lnu.sePublications
Change search
Refine search result
123456 1 - 50 of 265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abraham, Erika
    et al.
    RWTH Aachen University, Germany.
    Bekas, Costas
    IBM Research, Switzerland.
    Brandic, Ivona
    Vienna University of Technology, Austria.
    Genaim, Samir
    Complutense University of Madrid, Spain.
    Johnsen, Einar
    University of Oslo, Norway.
    Kondov, Ivan
    Karlsruhe Institute of Technology, Germany.
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Streit, Achim
    Karlsruhe Institute of Technology, Germany.
    Preparing HPC Applications for Exascale: Challenges and Recommendations2015In: Proceedings: 2015 18th International Conference on Network-Based Information Systems, NBiS 2015 / [ed] Barolli, L; Takizawa, M; Hsu, HH; Enokido, T; Xhafa, F, IEEE conference proceedings, 2015, p. 401-406Conference paper (Refereed)
    Abstract [en]

    While the HPC community is working towards the development of the first Exaflop computer (expected around 2020), after reaching the Petaflop milestone in 2008 still only few HPC applications are able to fully exploit the capabilities of Petaflop systems. In this paper we argue that efforts for preparing HPC applications for Exascale should start before such systems become available. We identify challenges that need to be addressed and recommend solutions in key areas of interest, including formal modeling, static analysis and optimization, runtime analysis and optimization, and autonomic computing. Furthermore, we outline a conceptual framework for porting HPC applications to future Exascale computing systems and propose steps for its implementation.

    Download full text (pdf)
    fulltext
  • 2.
    Aflaki, Kamyar
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Penetration And Security Testing As A Mean To Securing Universal Web Applications2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The domain of Information Technology has been discussed focusing the security of in-formation based on web application. The main purpose of the paper is to pinpoint andexplain the main attacks on web applications. In the study the I have used real world webapplication to demonstrate different types of attacks and the ways of prevention againstthem. Cyber criminals are using certain tactics to gather sensitive information throughweb applications, thus it is important to study this domain of IT. Experiment has beenconducted to demonstrate the concept and achieved outcomes have been explained. It hasbeen concluded that the most of the web application vulnerabilities come from a bad de-sign, according to Microsoft Developer Network (MSDN) Design Guidelines for SecureWeb Applications, and most of the threats can be prevented by considering basics of webapplication security while designing the application.

  • 3.
    Albano, Michele
    et al.
    Polytechnic Institute of Porto, Portugal.
    Sharma, Pankaj
    National University of Singapore, Singapore.
    Campos, Jaime
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland Ltd, Finland.
    Energy Saving by Blockchaining Maintenance.2018In: Journal of Industrial Engineering and Management Science, ISSN 2446-1822, Vol. 2018, no 1, p. 63-88, article id 4Article in journal (Refereed)
    Abstract [en]

    The development and interest in Industry 4.0 together with rapid development of Cyber Physical Systems has created magnificent opportunities to develop maintenance to a totally new level. The Maintenance 4.0 vision considers massive exploitation of information regarding factories and machines to improve maintenance efficiency and efficacy, for example by facilitating logistics of spare parts, but on the other hand this creates other logistics issues on the data itself, which only exacerbate data management issues that emerge when distributed maintenance platforms scale up. In fact, factories can be delocalized with respect to the data centers, where data has to be transferred to be processed. Moreover, any transaction needs communication, be it related to purchase of spare parts, sales contract, and decisions making in general, and it has to be verified by remote parties. Keeping in mind the current average level of Overall Equipment Efficiency (50%) i.e. there is a hidden factory behind every factory, the potential is huge. It is expected that most of this potential can be realised based on the use of the above named technologies, and relying on a new approach called blockchain technology, the latter aimed at facilitating data and transactions management. Blockchain supports logistics by a distributed ledger to record transactions in a verifiable and permanent way, thus removing the need for multiple remote parties to verify and store every transaction made, in agreement with the first “r” of maintenance (reduce, repair, reuse, recycle). Keeping in mind the total industrial influence on the consumption of natural resources, such as energy, the new technology advancements can allow for dramatic savings, and can deliver important contributions to the green economy that Europe aims for. The paper introduces the novel technologies that can support sustainability of manufacturing and industry at large, and proposes an architecture to bind together said technologies to realise the vision of Maintenance 4.0.

  • 4.
    Aleksakhin, Vladyslav
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Visualization of gene ontology and cluster analysis results2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The purpose of the thesis is to develop a new visualization method for Gene Ontologiesand hierarchical clustering. These are both important tools in biology andmedicine to study high-throughput data such as transcriptomics and metabolomicsdata. Enrichment of ontology terms in the data is used to identify statistically overrepresentedontology terms, that give insight into relevant biological processes orfunctional modules. Hierarchical clustering is a standard method to analyze andvisualize data to nd relatively homogeneous clusters of experimental data points.Both methods support the analysis of the same data set, but are usually consideredindependently. However, often a combined view such as: visualizing a large data setin the context of an ontology under consideration of a clustering of the data.The result of the current work is a user-friendly program that combines twodi erent views for analysing Gene Ontology and Cluster simultaneously. To makeexplorations of such a big data possible we developed new visualization approach.

    Download full text (pdf)
    fulltext
  • 5.
    Algabroun, Hatem
    Linnaeus University, Faculty of Technology, Department of Mechanical Engineering.
    Dynamic sampling rate algorithm (DSRA) implemented in self-adaptive software architecture: a way to reduce the energy consumption of wireless sensors through event-based sampling2020In: Microsystem Technologies: Micro- and Nanosystems Information Storage and Processing Systems, ISSN 0946-7076, E-ISSN 1432-1858, Vol. 26, no 4, p. 1067-1074Article in journal (Refereed)
    Abstract [en]

    With the recent digitalization trends in the industry, wireless sensors are, in particular, gaining a growing interest. This is due to the possibility of being installed in inaccessible locations for wired sensors. Although great success has already been achieved in this area, energy limitation remains a major obstacle for further advances. As such, it is important to optimize the sampling with a sufficient rate to catch important information without excessive energy consumption, and one way to achieve sufficient sampling is using adaptive sampling for sensors. As software plays an important role in the techniques of adaptive sampling, a reference framework for software architecture is important in order to facilitate their design, modeling, and implementation. This study proposes a software architecture, named Rainbow, as the reference architecture, also, it develops an algorithm for adaptive sampling. The algorithm was implemented in the Rainbow architecture and tested using two datasets; the results show the proper operation of the architecture as well as the algorithm. In conclusion, the Rainbow software architecture has the potential to be used as a framework for adaptive sampling algorithms, and the developed algorithm allows adaptive sampling based on the changes in the signal.

    Download full text (pdf)
    fulltext
  • 6.
    Alm, Anton
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Björling, Joakim
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Prestandautvärdering av firmwares baserade på öppen källkod för routrar/brandväggar på MIPS-arkitektur: Jämförelse mellan Open-WRT, DD-WRT och Tomato firmware2014Independent thesis Basic level (university diploma), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    This investigation compares the performance of three different open-source firmwares. DD-WRT, Open-WRT and Tomato Firmware with MIPS architecture. The test follows two RFC that describes the process of how to perform a performance analysis of network interconnected devices.

    The summarized results show a winner which has generally performed better throughout all the tests and this was Tomato firmware. These results are gathered from three different tests, which is throughput, latency and concurrent sessions test.

    The survey also shows that the performance in general is very equal across all firmwares in the various tests. An important aspect is that there are no outstanding winner, which depends on for example how consistent the results have been. This also concerns a possible conclusion where the firmwares perform various well depending on the type of task involved.

    As further work on this investigation we recommend a performance and function analysis of the tools that the firmware contains. Although a survey of the interface for each firmware would be interesting.

    Download full text (pdf)
    fulltext
  • 7.
    Almjamai, Sarmed
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks: physical and data-link layer2022Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. These security protocols are crucial in Wi-Fi networks with energy and memory-constrained devices because of adversaries that could breach confidentiality, integrity, and availability of networks through various attacks. Many research papers exist on single Wi-Fi attacks, and the strengths and weaknesses of security protocols and Wi-Fi standards. This thesis aims to provide a detailed overview of Wi-Fi attacks and corresponding mitigation techniques against IoT Wi-Fi networks in a comprehensive taxonomy. In addition tools are mentioned for each Wi-Fi attack that allows, e.g., professionals or network administrators to test the chosen Wi-Fi attacks against their IoT networks. Four types of attack (categories) were defined, Man-in-the-Middle (MitM), Key-recovery, Traffic Decryption, and Denial of Service (DoS) attacks. A set of Wi-Fi attack features were defined and decribed. The features included the security protocol and security mode, the layer (physical or data-link) that an attack targets, and the network component interaction required to allow a Wi-Fi attack to execute successfully. In total, 20 Wi-Fi attacks were selected with relevance to IoT in Wi-Fi networks based on some criteria. Additonally, each Wi-Fi attack consist of a description of possible consequences/results an adversary can achieve, such as eavesdropping, data theft, key recovery, and many more. Flow charts were also added to give the reader a visual perspective on how an attack works. As a result, tables were created for each relevant security protocol and the Open Systems Interconnection (OSI) layers to create a overview of mitigations and available tools for each attack. Furthermore, WPA3 was discussed on how it solves some shortcomings of WPA2 but has vulnerabilities of it own that lie in the design of the 4-way and dragonfly handshake itself. In conclusion, development and proper vulnerability tests on the Wi-Fi standards and security protocols have to be conducted to improve and reduce the possibility of current and upcoming vulnerabilities.

    Download full text (pdf)
    A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks:physical and data-link layer
  • 8.
    Alsouda, Yasser
    et al.
    Linnaeus University, Faculty of Technology, Department of Physics and Electrical Engineering.
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Kurti, Arianit
    RISE Interactive, Sweden.
    A Machine Learning Driven IoT Solution for Noise Classification in Smart Cities2018In: Machine Learning Driven Technologies and Architectures for Intelligent Internet of Things (ML-IoT), August 28, 2018, Prague, Czech Republic, Euromicro , 2018, p. 1-6Conference paper (Refereed)
    Abstract [en]

    We present a machine learning based method for noise classification using a low-power and inexpensive IoT unit. We use Mel-frequency cepstral coefficients for audio feature extraction and supervised classification algorithms (that is, support vector machine and k-nearest neighbors) for noise classification. We evaluate our approach experimentally with a dataset of about 3000 sound samples grouped in eight sound classes (such as, car horn, jackhammer, or street music). We explore the parameter space of support vector machine and k-nearest neighbors algorithms to estimate the optimal parameter values for classification of sound samples in the dataset under study. We achieve a noise classification accuracy in the range 85% -- 100%. Training and testing of our k-nearest neighbors (k = 1) implementation on Raspberry Pi Zero W is less than a second for a dataset with features of more than 3000 sound samples.

  • 9.
    Alsouda, Yasser
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    IoT-based Urban Noise Identification Using Machine Learning: Performance of SVM, KNN, Bagging, and Random Forest2019In: Proceedings of the International Conference on Omni-Layer Intelligent Systems (COINS '19), New York: ACM Publications, 2019, p. 62-67Conference paper (Refereed)
    Abstract [en]

    Noise is any undesired environmental sound. A sound at the same dB level may be perceived as annoying noise or as pleasant music. Therefore, it is necessary to go beyond the state-of-the-art approaches that measure only the dB level and also identify the type of noise. In this paper, we present a machine learning based method for urban noise identification using an inexpensive IoT unit. We use Mel-frequency cepstral coefficients for audio feature extraction and supervised classification algorithms (that is, support vector machine, k-nearest neighbors, bootstrap aggregation, and random forest) for noise classification. We evaluate our approach experimentally with a data-set of about 3000 sound samples grouped in eight sound classes (such as car horn, jackhammer, or street music). We explore the parameter space of the four algorithms to estimate the optimal parameter values for classification of sound samples in the data-set under study. We achieve a noise classification accuracy in the range 88% - 94%.

  • 10.
    Alwan, Alaa
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Secure Application Development2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. In the context of software programs, the output that attackers observe will not carry any information about the confidential input information. Integrity is the dual of confidentiality, i.e., unauthorized and untrusted data provided to the system will not affect or modify the system’s data. Availability means that systems must be available at a reasonable time. Information flow control is a mechanism to enforce confidentiality and integrity. An accurate security assessment is critical in an age when the open nature of modern software-based systems makes them vulnerable to exploitation. Security testing that verifies and validates software systems is prone to false positives, false negatives, and other such errors, requiring more resilient tools to provide an efficient way to evaluate the threats and vulnerabilities of a given system. Therefore, the newly developed tool Reax controls information flow in Java programs by synthesizing conditions under which a method or an application is secure. Reax is a command-line application, and it is hard to be used by developers. This project has its primary goal to integrate Reax by introducing a plugin for Java IDEs to perform an advanced analysis of security flaws. Specifically, by design, a graphical plugin performs advanced security analysis that detects and reacts directly to security flaws within the graphical widget toolkit environment (SWT). The project proposed a new algorithm to find the root cause of security violations through a graphical interface as a second important goal. As a result, developers will be able to detect security violations and fix their code during the implementation phase, reducing costs.

    Download full text (pdf)
    Alaa Alwan's thesis
  • 11.
    Amaral, Vasco
    et al.
    Universidade Nova de Lisboa, Portugal.
    Norberto, Beatriz
    Universidade Nova de Lisboa, Portugal.
    Goulão, Miguel
    Universidade Nova de Lisboa, Portugal.
    Aldinucci, Marco
    University of Torino, Italy.
    Benkner, Siegfried
    University of Vienna, Austria.
    Bracciali, Andrea
    University of Stirling, UK.
    Carreira, Paulo
    Universidade de Lisboa, Portugal.
    Celms, Edgars
    University of Latvia, Latvia.
    Correia, Luís
    Universidade de Lisboa, Portugal.
    Grelck, Clemens
    University of Amsterdam, Netherlands.
    Karatza, Helen
    Aristotle University of Thessaloniki, Greece.
    Kessler, Christoph
    Linköping University, Sweden.
    Kilpatrick, Peter
    Queens University Belfast, UK.
    Martiniano, Hugo
    Universidade de Lisboa, Portugal.
    Mavridis, Ilias
    Aristotle University of Thessaloniki, Greece.
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Respício, Ana
    Universidade de Lisboa, Portugal.
    Simão, José
    Instituto Politécnico de Lisboa, Portugal.
    Veiga, Luís
    Universidade de Lisboa, Portugal.
    Visa, Ari
    Tampere University, Finland.
    Programming Languages for Data-Intensive HPC Applications: a Systematic Mapping Study2020In: Parallel Computing, ISSN 0167-8191, E-ISSN 1872-7336, Vol. 91, p. 1-17, article id 102584Article in journal (Refereed)
    Abstract [en]

    A major challenge in modelling and simulation is the need to combine expertise in both software technologies and a given scientific domain. When High-Performance Computing (HPC) is required to solve a scientific problem, software development becomes a problematic issue. Considering the complexity of the software for HPC, it is useful to identify programming languages that can be used to alleviate this issue. Because the existing literature on the topic of HPC is very dispersed, we performed a Systematic Mapping Study (SMS) in the context of the European COST Action cHiPSet. This literature study maps characteristics of various programming languages for data-intensive HPC applications, including category, typical user profiles, effectiveness, and type of articles. We organised the SMS in two phases. In the first phase, relevant articles are identified employing an automated keyword-based search in eight digital libraries. This lead to an initial sample of 420 papers, which was then narrowed down in a second phase by human inspection of article abstracts, titles and keywords to 152 relevant articles published in the period 2006–2018. The analysis of these articles enabled us to identify 26 programming languages referred to in 33 of relevant articles. We compared the outcome of the mapping study with results of our questionnaire-based survey that involved 57 HPC experts. The mapping study and the survey revealed that the desired features of programming languages for data-intensive HPC applications are portability, performance and usability. Furthermore, we observed that the majority of the programming languages used in the context of data-intensive HPC applications are text-based general-purpose programming languages. Typically these have a steep learning curve, which makes them difficult to adopt. We believe that the outcome of this study will inspire future research and development in programming languages for data-intensive HPC applications.

  • 12.
    Amatya, Suyesh
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Kurti, Arianit
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Cross-Platform Mobile Development: Challenges and Opportunities2014In: ICT Innovations 2013: ICT Innovations and Education / [ed] Vladimir Trajkovik and Misev Anastas, Springer, 2014, 1, p. 219-229Chapter in book (Refereed)
    Abstract [en]

    Mobile devices and mobile computing have made tremendous advances and become ubiquitous in the last few years. As a result, the landscape has become seriously fragmented which brings lots of challenges for the mobile development process. Whilst native approach of mobile development still is the predominant way to develop for a particular mobile platform, recently there is shifting towards cross-platform mobile development as well. In this paper, we have performed a survey of the literature to see the trends in cross-platform mobile development over the last few years. With the result of the survey, we argue that the web-based approach and in particular,hybrid approach, of mobile development serves the best for cross-platform development. The results of this work indicate that even though cross platform tools are not fully matured they show great potential. Thus we consider that cross-platform development offers great opportunities for rapid development of high-fidelity prototypes of the mobile application.

  • 13.
    Ambrosius, Robin
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Machine Learning Based Optimizations for Bot Aided Interviews: In the Field of Due Diligence2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Startups need investments in order to scale their business. The value of such startups, especially software-based startups, are difficult to evaluate because there is no physical value that can be judged.  The company DueDive built experience in due diligence by conducting many interviews in this area, which are the base for the due diligence. These interviews are time consuming and require a lot of domain knowledge in the field, which makes them very expensive. This thesis evaluated different machine learning algorithms to integrate into a software that supports such interviews process. The goal is to shorten the interview duration and lowering the required know know for the interviewer using suggestions by the AI. The software uses completed interview sessions to provide enhanced suggestions through artificial intelligence. The proposed solution uses basket analysis and imputation to analyze the collected data. The result is a topic-independent software that is used to administrate and carry out interviews with the help of AI. The results are validated and evaluated in a case study using a generic, self-defined interview.

  • 14.
    Andersson, Jesper
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Caporuscio, Mauro
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Aligning Architectures for Sustainability2016In: ACM Proccedings of the 10th European Conference on Software Architecture Workshops (ECSA-W) / [ed] Rami Bahsoon and Rainer Weinreich, ACM Press, 2016, article id 13Conference paper (Refereed)
    Abstract [en]

    The digitization of industry has drastically changed the competitive landscape by requiring a higher degree of specialization and shorter time to delivery that affect the design properties a software platform should satisfy. The platform architecture must sustain continuous and rapid change to the organizational architecture, which in turn is affected by external forces: i.e., forces drive the velocity of change. In this paper, we explore the effects of digitization, characterizing internal and external forces that impact on business strategies and trigger the continuous realignment of the platform, and outline a research agenda to mitigate the effects.

  • 15.
    Andras, Balla
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    A comparison between serverless and Docker container deployments: In the cloud2018Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    Designing an application from top to bottom is a challenge for any software architect. Designing an application to be deployed in the cloud adds extra complexity and a variety of questions to the task. One of these questions is how to deploy an application? The most popular choices at this time are either Docker containers or serverless functions. This report presents a comparison between the two deployment methods based on cost and performance. The comparison did not yield a conclusive winner but it did offer some key pointers to help with the decision. Docker containers offer a standardized deployment method for a low price and with good performance. Before choosing Docker the intended market needs to be evaluated given that for each region Docker needs to serve, the price also increases. Serverless functions offer auto-scaling and easy global deployments but suffer from high complexity, slower performance, and an uncertain monthly price tag.

    Download full text (pdf)
    fulltext
  • 16.
    Annerbrink, Totte
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Talovic, Nizar
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Den avskalade effekten: Om effekten av ett minimalistiskt skrivverktyg och hur det upplevs i en interaktiv användningssituation2017Student paper second term, 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis and report has addressed and focused on identifying the interaction effect that occurs when an information system's interface is scaled off and is minimalistic. This case study is based on a web-based writing tool called Writer. The purpose of the research has been to clarify the personal interaction effect in an interactive usage situation and how it in turn affects the user experience. The theoretical field and framework of the study is Actability , focusing on the interactive action level in connection with The Elementary InterAction Loop . The Elementary InterAction Loop consists of four steps where the user asks, does, gets an answer and then evaluates. In conjunction with the theory, five interaction criteria have been incorporated, which are; Clear Action Repertoire , Intelligible Vocabulary , Action Transparency , Clear Feedback , and Amendability . These five criteria have been the thematization of the empirical work.

    Through both targeted selection and snowball sampling, six journalists/writers have been involved in collecting data. In the method work, user test was performed on the writing tool with tasks formulated in accordance to the five interaction criteria. In the method work, user tests was performed on the writing tool. Thereafter the tasks was formed according to the five interaction criteria from the theoretical framework. All informants evaluated their experience and made thirteen statements based on a user experience questionnaire where concepts such as easy to learn/not easy to learn and effective/ineffective were asked for. Following these two steps in the empirical study, semi-structured interviews were conducted with fifteen questions based on the five interaction qualities. In order to analyze the collected data, the content analysis method was applied which resulted in 25 categories with descriptions and quotes. Based on a content analysis and its results, the categories were then analyzed using the D.EU.PS model and its 18 classes. The analysis resulted in ten interaction effects placed in seven different classes. The result and the ten interaction effects are: Security, Previous references, Terminology, Recognition, Understanding of sequence/action, Perception, Simplicity, Efficiency Availability and Grouping (proximity). Based on personal behavior as a perspective, these effects are the result of a minimalistic writing tool that contributes to a good user experience.

    Download full text (pdf)
    Den avskalade effekten
  • 17.
    Assenza, Giacomo
    et al.
    University Campus Biomedico of Rome, Italy.
    Cozzani, Valerio
    University of Bologna, Italy.
    Flammini, Francesco
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Gotcheva, Nadezhda
    VTT Technical Research Centre of Finland, Finland.
    Gustafsson, Tommy
    Swedish Defence Research Agency, Sweden.
    Hansson, Anders
    Sectra Communications AB, Sweden.
    Heikkila, Jouko
    VTT Technical Research Centre of Finland, Finland.
    Iaiani, Matteo
    University of Bologna, Italy.
    Katsikas, Sokratis
    Norwegian University of Science and Technology, Norway.
    Nissilä, Minna
    VTT Technical Research Centre of Finland, Finland.
    Oliva, Gabriele
    University Campus Biomedico of Rome, Italy.
    Richter, Eleni
    EnBW Energie Baden-Württemberg AG, Germany.
    Roelofs, Maaike
    Netherlands Organisation for Applied Scientific Research TNO, Netherlands.
    Saman Azari, Mehdi
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Setola, Roberto
    University Campus Biomedico of Rome, Italy.
    Stejin, Wouter
    Netherlands Organisation for Applied Scientific Research TNO, Netherlands.
    Tugnoli, Alessandro
    University of Bologna, Italy.
    Vanderbeek, Dolf
    Netherlands Organisation for Applied Scientific Research TNO, Netherlands.
    Westerdahl, Lars
    Swedish Defence Research Agency, Sweden.
    Ylönen, Marja
    VTT Technical Research Centre of Finland, Finland.
    Young, Heather
    Netherlands Organisation for Applied Scientific Research TNO, Netherlands.
    White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 20192020In: Critical Information Infrastructures Security14th International Conference, CRITIS 2019,: Linköping, Sweden, September 23–25, 2019, Revised Selected Papers / [ed] Simin Nadjm-Tehrani, Springer, 2020, p. 197-207Chapter in book (Refereed)
    Abstract [en]

    The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within the 14th International Conference on Critical Information Infrastructures Security (CRITIS 2019). As such, it provides an overview of recent practical experience reports in the field of critical infrastructure protection (CIP), involving major industry players. The set of cases reported in this paper includes the usage of serious gaming for training infrastructure operators, integrated safety and security management in the chemical/process industry, risks related to the cyber-economy for energy suppliers, smart troubleshooting in the Internet of Things (IoT), as well as intrusion detection in power distribution Supervisory Control And Data Acquisition (SCADA). The session has been organized to stimulate an open scientific discussion about industry challenges, open issues and future opportunities in CIP research.

  • 18.
    Aster, Maximilian
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Repackaging Web Pages2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Current trends in the market of Web-enabled devices are moving the focus from desktop web pages to pages optimised for a set of other devices like smartphones or tablets. Within this thesis an approach is introduced, able to adapt and automatically transform web pages and even the web applications logic flow into a new kind of representation, specifically for a certain target group. Therefore a general process is defined to describe the various phases that have to be gone through to transform or repackage a website. It serves as the basis for the solution, which was built as part of this thesis, and incorporates state of the art concepts and methods from various fields of Web Science. The implemented artefacts demonstrate how an appropriate architecture looks like and what additional possibilities open up.

  • 19.
    Augustsson, Jesper
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Salomonsson, Peter
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Gamification - Samspelet mellan människor och IT: Undersökning av spelmekanismers motivationshöjande effekter2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This bachelor thesis is a study to investigate the game mechanics in a selected training application. The study aims to create a greater understanding of why people get motivational effects with the help of information technology. This will be done by examining the users of the example Nike + to find out what features they consider giving them a motivating effect and thus describe the game mechanics these include.

     

    The study uses a qualitative approach to carryout interviews with the users of our example Nike+. The interview questions are based in theory of the field Gamification and previous research on the topic.

     

    The result shows that there are several different game mechanics implemented in Nike +, which has a positive impact on users. The result strengthens the game mechanics informants set positively towards making running a fun form of exercise as well as increased training frequency of our informants.

    Download full text (pdf)
    fulltext
  • 20.
    Baglee, David
    et al.
    University of Sunderland, UK.
    Gorostegui, Unai
    Mondragon University, Spain.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland, Finland.
    Campos, Jaime
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Sharma, Pankaj
    Indian Institute of Technology Delhi, India.
    Optimizing Condition Monitoring of Big Data Systems2017In: Proceedings of the 2017 International Conference on Data Mining: DMIN'17 / [ed] Robert Stahlbock, Mahmoud Abou-Nasr, Gary M. Weiss, CSREA Press, 2017, p. 127-131Conference paper (Refereed)
    Abstract [en]

    Industrial communication networks are common in a number of manufacturing organisations. The high availability of these networks is crucial for smooth plant operations. Therefore local and remote diagnostics of these networks is of primary importance in determining issues relating to plant reliability and availability. Condition Monitoring (CM) techniques when connected to a network provide a diagnostic system for remote monitoring of manufacturing equipment. The system monitors the health of the network and the equipment and is therefore able to predict performance. However, this leads to the collection, storage and analyses of large amounts of data, which must provide value. These large data sets are commonly referred to as Big Data. This paper presents a general concept of the use of condition monitoring and big data systems to show how they complement each other to provide valuable data to enhance manufacturing competiveness.

  • 21.
    Baglee, David
    et al.
    University of Sunderland, UK.
    Gorostegui, Unai
    Mondragon University, Spain.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland, Finland.
    Sharma, Pankaj
    Indian Institute of Technology Dehli, India.
    Campos, Jaime
    Linnaeus University, Faculty of Technology, Department of Informatics.
    How can SMEs adopt a new method to advanced maintenance strategies: A Case study approach2018In: Conference Proceedings: 30th International Conference on Condition Monitoring and Diagnostic Engineering Management (COMADEM 2017) / [ed] Ian Sherrington;A. Onsy;H. Brooks;J. George;R. Rao, University of Central Lancashire , 2018, p. 155-162Conference paper (Refereed)
    Abstract [en]

    Maintenance is crucial to manufacturing operations. In many organisations, the production equipmentrepresents the majority of invested capital, and deterioration of these facilities and equipment increasesproduction costs, reduces product quality. Over recent years the importance of maintenance, and thereforemaintenance management, within manufacturing organisations has grown. The maintenance function hasbecome an increasingly important and complex activity, particularly as automation increases. Theopportunity exists for many organisations to benefit substantially through improvements to theircompetitiveness and profitability by adopting a new approach to maintenance management. Several toolsand technologies including Condition Based Maintenance (CBM), Reliability Centred Maintenance (RCM)and more recently e-maintenance have developed under the heading of Advanced Maintenance Strategies.However, the adoption of advanced maintenance strategies and their potential benefits are usuallydemonstrated in large organisations. Unfortunately, the majority of organisations are constrained by thelack of knowledge and understanding on the requirements, which need to be in place before adopting anadvanced maintenance strategy. These are usually classified as Small and Medium Sized Enterprises(SMEs).The research strategy is based on ‘empirical iterations’ using survey secondary data, experts’ interviewsinformation and multiple case studies. The results show that there is a set of recommendations, whichstrongly influence the implementation of an Advanced Maintenance Strategy (AMS) with a Small toMedium Enterprise (SME). Organisations require a structured and integrative approach in order to takeadvantage of a new approach to maintenance management. This paper will propose recommendations forintegrating an AMS into the organisation and provide evidence of a successful implementation.

  • 22.
    Bartosz, Michalek
    et al.
    Katholieke Univ Leuven, Belgium.
    Weyns, Danny
    Katholieke Univ Leuven, Belgium.
    Towards a Solution for Change Impact Analysis of Software Product Line Products2011In: VARSA Workshop; Software Architecture (WICSA), 2011 9th Working IEEE/IFIP Conference on, IEEE, 2011, p. 290-293Conference paper (Refereed)
    Abstract [en]

    Despite the fact that some practitioners and researchers report successful stories on Software ProductLines (SPL) adaptation, the evolution of SPL remains challenging. In our research we study a specific aspect of SPL adaptation, namely on updating of deployed products. Our particular focus is on the correct execution of updates and minimal interruption of services during the updates. The update process has two stages. First, the products affected by the evolution must be identified. We call this stage SPL-wide change impact analysis. In the second stage, each of the affected products has to be updated. In our previous work we have addressed the second stage of the update process. In this paper we report on our early results of the first stage: change impact analysis. We discuss how existing variability models can be employed to support automated identification of the products that require an update. The discussion is illustrated with the examples from an educational SPL that we are developing at K.U. Leuven.

  • 23.
    Bashir, Imran
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Visualizing Complex Data Using Timeline2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis  introduces the idea of visualizing complex data using timeline for problem solving and analyzing a huge database. The database contains information about vehicles, which are continuously sending information about driving behavior, current location, driver ativities etc. Data complexity can be resolved by data visualization where user can see this complex data in the abstract form of timeline visualization. visualize complex data by using timeline mgiht help to monitor and track diffrent time dependent activities. We developed web application to monitor and track monthly, weekly, and daily activities which helps in decision making and understanding complex data.

    Download full text (pdf)
    fulltext
  • 24.
    Beel, Joeran
    et al.
    Docear, Germany ; Konstanz University, Germany.
    Breitinger, Corinna
    Linnaeus University, Faculty of Technology, Department of Media Technology. Docear, Germany.
    Langer, Stefan
    Docear, Germany ; Otto-von-Guericke University, Germany.
    Lommatzsch, Andreas
    Technische Universität Berlin, Germany.
    Gipp, Bela
    Docear, Germany ; Konstanz University, Germany.
    Towards reproducibility in recommender-systems research2016In: User modeling and user-adapted interaction, ISSN 0924-1868, E-ISSN 1573-1391, Vol. 26, no 1, p. 69-101Article in journal (Refereed)
    Abstract [en]

    Numerous recommendation approaches are in use today. However, comparing their effectiveness is a challenging task because evaluation results are rarely reproducible. In this article, we examine the challenge of reproducibility in recommender-system research. We conduct experiments using Plista’s news recommender system, and Docear’s research-paper recommender system. The experiments show that there are large discrepancies in the effectiveness of identical recommendation approaches in only slightly different scenarios, as well as large discrepancies for slightly different approaches in identical scenarios. For example, in one news-recommendation scenario, the performance of a content-based filtering approach was twice as high as the second-best approach, while in another scenario the same content-based filtering approach was the worst performing approach. We found several determinants that may contribute to the large discrepancies observed in recommendation effectiveness. Determinants we examined include user characteristics (gender and age), datasets, weighting schemes, the time at which recommendations were shown, and user-model size. Some of the determinants have interdependencies. For instance, the optimal size of an algorithms’ user model depended on users’ age. Since minor variations in approaches and scenarios can lead to significant changes in a recommendation approach’s performance, ensuring reproducibility of experimental results is difficult. We discuss these findings and conclude that to ensure reproducibility, the recommender-system community needs to (1) survey other research fields and learn from them, (2) find a common understanding of reproducibility, (3) identify and understand the determinants that affect reproducibility, (4) conduct more comprehensive experiments, (5) modernize publication practices, (6) foster the development and use of recommendation frameworks, and (7) establish best-practice guidelines for recommender-systems research. © 2016, Springer Science+Business Media Dordrecht.

  • 25.
    Bengtsson, Emil
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Mattsson, Emil
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Smart task logging: Prediction of tasks for timesheets with machine learning2018Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Every day most people are using applications and services that are utilising machine learning, in some way, without even knowing it. Some of these applications and services could, for example, be Google’s search engine, Netflix’s recommendations, or Spotify’s music tips. For machine learning to work it needs data, and often a large amount of it. Roughly 2,5 quintillion bytes of data are created every day in the modern information society. This huge amount of data can be utilised to make applications and systems smarter and automated. Time logging systems today are usually not smart since users of these systems still must enter data manually. This bachelor thesis will explore the possibility of applying machine learning to task logging systems, to make it smarter and automated. The machine learning algorithm that is used to predict the user’s task, is called multiclass logistic regression, which is categorical. When a small amount of training data was used in the machine learning process the predictions of a task had a success rate of about 91%.

    Download full text (pdf)
    fulltext
  • 26.
    Bergsaker, Agnethe
    Linnaeus University, Faculty of Technology, Department of Informatics. Centrum för Informationslogistik.
    Standardsystem och användbarhet: Hur ska man som utvecklare säkra att användbarhet uppnås i små SharePoint-projekt?2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, ICT (Information and Communication Technology) is often used to distribute and communicate information internal and external. One of the great tools for information management is the intranet. This research is focused on usability regarding small SharePoint-projects. Usability covers the factors: usefulness, customization and user acceptance. A small SharePoint-project (less than 300 working hours) has fewer resources available for focusing on usability.

    The purpose with this research is to examine developers’ attitudes regarding usability and how usability is best achieved in small projects where resources are limited. A quantitative method has been used to conduct a case study consisting of three developers in a consulting company. The interviews were semi-structured.

    The result from the research concludes that user acceptance is the key factor for an intranet to be perceived as useful by the users. Usefulness in a standard SharePoint solution is relatively defined and in place. Customization of a solution instead of using the built-in standards is often more costly and resource intensive. Developers should therefore focus on education, user involvement, communication and other factors that may increase acceptance among the end users.

    Download full text (pdf)
    Examensarbete i Informatik: Standardsystem och användbarhet - Agnethe Bergsaker
  • 27.
    Blagodárný, David
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Do Privacy Concerns Matter in Adoption of Location-based Smartphone Applications for Entertainment Purposes: A Study Among University Students in Sweden2017Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Adoption of location-based services (LBS) was for a long time below expectations, and most of the studies attribute it to privacy concerns of users. However, many new LBS applications are currently among the most downloaded application for smartphones, particularly entertainment applications. Therefore, this research aims to find out whether privacy concerns still matter to users and to explore the role of the privacy in the adoption of LBS entertaining applications. The adopted methodology is qualitative research and data are collected through interviews and additional information from the smartphones ofparticipants. Ten individuals among university students at Linnaeus University in Sweden are selected for this research, and this sample choice is per their experience with two selected LBS entertaining applications, Pokémon Go and Tinder. As a result, six themes have been recognized to answer the research questions. Low privacy concerns about location information, especially in entertainment applications with negligible effect on adoption have been identified. However, author of this research suggests, that developers of LBS entertaining applications should care for retaining their credibility because it can have an impact on the adoption of their LBS services.

    Download full text (pdf)
    fulltext
  • 28.
    Blixt, Daniel
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nilsson, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Control systems on inexpensive hardware: Supporting Raspberry Pi in an existingdevelopment environment2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report aims to describe our bachelor degree projectin computer engineeringat Linnaeus university in Växjö. The project has been carried out on behalf of Danfoss whoapproached us with an interest in making it possible to use Raspberry Pi as an internal and external research platform, compatiblewith their development environment PLUS+1 GUIDE.We were therefore given the task to develop support for Raspberry Pi in PLUS+1 GUIDE. This would enable use of PLUS+1 GUIDE software without the use of Danfoss hardware. This report describes theimplementation of a Raspberry Pi support librarywhich had to be designed to be compatible with the PLUS+1 GUIDE software. It also describes the creation of acustomLinux distributionusing the YoctoProject, a comparison between existing solutionsand a usability test on thePLUS+1 GUIDEsoftware using the developedRaspberry Pi support library.The resultof this workis fully functioning support forRaspberry Pi packaged as a plugin that when installed in PLUS+1 GUIDE allows creation of applications for this platform in the same manner as fortheirother control systems.

  • 29.
    Bodare, Max
    Linnaeus University, Faculty of Technology, Kalmar Maritime Academy.
    Digital tillsyn: En kvalitativ undersökning om hur maskinbesättningen till sjöss upplever en digital rond2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Tillsynsrond är en stor del av arbetsgången, för driftpersonal, i maskinrummet på ett fartyg. Det tillhör det förebyggande underhåll som tillämpas ombord. Idag använd till största utbredningen en metod som innefattar en färdig rondlista som skrivs ut på papper för att sedan kunna användas av driftpersonal vid rondering. Utifrån detta undersöka en ny metod för rondering till sjöss. Syftet med arbetet var att undersöka hur en digital rond uppfattas av maskinbesättningen. Genom att låta besättningen prova en digital rond skapad utifrån deras nuvarande rondlistor och sedan svara på frågor i en enkät, kunde en uppfattning byggas om en digital rond kan praktisk tillämpas till sjöss. Även om det kan tidsbespara arbetet och om besättningen tror det finns en framtid med metoden. Resultatet visar att de flesta i testgruppen ser en framtid med en digital rond och att det kan underlätta arbetet om metoden vidareutvecklas. Med detta digitala rondverktyg tog dock ronden längre tid.

    Download full text (pdf)
    fulltext
  • 30.
    Boobalan, Parimala
    et al.
    Vellore Institute of Technology, India.
    Ramu, Swarna Priya
    Vellore Institute of Technology, India.
    Pham, Quoc-Viet
    Pusan National University, Republic of Korea.
    Dev, Kapal
    University of Johannesburg, South Africa.
    Pandya, Sharnil
    Symbiosis International (Deemed) University, India.
    Maddikunta, Praveen Kumar Reddy
    Vellore Institute of Technology, India.
    Gadekallu, Thippa Reddy
    Vellore Institute of Technology, India.
    Huynh-The, Thien
    Kumoh National Institute of Technology, Republic of Korea.
    Fusion of Federated Learning and Industrial Internet of Things: A survey2022In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 212, article id 109048Article in journal (Refereed)
    Abstract [en]

    Industrial Internet of Things (IIoT) lays a new paradigm for the concept of Industry 4.0 and paves an insight for new industrial era. Nowadays smart machines and smart factories use machine learning/deep learning based models for incurring intelligence. However, storing and communicating the data to the cloud and end device leads to issues in preserving privacy. In order to address this issue, Federated Learning (FL) technology is implemented in IIoT by the researchers nowadays to provide safe, accurate, robust and unbiased models. Integrating FL in IIoT ensures that no local sensitive data is exchanged, as the distribution of learning models over the edge devices has become more common with FL. Therefore, only the encrypted notifications and parameters are communicated to the central server. In this paper, we provide a thorough overview on integrating FL with IIoT in terms of privacy, resource and data management. The survey starts by articulating IIoT characteristics and fundamentals of distributed machine learning and FL. The motivation behind integrating IIoT and FL for achieving data privacy preservation and on-device learning are summarized. Then we discuss the potential of using machine learning (ML), deep learning (DL) and blockchain techniques for FL in secure IIoT. Further we analyze and summarize several ways to handle the heterogeneous and huge data. Comprehensive background on data and resource management are then presented, followed by applications of IIoT with FL in automotive, robotics, agriculture, energy, and healthcare industries. Finally, we shed light on challenges, some possible solutions and potential directions for future research.

  • 31.
    Bozios, Athanasios
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Fog Computing: Architecture and Security aspects2018Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    As the number of Internet of Things (IoT) devices that are used daily is increasing, the inadequacy of cloud computing to provide neseccary IoT-related features, such as low latency, geographic distribution and location awareness, is becoming more evident. Fog computing is introduced as a new computing paradigm, in order to solve this problem by extending the cloud‟s storage and computing resources to the network edge. However, the introduction of this new paradigm is also confronted by various security threats and challenges since the security practices that are implemented in cloud computing cannot be applied directly to this new architecture paradigm. To this end, various papers have been published in the context of fog computing security, in an effort to establish the best security practices towards the standardization of fog computing. In this thesis, we perform a systematic literature review of current research in order to provide with a classification of the various security threats and challenges in fog computing. Furthermore, we present the solutions that have been proposed so far and which security challenge do they address. Finally, we attempt to distinguish common aspects between the various proposals, evaluate current research on the subject and suggest directions for future research.

    Download full text (pdf)
    fulltext
  • 32.
    Brandic, Ivona
    et al.
    University of Vienna, Austria.
    Pllana, Sabri
    University of Vienna, Austria.
    Benkner, Siegfried
    University of Vienna, Austria.
    An approach for the high-level specification of QoS-aware grid workflows considering location affinity2006In: Scientific Programming, ISSN 1058-9244, E-ISSN 1875-919X, Vol. 14, no 3-4, p. 231-250Article in journal (Refereed)
    Abstract [en]

    Many important scientific and engineering problems may be solved by combining multiple applications in the form of a Grid workflow. We consider that for the wide acceptance of Grid technology it is important that the user has the possibility to express requirements on Quality of Service (QoS) at workflow specification time. However, most of the existing workflow languages lack constructs for QoS specification. In this paper we present an approach for high level workflow specification that considers a comprehensive set of QoS requirements. Besides performance related QoS, it includes economical, legal and security aspects. For instance, for security or legal reasons the user may express the location affinity regarding Grid resources on which certain workflow tasks may be executed. Our QoS-aware workflow system provides support for the whole workflow life cycle from specification to execution. Workflow is specified graphically, in an intuitive manner, based on a standard visual modeling language. A set of QoS-aware service-oriented components is provided for workflow planning to support automatic constraint-based service negotiation and workflow optimization. For reducing the complexity of workflow planning, we introduce a QoS-aware workflow reduction technique. We illustrate our approach with a real-world workflow for maxillo facial surgery simulation.

    Download full text (pdf)
    fulltext
  • 33.
    Brandin, Jacob
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Lundgren, Julia
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Identification of the factors affecting KMS adoption and utilization for the technical training process: A single-case study within heavy industry2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The intensifying value of learning, competence, and knowledge motivates decisions toward implementing knowledge management systems (KMS) to capitalize on the potential benefits of facilitating knowledge sharing, collecting, storing, and dissemination on a global scale. However, these systems frequently remain underutilized, and organizations encounter obstacles to achieve their proposed outcome. The case company experienced practical problems regarding a newly implemented KMS. The system was largely unused for a specific process. Therefore, this case study investigates the factors affecting KMS adoption and utilization for the technical training process by capturing the perspectives of the intended system users and management. A combination of KMS success factors and The Theory of Affordances were applied to generate knowledge regarding how factors affected the usage of the KMS. It was found that Management Involvement, Organizational Culture and Structure, Employee Commitment, Perceived Benefits, System Complexity, and Compatibility and Conformity influenced the users' KMS utilization outcomes. A conceptual framework was developed to show how these factors affected individuals' affordances process.

    Download full text (pdf)
    fulltext
  • 34.
    Brolien, Malin
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Lycksén, Daniel
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    De-Icing Management Tool V2: Utveckling av grafiska gränssnitt till ett system för hantering av avisning2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 35. Broschert, Stefan
    et al.
    Coughlin, Tom
    Ferraris, Mourizio
    Flammini, Francesco
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Florido, Jose Gonzalez
    Gonzalez, Alejandro Cadenas
    Henz, Patrick
    de Kerckhove, Derrick
    Rosen, Roland
    Saracco, Roberto
    Singh, Aman
    Vitillo, Antony
    Yousif, Mazin
    Symbiotic Autonomous Systems: White Paper III2019Report (Other (popular science, discussion, etc.))
  • 36.
    Buemi, Francesco
    et al.
    Aitek S., Italy.
    Esposito, Mariana
    Ansaldo STS, Italy ; University of Naples ”Federico II”, Italy.
    Flammini, Francesco
    Ansaldo STS, Italy.
    Mazzocca, Nicola
    University of Naples ”Federico II”, Italy.
    Pragliola, Concetta
    Ansaldo STS, Italy.
    Spirito, Marcella
    Aitek S., Italy.
    Empty vehicle detection with video analytics2013In: Image Analysis and Processing – ICIAP 2013. ICIAP 2013, Springer, 2013, no PART 2, p. 731-739Conference paper (Refereed)
    Abstract [en]

    An important issue to be addressed in transit security, in particular for driverless metro, is the assurance that a vehicle is empty before it returns to the depot. Customer specifications in recent tenders require that an automatic empty vehicle detector is provided. That improves system security since it prevents voluntary (e.g. in case of thieves or graffiti makers) or involuntary (e.g. in case of drunk or unconscious people) access of unauthorized people to the depot and possibly to other restricted areas. Without automatic systems, a manual inspection of the vehicle should be performed, requiring considerable personnel effort and being prone to failure. To address the issue, we have developed a reliable empty vehicle detection system using video content analytics techniques and standard on-board cameras. The system can automatically check whether the vehicles have been cleared from passengers, thus supporting the security staff and central control operators in providing a higher level of security. © 2013 Springer-Verlag.

  • 37.
    Campos, Jaime
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Current and Prospective Information and Communication Technologies for the e-maintenance applications2012In: Proceedings of the 2nd International Workshop & Congress on eMaintenance : Dec 12-14 Luleå, Sweden : eMaintenace: trends in technologies and methodologies, challenges, possibilities and applications, 2012, p. 57-62Conference paper (Refereed)
    Abstract [en]

    This paper is about the current state of affairs when it comes tothe Information and Communication Technologies (ICTs) inCondition Monitoring (CM) and Maintenance. In addition, thereare significant efforts done to standardise the systems for CM andMaintenance under discussion. The ICTs such as the Webtechnologies are presented, since they are an integral part of theE-maintenance approach. The author goes through the latestdevelopments in the area of Web technologies and the studiesconducted by the World Wide Web Consortium (W3C). Itemphasises the Semantic Web and its standardizing practices, theWeb 2.0 and its Social media technologies, which are nonexistingto the moment at the e-maintenance applications. Itdiscusses applications in the domain of interest and how the latestICTs, especially the developments of the Web technologies andthe Cloud computing, can make impact and might affect thefuture e-maintenance applications.

  • 38.
    Campos, Jaime
    Linnaeus University, Faculty of Technology, Department of Informatics. LNU.
    Modelling the Web 2.0 oriented sites for the e-maintenance applications2013In: International congress of condition monitoring and diagnostic engineering management: Congress Proceedings, COMADEM 2013, 11-13 June, Helsiki, 2013, p. 52-57Conference paper (Refereed)
  • 39.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Askenäs, Linda
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Important Aspects to Consider When Developing ICTs for Purposes of Fall Prevention in the eHealth Domain.2018In: Proceedings of the 1st International Workshop on Informatics & Data-Driven Medicine (IDDM 2018) Lviv, Ukraine, November 28-30, 2018. / [ed] Nataliya Shakhovska, Sergio Montenegro, Yannick Estève, Sergey Subbotin, Natalia Kryvinska, Ivan Izonin, ceur-ws.org , 2018, Vol. 2255, p. 229-238Conference paper (Refereed)
    Abstract [en]

    The current paper reviews briefly the eHealth domain, especially falldetection and prevention features, in connection with the developments of ICTs.The timely data signal providing identification of probable fall at early stages aswell as its specifics can prevent serious injuries. It is crucial for elderly peopleliving at home alone since it could affect their independent living. Therefore, thespecific and contextual characteristics of several related factors are essential tounderstand in order to be able to diminish or remove the risk of the fall of theelderly at risk. The current paper presents research in progress and its results inthe FRONT-VL project part of Celtic plus. The paper highlights essential factorsto consider when developing and implementing a semantic database model forpurposes, such as fault prevention.

  • 40.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland, Finland.
    Baglee, David
    University of Sunderland, UK.
    Fumagalli, Luca
    Politecnico di Milano, Italy .
    Emmanouilidis, Christos
    Cranfield University, UK.
    Gilabert, Eduardo
    Fundación TEKNIKER, Spain.
    Mobile Information Systems in Maintenance Engineering and Asset Management2016In: Journal of Societal Studies, ISSN 2029-2236, Vol. 8, no 2, p. 180-197Article in journal (Refereed)
    Abstract [en]

    The objective of this paper is to provide a profound insight into important characteristics with regard to the integration of mobile technology into the area of industrial maintenance. The aspects highlighted in the paper uncover, for instance, acceptance models and best practices, as well as the financial impact of mobile technologies in the domain of interest. Moreover, the paper pinpoints some important characteristics that impede full integration of these technologies into this area. In addition, the economic benefits and the current situation with regard to mobile integration are highlighted. In addition, relevant literature and theories are analysed and discussed. Furthermore, the industrial integration of mobile technologies is outlined. The results indicate that there is a tendency to place an emphasis on the technical aspects of mobile devices rather than on understanding the organisational context, which affects the integration of mobile technologies into this domain.

    The work provides a thorough understanding of best practices and aspects to consider for the successful integration of mobile technologies in this area. This is because the use of mobile devices enables maintenance staff to gain access to information and services pertaining to the task in hand in real time, as long as some form of network access is provided. Users of these devices thus become mobile actors who dynamically interact with the physical environment in the workplace and support information systems, leading to a faster response to events and improved organizational performance.

  • 41.
    Campos, Jaime
    et al.
    University of Kalmar, Department of Technology.
    Jantunen, Erkki
    Prakash, Om
    University of Kalmar, Department of Technology.
    A Mobile Maintenance Decision Support System2008In: Maintenance and Asset Management Journal, ISSN 1748-5290, Vol. 23, no 2, p. 42-48Article in journal (Refereed)
    Abstract [en]

    The development is reported of an e-maintenance system, ie a mobile maintenance decision supportsystem based on web and mobile technologies. The problem of the lack of experts to troubleshoot a fault ina machine is a long-standing one. It has led to the application of artificial intelligence and, later, distributedartificial intelligence for machine condition monitoring and diagnosis. Recently, web technology, alongwith wireless communication, is emerging as a potential tool in maintenance, facilitating acquisition ofthe desired information by the relevant personnel at any time, wherever they may be. It has been foundthat with the emergence of the new Information and Communications Technology (ICT) new conceptshave started to appear, such as e-manufacturing, e-business and e-maintenance. The paper begins byshowing the Web and Mobile architecture and then the ICT tools that are used for communication amongthe different layers of the system and the client machines. This is followed by a demonstration of the useof the system with a faulty bearing simulated signal. In addition, it is explained that a CMMS, ie a mobilework management system, has been tested, with successful results. Finally, it is shown how a mobileemulator was used to perfect the system for different requirements and how this was then tested on apersonal digital assistant (PDA).

  • 42.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics. LNU.
    Kortelainen, Juha
    VTT Technical Research Centre of Finland.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland.
    Product Lifecycle Simulation Applying Semantic Data Management2011In: Product Lifecycle Management: Virtual Product Lifecycles for Green Products and Services:Proceedings of the PLM11 conference held at the Eindhoven University of Technology, The Netherlands, 11-13 July 2011 / [ed] Pels, H.J., Bouras, A., & McMahon, C., 2011, p. 455-464Conference paper (Refereed)
    Abstract [en]

    Product lifecycle simulation (PLCS) has been given ever moreattention as the manufacturers are competing with the quality and lifecyclecosts of their products. Especially, the need of companies to try to get a strongposition in providing services for their products and thus to make themselvesless vulnerable to changes in the market has led to high interest in PLCS. Ashort summary of current status of PLCS is presented especially related to thepoor integration of data in product lifecycle management systems and in PLCS.The potential of applying semantic data management to solve these problems isthoroughly discussed in the light of recent development. A basic roadmap howthe above-described problems could be tackled with open software solutions ispresented. Finally, this paper reviews the emergent Web technologies such asthe Semantic Web framework and the Web services.

  • 43.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Sharma, Pankaj
    National University of Singapore, Singapore.
    Albano, Michele
    Aalborg University, Denmark.
    Jantunen, Erkki
    Technical Research Centre of Finland Ltd., Finland.
    Baglee, David
    University of Sunderland, UK.
    Ferreira, Luis Lino
    Polytechnic Institute of Porto, Portugal.
    Arrowhead Framework services for condition monitoring and maintenance based on the open source approach2019In: 6th International Conference on Control Decision Information Technologies (CoDIT 2019), IEEE, 2019, p. 697-702Conference paper (Refereed)
    Abstract [en]

    The emergence of new Information and Communication Technologies, such as the Internet of Things and big data and data analytics provides opportunities as well as challenges for the domain of interest, and this paper discusses their importance in condition monitoring and maintenance. In addition, the Open system architecture for condition-based maintenance (OSA-CBM), and the Predictive Health Monitoring methods are gone through. Thereafter, the paper uses bearing fault data from a simulation model with the aim to produce vibration signals where different parameters of the model can be controlled. In connection to the former mentioned a prototype was developed and tested for purposes of simulated rolling element bearing fault systems signals with appropriate fault diagnostic and analytics. The prototype was developed taking into consideration recommended standards (e.g., the OSA-CBM). In addition, the authors discuss the possibilities to incorporate the developed prototype into the Arrowhead framework, which would bring possibilities to: analyze various equipment geographically dispersed, especially in this case its rolling element bearing; support servitization of Predictive Health Monitoring methods and large-scale interoperability; and, to facilitate the appearance of novel actors in the area and thus competition.

  • 44.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Sharma, Pankaj
    Indian Institute of Technology Delhi, India.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland, Finland.
    Baglee, David
    University of Sunderland, UK.
    Fumagalli, Luca
    Politecnico di Milano, Italy.
    Business Performance Measurements in Asset Management with the Support of Big Data Technologies2017In: Management Systems in Production Engineering, ISSN 2299-0461, Vol. 25, no 3, p. 143-149Article in journal (Refereed)
    Abstract [en]

    The paper reviews the performance measurement in the domain of interest. Important data in asset management are further, discussed. The importance and the characteristics of today’s ICTs capabilities are also mentioned in the paper. The role of new concepts such as big data and data mining analytical technologies in managing the performance measurements in asset management are discussed in detail. The authors consequently suggest the use of the modified Balanced Scorecard methodology highlighting both quantitative and qualitative aspects, which is crucial for optimal use of the big data approach and technologies.

  • 45.
    Campos, Jaime
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Sharma, Pankaj
    Indian Institute of Technology (IIT) Delhi, India.
    Jantunen, Erkki
    VTT Technical Research Centre of Finland Ltd, Finland.
    Baglee, David
    University of Sunderland, UK.
    Fumagalli, Luca
    Politecnico di Milano, Italy.
    Business performance measurements in asset management with the support of big data technologies2016In: Proceedings of MPMM 2016: 6th International Conference on Maintenance Performance Measurement and Management, 28 November 2016, Luleå, Sweden / [ed] Diego Galar, Dammika Seneviratne, Luleå tekniska universitet , 2016, p. 89-95Conference paper (Refereed)
    Abstract [en]

    The paper reviews the performancemeasurement in the domain of interest. Important data in assetmanagement are further, discussed. The importance and thecharacteristics of today’s ICTs capabilities are also mentionedin the paper. The role of new concepts such as big data anddata mining analytical technologies in managing theperformance measurements in asset management are discussedin detail. The authors consequently suggest the use of themodified Balanced Scorecard methodology highlighting bothquantitative and qualitative aspects, which is crucial foroptimal use of the big data approach and technologies.

  • 46.
    Capano, B.
    et al.
    Rolls-Royce, Italy.
    Flammini, Francesco
    Università Italiane e Straniere, Italy.
    ICT in the era of Open Innovation2017In: Mondo Digitale, ISSN 1720-898X, Vol. 15, no 69, p. 221-240Article in journal (Refereed)
    Abstract [en]

    Due to the increasingly fast technological advancement of the ICT world, 'hi-tech' industries feel a growing need to open to the external world of research and innovation. The usage of external innovation sources allows overcoming the limits of internal resources in terms of capacities, skills and creativity. With respect to the traditional concept of "Closed Innovation", that is the innovation constrained within the internal R&D departments, the "Open Innovation" paradigm leverages on tools that enable importing external resources, thus boosting the quality and quantity of innovative technological solutions. In this paper the basic concepts and the possible "Open Innovation" applications will be presented, starting from the introduction of the paradigm as invented by Henry William Chesbrough in 2003. Furthermore, methodologies and computer tools will be described that are widely adopted to apply the paradigm to industrial settings, as well as the possible barriers to its implementation. Lastly, given the importance of universities, research centers and other companies as external sources for Open Innovation, some pointers will be provided to the selection process of technology innovation partners.

  • 47.
    Caporuscio, Mauro
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    D'Angelo, Mirko
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Grassi, Vincenzo
    Università di Roma Tor Vergata, Italy.
    Mirandola, Raffaela
    Politecnico di Milano, Italy.
    Decentralized Architecture for Energy-Aware Service Assembly2020In: Software Architecture: 14th European Conference, ECSA 2020, L'Aquila, Italy, September 14–18, 2020 / [ed] Anton Jansen, Ivano Malavolta, Henry MucciniIpek Ozkaya, Olaf Zimmermann, Springer, 2020, p. 57-72Conference paper (Refereed)
    Abstract [en]

    Contemporary application domains make more and more appealing the vision of applications built as a dynamic and opportunistic assembly of autonomous and independent resources. However, the adoption of such paradigm is challenged by: (i) the openness and scalability needs of the operating environment, which rule out approaches based on centralized architectures and, (ii) the increasing concern for sustainability issues, which makes particularly relevant, in addition to QoS constraints, the goal of reducing the application energy footprint. In this context, we contribute by proposing a decentralized architecture to build a fully functional assembly of distributed services, able to optimize its energy consumption, paying also attention to issues concerning the delivered quality of service. We suggest suitable indexes to measure from different perspectives the energy efficiency of the resulting assembly, and present the results of extensive simulation experiments to assess the effectiveness of our approach.

  • 48.
    Caporuscio, Mauro
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Edrisi, Farid
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Hallberg, Margrethe
    Scania AB, Sweden.
    Johannesson, Anton
    Virtual Manufacturing AB, Sweden.
    Kopf, Claudia
    Scania AB, Sweden.
    Perez-Palacin, Diego
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Architectural Concerns for Digital Twin of the Organization2020In: Software Architecture: 14th European Conference, ECSA 2020, L'Aquila, Italy, September 14–18, 2020 / [ed] Jansen A., Malavolta I., Muccini H., Ozkaya I., Zimmermann O., Springer, 2020, p. 265-280Conference paper (Refereed)
    Abstract [en]

    Employing a Digital Twin of the Organization would help enterprises to change and innovate, thus enhancing their organization’s sustainability. However, the lack of engineering best practices for developing and operating a Digital Twin of the Organization makes it difficult for enterprises to fully benefit from it. Many companies are currently investigating the potential use of it, but available solutions are often context-dependent or system-specific, and challenging to adapt, extend, and reuse. Therefore, digitalization is perceived as a slow, resource-demanding, and extremely expensive process whose outcome is uncertain. To this extent, enterprises seek solutions allowing them to gently introduce a Digital Twin of the Organization into their organization and to evolve it according to the changing needs and situations. This paper reports a first attempt on architecting a Digital Twin of an Organization, and discusses some architectural concerns to be addressed in order to facilitate its development and evolution.

  • 49.
    Caporuscio, Mauro
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Ghezzi, Carlo
    Politecnico di Milano, Italy.
    Engineering Future Internet applications: The Prime approach2015In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 106, p. 9-27Article in journal (Refereed)
    Abstract [en]

    The Future Internet is envisioned as a worldwide environment connecting a large open-ended collection of heterogeneous and autonomous resources, namely Things, Services and Contents, which interact with each other anywhere and anytime. Applications will possibly emerge dynamically as opportunistic aggregation of resources available at a given time, and will be able to self-adapt according to the environment dynamics. In this context, engineers should be provided with proper modeling and programming abstractions to develop applications able to benefit from Future Internet, by being at the same time fluid, as well as dependable. Indeed, such abstractions should (i) facilitate the development of autonomous and independent interacting resources (loose coupling), (ii) deal with the run-time variability of the application in terms of involved resources (flexibility), (iii) provide mechanisms for run-time resources discovery and access (dynamism), and (iv) enable the running application to accommodate unforeseen resources (serendipity).

    To this end, Prime (P-Rest at design/run tIME) defines the P-REST architectural style, and a set of P-REST oriented modeling and programming abstractions to provide engineers with both design-time and run-time support for specifying, implementing and operating P-RESTful applications.

  • 50.
    Caporuscio, Mauro
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Mirandola, Raffaela
    Polytechnic University of Milan, Italy.
    Trubiani, Catia
    Gran Sasso Science Institute, Italy.
    Building design-time and run-time knowledge for QoS-based component assembly2017In: Software, practice & experience, ISSN 0038-0644, E-ISSN 1097-024X, Vol. 47, no 12, p. 1905-1922Article in journal (Refereed)
    Abstract [en]

    Modern software systems are required to dynamically adapt to changing workloads, scenarios, and objectives and to achieve a certain Quality of Service (QoS). Guaranteeing QoS requirements is not trivial, as run-time uncertainty might invalidate the design-time rationale, where software components have been selected by means of off-line analysis. In this work, we propose a QoS-based feedback approach that makes a combined use of design-time predictions and run-time measurements to manage QoS data over time and support software architects while selecting software components that best fit QoS requirements. We illustrate the feasibility and efficacy of the approach on a case study, where the quantitative evaluation shows how the analysis effectively identifies the sources of QoS violations and indicates possible solutions to achieve QoS requirements.

123456 1 - 50 of 265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf