Change search
Refine search result
2345678 201 - 250 of 4803
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 201.
    Andersson, Måns
    Blekinge Institute of Technology, School of Computing.
    Data Compression for use in the Short Messaging System2010Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Data compression is a vast subject with a lot of different algorithms. All algorithms are not good at every task and this thesis takes a closer look on compression of small files in the range of 100-300 bytes having in mind that the compressed output are to be sent over the Short Messaging System (SMS). Some well-known algorithms are tested for compression ratio and two of them, the Algorithm Λ, and the Adaptive Arithmetic Coding, are chosen to get a closer understanding of and then implement in the Java language. Those implementations are tested alongside the first tested implementations and one of the algorithms are chosen to answer the question ”Which compression algorithm is best suited for compression of data for use in Short Messaging System messages?”.

  • 202.
    Andersson, Patrik
    Blekinge Institute of Technology, School of Computing.
    Voxelbaserad rendering med "Marching Cubes"-algoritmen2009Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    There are lots of different methods and techniques for three-dimensional rendering, everyone with different advantages and disadvantages that suits different applications. Voxel-based rendering has been used frequently within the scientific area, mainly within medicin for visualization of volumetric data. The technique is now used within many different areas for three-dimensional rendering, e.g. in computer games, in mathematical applications and in geological reconstruction. In this report voxel-based rendering with Marching Cubes algorithm will be researched to see how it suits for real-time applications. The area will partly be dealt with theoretically, but also practically as an implementation of Marching Cubes was done to run some tests to see how the performance was affected. From the tests it appeared cleary that the algorithm is well suited for real-time applications and today's graphics card. Though some optimization is needed to fully take advantage of it.

  • 203.
    Andersson, Patrik
    et al.
    Blekinge Institute of Technology, School of Computing.
    Johansson, Sakarias
    Blekinge Institute of Technology, School of Computing.
    Rendering with Marching Cubes, looking at Hybrid Solutions2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Marching Cubes is a rendering technique that has many advantages for a lot of areas. It is a technique for representing scalar fields as a three-dimensional mesh. It is used for geographical applications as well as scientific ones, mainly in the medical industry to visually render medical data of the human body. But it's also an interesting technique to explore for the usage in computer games or other real-time applications since it can create some really interesting rendering. The main focus in this paper is to present a novel hybrid solution using marching cubes and heightmaps to render terrain; moreover, to find if it’s suitable for real-time applications. The paper will follow a theoretical approach as well as an implementational one on the hybrid solution. The results across several tests for different scenarios show that the hybrid solution works well for today's real-time applications using a modern graphics card and CPU (Central Processing Unit).

  • 204.
    Andersson, Petter
    et al.
    Blekinge Institute of Technology, School of Computing.
    Ericsson, Eric
    Blekinge Institute of Technology, School of Computing.
    Jämförelse av funktionsbibliotek för JavaScript2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    När de traditionella skrivbordsapplikationerna görs om till webbapplikationer, ställer det krav på JavaScript som används mer och mer för att få fram ett responsivt gränssnitt på webben. För att underlätta utvecklingen av JavaScriptapplikationer har ett antal funktionsbibliotek skapats. I vår studie undersöker vi därför vilket av de två populäraste JavaScriptbiblioteken idag, jQuery och Prototype, som presterar bäst i dagens mest använda webbläsare. Dessa tester har utförts i ett testramverk som vi själva utvecklat för att vara webbläsaroberoende och inte kräva något av de bibliotek vi testar. Testerna är uppdelade i fyra testfall som körs 20 gånger för att ge ett mer tillförlitligt resultat. Vi har testat hur varje bibliotek hanterar traversering och manipulation av DOM-trädet, sätter och hämtar stilar och attribut på element i DOM-trädet och hanterar event på element i DOM-trädet. Testerna visade att biblioteket Prototype presterade bättre på alla utom ett testfall i majoriteten av våra utvalda webbläsare; det enda testfallet där jQuery presterade bättre än Prototype var där DOM-trädet skulle manipuleras. Trots att Prototype inte alls är lika omtalat som jQuery, verkar det vara ett bättre bibliotek att använda till webbapplikationer som ska ha ett interaktivt gränssnitt då det i flertalet av våra tester presterar bättre.

  • 205.
    Andersson, Robin
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Analys av Arbetsmiljöverkets tillämpning av enkätverktyget NOSACQ-502013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    År 2013 införde Arbetsmiljöverket ett nytt webbaserat enkätverktyg som skall kunna ge ett mått av säkerhetskulturen hos företag och organisationer. Denna enkät baserades på tidigare forskning som tog fram en enkät, NOSACQ-50, för just detta ändamål. Värt att notera är att Arbetsmiljöverkets version är förkortad där vissa påståenden togs bort och vissa skrevs om. Det är detta som analysen behandlar. Hur påverkas resultaten av dessa förändringar som genomfördes av Arbetsmiljöverket? Analysen undersöker den möjliga felmarginalen på två olika sätt. Först räknas en teoretisk felmarginal ut som påvisar hur mycket resultatet kan skilja sig. Därefter analyseras resultaten från enkätundersökningen med samma variabler som fastställdes i den teoretiska analysen. Det visar sig att Arbetsmiljöverkets version av enkäten kan ge upphov till en felmarginal på närmare 0,8175 poäng. Denna marginal är förvånansvärt stor även om den baserar sig på en väldigt osannolik situation. Vid nästa del av analysen visar det sig att enkätundersökningen har en felmarginal på <0,00 poäng, vilket innebär att resultatet inte påverkas i någon större utsträckning. Detta ger ett intressant slutresultat där det påvisats en stor felmarginal i teorin, men som i praktiken är närmare obefintlig. Hur resultatet skall tolkas är inte helt klart. Det finns ett antal felkällor som måste beaktas, såsom lågt deltagarantal i undersökningen. Analysen bygger även i stor utsträckning på subjektiva bedömningar, vilket minskar trovärdigheten för resultaten. Därav har författaren dragit slutsatsen att det finns en uppenbar skillnad i resultaten mellan analysobjekten i teorin. Dock finns det inte tillräckligt med data för att fastställa någon skillnad i praktiken. Det går inte heller att avgöra huruvida den teoretiska analysen och dess resultat stämmer, endast att skillnaden finns där.

  • 206.
    Andersson, Thomas
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Arnevill, Anita
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    How can business partners establish a relationship of trust in order to share Web Services?2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Introduction Web Services is a relatively new concept to distributed data systems. It provides a new way for companies to easily integrate with other companies. With UDDI, companies are able to host their services in a wider market and also connect to other companies. However, with business expansion also follows trust issues. In order to share Web Services in a business partner relationship it is necessary to have a relation of trust. Purpose The purpose of this thesis is to investigate about this issue, i.e. how Web Services with the use of UDDI can be made as a “network of trust” and additionally obtain an idea about how the use of these two will look like in the future. The question of trust between partners sharing Web Services is still open. There has therefore been an interest to look at this problem. The aim for this thesis is to find possible solutions that can be used to address the problem. Method To investigate this we chose to do a literature study and continue with a survey consisted by interviews and questionnaires. Interviews were used to find which solutions that are available in reality and the questionnaires provide information about to what extent Web services and the found solutions are used. The questionnaire was done on random Swedish companies and was sent by e-mails. The interviews were done on two global Swedish companies, Volvo and Ericsson. This way information was found and could be compared in how the issue is dealt with in the literature and what is actually done in reality. Conclusion The outcome of the entire investigation is that Web Services today, even though it exists in most companies, is still in testing phase. As for this, the use of UDDI has had little attention and so has the issues regarding trust. The solution we found to the most applicable to create a network of trust is the Liberty Alliance Project. Web Services, UDDI, trust

  • 207.
    Andersson, Tobias
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Brenden, Christoffer
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Parallelism in Go and Java: A Comparison of Performance Using Matrix Multiplication2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis makes a comparison between the performance of Go and Java using parallelizedimplementations of the Classic Matrix Multiplication Algorithm (CMMA). The comparisonattempts to only use features for parallelization, goroutines for Go and threads for Java,while keeping other parts of the code as generic and comparable as possible to accuratelymeasure the performance during parallelization.In this report we ask the question of how programming languages compare in terms of multi-threaded performance? In high-performance systems such as those designed for mathemati-cal calculations or servers meant to handle requests from millions of users, multithreadingand by extension performance are vital. We would like to find out if and how much of a dif-ference the choice of programming language could benefit these systems in terms of parallel-ism and multithreading.Another motivation is to analyze techniques and programming languages that have emergedthat hide the complexity of handling multithreading and concurrency from the user, lettingthe user specify keywords or commands from which the language takes over and creates andmanages the thread scheduling on its own. The Go language is one such example. Is this newtechnology an improvement over developers coding threads themselves or is the technologynot quite there yet?To these ends experiments were done with multithreaded matrix multiplication and was im-plemented using goroutines for Go and threads for Java and was performed with sets of4096x4096 matrices. Background programs were limited and each set of calculations wasthen run multiple times to get average values for each calculation which were then finallycompared to one another.Results from the study showed that Go had ~32-35% better performance than Java between 1and 4 threads, with the difference diminishing to ~2-5% at 8 to 16 threads. The differencehowever was believed to be mostly unrelated to parallelization as both languages maintainednear identical performance scaling as the number of threads increased until the scaling flat-lined for both languages at 8 threads and up. Java did continue to gain a slight increase goingfrom 4 to 8 threads, but this was believed to be due to inefficient resource utilization onJava’s part or due to Java having better utilization of hyper-threading than Go.In conclusion, Go was found to be considerably faster than Java when going from the mainthread and up to 4 threads. At 8 threads and onward Java and Go performed roughly equal.For performance difference between the number of threads in the languages themselves nonoticeable performance increase or decrease was found when creating 1 thread versus run-ning the matrix multiplication directly on the main thread for either of the two languages.Coding multithreading in Go was found to be easier than in Java while providing greater toequal performance. Go just requires the ‘go’ keyword while Java requires thread creation andmanagement. This would put Go in favor for those trying to avoid the complexity of multi-threading while also seeking its benefits.

  • 208.
    Andersson, Viktor
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Lindgren, Daniel
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Ranking factors to increase your positionon the search engine result page: Theoretical and practical examples2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Search engine optimization (SEO) is the way to improve the visibility of a website on thesearch engine result page (SERP). If the website is not on the first three result, then it will bemissing most of the traffic that could be generated. This report will go into detail on how towork with SEO and how to get a website to rank high. Both On-page, how to work with codeand content, and Off-page, how to get more links, methods will be discussed, with a higherfocus on On-page.This paper strives to find what methods and techniques to use with the results gathered fromscientific databases, interviews and three websites with different levels of SEOimplementation. How to structure the code, where and how to use keywords, domain name,links and much more will be discussed in this paper.

  • 209.
    Andreasson, Mathias
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Ekesrydh, Wynona
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Nielsen, Pia
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Schertell, Mattias
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Ansökan om körkortstillstånd via Internet2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Länsstyrelsen i Stockholms län hade en projektidé som gick ut på att det skulle skapas en Internetbaserad ansökan för körkortstillstånd med behörighet B, inklusive hälsodeklaration. Även en optiker skulle kunna fylla i ett synundersökningsformulär via webben. Dessa skulle sedan knytas ihop för behandling av den Länsstyrelse där den sökande bor. Alla personer som skall använda tjänsten måste inneha ett personligt medborgarcertifikat som används för elektronisk signering av ansökan. Optikern behöver ett företagscertifikat för att identifiera sig. Vi utvecklade två interaktiva användargränssnitt samt ett gränssnitt där administratören kunde hantera all data som inkommit. All data transporterades med hjälp av Web Services (SOAP/XML). För att strukturera upp datan gjordes ett XML-schema som används för validering vid transporten. Allt dvs ansökan, hälsodeklaration och synundersökning landar sedan i en databas där all data knyts ihop som tillhör en sökande. Vi förberedde även användargränssnittet, databasen och XML-strukturen för fortsatt utveckling som t ex ansökan om andra körkortsbehörigheter och läkarintyg. Under utvecklingen använde vi erfarenheter tagna från tidigare lästa kurser och omsatte teorier till praktik, både inom projektledning, -drift, -planering och teknologiska kunskaper. Vi tog tillvara på tidigare kurser samt utforskade nya områden inom vår valda inriktning som är webbprogrammering där Web Services ingår. Via litteratur och Internet sökte vi information som värderades. Hela arbetsprocessen genomfördes efter en iterativ produktutvecklingsmetod. Vi utvärderade och omvärderade resultat och delresultat i en ständigt pågående spiralprocess.

  • 210.
    Andrej, Sekáč
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Performance evaluation based on data from code reviews2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. Modern code review tools such as Gerrit have made available great amounts of code review data from different open source projects as well as other commercial projects. Code reviews are used to keep the quality of produced source code under control but the stored data could also be used for evaluation of the software development process.

    Objectives. This thesis uses machine learning methods for an approximation of review expert’s performance evaluation function. Due to limitations in the size of labelled data sample, this work uses semisupervised machine learning methods and measure their influence on the performance. In this research we propose features and also analyse their relevance to development performance evaluation.

    Methods. This thesis uses Radial Basis Function networks as the regression algorithm for the performance evaluation approximation and Metric Based Regularisation as the semi-supervised learning method. For the analysis of feature set and goodness of fit we use statistical tools with manual analysis.

    Results. The semi-supervised learning method achieved a similar accuracy to supervised versions of algorithm. The feature analysis showed that there is a significant negative correlation between the performance evaluation and three other features. A manual verification of learned models on unlabelled data achieved 73.68% accuracy. Conclusions. We have not managed to prove that the used semisupervised learning method would perform better than supervised learning methods. The analysis of the feature set suggests that the number of reviewers, the ratio of comments to the change size and the amount of code lines modified in later parts of development are relevant to performance evaluation task with high probability. The achieved accuracy of models close to 75% leads us to believe that, considering the limited size of labelled data set, our work provides a solid base for further improvements in the performance evaluation approximation.

  • 211.
    Andresen, Mario
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Johnsson, Daniel
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Analysmetod för designade ljudbilder: Skapandet av nya förhållningssätt för ljuddesign2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Syftet med detta kandidatarbete var att framställa en analysmetod för dekonstruktion av ljuddesign i film. Målet med analysmetoden var att skapa ett förhållningssätt för ljuddesigners som gör det enklare att lära sig från ljudläggningar och genom övning eventuellt kunna bidra till ett mer avancerat sätt att tänka på vad ljud kan göra i en filmproduktion.

    Metoden är tänkt som ett stöd för blivande ljuddesigners som lärt sig tekniska kunskaper men kämpar med den kreativa biten där problemen inte har lika konkreta lösningar. Metoden är också tänkt som ett supplement till mer erfarna ljuddesigners för övning på sina kunskaper ellerförbättring av deras egen process.

    Vi tycker metoden nådde upp till de målen, men den visade sig också vara mer flexibel än så. Genom applicering av metoden inför arbete med vår gestaltning där vi ljudlade ett filmklipp blev designprocessen mycket enklare att komma igenom. Vi tror därför att en metod som vår kan vara en viktig del i att få in ljud tidigare i en filmproduktion.

  • 212.
    Andréason, Nanna
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Hellman, Camilla
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Wengle, Sara
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Dokumentär om döden2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Vi har som kandidatarbete gjort ett dokumentärfilmsprojekt. Filmen handlar om barns och pensionärers tankar och funderingar om döden. Vi ville göra en annorlunda dokumentär som väcker känslor utan att provocera. Döden är något som man inte ofta talar om och därför kände vi att vi ville ta upp detta ämne i en seriös men ganska lättsam film. Vi bestämde att lägga tyngdpunkten på research för att få en så bra grund som möjligt. Eftersom ämnet kan väcka många känslor ville vi vara förberedda på alla slags reaktioner. Under projektets gång har vi planerat vecka för vecka vad vi ska göra samt följt en övergripande tidsplan. Vi har också varje vecka skrivit en rapport om vad vi har gjort, vilka problem som vi har haft och vad som har fungerat bra. Vi tog kontakt med ett dagcenter och ett dagis och hittade bra människor att intervjua. De var alla mycket hjälpsamma och våra inspelningar gick bra. Vi var mycket nöjda med våra bilder och även ljudet. I klippningen har vi sett dokumentären växa fram och vi har haft lätt att se vilka klipp som passar in och vilka som inte gör det. Projektet har flutit på relativt smidigt och när problem har uppstått har vi lyckats lösa dem efter hand. Vi har lärt oss mycket och blivit säkrare på oss själva. Det har varit nyttigt för oss att arbeta med utomstående och med olika åldersgrupper. Att vi har skapat externa kontakter har också varit en bra erfarenhet. Vi har lärt oss att samarbeta och att lyssna på varandra. Det är viktigt att alla får komma till tals i en så här liten grupp. Vi tycker att det har varit spännande att göra ett sådant här stort projekt. Det har varit skönt att ha mycket tid till förfogande och att vi har fått lägga upp och genomföra projektet helt själva. Vi har utvecklats under projektets gång och vi känner oss nöjda med både projektet och slutresultatet.

  • 213.
    Andrén, Fredrik
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Communication in SOS Alarm and the Possibility of Enhancement2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    When an accident is happening most of the time it is the person on the street that is reporting this to SOS Alarm, the instance that is controlling, for example, the ambulances. To ensure that as few mistakes as possible are made it us crucial that the communication between the caller and the ambulance via the SOS Alarm is as efficient as possible. Communication between the caller to SOS Alarm and the ambulance is done by passing through the operator at the SOS Alarm station and then on to the ambulance. Is this the way that it should be handled or are there optional ways that could be used? The technology has evolved since the system used today was installed and today cellular phones are very common and it is not unusual that it is possible to take pictures with these phones. Is this something that could be used to enhance the way information is sent between the caller and the ambulance? These are questions that this thesis tries to answer by using studies at SOS Alarm and Ambulance centrals as a foundation for the arguments.

  • 214.
    Andrén, Åse Larsen
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mantzakanis, Tove
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Blom, Maria
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Säkerhets lösning för elektronisk faktura2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    We have chosen to look closer at the area of security for electronic invoices. The purpose of this inquest is to provide our case study with a security analysis of three suggestions and a recommendation of the best solution, according to our test. The three solutions are ISDN via a third party, X.25 via Internet bank and Mail server. The company in our case study is in this report referred to as X, has a strong market position and a large clientele and therefore we were interested in analysing and improving X?s electronic invoice system. X was in the position of testing an electronic invoicing system towards a selective group of business customers. The major problem with the system was the security issue regarding transferring the file.

  • 215.
    Andén, Calle
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Moyle, Alexander
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Artem ex Machina: En undersökning av emergence som fenomen och som metod vid skapandet av posthumanistisk konst2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Detta kandidatarbete är en undersökning av begreppet emergence och hur det kan användas i skapandet av digital interaktiv konst. Vi undersöker sambandet mellan designern och datorn, och hur användaren kan interagera med båda dessa för att bidra till och utforma skapandet.

     

    För att demonstrera detta har vi skapat en simulation, som är tänkt att efterlikna tidigt mänskligt beteende på hög nivå: uppståndelsen av civilizationer, interaktion mellan folkgrupper, och utnyttjande av naturliga resurser. Vi diskuterar de etiska och politiska konsekvenserna som följer på skapandet av en sådan simulation, och vilken sorts interaktion vi främjar i vår design.

  • 216.
    Angelova, Milena
    et al.
    Technical University of Sofia-branch Plovdiv, BUL.
    Vishnu Manasa, Devagiri
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Boeva, Veselka
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Linde, Peter
    Blekinge Institute of Technology, The Library.
    Lavesson, Niklas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    An Expertise Recommender System Based on Data from an Institutional Repository (DiVA)2018In: Proceedings of the 22nd edition of the International Conference on ELectronic PUBlishing, 2018Conference paper (Refereed)
    Abstract [en]

    Finding experts in academics is an important practical problem, e.g. recruiting reviewersfor reviewing conference, journal or project submissions, partner matching for researchproposals, finding relevant M. Sc. or Ph. D. supervisors etc. In this work, we discuss anexpertise recommender system that is built on data extracted from the Blekinge Instituteof Technology (BTH) instance of the institutional repository system DiVA (DigitalScientific Archive). DiVA is a publication and archiving platform for research publicationsand student essays used by 46 publicly funded universities and authorities in Sweden andthe rest of the Nordic countries (www.diva-portal.org). The DiVA classification system isbased on the Swedish Higher Education Authority (UKÄ) and the Statistic Sweden's (SCB)three levels classification system. Using the classification terms associated with studentM. Sc. and B. Sc. theses published in the DiVA platform, we have developed a prototypesystem which can be used to identify and recommend subject thesis supervisors inacademy.

  • 217.
    Angelova, Milena
    et al.
    Technical University of sofia, BUL.
    Vishnu Manasa, Devagiri
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Boeva, Veselka
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Linde, Peter
    Blekinge Institute of Technology, The Library.
    Lavesson, Niklas
    An Expertise Recommender System based on Data from an Institutional Repository (DiVA)2019In: Connecting the Knowledge Common from Projects to sustainable Infrastructure: The 22nd International conference on Electronic Publishing - Revised Selected Papers / [ed] Leslie Chan, Pierre Mounier, OpenEdition Press , 2019, p. 135-149Chapter in book (Refereed)
    Abstract [en]

    Finding experts in academics is an important practical problem, e.g. recruiting reviewersfor reviewing conference, journal or project submissions, partner matching for researchproposals, finding relevant M. Sc. or Ph. D. supervisors etc. In this work, we discuss anexpertise recommender system that is built on data extracted from the Blekinge Instituteof Technology (BTH) instance of the institutional repository system DiVA (DigitalScientific Archive). DiVA is a publication and archiving platform for research publicationsand student essays used by 46 publicly funded universities and authorities in Sweden andthe rest of the Nordic countries (www.diva-portal.org). The DiVA classification system isbased on the Swedish Higher Education Authority (UKÄ) and the Statistic Sweden's (SCB)three levels classification system. Using the classification terms associated with studentM. Sc. and B. Sc. theses published in the DiVA platform, we have developed a prototypesystem which can be used to identify and recommend subject thesis supervisors in academy.

  • 218.
    Angulo, Julio
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    The Emotional Driver: A Study of the Driving Experience and the Road Context2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In modern societies the activity of driving has become almost an essential routine. Vehicles are considered by many as indispensable tools for accomplishing their daily tasks and they are the main form of transportation for millions of people. The average driver spends, voluntarily, considerable amounts of time on the road, using their vehicle to transport himself even for small distances and knowing that its use presents him with some form of comfort and convenience; yet, drivers frequently regard their road experience as tiring and fastidious, but their persistence in using their vehicle at every opportunity serves as proof of a pleasurable experience. So far car manufacturers, traffic authorities and designers of technology have been mainly concerned with aspects of the road that ensure drivers safety, increase power engine, provide more comfort, and maintain better streets, etc; however, the actual feelings of the driver as he travels through the streets has not yet been taken into a great account by the developers of the road environment. For this reason this thesis tries to create awareness on the existence and constant presence of people’s emotions as they drive, which have the mutual power to influence their action on the road and their driving patterns. In order to capture a drivers’ emotional experience this study uses three main methods. One of them is Cultural Probes, consisting of common objects specifically Postcards, Pictures, and Web-logs, to measure unknown factors about the users. The second is the use of Ethnographic studies on the driving activities through the use of observations, the popular talk-aloud-protocol and the shadow method. Finally, the Experience Sampling Method is used, which tries to captures the experience of an individual as it unfolds in its natural context. With the combined used of these three methods some of the main factors of the road’s environment that are commonly able to influence the driver’s emotions in negative or positive ways were discovered, which include the intensity and type of light, the different types and sources of sound, the perceivable landscapes and surrounding architectures and the different kinds of continuously occurring interactions. These are just some of the many factors that can influence emotions on the road, and hopefully this study will open the curiosity for a deeper study of these and other aspects of the emotional driving experience.

  • 219.
    Angélison, Johan
    et al.
    Blekinge Institute of Technology, School of Planning and Media Design.
    Angélison, Filip
    Blekinge Institute of Technology, School of Planning and Media Design.
    Monsterdesign2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Monster fyller en väldigt viktig roll i dagens skräckfilm och skräckspel där en av deras största uppgifter är att vara skrämmande. Denna uppsats är en studie som fokuserar på hur man designar skrämmande monster inom spel och film. Vi har, med hjälp av teoretiska tolkningar, tagit reda på faktorer som kan påverka vad människor ser som monster samt hur man kan göra monstret skrämmande på en kognitiv nivå. Exempel på sådana här faktorer är kultur, etnicitet, religion. Även sexism och rasism har en betydelse i detta samband. Med hjälp av tidigare forskning och analys av skräckfilmer och skräckspel har vi samlat in tips och idéer över hur man designar skrämmande monster. Dessa tips och idéer tillhandahåller vi i den resulterande bok om monsterdesign som vi skrivit i anslutning till denna studie.

  • 220.
    Annavarjula, Vaishnavi
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Computer-Vision Based Retinal Image Analysis for Diagnosis and Treatment2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context- Vision is one of the five elementary physiologial senses. Vision is enabled via the eye, a very delicate sense organ which is highly susceptible to damage which results in loss of vision. The damage comes in the form of injuries or diseases such as diabetic retinopathy and glaucoma. While it is not possible to predict accidents, predicting the onset of disease in the earliest stages is highly attainable. Owing to the leaps in imaging technology,it is also possible to provide near instant diagnosis by utilizing computer vision and image processing capabilities.

    Objectives- In this thesis, an algorithm is proposed and implemented to classify images of the retina into healthy or two classes of unhealthy images, i.e, diabetic retinopathy, and glaucoma thus aiding diagnosis. Additionally the algorithm is studied to investigate which image transformation is more feasible in implementation within the scope of this algorithm and which region of retina helps in accurate diagnosis.

    Methods- An experiment has been designed to facilitate the development of the algorithm. The algorithm is developed in such a way that it can accept all the values of a dataset concurrently and perform both the domain transforms independent of each other.

    Results- It is found that blood vessels help best in predicting disease associations, with the classifier giving an accuracy of 0.93 and a Cohen’s kappa score of 0.90. Frequency transformed images also presented a accuracy in prediction with 0.93 on blood vessel images and 0.87 on optic disk images.

    Conclusions- It is concluded that blood vessels from the fundus images after frequency transformation gives the highest accuracy for the algorithm developed when the algorithm is using a bag of visual words and an image category classifier model.

    Keywords-Image Processing, Machine Learning, Medical Imaging

  • 221.
    Ansari, Rehan Javed.
    et al.
    Blekinge Institute of Technology, School of Computing.
    Dodda, Sandhya Rani.
    Blekinge Institute of Technology, School of Computing.
    The Use of SCRUM in Global Software Development – An Empirical Study2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The trend for global software development is increasing day by day. Global software development takes into account, the development of software globally by bringing knowledge about the market. There are several challenges that have an impact in developing software globally. In this study we investigate several management challenges faced in globally distributed projects and scrum practices that are being implemented by the organization. We also study the benefits in implementing scrum. For our research, we have performed literature review to find out the various challenges in managing globally distributed software projects and various scrum practices that are discussed. We conducted industrial case studies to find out the challenges being faced by them in globally distributed projects and the various scrum practices that are followed by them to overcome those challenges and also to know the benefits of implementing scrum in GSD. In order to provide quantitative support of management challenges and scrum practices discussed in the literature review, surveys have been conducted. We used grounded theory for analyzing the data gathered during the study. There are several challenges that are being faced by the organizations while developing software globally. There are also several scrum practices that have been found from the interviews. There are few challenges that need to be addressed in future research.

  • 222.
    Ansari, Umair Azeem
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Ali, Syed Umair
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Application of LEAN and BPR principles for Software Process Improvement (SPI): A case study of a large software development organization2014Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Abstract ------------- Background ---------------- Like other businesses, the failures and problems faced by the software development industry over the time have motivated experts to look for software process improvement to create quality software rapidly, repeatedly, and reliably. Objective ------------ The purpose of this study is to evaluate if and how Lean thinking and principles primarily associated with auto manufacturing industry can be applied to software development lifecycle for Software Process Improvement (SPI). The secondary aim is to analyze how BPR can be integrated with Lean software development for process improvement. Method ---------- A derived Lean-BPR adoption pattern model is used as a theoretical framework for this thesis. The seven Lean software development principles along with four-step BPR process are selected as process improvement patterns, which effects the KPIs of a software organization. This research study incorporates both Qualitative and Quantitative methods and data to analyze the objectives of this study. The methodological framework of Plan-Do-Check-Act is used in the case study to implement process re-engineering incorporating Lean and BPR principles. The impact of adopting the Lean and BPR principles is assessed in terms of cost, productivity, quality of products and resource management. Results ---------- Application of Lean and BPR principles for software process improvement in the organization under study resulted in 79% improvement in test coverage, 60% reduction in time for test execution and analysis and 44% reduction in cost for fixing defects that were being passed to customer in past. Conclusion ------------- Based on case study results, it can be concluded that Lean, a bottom up approach, characterized by empowerment of employees to analyze and improve their own working process can be effectively combined with IT centric traditionally top down BPR approach for improving KPI’s and software processes.

  • 223.
    Antkowiak, Łukasz
    Blekinge Institute of Technology, School of Computing.
    Parallel algorithms of timetable generation2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Most of the problem of generating timetable for a school belongs to the class of NP-hard problems. Complexity and practical value makes this kind of problem interesting for parallel computing. Objectives: This paper focuses on Class-Teacher problem with weighted time slots and proofs that it is NP-complete problem. Branch and bound scheme and two approaches to distribute the simulated annealing are proposed. Empirical evaluation of described methods is conducted in an elementary school computer laboratory. Methods: Simulated annealing implementation described in literature are adapted for the problem, and prepared for execution in distributed systems. Empirical evaluation is conducted with the real data from Polish elementary school. Results: Proposed branch and bound scheme scales nearly logarithmically with the number of nodes in computing cluster. Proposed parallel simulated annealing models tends to increase solution quality. Conclusions: Despite a significant increase in computing power, computer laboratories are still unprepared for heavy computation. Proposed branch and bound method is infeasible with the real instances. Parallel Moves approach tends to provide better solution at the beginning of execution, but the Multiple Independent Runs approach outruns it after some time.

  • 224.
    Antman, Benjamin
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Cybernetic Social Space: A Theoretical Comparison of Mediating Spaces in Digital Culture2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This essay does a theoretical comparison of the intricate social production in digital and real spaces, proposing a model for the non-technical exploration of the social production of spaces relating to human digital technology. The ‘social space’ proposed by Henri Lefebvre (1974) - responsible for producing material space - and the holistic model of ‘cybernetic space’ proposed by Ananda Mitra and Rae Lynn Schwartz (2001) - responsible for supporting the production of real and digital spaces - are argued as collaboratively producing cybernetic social spaces, serving as the definition of a unified model for the production of spaces in contemporary society. The digital spaces are argued as being a similar analogue to classical ‘social space’. Two native cybernetic spaces are presented and discussed, argued as being responsible for the transitive production of digital and real spaces as they survey and situate the production of cybernetic social space. Finally, two case studies exemplifying the aesthetics and politics of cybernetic space are presented, analyzed and discussed in accordance with the proposed model of cybernetic social space.

  • 225.
    Antonsson, Roger
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Petterson, Lena
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Being at one with the tool: applying flow to usability2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Communication between people has become more and more important in society today and so has the way to communicate. Our work, which this master thesis is based upon, has been to evaluate and redesign an existing web application that works like a communication tool. To carry out this work we have compiled two questions; how to facilitate the interaction for an application that is used as a tool, focusing on interface design, usability and flow; how can the usability be improved in a system, with help of flow theory. To deal with these two questions we have used a number of methods that have had different kinds of influence of our work. The one that has had the greatest impact of the work with the evaluation has been cognitive walkthrough. For the design we have used literature studies along with the result of the evaluation. A problem during our work has been that the user has not been specified the design should work at a generic group of users. The problem has not been to define the target group rather to suit the interface to everybody. This has been the challenge of this semester and we found designing an interface infusing usability with help from flow as interesting.

  • 226.
    Antonsson, Roger
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Petterson, Lena
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Think big: for small - infusing confidence, security and trustworthiness for mobile services2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The use of mobile telephony has over the past years increased and consequently has the development of services over the mobile phone also increased. This semester we have taken part in a large system development project, our contributions have been designing the graphical user interfaces. In doing that we found the problem with how to mediate trust to a user through a graphical user interface interesting. In this thesis we are focusing on how to develop graphical user interfaces for a mobile phone service that radiate and infuse confidence, security and trustworthiness. In order to attain the purpose, we have used the combination of literature studies and to some extent user involvement with Mock-ups and a Think-aloud technique. We are also describing the importance of taking as well usability and usability goals as the needs for the end users into consideration. We have found that more research on how to radiate and infuse trust through a graphical user interface is needed. This thesis is concluded with some aspects on that subject that we think is important to have in mind. It is of great importance to never leave the user in a state of uncertainty and therefore is clear, sincere and informative feedback necessary throughout the service. Also central in designing graphical user interfaces is to make sure that there is no mismatch in the security of the system and the radiated security.

  • 227.
    Anwar, Khurshid
    et al.
    Blekinge Institute of Technology, School of Computing.
    Khan, Asad
    Blekinge Institute of Technology, School of Computing.
    AC and QAR for Provisioning of QoS in MANETs2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Mobile Ad-hoc network (MANET) is a collection of mobile nodes which communicate over wireless channels without any centralized control or existing infrastructure. The freely movement of nodes allow them to join or leave the network independently. Due to node mobility, wireless channels and limited resources makes the provision of Quality of Services (QoS) in MANETs very challenging. With the emerging use of multimedia applications over MANETs which requires different types of QoS provision from the networks. The Admission Control (AC) and QoS-Aware routing (QAR) protocols have made a progress in provision of QoS up to some extents. In this thesis, various AC and QAR protocols are reviewed and their characteristics and limitations are identified. We also make a comparison between DSR and AODV routing protocols in different network scenarios.

  • 228.
    Anwar, Mahwish
    Blekinge Institute of Technology, School of Computing.
    Virtual Firewalling For Migrating Virtual Machines In Cloud Computing2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. During live migration any security lax in VM firewall policy can put the VM data, OS and the applications on it at risk. A malicious VM can pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider’s control. Source VMM-level VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. Considering the potential of VFs there should be a great value in using open source VFs at VM-level for protecting VMs during migration, thereby, reducing the attacker’s slot to gain access to VM. It would enable hardened security for overall VM migration. Objectives. The aim is to investigate VM-level firewalling using open source firewall as a complementary security layer to VMM-level firewalling, to secure migrating VM in the CC domain. The first objective is to identify how virtual firewalls secure migrating VM in CC and to propose VM-level open-source virtual firewalling for protecting VM during migration. Later the VF is implemented to validate and evaluate its intactness or activeness during migration in real Cloud data center. Methods. In the literary review 9 electronic libraries are used, which include IEEE Xplore, ACM Digital Library, SCOPUS, Engineering Village and Web of Knowledge. Studies are selected after querying libraries for 2 key terms ‘virtual machine’ and ‘migration’ (along with other variations/synonyms), in the abstract. Relevant papers on the subject are read and analyzed. Finally, the information gaps are identified. Using a lacuna the experimental solution is designed. To test the potential of VF at VM-level for migrating VM’s security the experimental validation is performed using stratification samples of firewall rules. The VF evaluation is done using continuous ICMP echo packet transmission. The packets are analyzed to determine firewall behavior during migration. To evaluate the validity, the VM migration is performed 8 times in City Network data center. Results. The literary review identified the widespread use of VMM-level firewalling for migrating VM’s security in CC. The VM-level VFs were not researched nor evaluated for intactness during migration. The experiment performed at City Network demonstrated that the VM-level VF secures VM during migration (on average) for 96% of migration time, thereby reducing attack window for attacker during VM mobility. According to the results the average total migration time (TMT) was 16.6 s and average downtime (DT) of firewall was as low as 0.47 s, which means that VF at VM-level protects VM during entire migration span except when VM’s down (4% of migration time). Conclusions. The research concludes that VM-level firewalling using open source VF as an additional security layer in CC for VM migrations is feasible to employ and will enhance the migrating machine’s security by providing hardened firewall service during migration process, thus, reducing the potential attack window. VMM-level VF provides security in post and pre migration phase. Using VM-level VF as a complementary measure to VMM-level VF enables additional protection for VM migration process, thereby reducing the chances for attacker to attack VM during transition.

  • 229.
    Anwar, Naveed
    et al.
    Blekinge Institute of Technology, School of Computing.
    Kwoka, Adam
    Blekinge Institute of Technology, School of Computing.
    Web Site Usability, Technical and Social Perspectives2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    World Wide Web (www) has achieved an important role in communication, information sharing and service delivery now-a-days. World Wide Web consists of millions of web sites and web based applications which are deployed and can be visited all over the world without the limitation of time and geographical boundaries. Web site usability, security and reliability consider some of the core aspects in designing of web sites. In this thesis, we explore possible tensions and tradeoffs between usability and security issues in web site design. We discuss web site usability issues in terms of technical and social aspects. We discuss web site security in terms of usability and offer some recommendations for secure website design without compromising the web site performance. We also highlight the importance of ease of navigation and other aspects of user interface design. In order to explore these issues, we have chosen to review the related literature. We have also conducted interviews with professionals who are mainly concerned with web site usability. Two sample interviews are available at the end of this thesis report.

  • 230.
    ANWAR, WALEED
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Software Quality Characteristics Tested For Mobile Application Development: Literature Review and Empirical Survey2015Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Smart phones use is increasing day by day as there is large number of app users. Due to more use of apps, the testing of mobile application should be done correctly and flawlessly to ensure the effectiveness of mobile applications.

  • 231.
    Aouachria, Moufida
    et al.
    Universite du Quebec a Montreal, CAN.
    Leshob, Abderrahmane
    Universite du Quebec a Montreal, CAN.
    Gonzalez-Huerta, Javier
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Ghomari, Abdessamed Réda
    Ecole nationale superieure d'Informatique, DZA.
    Hadaya, Pierre
    Universite du Quebec a Montreal, CAN.
    Business Process Integration: How to Achieve Interoperability through Process Patterns2017In: Proceedings - 14th IEEE International Conference on E-Business Engineering, ICEBE 2017 - Including 13th Workshop on Service-Oriented Applications, Integration and Collaboration, SOAIC 207, Institute of Electrical and Electronics Engineers Inc. , 2017, p. 109-117Conference paper (Refereed)
    Abstract [en]

    Business process integration (BPI) is a crucial technique for supporting inter-organizational business interoperability. BPI allows automation of business processes and the integration of systems across numerous organizations. The integration of organizations' process models is one of the most addressed and used approach to achieve BPI. However, this model integration is complex and requires that designers have extensive experience in particular when organizations' business processes are incompatible. This paper considers the issue of modeling cross-organization processes out of a collection of organizations' private process models. To this end, we propose six adaptation patterns to resolve incompatibilities when combining organizations' processes. Each pattern is formalized with workflow net. © 2017 IEEE.

  • 232. Apell, Maria
    et al.
    Erman, David
    Popescu, Adrian
    Testbed for Advanced Mobile Solutions2010Conference paper (Refereed)
    Abstract [en]

    This paper describes the implementation of an IMS testbed, based on open source technologies and operating systems. The testbed provides rich communication services, i.e., Instant Messaging, Network Address Book and Presence as well as VoIP and PSTN interconnectivity. Our validation tests indicate that the performance of the testbed is comparable to similar testbeds, but that operating system virtualization signi ficantly aff ects signalling delays.

  • 233.
    Ardito, Luca
    et al.
    Politecnico di Torino, ITA.
    Coppola, Riccardo
    Politecnico di Torino, ITA.
    Torchiano, Marco
    Politecnico di Torino, ITA.
    Alégroth, Emil
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Towards automated translation between generations of GUI-based tests for mobile devices2018In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, Association for Computing Machinery, Inc , 2018, p. 46-53Conference paper (Refereed)
    Abstract [en]

    Market demands for faster delivery and higher software quality are progressively becoming more stringent. A key hindrance for software companies to meet such demands is how to test the software due to to the intrinsic costs of development, maintenance and evolution of testware. Especially since testware should be defined, and aligned, with all layers of system under test (SUT), including all graphical user interface (GUI) abstraction levels. These levels can be tested with different generations of GUI-based test approaches, where 2nd generation, or Layout-based, tests leverage GUI properties and 3rd generation, or Visual, tests make use of image recognition. The two approaches provide different benefits and drawbacks and are seldom used together because of the aforementioned costs, despite growing academic evidence of the complementary benefits. In this work we propose the proof of concept of a novel two-step translation approach for Android GUI testing that we aim to implement, where a translator first creates a technology independent script with actions and elements of the GUI, and then translates it to a script with the syntax chosen by the user. The approach enables users to translate Layout-based to Visual scripts and vice versa, to gain the benefits (e.g. robustness, speed and ability to emulate the user) of both generations, whilst minimizing the drawbacks (e.g. development and maintenance costs). We outline our approach from a technical perspective, discuss some of the key challenges with the realization of our approach, evaluate the feasibility and the advantages provided by our approach on an open-source Android application, and discuss the potential industrial impact of this work. © 2018 ACM.

  • 234.
    Arenas, Miguel Tames
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Social Engineering and Internal Threats in Organizations2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulnerable and the best methods to protect our organizations from inside threats.

  • 235.
    Areskoug, Andreas
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Jämförelse av J2EE och .NET från ett Web Services perspektiv.2006Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This thesis compares the performance of Web Services when hosted on either the J2EE or the .NET platform. The thesis will investigate which platform should be choosen to host Web Services mainly based on performance.

  • 236.
    Arikenbi, Temitayo
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Decision Support for Multi-Criteria Energy Generation Problem2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this study, an attempt is made to apply Decision Support Systems (DSS) in planning for the expansion of energy generation infrastructure in Nigeria. There is an increasing demand for energy in that country, and the study will try to show that DSS modelling, using A Mathematical Programming Language (AMPL) as the modelling tool, can offer satisficing results which would be a good decision support resource for motivating how to expend investment for energy generation.

  • 237. Arkoulis, Stamatios
    et al.
    Marias, Giannis
    Frangoudis, Pantelis
    Oberender, Jens
    Popescu, Alexandru
    Fiedler, Markus
    Meer, Hermann de
    Polyzos, George
    Misbehaviour Scenarios in Cognitive Radio Networks2010In: Future Internet, ISSN 1999-5903, E-ISSN 1999-5903, Vol. 2, no 3-4, p. 212-237Article, review/survey (Refereed)
    Abstract [en]

    Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work.

  • 238. Arlos, Patrik
    Application Level Measurement2011In: Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet, Berlin / Heidelberg: Springer , 2011, p. 14-36Chapter in book (Other academic)
    Abstract [en]

    In some cases, application-level measurements can be the only way for an application to get an understanding about the performance offered by the underlying network(s). It can also be that an application-level measurement is the only practical solution to verify the availability of a particular service. Hence, as more and more applications perform measurements of various networks; be that fixed or mobile, it is crucial to understand the context in which the application level measurements operate their capabilities and limitations. To this end in this paper we discuss some of the fundamentals of computer network performance measurements and in particular the key aspects to consider when using application level measurements to estimate network performance properties.

  • 239.
    Arlos, Patrik
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    On the Quality of Computer Network Measurements2005Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Due to the complex diversity of contemporary Internet-services, computer network measurements have gained considerable interest during recent years. Since they supply network research, development and operations with data important for network traffic modelling, performance and trend analysis, etc. The quality of these measurements affect the results of these activities and thus the perception of the network and its services. This thesis contains a systematic investigation of computer network measurements and a comprehensive overview of factors influencing the quality of performance parameters obtained from computer network measurements. This is done using a novel network performance framework consisting of four modules: Generation, Measurement, Analysis and Visualization. These modules cover all major aspects controlling the quality of computer network measurements and thus the validity of all kinds of conclusions based on them. One major source of error is the timestamp accuracy obtained from measurement hardware and software. Therefore, a method is presented that estimates the timestamp accuracy obtained from measurement hardware and software. The method has been used to evaluate the timestamp accuracy of some commonly used hardware (Agilent J6800/J6830A and Endace DAG 3.5E) and software (Packet Capture Library). Furthermore, the influence of analysis on the quality of performance parameters is discussed. An example demonstrates how the quality of a performance metric (bitrate) is affected by different measurement tools and analysis methods. The thesis also contains performance evaluations of traffic generators, how accurately application-level measurements describe network behaviour, and of the quality of performance parameters obtained from PING and J-OWAMP. The major conclusion is that measurement systems and tools must be calibrated, verified and validated for the task of interest before using them for computer network measurements. A guideline is presented on how to obtain performance parameters at a desired quality level.

  • 240. Arlos, Patrik
    et al.
    Fiedler, Markus
    Influence of the Packet Size on the One-Way Delay in 3G Networks2010Conference paper (Refereed)
    Abstract [en]

    We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation process on mobile access links is far less transparent to the user; still, its properties need to be known in order to minimize the impact of the network on application performance. This paper investigates the impact of the packet size on the minimal one-way delay for the uplink in third-generation mobile networks. For interactive and real-time applications such as VoIP, one-way delays are of major importance for user perception; however, they are challenging to measure due to their sensitivity to clock synchronization. Therefore, the paper applies a robust and innovative method to assure the quality of these measurements. Results from measurements from several Swedish mobile operators show that applications can gain significantly in terms of one-way delay from choosing optimal packet sizes. We show that, in certain cases, an increased packet size can improve the one-way delay performance at best by several hundred milliseconds.

  • 241. Arlos, Patrik
    et al.
    Fiedler, Markus
    Influence of the Packet Size on the One-Way Delay on the Down-link in 3G Networks2010Conference paper (Refereed)
    Abstract [en]

    The number of mobile broadband users is increasing. Furthermore, these users have high expectations into the capabilities of mobile broadband, comparable to those in fixed networks. On the other hand, the capacity assignment process on mobile access links is far from transparent to the user, and its properties need to be known in order to minimize the impact of the network on application performance. This paper investigates the impact of the packet size on the characteristics of the one-way delay for the down-link in third-generation mobile networks. For interactive and real-time applications such as VoIP, one-way delays are of major importance for user perception; however, they are challenging to measure due to their sensitivity to clock synchronization. Therefore, the paper applies a robust and innovative method to assure the quality of these measurements. We focus on the down-link as this is still the link that carries the most traffic to the user, and the quality of it will have a significant impact on all IP-based services. Results from measurements from several Swedish mobile operators reveal the possibility to partly control one-way delay and its variability by choosing appropriate packet sizes. In particular, packet sizes leading to the use of WCDMA entail significant but hardly varying one-way delays. On the other hand, we also show that HDSPA networks can deliver large amounts of data at rather high speed, but the cost is a huge variability in the one-way delay.

  • 242. Arlos, Patrik
    et al.
    Fiedler, Markus
    Nilsson, Arne A.
    A Distributed Passive Measurement Infrastructure2005Conference paper (Refereed)
    Abstract [en]

    In this paper we describe a distributed passive measurement infrastructure. Its goals are to reduce the cost and configuration effort per measurement. The infrastructure is scalable with regards to link speeds and measurement locations. A prototype is currently deployed at our university and a demo is online at http://inga.its.bth.se/projects/dpmi. The infrastructure differentiates between measurements and the analysis of measurements, this way the actual measurement equipment can focus on the practical issues of packet measurements. By using a modular approach the infrastructure can handle many different capturing devices. The infrastructure can also deal with the security and privacy aspects that might arise during measurements.

  • 243. Arlos, Patrik
    et al.
    Kommalapati, Ravichandra
    Fiedler, Markus
    Evaluation of Protocol Treatment in 3G Networks2011Conference paper (Refereed)
    Abstract [en]

    In this work, we present a systematic study of how the traffic of different transport protocols (UDP, TCP and ICMP) is treated, in three operational Swedish 3G networks. This is done by studying the impact that protocol and packet size have on the one-way-delay (OWD) across the networks. We do this using a special method that allows us to calculate the exact OWD, without having to face the usual clock synchronization problems that are normally associated with OWD calculations. From our results we see that all three protocols are treated similarly by all three operators, when we consider packet sizes that are smaller than 250~bytes and larger than 1100~bytes. We also show that larger packet sizes are given preferential treatment, with both smaller median OWD as well as a smaller standard deviation. It is also clear that, ICMP is given a better performance compared to TCP and UDP.

  • 244.
    Arneng, Per
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Bladh, Richard
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Performance Analysis of Distributed Object Middleware Technologies2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Each day new computers around the world connects to the Internet or some network. The increasing number of people and computers on the Internet has lead to a demand for more services in different domains that can be accessed from many locations in the network. When the computers communicate they use different kinds of protocols to be able to deliver a service. One of these protocol families are remote procedure calls between computers. Remote procedure calls has been around for quite some time but it is with the Internet that its usage has increased a lot and especially in its object oriented form which comes from the fact that object oriented programming has become a popular choice amongst programmers. When a programmer has to choose a distributed object middleware there is a lot to take into consideration and one of those things is performance. This master thesis aims to give a performance comparison between different distributed object middleware technologies and give an overview of the performance difference between them and make it easier for a programmer to choose one of the technologies when performance is an important factor. In this thesis we have evaluated the performance of CORBA, DCOM, RMI, RMI-IIOP, Remoting-TCP and Remoting-HTTP. The results we have seen from this evaluation is that DCOM and RMI are the distributed object middleware technologies with the best overall performance in terms of throughput and round trip time. Remoting-TCP generally generates the least amount of network traffic, while Remoting-HTTP generates the most amount of network traffic due to it's SOAP-formated protocol.

  • 245.
    Arnesson, Andreas
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Codename one and PhoneGap, a performance comparison2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Creating smartphone applications for more than one operating system requires knowledge of several code languages, more code maintenance, higher development costs and longer development time. To make this easier cross-platform tools (CPTs) exist. But using a CPT can decrease performance of the application. Applications with low performance are more likely to get uninstalled and this makes developers lose income. There are four main CPT approaches hybrid, interpreter, web and cross-compiler. Each has different disadvantages .and advantages. This study will examine the performance difference between two CPTs, Codename One and PhoneGap. The performance measurements, CPU load, memory usage, energy consumption, time execution and application size will be made to compare the CPTs. If cross-compilers have better performance than other CPT approaches will also be investigated. An experiment where three applications are created with native Android, Codename One and PhoneGap will be made and performance measurements will be made. A literature study with research from IEEE and Engineering village will be conducted on different CPT approaches. PhoneGap performed best with shortest execution time, least energy consumption and least CPU usage while Codename One had smallest application size and least memory usage. The research available on performance for CPTs is short and not well done. The difference between PhoneGap and Codename One is not big except for writing to SQLite. No basis was found for the statement that cross-compilers have better performance than other CPT approaches.  

  • 246.
    Arnesson, Andreas
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Lewenhagen, Kenneth
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Comparison and Prediction of Temporal Hotspot Maps2018Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. To aid law enforcement agencies when coordinating and planningtheir efforts to prevent crime, there is a need to investigate methods usedin such areas. With the help of crime analysis methods, law enforcementare more efficient and pro-active in their work. One analysis method istemporal hotspot maps. The temporal hotspot map is often represented asa matrix with a certain resolution such as hours and days, if the aim is toshow occurrences of hour in correlation to weekday. This thesis includes asoftware prototype that allows for the comparison, visualization and predic-tion of temporal data.

    Objectives. This thesis explores if multiprocessing can be utilized to im-prove execution time for the following two temporal analysis methods, Aoris-tic and Getis-Ord*. Furthermore, to what extent two temporal hotspotmaps can be compared and visualized is researched. Additionally it wasinvestigated if a naive method could be used to predict temporal hotspotmaps accurately. Lastly this thesis explores how different software packag-ing methods compare to certain aspects defined in this thesis.

    Methods. An experiment was performed, to answer if multiprocessingcould improve execution time of Getis-Ord* or Aoristic. To explore howhotspot maps can be compared, a case study was carried out. Another ex-periment was used to answer if a naive forecasting method can be used topredict temporal hotspot maps. Lastly a theoretical analysis was executedto extract how different packaging methods work in relation to defined as-pects.

    Results. For both Getis-Ord* and Aoristic, the sequential implementationsachieved the shortest execution time. The Jaccard measure calculated thesimilarity most accurately. The naive forecasting method created, provednot adequate and a more advanced method is preferred. Forecasting Swedishburglaries with three previous months produced a mean of only 12.1% over-lap between hotspots. The Python package method accumulated the highestscore of the investigated packaging methods.

    Conclusions. The results showed that multiprocessing, in the languagePython, is not beneficial to use for Aoristic and Getis-Ord* due to thehigh level of overhead. Further, the naive forecasting method did not provepractically useful in predicting temporal hotspot maps.

  • 247.
    Aroseus, Zara
    et al.
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Langeström, Emmie
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Lindberg, Tobias
    Blekinge Institute of Technology, Department of Human Work Science and Media Technology.
    Vår utvecklingsprocess: designaspekter på ett befintligt webbsystem2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Den här rapporten är ett resultat av ett kandidatarbete på 20-poäng. Projektet som rapporten handlar om, beskriver hur utvecklingen av ett webbutikssystem åt ett flertal företag gått till. De har i sin tur köpt webbsystemet från företaget Opti Use som givit oss uppgiften. I rapporten diskuteras hur utvecklingsprocessen gått till och hur ett arbete med ett befintligt system upplevts. Rapporten beskriver även hur lösningen på uppgiften har tagit form och hur utvecklingsprocessen påverkat den. Metoderna som används under projektets gång beskrivs utifrån hur de förändrats för att önskat resultat skulle uppnås. Titelns innebörd beskriver projektgruppens utvecklingsprocess under arbetet med projektet i förhållande till tidigare erfarenheter under MDA-utbildningen.

  • 248.
    Arredal, Martin
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Eye Tracking’s Impact on Player Performance and Experience in a 2D Space Shooter Video Game.2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Background. Although a growing market, most of the commercially available gamestoday that features eye tracking support is rendered in a 3D perspective. Games ren-dered in 2D have seen little support for eye trackers from developers. By comparing the differences in player performance and experience between an eye tracker and acomputer mouse when playing a classic 2D genre: space shooter, this thesis aim tomake an argument for the implementation of eye tracking in 2D video games.

    Objectives. Create a 2D space shooter video game where movement will be handledthrough a keyboard but the input method for aiming will alter between a computermouse and an eye tracker.

    Methods. Using a Tobii EyeX eye tracker, an experiment was conducted with fif-teen participants. To measure their performance, three variables was used: accuracy,completion time and collisions. The participants played two modes of a 2D spaceshooter video game in a controlled environment. Depending on which mode wasplayed, the input method for aiming was either an eye tracker or a computer mouse.The movement was handled using a keyboard for both modes. When the modes hadbeen completed, a questionnaire was presented where the participants would ratetheir experience playing the game with each input method.

    Results. The computer mouse had a better performance in two out of three per-formance variables. On average the computer mouse had a better accuracy andcompletion time but more collisions. However, the data gathered from the question-naire shows that the participants had on average a better experience when playingwith an eye tracker

    Conclusions. The results from the experiment shows a better performance for par-ticipants using the computer mouse, but participants felt more immersed with the eyetracker and giving it a better score on all experience categories. With these results,this study hope to encourage developers to implement eye tracking as an interactionmethod for 2D video games. However, future work is necessary to determine if theexperience and performance increase or decrease as the playtime gets longer.

  • 249.
    Arsalan, Muhammad
    Blekinge Institute of Technology, School of Engineering.
    Future Tuning Process For Embedded Control Systems2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    This master’s thesis concerns development of embedded control systems.Development process for embedded control systems involves several steps, such as control design, rapid prototyping, fixedpoint implementation and hardware-in-the-loop-simulations. Another step, which Volvo is not currently (September 2009) using within climate control is on-line tuning. One reason for not using this technique today is that the available tools for this task (ATI Vision, INCA from ETAS or CalDesk from dSPACE) do not handle parameter dependencies in a atisfactory way. With these constraints of today, it is not possible to use online tuning and controller development process is more laborious and time consuming.The main task of this thesis is to solve the problem with parameter dependencies and to make online tuning possible.

  • 250.
    Arslan, Muhammad
    et al.
    Blekinge Institute of Technology, School of Computing.
    Riaz, Muhammad Assad
    Blekinge Institute of Technology, School of Computing.
    A Roadmap for Usability and User Experience Measurement during early phases of Web Applications Development2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Web usability and User Experience (UX) play a vital role in the success and failure of web applications. However, the usability and UX measurement during the software development life cycle provide many challenges. Based on a systematic literature review, this thesis discusses the current usability and user experience evaluation and measurement methods and the defined measures as well as their applicability during the software development life cycle. The challenges of using those methods also identified. In order to elaborate more on the challenges, we conducted informal interviews within a software company. Based on the findings, we defined a usability and user experience measurement and evaluation roadmap for web applications development companies. The roadmap contains a set of usability evaluation and measurement methods as well as measures that we found suitable to be used during the early stages (requirement, design, and development) of web application development lifecycle. To validate the applicability of the defined roadmap, a case study was performed on a real time market oriented real estate web application. The results and the discussions of the findings as well as the future research directions are presented.

2345678 201 - 250 of 4803
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf