lnu.sePublications
Change search
Refine search result
1234567 151 - 200 of 485
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Göran, Gustafsson
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Sebastian, Lundberg
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Överbelastningsattacker genom öppna reläer2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This work concerns a specific type of Denial of Service attack which is becoming increasingly popular. These attacks are carried out through open relays with the purpose of getting a significantly higher effect than otherwise achievable. Examination of attacks carried out through the services DNS and NTP have been conducted with the purpose of providing a clear picture of how serious the threat is and also clarify how a system administrator can secure the services to protect both their own and others resources. The results of our studies show that an attack performed through a DNS service gives under optimal conditions a amplification factor of "102.4" and an attack through a NTP service gives under optimal conditions a amplification factor of "229.16". The results also show that the problem can be solved in whole or in part by limiting the allowed network or disable recursion in DNS and commands in NTP.

    Download full text (pdf)
    Överbelastningsattacker geom öppna reläer
  • 152.
    Göransson, Albin
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Persson, Alexander
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Smart-TV hybridapplikation: En undersökning i hur hybridapplikationer kan skapas mellan Smart-TV och surfplattor, samt användbarheten för dessa typer av applikationer2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In recent years the market for tablet has grown massively, while a new type of Television device called Smart TV has started to find its way into people’s homes. This study is dedicated to finding out if tablets can be used together with Smart TV’s in a single application to craft a better user experience. To enable this study, a poker application combining LG Smart TV with an Android tablet were created, where the TV was used as a way to show information on a much larger screen. The study used research interviews as a tool to compare this application to a similar application running on the tablet alone. The results points to this type of application having potential when designed properly, but that more research in the area is needed.

    Download full text (pdf)
    fulltext
  • 153.
    Gündogdu, Alper
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Designing a Better App for Universities2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There is an app for everything, however, not every app delivers what the user expects. As a student, I had many tasks which were routine such as keeping track of the courses, events, exams or to dine. I wished for a mobile application that would ease the burden these routines create. While there was an LNU mobile application, it failed to address some of the needs I had as a student. Consequently, I felt it lacked the tools I needed to be successful. For instance, absent features such as a personalized academic calendar prevented me from finding relevant information about the location and times of classes. On our way to improve the functionality of the current solution, we started with surveying other students and collecting their thoughts about the LNU mobile app. Next, we performed market research in order to understand how other universities handled these needs. Finally, we combined the findings and built a prototype for students to test. The prototype managed to achieve higher rates of student satisfaction and will serve as the basis for future development. 

    Download full text (pdf)
    fulltext
  • 154.
    Haesevoets, Robrecht
    et al.
    Katholieke Universiteit Leuven.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Holvoet, Tom
    Katholieke Universiteit Leuven.
    Architecture-Centric Support for Adaptive Service Collaborations2014In: ACM Transactions on Software Engineering and Methodology, ISSN 1049-331X, E-ISSN 1557-7392, Vol. 23, no 1, p. Article ID: 2-Article in journal (Refereed)
    Abstract [en]

    In today’s volatile business environments, collaboration between information systems, both within and across company borders, has become essential to success. An efficient supply chain, for example, requires the collaboration of distributed and heterogeneous systems of multiple companies. Developing such collaborative applications and building the supporting information systems poses several engineering challenges. A key challenge is to manage the ever growing design complexity. In this article, we argue that software architecture should play a more prominent role in the development of collaborative applications. This can help to better manage design complexity by modularizing collaborations and separating concerns. State of the art solutions, however, often lack proper abstractions for modeling collaborations at architectural level or do not reify these abstractions at detailed design and implementation level. Developers, on the other hand, rely on middleware, business process management, and Web services, techniques that mainly focus on low-level infrastructure. To address the problem of managing the design complexity of collaborative applications, we present Macodo. Macodo consists of three complementary parts: (1) a set of abstractions for modeling adaptive collaborations, (2) a set of architectural views, the main contribution of this article, that reify these abstractions at architectural level, and (3) a proof of concept middleware infrastructure that supports the architectural abstractions at design and implementation level. We evaluate the architectural views in a controlled experiment. Results show that the use of Macodo can reduce fault density and design complexity, and improve reuse and productivity. The main contributions of this article are illustrated in a supply chain management case.

    Download full text (pdf)
    fulltext
  • 155.
    Hafizovic, Nedzad
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Linneuniversitetet.
    Candidate - job recommendation system: Building a prototype of a machine learning – based recommendation system for an online recruitment company2019Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Recommendation systems are gaining more popularity because of the complexity of problems that they provide a solution to. There are many applications of recommendation systems everywhere around us. Implementation of these systems differs and there are two approaches that are most distinguished. First approach is a system without Machine Learning, while the other one includes Machine Learning. The second approach, used in this project, is based on Machine Learning collaborative filtering techniques. These techniques include numerous algorithms and data processing methods. This document describes a process that focuses on building a job recommendation system for a recruitment industry, starting from data acquisition to the final result. Data used in the project is collected from the Pitchler AB company, which provides an online recruitment platform. Result of this project is a machine learning based recommendation system used as an engine for the Pitchler AB IT recruitment platform.

    Download full text (pdf)
    Candidate - job recommendation system
  • 156.
    Hagelbäck, Johan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hybrid pathfinding in StarCraft2016In: IEEE Transactions on Computational Intelligence and AI in Games, ISSN 1943-068X, E-ISSN 1943-0698, Vol. 8, no 4, p. 319-324, article id 7063238Article in journal (Refereed)
    Abstract [en]

    Micro-management is a very important aspect of RTS games. It involves moving single units or groups of units effectively on the battle field, targeting the most threatening enemy units and use the unit's special abilities when they are the most harmful for the enemy or the most beneficial for the player. Designing good micro-management is a challenging task for AI bot developers. In this paper we address the micro-management sub-task of positioning units effectively in combat situations. Two different approaches are evaluated, one based on potential fields and the other based on flocking algorithms. The results show that both the potential fields version and the flocking version clearly increases the win percentage of the bot, but the difference in wins between the two is minimal. The results also show that the more flexible potential fields technique requires much more hardware resources than the more simple flocking technique.

  • 157.
    Hallenfors Johansson, Maxim
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Färlind, Filip
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Ottosson, Kim
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Processorbelastning med MPLS och IP-routing2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This paper was based on the thesis "MPLS kontra traditionell IP routing - enjämnförelse av resursåtgång" by Sebastian Viking and Anton Öhlin. Their workcompared the CPU usage when performing routing with, and without, MPLS. Theresults demonstrates that MPLS provides higher processor load over traditional IProuting, contrary to the theory of MPLS. Due to the apparent contradictions betweentheory and practice has this work intended to create a hypothesis examined deductivelywith the aim to confirm its statement: Because of MPLS, and IP's, implementation ofthe underlying hardware architecture should no noticeable difference in processor usagebe presentated at tests where a router's job is to convey the package. Therefore, we recreatedtheir tests to confirm the authenticity of their results. The results from the testsin this paper showed no significant difference between IP routing technologies withCEF, and MPLS. Presented results thus confirm the hypothesis supported by thetheories behind the techniques used.

    Download full text (pdf)
    fulltext
  • 158.
    Hamberg, Christer
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    GUI driven End to End Regression testing with Selenium2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digitalization has changed our world and how we interact with different systems. Desktop applications have more and more been integrated with internet, and the web browser has become the Graphical User Interface (GUI) in today’s system solutions. A change that needs to be considered in the automated regression testing process. Using the actual GUI has over time shown to be a complicated task and is therefore often broken out as its own standalone test object. This study looked into time and quality constrains of using the GUI as driver of the regression testing of business requirements in a web based solution. By evaluating the differences in execution times of test cases between Application Programming Interface (API) calls and GUI driven testing, flakiness of test results and required modifications over time for a specific test suite. These constraints were analyzed by looking into how reliability of the test results could be achieved. With a GUI driven full end to end scope the quality in software solutions could be improved with a reduction in the number of interface issues and detected errors in deployed systems. It would also reduce the volume of test cases that needs to be executed and maintained as there are no longer standalone parts to verify separately with partially overlapping test cases. The implementation utilized Selenium WebDriver to drive the GUI and the results showed that by utilizing Selenium the test execution times were increased from approximately 2 seconds (API) to 20-75 seconds (Selenium). The flaky test results could be eliminated by applying the appropriate pattern to detect, locate, and scroll into visibility prior to interacting with the elements. In the end of the study the test execution results were 100% reliable. The navigation required 15 modifications over time to keep them running. By applying the appropriate pattern a reliable test result can be achieved in end to end regression testing where the test case is driven from the GUI, however with an increase in execution time.

    Download full text (pdf)
    fulltext
  • 159.
    Hansson, Rickard
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Lindau, Emil
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Parallell utveckling av en- och flerspelarläge i spel: En strävan efter separation2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This paper addresses the question formulation “How does one aid a parallel development of singleplayer and multiplayer in game development?” The reasoning behind is that we believe a separation between the two achieves a greater agility in software development minded towards games. Something that the industry and developers alike historically have struggled and had problems with. At the same time a separation of functionality divides the different areas of expertise (game logic and network) so that the right person can focus on the right thing in a development cycle. The contribution to the scarce research in the general area computer science more narrowly and specific, game development research is mainly to pave the way for further research. The problem has been tackled through Action Research, meaning the use of practical development iterated towards a potential solution, and on a weekly basis considered the solution and made improvements and adjustments on it. This paper describes a solution in form of a software design and a couple of rules to relate to as well as the experience we obtained throughout this project.

    Download full text (pdf)
    fulltext
  • 160.
    Hauch, Manuel David
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Using Geographic Location for Optimal Service Selection2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Nowadays, a multitude of functionally equal web services are available. By thisbroad offer, the need of a service recommendation based on non-functional characteristics(e.g. price, response time, availability) is increasing. The static ServiceLevel Agreements (SLAs) of service providers cannot suffice this need. SLAs arenot reliable enough, due to the fact that they do not cover the dynamic performanceand quality changes of services during their lifetime. This bachelor’s thesis waswritten within a research project of the Linnaeus University in Sweden and the KarlsruheUniversity of Applied Science in Germany. The goal of this research projectis to eliminate the issues as described above. For this reason, a framework for anoptimized service selection was developed. Instead of using the static SLAs, measurementsof each service call are taken. On the basis of the measurements and therequirements of the consumer, the framework then provides an automated best-fitservice selection.

    The purpose of this thesis is to involve the geographic location of each serviceconsumer in the automated service selection. Therefore, a mobile app was developedto get a sufficient amount of real world test data. This app measures service calls andadditionally records the geographic location of the user. Based on the geographiclocation, the collected measurement data then were grouped into regions. Thereby,it could be shown that the geographic location of the user can be used to improve theoptimal service selection.

    Download full text (pdf)
    fulltext
  • 161.
    Hedenborg, Mathias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Lundberg, Jonas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Löwe, Welf
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Trapp, Martin
    Senacor Technologies AG, Germany.
    Approximating Context-Sensitive Program Information2015In: Proceedings Kolloquium Programmiersprachen (KPS 2015) / [ed] Jens Knoop, 2015Conference paper (Other academic)
    Abstract [en]

    Static program analysis is in general more precise if it is sensitive to execution contexts (execution paths). In this paper we propose χ-terms as a mean to capture and manipulate context-sensitive program information in a data-flow analysis. We introduce finite k-approximation and loop approximation that limit the size of the context-sensitive information. These approximated χ-terms form a lattice with a finite depth, thus guaranteeing every data-flow analysis to reach a fixed point. 

    Download full text (pdf)
    fulltext
  • 162.
    Hjelm, Sofia
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Evaluation of JavaScript frameworks: Why should you use them?2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    JavaScript is today’s most common client-side programming language for the web. Choosing the most adapted framework for each and every project can optimize the development process and increase profits. Developers often lack knowledge about what to prioritize when choosing a framework and very little previous research regarding this subject area is available. This thesis investigates two JavaScript client-side frameworks and answers the questions of why you should use a framework when developing applications. This thesis also investigates why a company should develop a new framework, when equivalent open-source alternatives are available. To be able to answer the questions interviews with developers were conducted. The results are that using a framework can optimize the development process regarding time and complexity, but learning a new framework can be difficult. In rare cases it is a great idea to develop a new framework for a certain project, but it is often not worth it. Developers also seem to choose experience of using a framework over performance.

    Download full text (pdf)
    fulltext
  • 163.
    Holmström, Erik
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Sandroos, Jonas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Urskilja projekt skrivna med testdriven utveckling: En kvantitativ studie om TDD-projekt på GitHub2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Testdriven utveckling (TDD) är en mjukvaruutvecklings process där man skriver automatiska enhetstester innan implementationskoden. Vi har utvecklat en metod för att kunna urskilja projekt skrivna med TDD efter implementationen. Att veta om ett projekt är skrivet i TDD efter implementation har inte gjorts tidigare. En lösning kan hjälpa till vid forskning inom ämnet genom att identifiera en större mängd projekt som är skrivna med TDD. Vår lösning är en metod som innebär att först söka efter data och sedan skapa en modell med den hämtade datan. Modellen testades och därefter automatiserades. Resultatet indikerar att det är svårt att komma fram till ett bra strukturerat sätt att urskilja TDD-projekt efter utvecklingsprocessen. 

    Download full text (pdf)
    fulltext
  • 164.
    Houssein, Hatem
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Are ORMs the end of stored procedures?2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Stored procedures are used as the current database logic for SAAB’s data model of the fighter aircraft JAS-39 Gripen electrical schemas. Since the database model was developed in 2000, a research and tests needed to be carried out to decide on whether updating the database to today's technology is applicable. Therefore, Object-Relational Mapping (ORM) is to be researched, tested and compared to stored procedures using test-driven development (TDD)concerning an important factor, that Stored procedures are well-known for, which is querying performance of the database. Moreover, how maintainability and flexibility [1] can affect decision between Stored procedures or migrating to ORM based on our subjective experience. NHibernate and Entity Framework are the two ORM solutions considered sinceSAAB uses C# in this project. The process of this project is run using scrum of the agile software development to maintain an iterative progress throughout the project timeline. In this paper, the process and methodology are covered in details and also the comparison with the test results. These results eventually lead us to the answer that ORM is not a suitable technology, and stored procedures still dominate the querying performance for SAAB’scurrent database.

    Download full text (pdf)
    fulltext
  • 165.
    Huber, Florian
    et al.
    SYNYO GmbH, Austria.
    Jäger, Bernhard
    SYNYO GmbH, Austria.
    Pllana, Sabri
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hrdlicka, Zdenek
    University of Chemistry and Technology, Czech Republic.
    Mettouris, Christos
    University of Cyprus, Cyprus.
    Papadopoulos, George
    University of Cyprus, Cyprus.
    Matevc, Tamara
    Jožef Stefan Institute, Slovenia.
    Ocsovszky, Zsófia
    BioTalentum, Hungary.
    Hajdu, Edina
    BioTalentum, Hungary.
    Gary, Chris
    Kinderbüro Universität Wien, Austria.
    Smith, Phil
    Teacher Scientist Network , UK.
    Pushing Stem-Education through a Social-Media-Based Contest Format - Experiences and Lessons-Learned from the H2020-Project SciChallenge2017In: INTED2017 Proceedings: 11th International Technology, Education and Development Conference, Valencia, Spain: IATED , 2017, p. 334-344Conference paper (Refereed)
    Abstract [en]

    Science education is tremendously shaping the present and future of modern societies. Thus, Europe needs all its talents to increase creativity and competitiveness. Especially young boys and girls have to be engaged to pursue careers in Science, Technology, Engineering and Mathematics (STEM). However, statistics still show that enrolment rates in STEM-based degree programs are decreasing. On the long run, this will lead to a workforce problem in the research and development based economy as well as in the scientific sector of all EU member states. But how can we manage it to get young people more interested in STEM?The EU-funded research project SciChallenge (project.scichallenge.eu) addresses this challenge by proposing a social-media-based STEM-contest for young people between 10 to 20 years. The contest pilot is currently running (until April 30th 2017). With its multi-level approach, SciChallenge aims at increasing the attractiveness of science education and careers among young girls and boys on a pan- European level.In the first part, the paper introduces the project and highlights the main steps of the preparation of the contest. This includes the development of the contest concept and the processual framework as well as the main steps that were done for preparing the contest. It also presents the resources that are provided for the participants. The second part of the paper highlights the idea, design and implementation of the digital contest platform (www.scichallenge.eu), which serves as the core of the contest. It will present for example the novel submission and rating system that utilize the power of social networking platforms such as Facebook, as well as the contest dashboards, a convenient, easy to use informational map for the users to observe the status of the contest and related information. Furthermore, it will show how intelligent social media syndication tools can support the awareness creation. The third part of the paper will provide a status update on the currently running contest pilot. It will provide a summary of the experiences that the consortium made with this novel approach. It will also elaborate on the main obstacles the consortium was facing and present the lessons-learned for a future implementation, before drawing preliminary conclusions in the final part regarding the question if such an approach can be a way to increase interest of young people in STEM-education and careers.

  • 166.
    Hui, Wu
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Visualization of Bags2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this thesis is to develop a toolkit to visualize bag calculations for teaching. We take full advantage of interaction techniques in Computer Science to achieve it, which could lead to a modern and impressive way for teaching.

      In this thesis, the developed toolkit is going to show the bag calculations and corresponding animations interactively and aesthetically which make new learners easier to acquire the concept of multiset.

    Download full text (pdf)
    fulltext
  • 167.
    Hult, Adam
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Automatiserad IO-adressering: Ett konfigureringssystem som hanterar maskinunik hårdvaruadressering2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Genom Norden Machinerys förmåga att innovera och skapa har de bland annat lyckats producera maskiner med otroliga kapaciteter. Med det och den höga verkningsgraden maskinerna verkar på har gjort att företaget idag är världsledande inom tubfyllningsindustrin.

     

    Varje maskin som levereras utav Norden har ofta unika kundspecifikationer, detta gör att Nordens elkonstruktionsavdelning behöver tilldela en maskinunik eldokumentation till varje maskin. Detta innebär att IO-konfigurationen är unik och måste då anpassas i maskinens PLC-program. Vid uppstart av maskiner idag måste alla IO-adresser matas in för hand via en operatörspanel. Detta utgör att uppstartsfatsen är både tidskrävande samt att det finns en risk att felaktiga adresser anges.

     

    Denna rapport kommer avhandla och beskriva hur man kan hantera IO-adressering och IO-konfigurering när antalet portar hos en PLC är otillräckliga samt att undersöka möjligheterna till att automatisera den manuella hanteringen utav adresser och IO-konfigurationen.

    Download full text (pdf)
    fulltext
  • 168.
    Håkansson, Jesper
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Badran, Sherief
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Evaluating cyclomatic complexity on functional JavaScript2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Bugs in software is a very common problem, code reviews can help to catch

    bugs early on and detect which code is the most complex and may introduce

    bugs but when the code base is very large it can be costly to review all the

    code. Cyclomatic complexity can be used to give an indication of how complex

    the system source code is and help the developers to select which code they

    should review. But when measuring cyclomatic complexity on code written

    according to the functional paradigm, McCabe’s formula will not be sufficient

    since it is a formula most suitable for imperative code. Therefore we are

    making adaptations to a formula suited for pure functional languages in order

    to fit functional JavaScript. We are using an inductive empirical quantitative

    measurement method to calculate cyclomatic complexity on a directed graph

    implementation in order to define adaptations for functional JavaScript. Our

    results show a working adapted version of the formula. We have measured on

    a graph implemented in Haskell and on a corresponding functional JavaScript

    version which results in a cyclomatic complexity difference at only 0.375.

    Download full text (pdf)
    fulltext
  • 169.
    Hönel, Sebastian
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Temporal data analysis facilitating recognition of enhanced patterns2015Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Assessing the source code quality of software objectively requires a well-defined model. Due to the distinct nature of each and every project, the definition of such a model is specific to the underlying type of paradigms used. A definer can pick metrics from standard norms to define measurements for qualitative assessment. Software projects develop over time and a wide variety of re-factorings is applied tothe code which makes the process temporal. In this thesis the temporal model was enhanced using methods known from financial markets and further evaluated using artificial neural networks with the goal of improving the prediction precision by learning from more detailed patterns. Subject to research was also if the combination of technical analysis and machine learning is viable and how to blend them. An in-depth selection of applicable instruments and algorithms and extensive experiments were run to approximate answers. It was found that enhanced patterns are of value for further processing by neural networks. Technical analysis however was not able to improve the results, although it is assumed that it can for an appropriately sizedproblem set.

    Download full text (pdf)
    fulltext
  • 170.
    Iakovenko, Volodymyr
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Visualization of complex events in multithreading systems2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Today more and more applications become multithreaded, because parallel processing of multiple threads improves program performance on computer systems that have multiple CPUs. With growing of amount of multithreaded applications also amount of problems increases, which can occur during program execution.

    There are many tools, which help with multithreading debugging. They all differ from each other and they are all good in solving specific kinds of problems that they aim to solve, but still there is much work has to be done in multithreading debugging area.

    The aim of this project is to create a solution, with use of each users can define events, which are executed in their single- or multithreaded applications and should be visualized for future debugging. This will help user to see how the application works on a logical level.

    Download full text (pdf)
    fulltext
  • 171.
    Idrizi, Florim
    et al.
    Tetovo State University, Macedonia.
    Rustemi, Avni
    Tetovo State University, Macedonia.
    Dalipi, Fisnik
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Tetovo State University, Macedonia.
    A new modified sorting algorithm: A comparison with state of the art2017In: 2017 6th Mediterranean Conference on Embedded Computing (MECO), IEEE, 2017, p. 419-424Conference paper (Refereed)
    Abstract [en]

    Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. The most used sorting algorithms today have been discovered years ago, and to this day, they have been the best for the job as there was no other competitive algorithm. Through this paper, we make an analysis and comparison between the state of the art algorithms in sorting and based on their analogy of functionality, we propose a new modified sorting algorithm. We then present a brief description of the new modified algorithm, conduct comparisons with the state of the art, and finally we give conclusions about the performance of the proposed algorithm versus the most popular sorting algorithms. Moreover, we highlight the benefits of using this algorithm in different fields by various business companies or software developers, in cases when they need faster and easier sorting for their data management.

  • 172.
    Iftikhar, Muhammad Usman
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Faculty of Engineering Science, Department of Computer Science, KU Leuven, Belgium.
    A Model-Based Approach to Engineer Self-Adaptive Systems with Guarantees2017Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Modern software systems are increasingly characterized by uncertainties in the operating context and user requirements. These uncertainties are difficult to predict at design time. Achieving the quality goals of such systems depends on the ability of the software to deal with these uncertainties at runtime. A self-adaptive system employs a feedback loop to continuously monitor and adapt itself to achieve particular quality goals (i.e., adaptation goals) regardless of uncertainties. Current research applies formal techniques to provide guarantees for adaptation goals, typically using exhaustive verification techniques. Although these techniques offer strong guarantees for the goals, they suffer from well-known state explosion problem. In this thesis, we take a broader perspective and focus on two types of guarantees: (1) functional correctness of the feedback loop, and (2) guaranteeing the adaptation goals in an efficient manner. To that end, we present ActivFORMS (Active FORmal Models for Self-adaptation), a formally founded model-driven approach for engineering self-adaptive systems with guarantees. ActivFORMS achieves functional correctness by direct execution of formally verified models of the feedback loop using a reusable virtual machine. To efficiently provide guarantees for the adaptation goals with a required level of confidence, ActivFORMS applies statistical model checking at runtime. ActivFORMS supports on the fly changes of adaptation goals and updates of the verified feedback loop models that meet the changed goals. To demonstrate the applicability and effectiveness of the approach, we applied ActivFORMS in several domains: warehouse transportation, oceanic surveillance, tele assistance, and IoT building security monitoring.

    Download full text (pdf)
    fulltext
    Download (jpg)
    Presentationsbild
  • 173.
    Iftikhar, Muhammad Usman
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Lundberg, Jonas
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Katholieke Univ Leuven, Belgium.
    A Model Interpreter for Timed Automata2016In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, PT I, Springer, 2016, p. 243-258Conference paper (Refereed)
    Abstract [en]

    In the model-centric approach to model-driven development, the models used are sufficiently detailed to be executed. Being able to execute the model directly, without any intermediate model-to-code translation, has a number of advantages. The model is always up-to-date and runtime updates of the model are possible. This paper presents a model interpreter for timed automata, a formalism often used for modeling and verification of real-time systems. The model interpreter supports real-time system features like simultaneous execution, system wide signals, a ticking clock, and time constraints. Many existing formal representations can be verified, and many existing DSMLs can be executed. It is the combination of being both verifiable and executable that makes our approach rather unique.

  • 174.
    Iftikhar, Muhammad Usman
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science. Katholieke Univ Leuven, Belgium.
    ActivFORMS: A Runtime Environment for Architecture-Based Adaptation with Guarantees2017In: 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ICSAW), IEEE, 2017, p. 278-281Conference paper (Refereed)
    Abstract [en]

    Modern software systems are exposed to various types of uncertainties, such as dynamics in the available resources that are difficult to predict and goals that may change during operation. Self-adaptation equips a software system with a feedback loop that collects additional knowledge at runtime, monitors the system and adapts it when necessary to maintain its quality goals, regardless of uncertainties. One challenging problem of self-adaptation is to provide guarantees for the goals that are subject of adaptation. In this paper, we present the ActivFORMS runtime environment to realise self- adaptation with guarantees. With ActivFORMS designers model and verify a feedback loop. The verified models can directly be deployed on top of a virtual machine that executes the models to realise adaption. The approach avoids coding of the models, which is an error-prone task. The runtime environment visualises the executing models, the state of the goals, and it supports on the fly updates of the models and goals. We illustrate the approach with an adaptation scenario of an IoT building security example.

  • 175.
    Iftikhar, Muhammad Usman
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    ActivFORMS: Active Formal Models for Self-adaptation2014In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM Press, 2014, p. 125-134Conference paper (Refereed)
    Abstract [en]

    Self-adaptation enables a software system to deal autonomously with uncertainties, such as dynamic operating conditions that are difficult to predict or changing goals. A common approach to realize self-adaptation is with a MAPE-K feedback loop that consists of four adaptation components: Monitor, Analyze, Plan, and Execute. These components share Knowledge models of the managed system, its goals and environment. To provide guarantees of the adaptation goals, state of the art approaches propose using formal models of the knowledge. However, less attention is given to the formalization of the adaptation components themselves, which is important to provide guarantees of correctness of the adaptation behavior (e.g., does the execute component execute the plan correctly?). We propose Active FORmal Models for Self-adaptation (ActivFORMS) that uses an integrated formal model of the adaptation components and knowledge models. The formal model is directly executed by a virtual machine to realize adaptation, hence active model. The contributions of ActivFORMS are: (1) the approach assures that the adaptation goals that are verified offline are guaranteed at runtime, and (2) it supports dynamic adaptation of the active model to support changing goals. We show how we have applied ActivFORMS for a small-scale robotic system

    Download full text (pdf)
    fulltext
  • 176.
    Iftikhar, Muhammad Usman
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Assuring System Goals Under Uncertainty with Active Formal Models of Self-adaptation2014In: Companion Proceedings of the 36th International Conference on Software Engineering, ACM Publications, 2014, p. 604-605Conference paper (Refereed)
    Abstract [en]

    Designing software systems with uncertainties, such as incomplete knowledge about changing system goals, is challenging. One approach to handle uncertainties is self-adaptation, where a system consists of a managed system and a managing system that realizes a feedback loop. The promise of self-adaptation is to enable a system to adapt itself realizing the system goals, regarding uncertainties. To realize this promise it is critical to provide assurances for the self-adaptive behaviours. Several approaches have been proposed that exploit formal methods to provide these assurances. However, an integrated approach that combines: (1) seamless integration of offline and online verification (to deal with inherent limitations of verification), with (2) support for runtime evolution of the system (to deal with new or changing goals) is lacking. In this paper, we outline a new approach named Active FORmal Models of Self-adaptation (ActivFORMS) that aims to deal with these challenges. In ActivFORMS, the formal models of the managing system are directly deployed and executed to realize self-adaptation, guaranteeing the verified properties. Having the formal models readily available at runtime paves the way for: (1) incremental verification during system execution, and (2) runtime evolution of the self-adaptive system. Experiences with a robotic system show promising results.

    Download full text (pdf)
    fulltext
  • 177.
    Ihantola, Petri
    et al.
    Tampere University of Technology, Finland.
    Vihavainen, Arto
    University of Helsinki, Finland.
    Ahadi, Alireza
    University of Technology, Australia.
    Butler, Matthew
    Monash University, Australia.
    Börstler, Jürgen
    Blekinge Institute of Technology.
    Edwards, Stephen H.
    Virginia Tech, USA.
    Isohanni, Essi
    Tampere University of Technology, Finland.
    Korhonen, Ari
    Aalto University, Finland.
    Petersen, Andrew
    University of Toronto, Canada.
    Rivers, Kelly
    Carnegie Mellon University, USA.
    Rubio, Miguel Ángel
    University of Granada, Spain.
    Sheard, Judy
    Monash University, Australia.
    Skupas, Bronius
    Vilnius University, Lithuania.
    Spacco, Jaime
    Knox College, USA.
    Szabo, Claudia
    The University of Adelaide, Australia.
    Toll, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Educational Data Mining and Learning Analytics in Programming: Literature Review and Case Studies2015In: Proceedings of the 2015 ITiCSE on Working Group Reports / [ed] Program ChairsNoa Ragonis Beit Berl College and Technion-ITT, Israel Päivi Kinnunen Aalto University, Finland, New York: ACM Press, 2015, p. 41-63Conference paper (Refereed)
    Abstract [en]

    Educational data mining and learning analytics promise better understanding of student behavior and knowledge, as well as new information on the tacit factors that contribute to student actions. This knowledge can be used to inform decisions related to course and tool design and pedagogy, and to further engage students and guide those at risk of failure. This working group report provides an overview of the body of knowledge regarding the use of educational data mining and learning analytics focused on the teaching and learning of programming. In a literature survey on mining students’ programming processes for 2005–2015, we observe a significant increase in work related to the field. However, the majority of the studies focus on simplistic metric analysis and are conducted within a single institution and a single course. This indicates the existence of further avenues of research and a critical need for validation and replication to better understand the various contributing factors and the reasons why certain results occur. We introduce a novel taxonomy to analyse replicating studies and discuss the importance of replicating and reproducing previous work. We describe what is the state of the art in collecting and sharing programming data. To better understand the challenges involved in replicating or reproducing existing studies, we report our experiences from three case studies using programming data. Finally, we present a discussion of future directions for the education and research community.

  • 178.
    Isaksson, Mårten
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Synchronized collection of video streams to microcomputer2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Saab currently uses a system for recording exercises and tests of their products, based upon multiple cameras and microphones connected to a desktop computer. The system produces a final video, in which the entire exercise or test can be viewed. Saab wants to investigate whether it is possible to create a new recording system, based on single board computers, USB microphones, USB cameras and IP cameras.

    The purpose of the present report is to study whether it is possible to synchronize video and audio streams using inexpensive hardware in real-time. The present study resulted in two applications using the single board computer Raspberry Pi with the following hardware connected; USB camera, IP camera and USB microphone. Raspberry Pi received video and audio streams from connected cameras and microphones. These streams were thereafter synchronized into a video.

    The present study has shown that Raspberry Pi is fully sufficient to create a synchronization system for video and audio streams. A method for synchronizing video and audio streams is furthermore proposed. The method is based upon very precisely recorded timestamps for the first video frame. That timestamp is furthermore used as a baseline, in order to synchronize all video and audio streams.

  • 179.
    Jalili, Mahmoud
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Analyse Mobile Device Management Criteria2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Mobility and using smartphones and tablets as replacement of laptops are getting to be increasingly vital for enterprises and accordingly bring new concerns from different perspective for both companies and individuals. To achieve enterprise mobility companies needs to ensure that the mobile equipment are always connected, complies with security policy in a safe and protected path toward being productivity and efficiency. To approach these purposes Mobile Device Management (MDM) was created few years back in order to not only secure enterprises information but additionally manage user’s activities and equipment. However there is no general methodology to define criteria weight for these systems and rather depends on different enterprise policy. One primary issue here is availability of many MDM solutions in market and several difficulties to compare them together and meanwhile most of comparison documents limited based on white papers of providers which mostly designed for commercial market purposes. This thesis will come up with a list of important properties for MDM solutions and evaluate several of solutions as well as categorizing all available criteria in this area. Second part of thesis is a case study of choosing proper MDM solution for two different scenarios and give recommendations on what products to utilize relying upon what sort of association you have. In order to achieve this, strong analytical methods are required to compare existing services and sharper eye from security perspective toward the applications. 

    Download full text (pdf)
    Analyse Mobile Device Management Criteria
  • 180.
    Jercic, Petar
    et al.
    Blekinge institute of technology, Sweden.
    Wen, Wei
    Blekinge institute of technology, Sweden.
    Hagelbäck, Johan
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Sundstedt, Veronica
    Blekinge institute of technology, Sweden.
    The Effect of Emotions and Social Behavior on Performance in a Collaborative Serious Game Between Humans and Autonomous Robots2018In: International Journal of Social Robotics, ISSN 1875-4791, E-ISSN 1875-4805, Vol. 10, no 1, p. 115-129Article in journal (Refereed)
    Abstract [en]

    The aim of this paper is to investigate performance in a collaborative human–robot interaction on a shared serious game task. Furthermore, the effect of elicited emotions and perceived social behavior categories on players’ performance will be investigated. The participants collaboratively played a turn-taking version of the Tower of Hanoi serious game, together with the human and robot collaborators. The elicited emotions were analyzed in regards to the arousal and valence variables, computed from the Geneva Emotion Wheel questionnaire. Moreover, the perceived social behavior categories were obtained from analyzing and grouping replies to the Interactive Experiences and Trust and Respect questionnaires. It was found that the results did not show a statistically significant difference in participants’ performance between the human or robot collaborators. Moreover, all of the collaborators elicited similar emotions, where the human collaborator was perceived as more credible and socially present than the robot one. It is suggested that using robot collaborators might be as efficient as using human ones, in the context of serious game collaborative tasks.

  • 181.
    Jesper, Lindberg
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Hybridapplikationer för desktopmiljön: Utvärdering av ramverk2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis is about the frameworks that are available for developing hybrid applicationsfor the desktop environment. The two main frameworks are compared through aqualitative analysis and implementation of the test application. The results show thatone framework is significantly better suited for the development of hybrid applicationsas of right now.

  • 182.
    Jiménez Tarrés, Víctor
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Mobile development: Linnaeus University App for Exchange students2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Every year approximately a thousand of exchange students arrive to Växjö looking forimproving their university experience. The main problem is that this amount of peopleis very difficult to handle and organize. Sometimes, students don’t have enoughsupport, missing important information, missing interesting events and so on.

    In consequence, the students can develop a bad feeling about the universityorganization giving a bad feedback to the future potential incoming students. This is abad aspect to Linnaeus University because it is losing future students.

    In order to solve the problem, different surveys have been done to the internationalstudents, and even to the Växjö International Students (VIS) organization.

    The findings from these surveys are very interesting, and it is possible to identify andgroup different problems in order to make the solution easier.

    Furthermore, a good solution is found, improving the situation we were before. The solution found will fit in the hand of each student and will bring us in a better situationfor the university and their students.

    Download full text (pdf)
    Final Thesis
  • 183.
    Johansen, Carl
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Andersson, Mikael
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Tabulex, en algoritmutbrytning: Analys och jämförelse mellan objektorienterade språk2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Tabulex is a software produced and developed by IST AB that manages scheduling for schools. The purpose of this project was to extract an algorithm embedded in the software written inDelphi and translate it into Java. These languages share many similarities due to them bothbeing object oriented. Studies were made to compare the differences in the languages on themost basic of concepts such as: performance, inheritance, classes and encapsulation. To achievea more thorough basis for this study other programming languages in the object orientatedparadigm were compared as well. Tests were made between C++, C# and Java to test andanalyse differences in execution time on a few selected algorithms. The report also refers toexternal tests where the languages are tested using the same principle as above. With theextraction of the algorithm the biggest difference was how Delphi handles encapsulation incomparison to Java. The extraction of the algorithm succeeded and you could see clearimprovements in execution time and efficiency. The performance comparisons showed adifference in execution-time in the different programming languages. C++ was the fastest andit could be linked to the fact that C++ has pointers which allows a programmer to refer directlyto a specific location in memory. Some of the time-differences could also be linked to differentcompilers and support for features such as JIT - Just in time compilation.

    Download full text (pdf)
    fulltext
  • 184.
    Johansson, Anders
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wassbjer, Robin
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Windows 10 för inbyggda system: En undersökning av Windows 10 IoT Enterprise2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Microsoft released Windows 10 in the middle of 2015. Windows 10 is a series of operating systems with multiple versions adapted for many different fields of work. Windows 10 IoT Enterprise is one of the versions aimed at various types of embedded systems. During adaptation into certain environments, parts of the operating system may therefore be locked down or limited. For configuration of Windows 10, both old and new tools are available. 

    In this project, an examination of lockdown and adaptation possibilities, as well as configuration tools, focusing on Windows 10 IoT Enterprise is made. The tools used are Microsoft’s brand new Windows Imaging and Configuration Designer, but also their older Windows System Image Manager. Multiple configurations have been examined both with, and without the help of these tools. This includes user and application limitations, branding, and appearance. In addition to this, the creation of fully configured Windows images is superficially addressed.

    The project has consisted of several tests, mainly based on documentation from Microsoft. A majority of the examined possibilities and configurations have proven functional and quite easy to make use of. A working functionality has only been evaluated as such if it satisfies descriptions released by Microsoft themselves. This, as well as not breaking other parts of the system. In the end, the result mainly describes existing and working functionalities, not in what practical scenarios they fit. During configuration of major lockdown features, Windows ICD displays problems. Other problems has also been noted, among other things related to profile copying and generalization in Windows 10.

    Download full text (pdf)
    Windows 10 för inbyggda system
  • 185.
    Johansson, Daniel
    Linnaeus University, School of Business and Economics, Department of Organisation and Entrepreneurship. Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    From products to consumption: changes on the Swedish music market as a result of streaming technologies2013Report (Other academic)
    Abstract [en]

    Since the year 2009, the Swedish music market has changed drastically. In the first six months of 2013, 75 percent of total revenues to Swedish repertoire owners came from digital distribution. More than 90 percent of those revenues came from streaming. More than half of the population has a streaming subscription, and streaming has become the dominant format for consuming music on this specific market. As a result of this paradigm shift, changes have occurred in the Swedish music industrial system, as well as in user behaviors. This report examines how the Swedish music market has changed as a result of à la carte on demand streaming, explains the streaming model as such and give a picture of what these changes could mean for the future.

    Download full text (pdf)
    fulltext
  • 186.
    Johansson, Daniel
    Linnaeus University, School of Business and Economics, Department of Organisation and Entrepreneurship. Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Music festivals in Sweden - an analysis of the ten largest commercial festivals 2000 - 20132014Report (Other academic)
    Abstract [en]

    This study examines the development for commercial music festivals in Sweden during the time period 2000 - 2013. Although it is clear that some legendary Swedish music festivals have disappeared during the latest years, this study indicates that the number of paying visitors of the largest festivals continues to increase. In fact, 2013 was the record year during the studied time frame regarding the number of paying visitors to the ten largest commercial festivals, with official visitor figures validated through STIM data. Nevertheless, the Swedish music festival market has changed considerably. The purpose of the paper is to describe some of these changes as well as provide a quantitative foundation for further research questions to be dealt with in the future.

    Download full text (pdf)
    fulltext
  • 187.
    Johansson, Erik
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kroon, Rasmus
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Migrering från IPv4 till IPv6: En studie i komplexitet2015Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report is based on the problem of combining TCP/IPv4 and TCP/IPv6 with eachother. The two protocols are not compatible to send packets between themselves andonly parts of the Internet make use of, or supports, the newer IPv6 protocol. Due tothe shortage of public IPv4 addresses in the world we need to, sooner or later, makea complete migration from IPv4 to IPv6 over the Internet. However, until needed,we can make use of migration methods that can handle both the older and the newerTCP/IP protocols simultaneously.In the report, various migration techniques are evaluated with the main focusbeing complexity, as in: the time it takes to implement the solution. The methodpresented constitute a laboratory task where the test persons performs simulated migrationswith the different techniques to get a time data. With the help of time datathe least complex migration method is later presented. A minimally complex methodcan help both individuals and companies connected to the Internet to migrate fromIPv4 to IPv6 in a smoother manner.Migration solutions in this report are mainly addressed to a target group of mediumsizedcompanies that want to use the IPv6-protocol but at the same time want to havethe opportunity to be connected to the Internet.The results showed that by using a technique called Dual Stacking, both IPv4 andIPv6 can be used on a network simultaneously. Our testers also pointed out that thistechnique is the least complex, therefore the easiest to implement and understand.The outcome of the report might result in more companies daring to use IPv6, andwhen the day comes when the Internet completely migrates to IPv6 these companieswill be in the forefront and well prepared.

    Download full text (pdf)
    Migrering från IPv4 till IPv6
  • 188.
    Johansson, Oscar
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Forsman, Max
    Shared computer systems and groupware development: Escaping the personal computer paradigm2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    For the majority of the computers existence, we humans have interacted with them in a similar way, usually with a strict one-to-one relationship between user and machine. This is reflected by the design of most computers, operating systems and user applications on the market today, which are typically intended to only be operated by a single user. When computers are used for teamwork and cooperation, this design philosophy can be restricting and problematic. This paper investigates the development of shared software intended for multiple users and the impact of the single user bias in this context. A prototype software system was developed in order to evaluate different development methods for shared applications and discover potential challenges and limitations with this kind of software. It was found that the development of applications for multiple users can be severely limited by the target operating system and hardware platform. The authors conclude that new platforms are required to develop shared software more efficiently. These platforms should be tailored to provide robust support for multiple concurrent users. This work was carried out together with SAAB Air Traffic Management in Växjö, Sweden and is a bachelor's thesis in computer engineering at Linnaeus University.

    Download full text (pdf)
    Shared computer systems and groupware development
  • 189.
    Jonsson, Rickard
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Tägt, Daniel
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Remote Tower Center - Planning Tool2017Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Saab has a product, Remote Tower, which allows air traffic controllers to supervise and control an airport remotely. Today an air traffic controller can operate on one airport at the time and switch between airports. The next phase of this system is to allow the air traffic controller to simultaneously control multiple airports, i.e. going from controlling airports in sequence to controlling airports in parallel. The airports are connected to and controlled from one single airport control center. This leads to a planning problem, both in long term and short term, for staffing this airport control center to maintain the capacity of the connected airports. This thesis will present the process of the development of a tool allowing a user to plan the schedule the staffing of a remote tower center. By utilizing this tool the impact of different restrictions affecting the planning will be evaluated and presented in the results.

    Download full text (pdf)
    fulltext
  • 190.
    Jonsson, Rickard
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Törnström Andersson, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kamerakalibrering2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Saab has developed a product, Remote Tower, which is designed to remotely control an airport that is monitored and controlled from a location other than the air traffic control tower. At the airport you want to control the cameras mounted in a manner such that a 360 degree view is given and the image of those sent to the place from which to control the airport. When a re-installation of one or many cameras is needed there is today required two people. These may have to work in different places because the server does not need to be located in the vicinity of the airport itself. This is both time consuming and costly, which has led to a need for a versatile installation of the cameras. A server application has been developed which can communicate with the cameras and control their functions such as zoom, focus and iris, but also make image comparison calculations. An Android application was also developed to access the server. It is this that the installer will use when he is up in the camera tower and adjusts the cameras. This application has access to the current view, the camera's features and also the possibility to run guides created to facilitate calibration.

    Download full text (pdf)
    kamerakalibrering
  • 191.
    Jonsson, Robin
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Blixt, Simon
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Distribution and configuration of agents for NMS in a reasonable time2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With this paper we intended to simplify deployment and management of monitoring agents for a Network Monitoring System. We found interest on the subject since the time consumed to deploy and manage agents was found to be very inefficient. During a lecture with the Swedish based company Op5 AB at the Linnaeus University in Kalmar, Sweden, we presented the complex of problem. The lecturer showed great interest in a solution on the subject and we found it to be a great thesis subject for the Bachelor degree in Computer Science.

    By the year of 2016 it is expected that the number of network connected devices will grow threefold, there will be four times as much IP traffic and the data storage demand will increase tenfold. [8] This growing demand will also affect the requirement on the Network Monitoring System and in turn the monitoring agents.

    In this paper we created a baseline, which consisted of a timing regarding the time consumption for manual deployment, configuration and management of the monitoring agents. We also developed an automated way for deployment, configuration and management of monitoring agents by integrating a Content Management Software called Puppet, combined with several scripts. To simplify the management and deployment furthermore a widget was developed for Op5’s Web based User Interface called Ninja.

    The developed solution was measured against the baseline and a result regarding time consumption was presented. The result fell into a discussion on the subject of automatization and the time savings that it may result in due to less frequent human errors and a less repetitive work processes. 

    Download full text (pdf)
    Distribution and configuration of agents for NMS in a reasonable time
  • 192.
    Joosep, Henno
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Empirical Evaluation of Approaches for Digit Recognition2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Optical Character Recognition (OCR) is a well studied subject involving variousapplication areas. OCR results in various limited problem areas are promising,however building highly accurate OCR application is still problematic in practice.This thesis discusses the problem of recognizing and confirming Bingo lottery numbersfrom a real lottery field, and a prototype for Android phone is implementedand evaluated. An OCR library Tesseract and two Artificial Neural Network (ANN)approaches are compared in an experiment and discussed. The results show thattraining a neural network for each number gives slightly higher results than Tesseract.

    Download full text (pdf)
    fulltext
  • 193.
    Juhlin, Tobias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wangberg, Dan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bristfällig säkerhet inom trådlösa routrar med fokus på WPS2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In this report the WPS-function is evaluated due to the vulnerabilty of the protocol.Interviews, tests and observations have been conducted to evaluate the problems withWPS. The tests and interviews conducted indicates that the vulnerability of the WPS-function has been secured with extra functions.

    Download full text (pdf)
    fulltext
  • 194.
    Juhlin, Tobias
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Wangberg, Dan
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Bristfällig säkerhet inom trådlösa routrar med fokus på WPS2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In this report the WPS-function is evaluated due to the vulnerabilty of the protocol. Interviews, tests and observations have been conducted to evaluate the problems with WPS. The tests and interviews conducted indicates that the vulnerability of the WPS-function has been secured with extra functions. 

    Download full text (pdf)
    fulltext
  • 195.
    Jusufi, Ilir
    Linnaeus University, Faculty of Engineering and Technology, Department of Computer Science.
    Multivariate Networks: Visualization and Interaction Techniques2013Doctoral thesis, monograph (Other academic)
    Abstract [en]

    As more and more data is created each day, researchers from different science domains are trying to make sense of it. A lot of this data, for example our connections to friends on different social networking websites, can be modeled as graphs, where the nodes are actors and the edges are relationships between them. Researchers analyze this data to find new forms of communication, to explore different social groups or subgroups, to detect illegal activities or to seek for different communication patterns that could help companies in their marketing campaigns. Another example are huge networks in system biology. Their visualization is crucial for the understanding of living beings. The topological structure of a network on its own could give insight into the existence or distribution of interesting actors in the network. However, this is often not enough to understand complex network systems in real-world applications. The reason for this is that all the network elements (nodes or edges) are not simple one-dimensional data. For instance in biology, experiments can be performed on biological networks. These experiments and network analysis approaches produce additional data that are often important to be analyzed with respect to the underlying network structure. Therefore, it is crucial to visualize the additional attributes of the network while preserving the network structure as much as possible. The problem is not trivial as these so-called multivariate networks could have a high number of attributes that are related to their nodes, edges, different groups, or clusters of nodes and/or edges.

    The aim of this thesis is to contribute to the development of different visualization and interaction techniques for the visual analysis of multivariate networks. Two research goals are defined in this thesis: first, a deeper understanding of existing approaches for visualizing multivariate networks should be acquired in order to classify them into categories and to identify disadvantages or unsolved visualization challenges. The second goal is to develop visualization and interaction techniques that will overcome various issues of these approaches.

    Initially, a brief survey on techniques to visualize multivariate networks is presented in this thesis. Afterwards, a small task-based user study investigating the usefulness of two main approaches for multivariate network visualization is discussed. Then, various visualization and interaction techniques for multivariate network visualization are presented. Three different software tools were implemented to demonstrate our research efforts. All features of our systems are highlighted, including a description of visualization and interaction techniques as well as disadvantages and scalability issues if present.

    Download full text (pdf)
    fulltext
  • 196.
    Jusufi, Ilir
    et al.
    Linnaeus University, Faculty of Technology, Department of Media Technology.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Network Visualization for Digital Humanities: Two Case Studies of Visual Analyses for Text Analytics2016In: International Symposium on Digital Humanities, Växjö 7-8 November 2016: Book of Abstracts, Linnaeus University , 2016, p. 39-43Conference paper (Refereed)
    Abstract [en]

    Much of the data created nowadays in fields such as Digital Humanities (DH) is of relational nature, such as social or semantic networks. Researchers often decide to depict networks as node-link diagrams to make a better sense of the complex nature of data. Understanding the topology of such a network can be very important. For instance, if we show our friends as network nodes and their friendship as edges between the nodes, it becomes easy to identify groups of friends from different social settings (work friends, high school friends, etc.).

    Networks usually have additional attributes attached to their elements. For instance, we can model a number of documents in a repository as nodes and use edges to describe co-authorship. Additionally, we might want to explore other aspects of such a corpus, like the keywords for each document, its genre, and various other data associated. Here, it is often desirable to get an overview about the network structure and how different data values relate to this structure. In this paper, we present two case studies for visualizations in DH with a focus on publication networks. But first, we will introduce our data sets used in these studies.

    Download full text (pdf)
    fulltext
  • 197.
    Jusufi, Ilir
    et al.
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Liu, Jiayi
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Zimmer, Björn
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Visual Exploration of Relationships between Document Clusters2014In: IVAPP 2014: Proceedings od the 5th International Conference on Information Visualization Theory and Applications / [ed] Robert S. Laramee, Andreas Kerren, José Braz, SciTePress, 2014, p. 195-203Conference paper (Refereed)
    Abstract [en]

    The visualization of networks with additional attributes attached to the network elements is one of the ongoing challenges in the information visualization domain. Such so-called multivariate networks regularly appear in various application fields, for instance, in data sets which describe friendship networks or co-authorship networks. Here, we focus on networks that are based on text documents, i.e., the network nodes represent documents and the edges show relationships between them. Those relationships can be derived from common topics or common co-authors. Attached attributes may be specific keywords (topics), keyword frequencies, etc. The analysis of such multivariate networks is challenging, because a deeper understanding of the data provided depends on effective visualization and interaction techniques that are able to bring all types of information together. In addition, automatic analysis methods should be used to support the analysis process of potentially large amounts of data. In this paper, we present a visualization approach that tackles those analysis problems. Our implementation provides a combination of new techniques that shows intra-cluster and inter-cluster relations while giving insight into the content of the cluster attributes. Hence, it facilitates the interactive exploration of the networks under consideration by showing the relationships between node clusters in context of network topology and multivariate attributes.

  • 198.
    Jusufi, Ilir
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Schreiber, Falk
    Univ Halle Wittenberg, Inst Comp Sci, D-06108 Halle, Germany.
    Exploring Biological Data: Mappings between Ontology- and Cluster-based Representations2013In: Information Visualization, ISSN 1473-8716, E-ISSN 1473-8724, Vol. 12, no 3-4, p. 291-307Article in journal (Refereed)
    Abstract [en]

    Ontologies and hierarchical clustering are both important tools in biology and medicineto study high-throughput data such as transcriptomics and metabolomics data. Enrichmentof ontology terms in the data is used to identify statistically overrepresented ontology terms,giving insight into relevant biological processes or functional modules. Hierarchical clusteringis a standard method to analyze and visualize data to find relatively homogeneousclusters of experimental data points. Both methods support the analysis of the same dataset, but are usually considered independently. However, often a combined view is desired:visualizing a large data set in the context of an ontology under consideration of a clusteringof the data. This article proposes new visualization methods for this task. They allow forinteractive selection and navigation to explore the data under consideration as well as visualanalysis of mappings between ontology- and cluster-based space-filling representations. Inthis context, we discuss our approach together with specific properties of the biological inputdata and identify features that make our approach easily usable for domain experts.

  • 199.
    Jusufi, Ilir
    et al.
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Kerren, Andreas
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Zimmer, Björn
    Linnaeus University, Faculty of Technology, Department of Computer Science.
    Multivariate Network Exploration with JauntyNets2013In: Proceedings 2013 17th International Conference on Information Visualisation IV 2013: 16-18 July 2013, London, United Kingdom, IEEE, 2013, p. 19-27Conference paper (Refereed)
    Abstract [en]

    The amount of data produced in the world every day implies a huge challenge in understanding and extracting knowledge from it. Much of this data is of relational nature, such as social networks, metabolic pathways, or links between software components. Traditionally, those networks are represented as node-link diagrams or matrix representations. They help us to understand the structure (topology) of the relational data. However in many real world data sets, additional (often multidimensional) attributes are attached to the network elements. One challenge is to show these attributes in context of the underlying network topology in order to support the user in further analyses. In this paper, we present a novel approach that extends traditional force-based graph layouts to create an attribute-driven layout. In addition, our prototype implementation supports interactive exploration by introducing clustering and multidimensional scaling into the analysis process.

  • 200. Juziuk, Joanna
    et al.
    Weyns, Danny
    Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM), Department of Computer Science.
    Holvoet, Tom
    Katholieke Univ Leuven, Belgium.
    Design Patterns for Multi-Agent Systems: A Systematic Literature Review2014In: Agent-Oriented Software Engineering: Reflections on Architectures, Methodologies, Languages, and Frameworks / [ed] Onn Shehory, Arnon Sturm, Berlin/Heidelberg: Springer, 2014, p. 79-99Chapter in book (Refereed)
    Abstract [en]

    Design patterns document a field’s systematic knowledge derived from experiences. Despite the vast body of work in the field of multi-agent systems (MAS), design patterns for MAS are not popular among software practitioners. As MAS have features that are widely considered as key to engineering complex distributed applications, it is important to provide a clear overview of existing patterns to make this knowledge accessible. To that end, we performed a systematic literature review (SLR) covering the main publication venues of the field since 1998, resulting in 206 patterns. The study shows that (1) there is a lack of a standard template for documenting design patterns for MAS, which hampers the use of patterns by practitioners, (2) associations between patterns are poorly described, which results in a lack of overview of the pattern space, (3) patterns for MAS have been used for a variety of application domains, which underpins their high potential for practitioners, and (4) classifications of design patterns for MAS are bounded to specific pattern catalogs, a more holistic view on the pattern space is missing. From our study, we outline a number of guidelines that are important for future work on design patterns for MAS and their adoption in practice.

    Download full text (pdf)
    fulltext
1234567 151 - 200 of 485
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf