarantee team’s effectiveness. Implementation of proper roles and responsibilities has been mentioned as one of the successful strategies for increasing team’s effectiveness in the literature, but which particular roles and responsibilities should be implemented still need to be addressed. We also conclude that there must be basic responsibilities associated with any particular role. Moreover, we conclude that there is a need for further development and empirical validation of different frameworks for suggesting roles and responsibilities in full scale industry trials.

  • 185.
    Ahmad, Ehsan
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Raza, Bilal
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Towards Optimization of Software V&V Activities in the Space Industry [Two Industrial Case Studies]2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Developing software for high-dependable space applications and systems is a formidable task. With new political and market pressures on the space industry to deliver more software at a lower cost, optimization of their methods and standards need to be investigated. The industry has to follow standards that strictly sets quality goals and prescribes engineering processes and methods to fulfill them. The overall goal of this study is to evaluate if current use of ECSS standards is cost efficient and if there are ways to make the process leaner while still maintaining the quality and to analyze if their V&V activities can be optimized. This paper presents results from two industrial case studies of companies in the European space industry that are following ECSS standards and have various V&V activities. The case studies reported here focused on how the ECSS standards were used by the companies and how that affected their processes and how their V&V activities can be optimized.

  • 186. Ahmad, Ehsan
    et al.
    Raza, Bilal
    Feldt, Robert
    Assessment and support for software capstone projects at the undergraduate level: A survey and rubrics2011Conference paper (Refereed)
    Abstract [en]

    Software engineering and computer science students conduct a capstone project during the final year of their degree programs. These projects are essential in validating that students have gained required knowledge and they can synthesize and use that knowledge to solve real world problems. However, the external requirements on educational programs often do not provide detailed guidelines for how to conduct or support these capstone projects, which may lead to variations among universities. This paper presents the results from a survey conducted at 19 different Pakistani universities of the current management practices and assessment criteria used for the capstone project courses at Undergraduate level. Based upon the results of this survey and similar work on Master Thesis capstone projects in Sweden, we present assessment rubrics for software-related undergraduate capstone projects. We also present recommendations for the continuous improvement of capstone projects.

  • 187.
    Ahmad, Junaid
    et al.
    Blekinge Institute of Technology, School of Management.
    Majid, Muhammad Abdul
    Blekinge Institute of Technology, School of Management.
    Benchmarking of Financial Solutions Offered by Islamic Banks2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    There has been significant growth in Islamic banking sector over the last two decades and this market has become very competitive in many Islamic countries. Islamic banking products are regulated by law of Islam and regulatory authority in that particular country. Our main objective is that given the standards of Islamic financial systems, are the Islamic banks compliance with those principles. Some specific banks will be selected and so shall be the scope of standards. The solutions implemented by Islamic banks will be analyzed critically against these standards and suggestions for improvement will be presented. The secondary objective is to compare specific products offered by Islamic banks with corresponding products of conventional banks (competitors working in same country and thus regulated by same government body). Then we will present critical analysis of both products in terms of monetary value and conditions imposed by each bank.

  • 188.
    Ahmad, Kanar
    et al.
    Blekinge Institute of Technology, School of Health Science.
    Al-Shatrawi, Zahra
    Blekinge Institute of Technology, School of Health Science.
    Jag väger för mycket! Kvinnor med Anorexia Nervosas upplevelse av mötet med vårdpersonal.2009Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Bakgrund: Anorexia nervosa är en störning som kännetecknas som avsiktlig viktnedgång, framkallad och vidmakthållen av patienten själv. Dessa patienter saknar sjukdomsinsikt vilket förvärrar relationen mellan dem och vårdpersonalen. Sjukdomen har tre olika faser i utvecklingen och drabbar främst flickor i åldrarna 12-20 år. Syftet: Syftet med studien var att belysa hur kvinnor med anorexia nervosa upplever mötet med vårdpersonalen. Metod: En litteraturstudie som baserades på tre självbiografiska böcker utfördes. Burnards analysmetod användes med modifikationer, där tolv steg användes i studien. Resultat: På olika sätt uttryckte kvinnorna att de kände sig missförstådda av vårdpersonalen. Panikkänslor förekom ofta när vårdpersonalen påpekade hur magra de var. Diskussion: För kvinnor med anorexia nervosa var självständighet något som ansågs vara oerhört värdefullt. När de medverkade i sin behandling resulterade det i en bättre vårdrelation. Slutsats: Resultatet visade att adekvat och uppdaterad utbildning av vårdpersonal resulterade i mindre vårdlidande och ett positivt patientmöte med kvinnor som led av anorexia nervosa.

  • 189.
    Ahmad, Khalid
    et al.
    Blekinge Institute of Technology, School of Management.
    Azumah, Kenneth
    Blekinge Institute of Technology, School of Management.
    Employee Retention Strategies: the case of a patent firm in Australia2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Retaining employees is an important goal of every organization. This thesis explores the factors that can significantly impact employee retention in an organisation. It attempts to relate some of the factors discovered to major theories such as the Employee Equity Model, Herzberg’s (Two-Factor) Theory and the Job Embeddedness Theory. The literature surveyed by this study mention employee motivation, job satisfaction and job embeddedness as the main factors that influence employee retention rates. The study proposes that job embeddedness is a superior model that significantly explains employee retention. The population for the study were 53 respondents out of 75 taken from a patent firm in Australia, a representation of the rapidly growing knowledge industry. The participants of the survey were contacted through private email and selected for the study by simple random sampling done via the listing of the employee names in a spreadsheet program. The survey questions were categorized under six major theories of employee retention with each category having an average of five questions. Four most significant theories emerging were compared and the theory best explaining employee retention was chosen. The four most significant theories were Employee Equity Model, Herzberg’s (Two-Factor) Theory and the Job Embeddedness Theory, and the one that most explains employee retention was Herzberg’s (Two-Factor) Theory. This implies that notwithstanding the age of the Two-Factor theory, it is still significant for managing employee retention in today’s rapidly expanding service- and knowledge-based organizations.

  • 190.
    AHMAD, MUHAMMAD ZEESHAN
    Blekinge Institute of Technology, School of Engineering.
    Comparative Analysis of Iptables and Shorewall2012Student thesis
    Abstract [en]

    The use of internet has increased over the past years. Many users may not have good intentions. Some people use the internet to gain access to the unauthorized information. Although absolute security of information is not possible for any network connected to the Internet however, firewalls make an important contribution to the network security. A firewall is a barrier placed between the network and the outside world to prevent the unwanted and potentially damaging intrusion of the network. This thesis compares the performance of Linux packet filtering firewalls, i.e. iptables and shorewall. The firewall performance testing helps in selecting the right firewall as needed. In addition, it highlights the strength and weakness of each firewall. Both firewalls were tested by using the identical parameters. During the experiments, recommended benchmarking methodology for firewall performance testing is taken into account as described in RFC 3511. The comparison process includes experiments which are performed by using different tools. To validate the effectiveness of firewalls, several performance metrics such as throughput, latency, connection establishment and teardown rate, HTTP transfer rate and system resource consumption are used. The experimental results indicate that the performance of Iptables firewall decreases as compared to shorewall in all the aspects taken into account. All the selected metrics show that large numbers of filtering rules have a negative impact on the performance of both firewalls. However, UDP throughput is not affected by the number of filtering rules. The experimental results also indicate that traffic sent with different packet sizes do not affect the performance of firewalls.

  • 191.
    Ahmad, Nadeem
    et al.
    Blekinge Institute of Technology, School of Computing.
    Habib, M. Kashif
    Blekinge Institute of Technology, School of Computing.
    Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security of the network.

  • 192.
    Ahmad, Naseer
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Security Issues in Wireless Systems2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    ireless Communication is one of the fields of Telecommunications which is growing with the tremendous speed. With the passage of time wireless communication devices are becoming more and more common. It is not only the technology of business but now people are using it to perform their daily tasks, be it for calling, shopping, checking their emails or transfer their money. Wireless communication devices include cellular phones, cordless phones and satellite phones, smart phones like Personal Digital Assistants (PDA), two way pagers, and lots of their devices are on their way to improve this wireless world. In order to establish two way communications, a wireless link may be using radio waves or Infrared light. The Wireless communication technologies have become increasingly popular in our everyday life. The hand held devices like Personal Digital Assistants (PDA) allow the users to access calendars, mails, addresses, phone number lists and the internet. Personal digital assistants (PDA) and smart phones can store large amounts of data and connect to a broad spectrum of networks, making them as important and sensitive computing platforms as laptop PCs when it comes to an organization’s security plan. Today’s mobile devices offer many benefits to enterprises. Mobile phones, hand held computers and other wireless systems are becoming a tempting target for virus writers. Mobile devices are the new frontier for viruses, spam and other potential security threats. Most viruses, Trojans and worms have already been created that exploit vulnerabilities. With an increasing amount of information being sent through wireless channels, new threats are opening up. Viruses have been growing fast as handsets increasingly resemble small computers that connect with each other and the internet. Hackers have also discovered that many corporate wireless local area networks (WLAN) in major cities were not properly secured. Mobile phone operators say that it is only a matter of time before the wireless world is hit by the same sorts of viruses and worms that attack computer software.

  • 193.
    Ahmad, Raheel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    On the Scalability of Four Multi-Agent Architectures for Load Control Management in Intelligent Networks2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Paralleling the rapid advancement in the network evolution is the need for advanced network traffic management surveillance. The increasing number and variety of services being offered by communication networks has fuelled the demand for optimized load management strategies. The problem of Load Control Management in Intelligent Networks has been studied previously and four Multi-Agent architectures have been proposed. The objective of this thesis is to investigate one of the quality attributes namely, scalability of the four Multi-Agent architectures. The focus of this research would be to resize the network and study the performance of the different architectures in terms of Load Control Management through different scalability attributes. The analysis has been based on experimentation through simulations. It has been revealed through the results that different architectures exhibit different performance behaviors for various scalability attributes at different network sizes. It has been observed that there exists a trade-off in different scalability attributes as the network grows. The factors affecting the network performance at different network settings have been observed. Based on the results from this study it would be easier to design similar networks for optimal performance by controlling the influencing factors and considering the trade-offs involved.

  • 194.
    Ahmad, Saleem Zubair
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Analyzing Suitability of SysML for System Engineering Applications2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    During last decade UML have to face different tricky challenges. For instance as a single unified, general purpose modeling language it should offer simple and explicit semantic which can be applicable to wide range of domains. Due to significant shift of focus from software to system “software-centric” attitude of UML has been exposed. So need of certain domain specific language is always there which can address problems of system rather then software only i.e. motivation for SysML. In this thesis SysML is evaluated to analyze its suitability for system engineering applications. A evaluation criteria is established, through which appropriateness of SysML is observed over system development life cycle. The study is conducted by taking case example of real life i.e. automobile product. Results of research not only provide an opportunity to get inside into SysML architecture but also offer an idea of SysML appropriateness for multidisciplinary product development

  • 195.
    Ahmad, Waqar
    et al.
    Blekinge Institute of Technology, School of Computing.
    Riaz, Asim
    Blekinge Institute of Technology, School of Computing.
    Predicting Friendship Levels in Online Social Networks2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Abstract Context: Online social networks such as Facebook, Twitter, and MySpace have become the preferred interaction, entertainment and socializing facility on the Internet. However, these social network services also bring privacy issues in more limelight than ever. Several privacy leakage problems are highlighted in the literature with a variety of suggested countermeasures. Most of these measures further add complexity and management overhead for the user. One ignored aspect with the architecture of online social networks is that they do not offer any mechanism to calculate the strength of relationship between individuals. This information is quite useful to identify possible privacy threats. Objectives: In this study, we identify users’ privacy concerns and their satisfaction regarding privacy control measures provided by online social networks. Furthermore, this study explores data mining techniques to predict the levels/intensity of friendship in online social networks. This study also proposes a technique to utilize predicted friendship levels for privacy preservation in a semi-automatic privacy framework. Methods: An online survey is conducted to analyze Facebook users’ concerns as well as their interaction behavior with their good friends. On the basis of survey results, an experiment is performed to justify practical demonstration of data mining phases. Results: We found that users are concerned to save their private data. As a precautionary measure, they restrain to show their private information on Facebook due to privacy leakage fears. Additionally, individuals also perform some actions which they also feel as privacy vulnerability. This study further identifies that the importance of interaction type varies while communication. This research also discovered, “mutual friends” and “profile visits”, the two non-interaction based estimation metrics. Finally, this study also found an excellent performance of J48 and Naïve Bayes algorithms to classify friendship levels. Conclusions: The users are not satisfied with the privacy measures provided by the online social networks. We establish that the online social networks should offer a privacy mechanism which does not require a lot of privacy control effort from the users. This study also concludes that factors such as current status, interaction type need to be considered with the interaction count method in order to improve its performance. Furthermore, data mining classification algorithms are tailor-made for the prediction of friendship levels.

  • 196.
    Ahmad, Waqas
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Aslam, Muhammad Kashif
    Blekinge Institute of Technology, School of Engineering.
    An investigation of Routing Protocols in Wireless Mesh Networks (WMNs) under certain Parameters2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Wireless Mesh Networks (WMNs) are bringing revolutionary change in the field of wireless networking. It is a trustworthy technology in applications like broadband home networking, network management and latest transportation systems. WMNs consist of mesh routers, mesh clients and gateways. It is a special kind of wireless Ad-hoc networks. One of the issues in WMNs is resource management which includes routing and for routing there are particular routing protocols that gives better performance when checked with certain parameters. Parameters in WMNs include delay, throughput, network load etc. There are two types of routing protocols i.e. reactive protocols and proactive protocols. Three routing protocols AODV, DSR and OLSR have been tested in WMNs under certain parameters which are delay, throughput and network load. The testing of these protocols will be performed in the Optimized Network Evaluation Tool (OPNET) Modeler 14.5. The obtained results from OPNET will be displayed in this thesis in the form of graphs. This thesis will help in validating which routing protocol will give the best performance under the assumed conditions. Moreover this thesis report will help in doing more research in future in this area and help in generating new ideas in this research area that will enhance and bring new features in WMNs.

  • 197.
    Ahmad, Zunnurain
    Blekinge Institute of Technology, School of Engineering.
    Design and Implementation of Quasi Planar K-Band Array Antenna Based on Travelling Wave Structures2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Designing antenna arrays based on travelling wave structures has been studied extensively during the past couple of decades and literature on several array topologies is present. It has been an active area of research as constant improvement of antenna arrays is desired for different communication systems developed. Slotted waveguide antennas are one form of travelling wave structures which is adapted in this study due to several advantages offered over other planar array structures. Waveguide slots have been used for a couple of decades as radiating elements. Several design studies have been carried out regarding use of slots with different orientations and geometry and cascading them together to be used as array antennas. Waveguide antennas are preferred as they provide low losses in the feed structure and also offer good radiation characteristics. This study provides a design procedure for implementing a circular polarized planar antenna array based on slotted waveguide structures. The antenna is designed to work in the 19.7 - 20.2 GHz range which is the operating frequency for the downlink of satellites.

  • 198.
    Ahmadi Mehri, Vida
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    An Investigation of CPU utilization relationship between host and guests in a Cloud infrastructure2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Cloud computing stands as a revolution in IT world in recent years. This technology facilitates resource sharing by reducing hardware costs for business users and promises energy efficiency and better resource utilization to the service providers. CPU utilization is a key metric considered in resource management across clouds.

    The main goal of this thesis study is directed towards investigating CPU utilization behavior with regard to host and guest, which would help us in understanding the relationship between them. It is expected that perception of these relationships would be helpful in resource management.

    Working towards our goal, the methodology we adopted is experi- mental research. This involves experimental modeling, measurements and observations from the results. The experimental setup covers sev- eral complex scenarios including cloud and a standalone virtualization system. The results are further analyzed for a visual correlation.

    Results show that CPU utilization in cloud and virtualization sce- nario coincides. More experimental scenarios are designed based on the first observations. The obtaining results show the irregular behav- ior between PM and VM in variable workload.

    CPU utilization retrieved from both cloud and a standalone system is similar. 100% workload situations showed that CPU utilization is constant with no correlation co-efficient obtained. Lower workloads showed (more/less) correlation in most of the cases in our correlation analysis. It is expected that more number of iterations can possibly vary the output. Further analysis of these relationships for proper resource management techniques will be considered. 

  • 199.
    Ahmadi Mehri, Vida
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Towards Secure Collaborative AI Service Chains2019Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    At present, Artificial Intelligence (AI) systems have been adopted in many different domains such as healthcare, robotics, automotive, telecommunication systems, security, and finance for integrating intelligence in their services and applications. The intelligent personal assistant such as Siri and Alexa are examples of AI systems making an impact on our daily lives. Since many AI systems are data-driven systems, they require large volumes of data for training and validation, advanced algorithms, computing power and storage in their development process. Collaboration in the AI development process (AI engineering process) will reduce cost and time for the AI applications in the market. However, collaboration introduces the concern of privacy and piracy of intellectual properties, which can be caused by the actors who collaborate in the engineering process.  This work investigates the non-functional requirements, such as privacy and security, for enabling collaboration in AI service chains. It proposes an architectural design approach for collaborative AI engineering and explores the concept of the pipeline (service chain) for chaining AI functions. In order to enable controlled collaboration between AI artefacts in a pipeline, this work makes use of virtualisation technology to define and implement Virtual Premises (VPs), which act as protection wrappers for AI pipelines. A VP is a virtual policy enforcement point for a pipeline and requires access permission and authenticity for each element in a pipeline before the pipeline can be used.  Furthermore, the proposed architecture is evaluated in use-case approach that enables quick detection of design flaw during the initial stage of implementation. To evaluate the security level and compliance with security requirements, threat modeling was used to identify potential threats and vulnerabilities of the system and analyses their possible effects. The output of threat modeling was used to define countermeasure to threats related to unauthorised access and execution of AI artefacts.

  • 200.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering. Blekinge Institute of technology.
    Ilie, Dragos
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Tutschku, Kurt
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Privacy and DRM Requirements for Collaborative Development of AI Application2018In: ACM International Conference Proceeding Series, 2018, article id 3233268Conference paper (Refereed)
    Abstract [en]

    The use of data is essential for the capabilities of Data-driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other.

    This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 

1234567 151 - 200 of 13556
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf