lnu.sePublications
Change search
Refine search result
1234567 101 - 150 of 2520
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Ambrosius, Robin
    et al.
    Dezember IT GmbH, Germany.
    Ericsson, Morgan
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Interviews Aided with Machine Learning2018In: Perspectives in Business Informatics Research. BIR 2018: 17th International Conference, BIR 2018, Stockholm, Sweden, September 24-26, 2018, Proceedings / [ed] Zdravkovic J., Grabis J., Nurcan S., Stirna J., Springer, 2018, Vol. 330, p. 202-216Conference paper (Refereed)
    Abstract [en]

    We have designed and implemented a Computer Aided Personal Interview (CAPI) system that learns from expert interviews and can support less experienced interviewers by for example suggesting questions to ask or skip. We were particularly interested to streamline the due diligence process when estimating the value for software startups. For our design we evaluated some machine learning algorithms and their trade-offs, and in a small case study we evaluates their implementation and performance. We find that while there is room for improvement, the system can learn and recommend questions. The CAPI system can in principle be applied to any domain in which long interview sessions should be shortened without sacrificing the quality of the assessment.

  • 102.
    Aminbaghai, Mehdi
    et al.
    Vienna University of Technology, Austria.
    Dorn, Michael
    Linnaeus University, Faculty of Technology, Department of Building and Energy Technology. Vienna University of Technology, Austria.
    Eberhardsteiner, Josef
    Vienna University of Technology, Austria.
    Pichler, Bernhard
    Vienna University of Technology, Austria.
    A Matrix-Vector Operation-Based Numerical Solution Method for Linear m-th Order Ordinary Differential Equations: Application to Engineering Problems2013In: Advances in Applied Mathematics and Mechanics, ISSN 2070-0733, E-ISSN 2075-1354, Vol. 5, no 3, p. 269-308Article in journal (Refereed)
    Abstract [en]

    Many problems in engineering sciences can be described by linear, inhomogeneous, m-th order ordinary differential equations (ODEs) with variable coefficients. For this wide class of problems, we here present a new, simple, flexible, and robust solution method, based on piecewise exact integration of local approximation polynomials as well as on averaging local integrals. The method is designed for modern mathematical software providing efficient environments for numerical matrix-vector operation-based calculus. Based on cubic approximation polynomials, the presented method can be expected to perform (i) similar to the Runge-Kutta method, when applied to stiff initial value problems, and (ii) significantly better than the finite difference method, when applied to boundary value problems. Therefore, we use the presented method for the analysis of engineering problems including the oscillation of a modulated torsional spring pendulum, steady-state heat transfer through a cooling web, and the structural analysis of a slender tower based on second-order beam theory. Related convergence studies provide insight into the satisfying characteristics of the proposed solution scheme.

  • 103.
    An, Nan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Protect Data Privacy in E-Healthcare in Sweden2007Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. This thesis gives a brief description of the background of healthcare in Sweden and ICT adoption in healthcare, introduces an Information system security model, describes the technology and law about data privacy and carries out a case through questionnaire and interview.

  • 104.
    Anders, Christian
    Linnaeus University, Faculty of Technology, Department of Informatics.
    How to improve citizen participation in a municipal context with blockchain-based ICT2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The master thesis focuses on citizen participation and how to support it with the application of ICT. Due to its recent publicity, blockchain and its features have been investigated and were related to the citizen participation domain. A qualitative research study has been conducted to explore the perceptions of citizens relating to blockchain. Based on those findings suggestions for improvement of citizen participation were provided.

    More specifically, a focus group interview has been conducted in the Swedish municipality of Växjö. Probes have been used to encourage the participants to follow unexpected thoughts to provide creative answers and to start a dialogue between the group and the researcher. The gathered data from the focus group interview was then analyzed with an iterative coding process. This process yielded a list of seven concepts which bundle the following aspects mentioned by the participants in the group interview: Accessibility, Flexibility and Responsiveness, Trust, Accountability vs Privacy, Adaption, Representation, and Collaboration. The concepts are referring to the use of blockchain in the context of citizen participation. They have been discussed later on, based on the contextual framework built on the topics ICT, blockchain, citizen participation, and soft systems methodology. A literature review was conducted to build this framework.

    The discussion summarizes how the citizens perceive blockchain and how it can support their participation within a municipality context. The perceptions include concerns relating to privacy, hopes of improved information infrastructures with open data formats, as well as that blockchain could modernize democracy. The forms of blockchain systems which could support citizen participation comprise aspects such as that it could lead to transparent and traceable investment flows for participative planning and controlling, as well as that it could help to identify bad players when collaborating with each other. In the last parts, issues of citizen empowerment are discussed as a result of the previous parts of the discussion about citizens' perceptions and the forms blockchain could have for them.

    This research aims to contribute to current research on citizen participation supported by ICT. It means to promote developments towards higher degrees of citizen power, by providing citizens' views on blockchain and the forms of participation it could support.

  • 105.
    Andersen, Henrik
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Spelutveckling mot publika utvecklingsplattformar: En fallstudie i hur spelutveckling mot en publik arkadmaskinsplattform påverkar medietekniksstudenters motivation.2015Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Tidigare forskning har registrerat en pågående rekryteringskris vid datavetenskapliga utbildningar, där problematiken främst tycks bero på avsaknad av motivation hos studenterna. I denna uppsats undersöktes huruvida studenters motivation i en programmeringsinriktad speldesignskurs kunde påverkas genom att utveckla spel för en arkadmaskin och dess innehåll. Undersökningen är genomförd i form av en fallstudie och behandlar fall mellan 2002 och 2014. Datan som behandlades var sekundärdata i form av betygsstatistik och kursutvärderingar. Uppsatsen presenterade resultatet i form av riktlinjer och slutsatser som kan ligga till grund för att förbättra studenters motivation i programmeringsinriktade universitetskurser och särskilt för kurser som involverar spel och speldesign. 

  • 106.
    Andersson, Elisabeth
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Förbättrad Internkommunikation2007Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
  • 107.
    Andersson, Gustaf
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Andersson, Fredrik
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Android Environment Security2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.

  • 108.
    Andersson, Gustav
    University of Kalmar, School of Communication and Design.
    Kartografisk kommunikation med hjälp av en 3D-modell: 3D-verktyg för kommunal planering2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpStudent thesis
    Abstract [en]

    In this paper treat the usage of 3D as planning tool for local planning and roadprojecting. The goal with the project is to develop a 3D model over an area in Kalmar with theories within information design and communication with maps.

    The main purpose is to examine how an urban environment in 3D can develop to become a help in the planning process and the dialogue with the citizens of Kalmar and press. With support in theories and a qualitative examination through a user test examine the problem question: How is it possible to develop a three-dimensional region with intension to facilitate planning of new construction at Norra Kvarnholmen and Malmfjärden starting from theories in communication process and communication with maps? How can the main users creating objects in the mentioned milieu placing chosen buildings and traffic problems?

    The result and conclusion of the examination show that the pictures and film sequences from a 3D model is a valuable tool in planning and in meaning of having a dialogue with their target group.

  • 109.
    Andersson, Hampus
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Informationsåteranvändning: En framtida helhetslösning2005Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Återanvändning av information utgår ifrån att bryta ner den informationen man planerar att återanvända i moduler som struktureras upp. Dessa moduler kan sedan användas för att bygga upp ny information till nya produkter. Genom att ha en organisation där avdelningarna arbetar nära varandra har man en möjlighet att förbättra återanvändningen och skapa ett system med både information och kunskapsutbyte. Genom planering kan man maximera möjligheterna och undvika flertalet hinder.

    Informationen skall vara välstrukturerad med en vald målgrupp för att lättare kunna återanvändas. Produkten har en betydande roll i återanvändning där enklare produkter är av mindre behov av strukturering än komplexa. Informationen är inte styrs av om produkten är en fysisk eller digital produkt utan de båda påverkas efter samma faktorer.

    All återanvändning påverkas av företagets huvudmål för införandet och påverkas av marknaden samt företagets ekonomiska situation. Det finns ingen klar lösning för återanvändning utan det måste anpassas till de unika förhållandena i det aktuella fallet.

  • 110.
    Andersson, Jesper
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    Dynamic Software Architectures2007Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Software architecture is a software engineering discipline that

    provides notations and processes for high-level partitioning of

    systems' responsibilities early in the software design process. This

    thesis is concerned with a specific subclass of systems, systems with a dynamic software architecture. They have practical applications in various domains such as high-availability systems and ubiquitous computing.

    In a dynamic software architecture, the set of architectural elements and the configuration of these elements may change at run-time. These modifications are motivated by changed system requirements or by changed execution environments. The implications of change events may be the addition of new functionality or re-configuration to meet new Quality of Service requirements.

    This thesis investigates new modeling and implementation techniques for dynamic software architectures. The field of Dynamic Architecture is surveyed and a common ground defined. We introduce new concepts and techniques that simplify understanding, modeling, and implementation of systems with a dynamic architecture, with this common ground as our starting point. In addition, we investigate practical use and reuse of quality implementations, where a dynamic software architecture is a

    fundamental design principle.

    The main contributions are a taxonomy, a classification, and a set of architectural patterns for dynamic software architecture. The taxonomy and classification support analysis, while the patterns affect design and implementation work directly. The investigation of practical applications of dynamic architectures identifies several issues concerned with use and reuse, and discusses alternatives and solutions where possible.

    The results are based on surveys, case studies, and exploratory development of dynamic software architectures in different

    application domains using several approaches. The taxonomy,

    classification and architecture patterns are evaluated through several experimental prototypes, among others, a high-performance scientific computing platform.

  • 111.
    Andersson, Jesper
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Bencomo, Nelly
    Baresi, Luciano
    Lemos, Rogerio de
    Gorla, Alessandra
    Inverardi, Paola
    Vogel, Thomas
    Software Engineering Processes for Self-adaptive Systems2012In: Software Engineering for Self-adaptive Software Systems, Springer, 2012Chapter in book (Refereed)
    Abstract [en]

    In this paper, we discuss how for self-adaptive systems someactivities that traditionally occur at development-time are moved to runtime. Responsibilities for these activities shift from software engineers tothe system itself, causing the traditional boundary between development time and run-time to blur. As a consequence, we argue how the traditional  software engineering process needs to be reconceptualized to distinguishvboth development-time and run-time activities, and to support designers in taking decisions on how to properly engineer such systems.Furthermore, we identify a number of challenges related to this required reconceptualization, and we propose initial ideas based on process modeling.We use the Software and Systems Process Engineering Meta-Model(SPEM) to specify which activities are meant to be performed o-line andon-line, and also the dependencies between them. The proposed models should capture information about the costs and benets of shifting activitiesto run-time, since such models should support software engineers in their decisions when they are engineering self-adaptive systems.

  • 112.
    Andersson, Jesper
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    de Lemos, Rogerio
    Malek, Sam
    Weyns, Danny
    Katholieke Universiteit Leuven.
    Reflecting on self-adaptive software systems2009In: Software Engineering for Adaptive and Self-Managing Systems, 2009. SEAMS '09. ICSE Workshop on, 2009, Vol. 0, p. 38-47Conference paper (Refereed)
  • 113.
    Andersson, Jesper
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    de Lemos, Rogério
    Malek, Sam
    Weyns, Danny
    Katholieke Universiteit Leuven.
    Modeling Dimensions of Self-Adaptive Software Systems2009In: Software Engineering for Self-Adaptive Systems / [ed] Betty H.C. Cheng, Rogério de Lemos, Holger Giese, Paola Inverardi and Jeff Magee, Springer, 2009, Vol. 5525, p. 27-47Chapter in book (Other academic)
  • 114.
    Andersson, Jesper
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    Edvinsson, Marcus
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering. Datalogi.
    The Puppeteer — Directing Software Engineering Projects2008In: International Conference on Computer Science and Software Engineering: CSSE 2008, IEEE Computer Society , 2008Conference paper (Refereed)
    Abstract [en]

    Software engineering projects are often used to teach complex aspects of software engineering. It is well-known that these courses are difficult to run. In this paper we address one aspect that can be used to reduce differences between projects and project groups to more easily find the balance of “challenging but possible”. We describe the role of the “puppeteer” and present four communication patterns that we use in an international software engineering project course.

  • 115.
    Andersson, Jesper
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Heberle, Andreas
    Kirchner, Jens
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Löwe, Welf
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Service Level Achievements: Distributed Knowledge for Optimal Service Selection2011In: Proceedings - 9th IEEE European Conference on Web Services, ECOWS 2011 / [ed] Gianluigi Zavattaro, Ulf Schreier, and Cesare Pautasso, IEEE, 2011, p. 125-132Conference paper (Refereed)
    Abstract [en]

    In a service-oriented setting, where services are composed to provide end user functionality, it is a challenge to find the service components with best-fit functionality and quality. A decision based on information mainly provided by service providers is inadequate as it cannot be trusted in general. In this paper, we discuss service compositions in an open market scenario where an automated best-fit service selection and composition is based on Service Level Achievements instead. Continuous monitoring updates the actual Service Level Achievements which can lead to dynamically changing compositions. Measurements of real life services exemplify the approach.

  • 116.
    Andersson, Jessica
    et al.
    Gothenburg Univ, Sweden.
    Larsson, Sofia
    Gothenburg Univ, Sweden.
    Ericsson, Morgan
    Gothenburg Univ, Sweden.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Linnaeus Univ, Vaxjo, Sweden..
    A Study of Demand-Driven Documentation in Two Open Source Projects2015In: 2015 48th Hawaii International Conference on System Sciences (HICSS), 2015, p. 5271-5279Conference paper (Refereed)
    Abstract [en]

    We investigate how demand-driven documentation is used by open source projects. Our study relies on questions and answers (i.e., demand-driven documentation) posted to Stack Overflow and focuses on two projects: Apache POI and Fennec (Firefox for Android). We find that the demand-driven documentation provided by respective community is of good quality and contributions are made within an acceptable amount of time. We conclude that demand-driven documentation can be suitable as a primary information source if other resources accompany it, e.g., websites. However, the suitability is closely related to size and activity of the project's community. We also investigate whether the type of project (e.g., API, application, product, etc.) matters, and find that given the nature of a forum, projects where the intended users are developers have larger and more active communities and are thus better suited for demand-driven documentation.

  • 117.
    Andersson, Jessica
    et al.
    Chalmers University of Technology.
    Larsson, Sofia
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Quality of Demand-Driven Documentation2014In: Proceedings of the 37th Information Systems Research Seminar in Scandinavia / [ed] Ahmad Ghazawneh, Jacob Nørbjerg and Jan Pries-Heje, 2014Conference paper (Refereed)
    Abstract [en]

    In this case study we investigate how demand-driven documentation can be used in open source projects. The study relied on questions and answers (demand-driven documenta- tion) posted on Stack Overflow and studied two open source projects, Apache POI and Firefox for Android, in depth. We found that the demand driven documentation provided by the respec- tive community is in general of good quality and contributed within an acceptable amount of time. We conclude that demand driven documentation can be suitable as a primary information source if other resources accompany it. However, the suitability is closely related to the size and activity of the project’s community. 

  • 118.
    Andersson, Johan
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Serbner, Martin
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Ståhl, Maria
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Kunskapsöverföring: En teoretisk verklighet?2008Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Kraven på dagens företag har ökat markant de senaste åren. För dagens

    företag är det viktigt att hela tiden kunna mäta sig och helst även vara

    steget före sina konkurrenter. En viktig del i detta är att ha rätt typ av

    kompetens inom olika områden och positioner inom det egna företaget.

    För att uppnå det är det idag vanligt att företagen arrangerar traineeprogram.

    I denna uppsats beskrivs problematiken vid kunskapsöverföring till

    en trainee och de problemområden som finns kring den processen.

    För att kunna utforma ett väl fungerande traineeprogram från företagets

    sida är det mycket viktigt att förstå vilka mål som företaget vill uppnå genom

    att genomföra ett traineeprogram.

    Vårt tillvägagångssätt och metodval var att intervjua personer som genomgått

    fallföretagets traineeprogram. Vi formulerat vårt problem som är;

    Hur överförs kunskap till trainees inom vårt fallföretag idag och kan den

    förbättras?

    Under arbetets gång upptäckte vi brister i fallföretagets traineeprogram

    men vi fann även många positiva delar. Empiri avsnittet gav oss mycket

    värdefull kunskap som vi hade nytta av i analys samt slutsats avsnittet. I

    vår slutsats redovisar vi olika förslag och rekommendationer till möjliga

    åtgärder beträffande metodval för kunskapsöverföring.

  • 119.
    Andersson, Jonas
    University of Kalmar, School of Communication and Design.
    Piqtura – Interaktiv bildvisning2008Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The underlying question for this project was, how do you create a solid platform for art on the internet and how do you visualize the art in a good way?

    The technology used during the project was ASP.NET 3.5 with the programming language C#. To handle the datastorage MsSql Server 2005 was choosen. Plenty of time and effort was spent around AJAX and the creation of own AJAX Extenders, mainly for the imageviewing part.

    ImageGallery is a AJAX Extender that works like a simplyfied imagegallery, its used to visualize the artworks in a interactive way.

    The project resulted in a ready to use application targeted for artists that want to publish their works online. Visitors can affect the imageviewing in a interactive way. Other functions that are available to them are the possiblity to comment, rate and filter artworks. The administrators for the website can handle news, users, categories and techniques.

  • 120.
    Andersson, Maria
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Hofverberg, Richard
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Närvaro trots frånvaro:  En studie om en projektbloggs möjliggörande av gränsöverskridande samarbeten2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Denna forskningsrapport undersöker hur nya teknologier kan verka som stöd för visuellt informationsutbyte och koordination för kreativa arbeten på distans. Arbetsgruppen genomförde denna undersökning för att kunna utbyta prototyper och annat visuellt material på regelbunden basis med en beställare av ett projekt som har sitt säte i New York. Projektet använde sig av en så kallad projektblogg som kanal för att förmedla utfört arbete samt för att föra en diskussion och ge feedback på det. Eftersom detta projekt skulle genomföras inom ramen för detta examensarbete valde arbetsgruppen att även undersöka hur examensarbetet skulle kunna koordineras genom projektbloggen. Dessa två undersökningar skedde genom en fallstudie under 8 av examensarbetets totala 10 veckor. Samtidigt som fallstudien genomfördes gjordes även en litteraturstudie som undersökte om det fanns teori som kunde stödja användandet av en projektblogg på detta sätt. Efter fallstudien utvärderades resultatet och genom intervjuer med användare och enkätundersökningar med en referensgrupp framkom det att projektbloggen hade upplevts vara ett mycket användbart hjälpmedel för att förmedla visuell information samt för att ge feedback för det ena projektet. Det andra projektet (examensarbetet) hade mindre behov av visuellt informationsutbyte då arbetet huvudsakligen bestod av längre textdokument. Eftersom dessa dokument skulle editeras fann användaren inte projektbloggen som ett optimalt verktyg för detta, bloggen verkade i det projektet mer som samlingsställe för dessa dokument, där användarna kunde hämta informationen för att sedan editera på traditionellt vis. Litteraturstudien som genomfördes visade att det fanns gott om stöd som pekade på att en projektblogg skulle vara användbar för koordinering av kreativa projekt som skedde på distans, och en av de mest intressanta möjligheterna som beskrevs inom ämnet computer supported collaborative work(CSCW) var att den nya tekniken att genomföra distansarbeten framförallt öppnade dörrar för de yrkesgrupper som hade behov av att visa upp grafiskt material, en yrkesgrupp som normalt blir väldigt belastad om arbetsgruppen inte är närvarande.

  • 121.
    Andersson, Mari-Louise
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Securing an ERP Implementation2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    An implementation project of an ERP system results in large changes. Organizations

    that face an ERP implementation project have several risks to

    consider in order to avoid problems that cause failures. The purpose of

    this research is to extend existing models and create a method for implementation

    of ERP systems. The method has then been employed to an

    ongoing project at the department of Procurement and Supply at Ericsson

    Mobile Platforms in Lund. Objectives for the research are to consider

    which implementation strategy can be used and how an organization can

    minimize risks.

    The research approach and methodology is influenced by the qualitative

    research method since it was necessary to gather qualitative facts instead

    of quantitative facts. Included is also a case study due to the research is

    executed within Ericsson Mobile Platforms in Lund.

    There are two main opposite implementation strategies, Big Bang and

    Step-by-Step. The choice of implementation strategy depends on number

    of factors like the size of the organizations, complexity and resources.

    A method of ERP implementation has been put forward as a result of the

    integrated models. The method includes an overall model and a check list.

    Risk identification is a problem that many implementation project faces, a

    way to solve this is to make a careful risk analysis, a risk matirx with several

    identified risks are putted forward throughout this study.

  • 122.
    Andersson, Martin
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Detecting known host security flaws over a network connection2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be made. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used.

    There is no common way of merging information from different VA tools. Therefore the Vulnerability Assessment Information Handler (VAIH) has been developed. The VAIH system consists of three parts. First, a intermediate language format defined in XML. Second, modules that converts the output of VA tools to the intermediate language format. Third, a program for reading and displaying the intermediate language format.

    The VAIH system makes it possible to merge the results from vulnerability assessment tools into one file that can be displayed and edited through a GUI.

  • 123.
    Andersson, Martin
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Software Security Testing: A Flexible Architecture for Security Testing2008Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Abstract: This thesis begins with briefly describing a few vulnerability classes that exist in today’s software. We then continue by describing how these vulnerabilities could be discovered through dynamic testing. Both general testing techniques and existent tools are mentioned.

    The second half of this thesis present and evaluates a new flexible architecture. This new architecture has the ability to combine different approaches and create a more flexible environment from where the testing can be conducted. This new flexible architecture aims towards reducing maintenance and/or adaptation time for existing tools or frameworks. The architecture consists of a given set of plug-ins that can be easily replaced to adapt test as needed. We evaluate this architecture by implementing test plug-ins. We also use this architecture and a set of test plug-ins to generate a fuzzer targeted to test a known vulnerable server.

  • 124.
    Andersson Nazzal, Lena
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Ryberg, Agneta
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Ett vårdinformationssystem i vårdens frontlinje: En fallstudie om Cambio Cosmic på en vårdcentral i Landstinget Kronoberg2007Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In healthcare there is a rapid development towards introducing and implementing a wide range of information technology (IT) to aim for higher quality and more effective care. A common health information system (Cambio Cosmic) has been implemented in Landstinget Kronoberg. Clinical microsystems are the frontline units where staff and pa-tient meet. When the conditions in the microsystems are changed, it is interesting to de-scribe and analyse the consequences.

    The purpose of this study is to describe how health care staff uses a health information sys-tem and how they experience its functionality in their patient work. Initially, a literature re-view about the use of health information system was undertaken, followed by a qualitative case study based on interviews about how healthcare staff describes their reality. In March 2007 general practitioners, district nurses and practical nurses at the health care center in Markaryd were interviewed. The results were analysed using a modified microsystem the-ory. The analysis showed that the health care staff in Markaryd used Cambio Cosmic for medical record, time planning, cash handling, laboratory examinations and results, and medications. Apart from Cosmic, they used several other information systems IT- or pa-perbased.

    The staff experienced that Cosmic did support their patient work, but technical deficiencies impeded use. The staff required a more rapid system, integration of systems and more per-sonal adaptations. A common health information system was seen as a strength in the care process. Co-operation between staff and with other caregivers was facilitated and Cosmic contributed to a more efficient work pattern. The patients could receive improved service and information. In general, the staff thought that they had access to the right information for the care of the patient, but improvements were needed for access to information at the right point of time. Cosmic was not used to improve work at the health care center. The staff expressed a positive attitude towards working with and in Cosmic. Based on the re-sult, improvements at both micro- and macrosystems levels are recommended.

  • 125.
    Andersson, Ola
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Larsson, Niclas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    En studie om EU-direktiv 2005/0182: – med fokus på personlig integritet, etik och gällande direktiv2006Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    At the beginning of year 2006 EU directive 2005/0182 was approved by the European parliament. The directive contains rules concerning the retention of traffic and localization data created with electronically communication. This data will be stored between six months and 1 year depending on the data type. The intension is to use the data to detect, investigate and prosecute heavy criminals and terrorists.

    This study contains three different problem areas, if the directive op-poses to existing directives and conventions. The relationship between personal integrity and storage of personal information is also investi-gated. The last area is ethical issues with the storing of personal data.

    The result is divided into three parts, one for each problem area. It shows that the new directive don’t comply with article 8 in the European convention on human rights. Although all the articles presented are open for wide interpretation.

    Peter Seipel has made a categorization of six different views of the per-sonal integrity. It is clear that the new directive will affect the personal integrity.

    The ethical view on the directive is concentrated to who will benefit from the changes and witch goals are the directive set to meet. Often the rules of ethics will conflict with each other because of two sets of rules can’t exist together.

  • 126.
    Andersson, Ola
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Larsson, Niclas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    RSS – The future of internal communication?2005Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    RSS is a format for easy information sharing between computers. A RSS-file, also known as a feed or a channel, consist of a list of items. The items are structured with XML-tags and have to be processed in some way before it can be read. RSS¬readers, web-browsers with RSS support and e-mail-clients with RSS support can be used to display the feed.

    This thesis is focused to investigate if RSS can be used within an enterprise for internal communication. We look at different computer based communication tools that are available today and compare them with RSS. All the different tools has there advantages as well as disadvantages, we have tried to find out if there is room for one more information channel within an enterprise.

    Our study shows that RSS is not suitable as a stand alone solution for internal combination. RSS main strengths lies in mass information that has to be pushed out in one direction.

  • 127.
    Andersson, Patrik
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Friberg, Angela
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Feedback från universitetslärare till student: En kvantitativ undersökning av feedback-processen ur ett informations- och kommunikationsperspektiv2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Feedback can be defined as a process where the effect of an action is returned to its source in order to alter future actions. Within educational systems feedback is commonly associated with the teacher’s response to student performance. Previous research shows that the feedback process between tutor and student is a complex one that involves several problem areas. This study aimed to explore, from a student perspective, whether these problem areas exist at Linnaeus University and to describe and analyze existent problem areas with information- and communication theories. The theories used in this study are Shannon-Weavers models of communication, criteria for information quality and Media Richness Theory. The study has been conducted with a quantitative method and a deductive approach, carried out by a survey targeted to students at Linnaeus University. The result/analysis of the study identified problem areas and described them with the selected theories. The conclusion of the study was an answer to the question regarding which problem areas can be identified at Linnaeus University as well as how these problems can be described with the use of the study’s selected information- and communication theories.

  • 128.
    Andersson, Pär
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Nylund, Robin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bring Your Own Device i kommun- och landstingsnätverk: En undersökning om dess utbredd2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    An ongoing question which have been brought into consideration lately is whether employees should be given the permission to bring their own devices to their jobs or not. The numbers of people using smartphones and laptops have been growing and with that, the will to make use of those devices at work. That phenomenon is called Bring Your Own Device and the implementation of it can cause network security related problems. This essay was written with the intentions to find out how many of the municipalities and counties that have allowed people to bring their own devices. The intentions was also to investigate which security actions that have been taken into consideration when securing the rest of the network from the brought devices. This was performed by sending out a survey. The result that the survey gave proves that BYOD have often been taking into consideration among the organizations. It also proves that many have chosen to not implement the phenomenon because of reasons like problem with the security, the costs, and the lack of resources. An overrepresented majority of the organizations who have chosen to implement it have decided to have the private devices in a separate network to secure the rest of the network infrastructure.

  • 129.
    Andersson, Rikard
    et al.
    Chalmers University of Technology.
    Ericsson, Morgan
    University of Gothenburg.
    Wingkvist, Anna
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Mining Relations from Git Commit Messages: an Experience Report2014In: Proceedings of the Fifth Swedish Language Technology Conference, 2014Conference paper (Refereed)
  • 130.
    Andersson, Therese
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Praktisk optimering av marknadsföring i sociala medier2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this study is to examine how companies can preform practical optimization of their marketing efforts in social media. Marketing in social media is something that many business leaders prioritize as it promotes a two-way communication, which in turn can lead to the possibility to reach out to more customers and provide successful profit effects.

    The report examines selected best-practices to find those recommendations that can be viewed as best suited for pracital optimization of a company’s website and profile-pages in social media. In order to define the recommendations, the study reviewed which recommendations were applied to real companies and what need and what knowledge small businesses have in the area. This was examined by analyzing five businesses and their activity in social media, which was followed up by an digital survey targeting small businesses. The result include a summary of appropriate recommendations to smaller companies that want to practically optimize their marketing efforts in social media.

  • 131.
    Andersson, Tobias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hedlund, Victor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kommunikationslösningar i molnet: Examensarbete angående olika nätverkslösningar i WAN2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    To connect networks across geographically diverse sites has become increasingly common in todays society. This report will highlight the various WAN solutions to make this possible. The different solutions that will be highlighted in this report is rent own fiber , Layer 2 link, MPLS , and VPN. There will be comparisons between these solutions in terms of cost, safety , speed and reliability. This has been done with scientific articles and interviews , but the report also includes a practical laboration.

  • 132.
    Andersson, Tobias
    et al.
    University of Kalmar, School of Communication and Design.
    Martinson, Mattias
    University of Kalmar, School of Communication and Design.
    Licenshantering: - Är företag medvetna om sin licenshanteringssituation?2009Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In a community where copyright and intellectual property law is getting more attention in the media, it is important for companies to be aware of their possession of software licenses. In this thesis we are going to investigate the awareness of the software licensing situation in some companies. To collect data that can be analyzed, we are interviewing companies. The interviews are performed by phone or e-mail. A similar report hasn’t been done before therefore it’s an interesting subject to look at.

    The interviews resulted in answers from 11 companies. The answers showed that the awareness about software licensing among the companies had big variations. Some other things that varied among the companies were the size of the companies and the usage of software licensing policy within the companies. The way and method of handling software licensing also varied among the companies.

    A lot of software programs, along with folders and Excel-lists dominated the method of handling software licenses among the companies. Software developing companies together with their interest organization for example BSA has demands on companies using their software to have a foreseeable documentation for the software licenses. They gladly see that the companies uses a best practice method to manage their license possessions, one best practice method is Software Asset Management, SAM.

    It is hard to recommend a method for software license management to a non-specific company, because every company has a unique organization and computer network structure. Most of the big license management software is following a best practice method for software license management.

  • 133.
    Andersson, Tommy
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Torkelsson, Mattis
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Wärlinge, Gustav
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    3DES, AES i hårdvara - Förmåga att skala i en växande miljö2010Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report describes the work and studies carried out in the field of encryption and VPN. The focus is on how well the encryption algorithms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) perform in a predetermined environment. The main focus has been to answer the question: Which of the encryption algorithms AES and 3DES requires less system resources. During the period  of studies, lectures and literature have several times claimed the 3DES algorithm to require more resources of encryption devices, compared to AES. This report tries to find if it is a fact and if so how big is the difference between the algorithms. To seek  answers to the questions, a number of experiments was performed. These experiments were intended to demonstrate or refute the above claims about 3DES and AES. The results of the performed experiments shows no major differences between 3DES and AES. This differs from what have been publicly accepted concerning facts regarding encryption algorithms 3DES and AES.

  • 134.
    Andersson, Torsten
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Learning Management Systems (LMS) Case study on an implementation of an LMS and its perceived effects on teachers.2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Learning Management Systems (LMS) is a widespread information system used in many Higher Education Institutes (HEI) in order to facilitate educational efforts. The system can be used for support in campus courses; courses conducted on the Internet and of course a mixture of these usages. This study attempts to understand the process of the implementing an LMS at a specific HEI. The HEI has made several implementations over the last 6 years, but decided to implement a new LMS during 2018. The focus of the study is the perceived effects on teachers in the implementation and the role a group of so-called Ambassadors played in the implementation.

    The study applied a social constructivist approach, mixing interviews, observation and survey as methods for data collection from teachers and implementation project management at the HEI. The study applied thematic analysis in order to analyse the collected data. The analysis built on five themes, Ambassadors, Implementation, Major concerns, Pedagogy, and System Literacy. Findings suggest that time management issues created the major effect on the daily work of teachers and that the group of Ambassadors in their role acted as a form of change agents, thus influencing the implementation project positively. Findings also suggested that only a few teachers took the opportunity to apply new pedagogical features to their teaching, in connection with the implementation. Finally, findings suggested that, in line with previous research, that the LMS is not used fully, as some teachers tends to use only minor functionalities in the LMS.

  • 135.
    Andreasian, Gelena
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Andreasian, Mylana
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Knowledge Sharing and Knowledge Transfer Barriers. A Case Study2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 136.
    Andreasson, Simon
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Glimfelt, Thomas
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Affärsmodeller inom E-commerce: – Hur lyckas man som småföretagare på Internet2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To start a company on the Internet is something that has appealed a lot of people during the last couple of years. Some of the companies have succeeded in their struggle but a lot of companies have failed to live out their ambition. This paper deals with the concept of e-commerce and aims to study whether or not the companies that has succeeded has made use of business models and what other factors that is important that you wont find in any written theory.

    The paper also aims to study the concept of business models and what a business model consists of. To be able to do this research we have interviewed three different companies that are all active in e-commerce and have survived for at least three years. Two of the companies are classical web shops that sell products to their customers and the last one is a site with articles about hardware and IT business in general. The company that provides articles receives their incomes from advertising sales.

    The results from these research has been compared to what the theory says to see if the theoretical business models is being used and to see if there are other factors that has impacted the success of the company.

    In the result of the thesis it shows that there are factors where the studied companies have followed the theoretical approaches. But there are also other factors that are important to consider. In the theory part of the thesis the authors put together a research model based on other authors theories on what a small internet based company should think of. With the research model as a base the founders of three small internet based companies were interviewed. From these interviews the authors discovered that there are other important factors that the theory did not bring up. One of those factors is personal engagement which is strongly linked with the personal freedom that you get from running your own Internet based company. Other essential factors that were found are the development of distributor contacts and having a good customer focus.

  • 137.
    Andrén Eggeborn, Therése
    Linnaeus University, Faculty of Technology, Department of Informatics.
    En utvärdering av hur Business Intelligence mognaden kan öka: - Att hantera, analysera och presentera data av ett återkommande enkätresultat2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 138.
    Angelopoulou, Zoi
    Linnaeus University, Faculty of Technology, Department of Informatics.
    ICTs and Citizen Participation: An Ethnography in the Municipality Level2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This master thesis describes an ethnographic research under the critical paradigm of thoughtin the use of ICTs to support citizen participation in the Municipality level. The purpose ofthe research was to acquire an understanding of the perspective of citizens on the topic andprovide suggestions for the employment of ICTs in citizen participation on the specificcontext. The research setting is located in a neighborhood of a Municipality in Athens, thecapital of Greece. Participants included randomly selected citizens, representatives fromcitizens groups which are active in the neighborhood and a representative of the Municipality.The data gathered in the research was qualitative and the methods were selected andconducted following the participatory design approach in correspondence with theethnographic methodology and critical paradigm. The methods used were interviews, probesand participatory observation. The data gathered pointed at similar concerns expressed by theparticipants mainly towards issues such as ignorance and indifference. Participants also hadthe opportunity to make suggestions on the topic of ICTs and citizen participation, which incombination with the results of a thematic analysis of the qualitative data were used to makesuggestions for future employment of ICTs in the Municipality. Through this directengagement with participants the research also hopes to contribute to the developing Greekdomestic literature on the topic, especially concerning the use of qualitative data.

  • 139.
    Ankarberg, Alexander
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Samkörning av databaser-Är lagen ett hinder?2006Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Title:Comparison of databases – Is the law an obstacle?

    Authors:Alexander Ankarberg, Applied Information Science.

    Tutors:Lars- Eric Ljung

    Problem: Cross running databases is getting more and more significant during the development of the information flow. There are huge benefits if we start to use the technique that already exists. The law is today an obstacle, so what would happen if the law wasn’t so stern. My question is:” why don’t we cross run databases more efficient between parts of institutions”

    Aim:The purpose of this essay is to evaluate why institutions does not cross run databases and start a discussion. There are possibilities that we today does not use. One aim is also to find solutions so that we can start to use the techniques. The essay will explain the fundamentals and discuss both the advantages and the disadvantages in depth.

    Method:The author has approached the problem from two ways. From induction and deduction which combined is abduction. The author hopes that this results in as many points of angles as possible. And the answers will be as complete as possible. The essay also includes an inquiry which is based on interview with ordinary people.

    Conclusions:The law is not up to date nor made for today’s technique. It is in some ways an obstacle for a more efficient system and it could save enormous amounts of money for both the government and common man. There is hope though, and small revolutions happen every day. There is also ways to go around the law and make things possible and make the system more efficient. That is with agreement from the person that the information is about. There is also one possibility with safety classes, to put a number on information.

  • 140.
    Annerstedt, Gunnar
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Landerhjelm, Madeleine
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Samtidighetskontroll i applikationer utvecklade med ASP.NET Web Forms och traditionell ADO.NET2012Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Samtidighetskonflikt, även känt under den engelska termen concurrency conflict, uppstår när två eller flera processer försöker uppdatera samma information i en databas vid samma tidpunkt. Processen som sparar ändringarna sist blir de ändringar som gäller och på så sätt kan viktigt information försvinna. Det finns flera tillvägagångssätt för att förhindra dessa problem med olika typer av samtidighetskontroller som kan ske i applikationen eller redan på databasnivå via lagrade procedurer.

    Metoden som används för att undersöka problemområdet har utgått från ett praktiskt arbete med en utökning av en existerande applikation, webbutiken RoyalDesign, skriven i ASP.NET (ASP-dotnet) Web Forms. Utökningen kräver samtidighetskontroll där användaren ska informeras av eventuella konflikter. Undersökningen avser att granska hur samtidighetskontroll implementeras och hanteras i applikationen. Resultatet av undersökningen visar databasen gör den största delen av arbetet, fångar samtidighetskonflikter samt kastar ett undantag som sedan applikationen fångar och hanterar. 

  • 141.
    Antebro, Charlotta
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Storm, Cecilia
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    SMS, en lösning på Apotekets väntetider?: Kan ett informationslogistiskt synsätt vara en bas för effektivisering?2006Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Nowadays long waiting time exists at the Pharmacy related to handle prescription.

    In the beginning of the study we related on our own experiences and valuations. There for this report could be consider as a result of our interst.

    The prescriptions constitute about three quarters of the Pharmacy´s sale. The size of the sales margin for these products is the trade margin that decider how the Pharmacy´s prin-ciple adjusts to the conditions of the market.

    The Pharmacy intends to short the waiting time to max 5 minutes within 3 years. Further-more they will increase their opining and closing times. The Pharmacy goals is to increase the number of Pharmacy from 870 to 1000.

    In our examination we notice that the customers we met adjusted their visit to a specific time when the waiting time is short, they also avoid Pharmacy´s that are greater loaded. In our study we calculate that the reduction of the number of repliers are totaly 7 %. The study of the questionnaire are the base of our thesis.

    In a contribution to a discussion from Svenska Dagbladet the 8 th of the July 2005 the Pharmacy´s MD Stefan Carlsson point out that they will work harder to reduce their wait-ing times.

    We have adjusted our SMS solution on the long waiting time at the Pharmacy after a study on the target group in the age of 16-74 years. The informations we have gathered cames from Statistiska Centralbyrån (SCB).

    In our growing community there almost everyone owns a mobile phone, which contributes to a more frequent use of Short Message Service (SMS).

    We were hoping that our responders would have the same opinion as we regarding the waiting time at the Pharmacy. In our study we saw that many of the responders considered that the waiting time were to long in general.

    To handle the information and to handle information logistic aren’t new. It’s a further de-velopment of that which have been a central source of information in many enterprises. In many cases an effective information flow has a directly ruling part in the existents of the ac-tivity and its ability to conquer a global market.

  • 142.
    Anton, Andersson
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Runbert, Johan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Cross-platform Mobile Development and Internet of Things: Developing a cross-platform mobile application using web technologies to interact with smart things2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today more and more objects in our daily lives are getting connected to the Internet. This phenomenon is called the Internet of Things and is a way for physical things such as cars, buildings or even bus stations to get access and communicate with other objects using the Internet. The problem is that for every Internet of Things device, an application is often needed in order to communicate with these devices. Developing mobile applications in a separate programming language for each operating system can be an expensive and time consuming task.

    In this thesis, we implement and evaluate a cross-platform mobile solution for users to interact with smart things using the advantages of web technologies. To compare previous findings in this area, two literature reviews has been performed to find out which is the state of the art on cross-platform mobile development frameworks and smart-things technologies used for interacting with physical objects. The result is a mobile application developed using PhoneGap and jQuery Mobile that interacts with iBeacons, where students inside a university building can get directions and schedules for different rooms.

    The application received good results from a couple of usability studies, and performed well when measuring its performance. The outcome shows that web technologies that exist today are a viable solution to native mobile applications in terms of interacting with smart things such as tagging technologies.

  • 143.
    Antonio, Zubak
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Viberg, Jacob
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Informationsspridning vid Introduktionsprocessen på ett Bemanningsföretag: En studie där informationsspridningen vid Introduktionsprocessen studerats.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Personalomsättningen är idag väldigt stor inom organisationer och numera söker sig unga människor med mindre arbetslivserfarenhet till bemanningsföretag. Tidspressen är hög inom branschen och företagen vill snabbt få ut sina anställda, vilket ställer stora krav på en lyckad och tidsbegränsad introduktion. Fördelar med en lyckad introduktion är att den anställde känner trygghet och tillit inför kommande uppdrag och arbetsgivare. Bakgrunden till ett fördjupat intresse av att studera introduktionsprocessen inom bemanningsbranschen framstod när tidigare forskningar påvisade tydliga brister men även förbättringsmöjligheter som finns inom området. En bidragande orsak till valet av studie var fallföretagets engagemang, vilja och positiva inställning till en fördjupad forskning. Genom tidigare erfarenheter inom branschen av författarna upplevdes forskningsfrågan relevant och viktig. Efter en avstämning med tänkt fallföretag framkom det att konsultchefen upplevde att informationsspridningen under introduktionsprocessen var problematiskt. Därmed var vår tanke att bidra med en extern samt intern synvinkel över introduktionsprocessen. Syftet med studien var att undersöka hur nyanställda konsulter upplever informationsspridningen vid introduktionsprocessen ur ett informationslogistiskt perspektiv. För att få fram önskade data har ett induktivt angreppssätt använts där författaren gått från empiri till teori. För att få fram djupgående fakta och insikter användes en kvalitativ datainsamlingsmetod där 7 informanter i olika åldersgrupper intervjuades. För att besvara frågeställningen har följande teorier använts; Knowlegde Management, Organisatoriskt lärande, Informationslogistik, Informationsspridning och Bauers 4:cn. Studien har resulterat i en slutsats som visar olika tillvägagångssätt av förbättringsförslag som kan användas till underlag för att implementera och etablera en förändring av introduktionsprocessen. Dessa områden är att göra konsulten mer aktiv under introduktionen, att avsätta tid utifrån varje individs behov samt att använda workshops för att konsulterna ska kunna sprida insikter till varandra. Förslag till fortsatt forskning inom området är att studera ledarskapets roll i introduktionsprocessen samt hur en helt digital introduktion skulle kunna effektivisera introduktionen.

  • 144.
    Appaneni, Viri
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Likisa, Yenus
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Using Virtual World in Education: The case of Second Life .2011Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With technology being advanced and many new teaching methods being implemented, considering virtual worlds for teaching is quite innovative and interesting. A virtual environment is an artificially constructed  representation of a natural or imagined environment. Virtual worlds consist of enactment for terrains, avatars, objects, textures, and other forms of digital assets. Many virtual worlds like Alpha World, Delta 3D, Second Life etc. are available today. An avatar can be defined as a computer user’s representation of him/her-self within the virtual environment.    

       Today, educational institutes have been using virtual worlds in various fields like designing user interfaces, nursing courses,  cooperate training, leadership training programmes. But certain aspects need to be examined thoroughly like how virtual spaces are influencing education, how students and teachers understand learning in virtual worlds while interacting through avatars where communication lacks body language and is limited to seeing, hearing and talking. Our study was conducted on a single course called Business Talking offered in Second Life by Linnaeus University.This course mainly emphasizes on technical and administrative presentations in English.     

       The main purpose of our study is to investigate how students and teachers understand learning in such environments and identifying the factors which are related to this. Relating to the purpose the research question “How do students and teachers perceive learning through avatar-based interaction in virtual world environments? ”  was investigated.     Pedagogy and general theories like constructivism, cognition, virtual world, synchronous versus asynchronous e-learning were used in our study.     A qualitative interpretative case study was conducted. Data was collected through observations and interviews. All the sessions of the course were observed and  interviews were made with five students and one teacher of the course.     The main results include students perceive more through avatar education as they get a sense of real feeling when compared  to other online education systems. Also, performing activities in different places of SL such as camp fire, near waterfalls, different cultural places etc. made them perceive well as they feel relaxed and less pressure. Second Life's environment helps to simulate real conditions and situations which help them to perceive more. But factors like usability of avatars, technical problems and getting adapted to the environment play an unfavourable role in perceiving learning.  Both the teachers and students have to be constructive and good pedagogical decisions have to be made when a problem arises. Another main result was that, lack of body language does effect in perceiving learning. 

  • 145.
    Appelqvist, Oscar
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Klåvus, Sara
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Omvärldsanalys delight: En studie av hur små till medelstora företag kan få igång ett omvärldsanalysarbete2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this thesis is to offer models and IT-supportive tools for external business intelligence for smaller to medium sized businesses. Larger businesses often have more funds and resources that continuously work to monitor the surrounding environment. However, due to the fact that small businesses lack the time and knowledge to investigate external business intelligence sufficiently, and lack appropriate funds to hire a consultant, as they are too expensive, smaller businesses rarely ever have access to these resources. Four models for external business intelligence were chosen and tested in workshops with two different companies, three different companies were approached and participated in interviews, and a study on useful IT-supporting tools for external business intelligence was conducted. The study has shown that the most suitable way to display models and IT-supportive tools is with a manual that would assist smaller to medium sized businesses with external business intelligence without the need to hire external assistance.

  • 146.
    Ardagna, Danilo
    et al.
    Politecnico di Milano, Italy.
    Bernardi, Simona
    University Center for Defense, Spain.
    Gianniti, Eugenio
    Politecnico di Milano, Italy.
    Aliabadi, Soroush Karimian
    Sharif University of Technology, Iran.
    Perez-Palacin, Diego
    Politecnico di Milano, Italy.
    Requeno, José Ignacio
    University of Zaragoza, Spain.
    Modeling performance of Hadoop applications: A journey from queueing networks to stochastic well formed nets2016In: Algorithms and Architectures for Parallel Processing: 16th International Conference, ICA3PP 2016, Granada, Spain, December 14-16, 2016, Proceedings / [ed] Jesus Carretero, Javier Garcia-Blas, Ryan K.L. Ko, Peter Mueller, Koji Nakano, Springer, 2016, p. 599-613Conference paper (Refereed)
    Abstract [en]

    Nowadays, many enterprises commit to the extraction of actionable knowledge from huge datasets as part of their core business activities. Applications belong to very different domains such as fraud detection or one-to-one marketing, and encompass business analytics and support to decision making in both private and public sectors. In these scenarios, a central place is held by the MapReduce framework and in particular its open source implementation, Apache Hadoop. In such environments, new challenges arise in the area of jobs performance prediction, with the needs to provide Service Level Agreement guarantees to the end-user and to avoid waste of computational resources. In this paper we provide performance analysis models to estimate MapReduce job execution times in Hadoop clusters governed by the YARN Capacity Scheduler. We propose models of increasing complexity and accuracy, ranging from queueing networks to stochastic well formed nets, able to estimate job performance under a number of scenarios of interest, including also unreliable resources. The accuracy of our models is evaluated by considering the TPC-DS industry benchmark running experiments on Amazon EC2 and the CINECA Italian supercomputing center. The results have shown that the average accuracy we can achieve is in the range 9–14%.

  • 147.
    Arhammar Andersson, Molly
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    Tillgänglighet, testning och förtroende: eller konsten att inte vara ett funktionshinder2018Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Arbetet undersöker hur Sveriges kommuner valt att testa tillgänglighetsanpassningen av sina webbplatser och vilket förtroende de har för att webbplatsen är tillgänglighetsanpassad. Dessa två faktorer analyseras sedan i relation till varandra för att belysa om, och i så fall på vilket sätt, testpraktik påverkar förtroende. Resultatet ställs i kontrast mot den tidigare forskning som säger att manuell testning av tillgänglighetsanpassning är mer pålitlig än automatisk sådan, samt att testning överlag leder till högre förtroende. Undersökningen görs genom en enkätundersökning utskickad till alla Sveriges kommuner och kommer fram till att det, i samklang med tidigare forskning, går att se att närvaro av testning leder till högre förtroende, medan det i motsats till vad forskningen indikerar inte går att se att de som testar manuellt har ett generellt högre förtroende än de som testar automatiskt. Detta leder till slutsatsen om att datavetenskapen måste kommunicera ut sin kunskap om hur testning av tillgänglighetsanpassning kan utföras på bästa sätt, att kommunerna själva behöver få tillgång till mer kunskap om hur man testar effektivt och pålitligt med manuell testning, och pekar mot vidare forskning inom datavetenskap, filosofi och psykologi kring testning, förtroende och människans relation till maskinen.

  • 148.
    Arhammar Andersson, Molly
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
    What we talk about when we talk about winners: Using clustering of Twitter topics as a basis for election prediction2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Social media has over the years partly become a platform to express opinions and discuss current events. Within the field of Computer Science, Twitter has been used both as the basis for political analysis - for example using sentiment analysis to predict election results - and within the field of cluster analysis, where the question of how to best design and use an algorithm to extract topics from tweets has been studied. The ClusTop algorithm is specifically designed to cluster tweets based on topics. This paper aims to explore whether it is possible to (a) use an implementation of the ClusTop algorithm to identify topics connected to tweets about Trump and Clinton just before the American 2016 election, and (b) distinguish between the topics used in connection with a specific candidate in states where they won versus states where they lost the election. The problem is approached through the method of a controlled experiment where the data collected from Twitter is divided into groups and run through the ClusTop algorithm. The topics are then compared to draw tentative conclusions about their validity as a basis for election prediction. The study finds that it is indeed possible to adapt the ClusTop algorithm to use with tweets and geolocation to identify different topics, thus confirming the usefulness of the algorithm. In addition to this, the study confirms that manually examining the words used within the topics makes it possible to see differences between them. The work thereby places itself in the tradition of exploring how Twitter can be used for election prediction by being one of the first studies to look at clustering as a way of approaching the problem.

  • 149.
    Arlefur, Kristoffer
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Implementering av EtherCAT i robotsystem Motoman NX1002008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With a fast growing production industry in Asia it’s getting harder and harder for Swedish companies to compete with the low production cost that the east offers. To be more competitive robot solutions are used more and more. This is a report of a first concept to implement a new Ethernet based communication called EtherCAT, in one of Motoman robot controllers. Test equipment has been constructed and simulated a communication with the PLC. A first HMI interface has been written to show the information from the PLC in a way that is understandable for humans. For one of Motoman’s robots a program has been prepared.

  • 150.
    Arnbro, Johannes
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Motivera eller engagera: En studie om registreringsprocesser på webbaserade tjänster2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Att behöva fylla i namn, telefonnummer och andra uppgifter för att få ta del av en tjänst och börja använda den kallas registreringsformulär, och kan anses vara en utav de mindre roliga företeelserna på internet. Många tjänster använder sig dock av dessa vilket gör att besökare måste gå igenom ett extra steg för att få börja använda tjänsten i fråga. Registrering till tjänster är dock många gånger nödvändigt vilket leder fram till problemet som undersöks i denna rapport: Hur ska registreringsprocessen till en tjänst utformas för att få besökare att vilja registrera sig?

    I denna rapport har två prototyper av en webbaserad tjänst undersökts. En som baserar sig på Luke Wroblewskis (2008) teori om gradvist engagemang, vilket innebär att registreringen blandas in i användandet av tjänsten. Den andra prototypen använder sig av teorier som på olika sätt motiverar användaren att ta sig igenom registreringen. Genom tester och intervjuer har dessa prototyper undersökts och granskats.

    Vad jag har kommit fram till är att det inte finns någon generell lösning på problemet och att varken det en eller det andra föredras. Istället bör hänsyn tas bland annat till vad det är för tjänst som presenteras och komplexiteten hos denna samt vilka målgrupper man riktar sig mot. Detta för att skapa en registreringsprocess som mindre framstår som ett hinder mellan besökaren och tjänsten och därigenom få fler att registrera sig, något som är till nytta för både användare och organisationer bakom webbaserade tjänster. 

1234567 101 - 150 of 2520
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf