Change search
Refine search result
12 1 - 50 of 86
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abu Ghanem, Anas
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Eftekhari, Sina
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    A study of the network traffic between Bitcoin nodes2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Bitcoin is a digital cash money system that is decentralized and not controlled by a central authority. It functions as a cryptocurrency across a peer-to-peer network and all nodes in the network have a public registry of who owns what and who transact what. Transactions are secured through cryptography and with time gets locked in blocks of data and added to the blockchain. All transactions and new blocks are sent using TCP protocol to transport these packets to other nodes in the network.

    Bitcoin protocol uses different message types in the communications between the nodes in the network. This work has examined all the message types that are used in the Bitcoin network during two different stages: Downloading of the blockchain to a Bitcoin node versusrunning the node after the blockchain has been downloaded.

    From the produced results, it can be concluded that the network traffic between Bitcoin nodes varies depending on what messages are required to be sent and which phase the node is in.

  • 2.
    Allen Anyabe, Aloge
    University West, Department of Engineering Science.
    The Impact of Social Media Attacks Targeting Employees in an Organization: A Case Study2023Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Social media has a huge potential to be used positively or negatively. It allows for the preservation of relationships, information sharing, and connections with loved ones. It does, however, offer a platform for using social engineering techniques. 

    It's a great chance to network and find new job paths on LinkedIn, a social media platform that connects experts in particular industries. But it could also be a target for social engineering schemes. This was demonstrated in the example mentioned in the coming sections when the author used LinkedIn to break into the network of the business. To access the employees' profiles, the author created a fake profile and issued friend requests to them, as well as using open-source intelligent tools to do reconnaissance on the company and its employees. As a result, they learned important information about the duties and tasks of the staff. The information was then utilized to create more effective social media like LinkedIn attacks.

    Overall, the case study emphasizes the necessity for businesses to understand the risks posed by employee-targeted social media attacks and to take appropriate action. Organizations may protect the safety of their employees, uphold their reputation, and maintain a secure online environment by being aware of the effects of such assaults and taking preventative action.

  • 3.
    Amoson, Jonas
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Building complex GUIs in Plan 92009In: Proceedings 4th International Workshop on Plan9, Athens, GA: University of Georgia , 2009, p. 15-21Conference paper (Other academic)
    Abstract [en]

    How can non-trivial graphical user interfaces be designed in Plan 9 without them losing their minimalistic style? Different toolkits are discussed, and a proposal for a tabbed toolbar is suggested as a way to add functionality without cluttering the interface and avoiding the use of pop-up dialog boxes. A hypothetical port to the GUI in LyX is used as an example.

  • 4.
    Amoson, Jonas
    et al.
    University West, Department of Engineering Science, Division of Automation and Computer Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Automation and Computer Engineering.
    A light-weigh non-hierarchical file system navigation extension2012In: Proceedings of the 7th International Workshop on Plan 9 / [ed] Eric Jul, Dublin, Ireland, 2012, p. 11-13Conference paper (Other academic)
    Abstract [en]

    Drawbacks in organising and finding files in hierarchies have led researchers to explorenon-hierarchical and search-based filesystems, where file identity and belonging is pred-icated by tagging files to categories. We have implemented a chdir() shell extension en-abling navigation to a directory using a search expression. Our extension is light-weightand avoids modifying the file system to guarantee backwards compatibility for applicationsrelying on normal hierarchical file namespaces.

    Download full text (pdf)
    searchpath_amoson_lundqvist_2012
  • 5. Andersson, M.
    et al.
    Heldal, R.
    Christiernin, Linn G.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Applying task-based division in multi-layered design: an industrial case study2005In: Human-Computer Interaction 2005: Proceeding of The IASTED International Conference on Human-Computer Interaction (IASTED-HCI)Phoenix, USA, November 14 - 16, 2005, Acta Press , 2005Conference paper (Refereed)
  • 6.
    Asker Zada, Salar
    University West, Department of Economics and IT.
    Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 2010Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    No infrastructure, no centralized administration and self-configuration are the main characteristics of MANETs. The primary motivation of MANET deployment is to increase portability, mobility and flexibility. However, this mobility causes an unpredictable change in topology and makes routing more difficult. Many routing algorithms have been proposed and tested over the last few years in order to provide an efficient routing in Ad Hoc networks. In this report we will show our conducted study with AODV (reactive), DSDV (proactive) and ZRP (hybrid) routing protocols. The performance of routing protocols have been evaluated carefully by analyzing the affects of changing network parameters such as, number of nodes, velocity, pause time, workload and flows on three performance metrics: packet delivery ratio, routing cost and average end- to- end delay. All the simulation work has been conducted in NS2. Our simulation results show that AODV gives better performance in all designed simulation models in terms of packets delivery ratio. DSDV shows the second best performance. Performance of ZRP is found average.

    Download full text (pdf)
    FULLTEXT01
  • 7.
    Bennulf, Mattias
    et al.
    University West, Department of Engineering Science, Division of Production Systems.
    Danielsson, Fredrik
    University West, Department of Engineering Science, Division of Production Systems.
    Svensson, Bo
    University West, Department of Engineering Science, Division of Production Systems.
    Identification of resources and parts in a Plug and Produce system using OPC UA2019In: Procedia Manufacturing, E-ISSN 2351-9789, Vol. 38, p. 858-865Article in journal (Refereed)
    Abstract [en]

    This paper describes a method together with an implementation for automating the detection, identification and configuration of newly added resources and parts in a Plug and Produce system using OPC UA. In a Plug and Produce system, resources and parts are usually controlled by agents, forming a multi-agent system of collaborating resources. Hence, when a resource or part is connected to the system, a corresponding agent must be instantiated and associated with that specific device. In order to automate this, the system needs information about newly connected devices. This information could, for example, be positional data describing where the device is connected. Some devices like tools and parts to be processed have no own network connection, but still, they should get an agent with correct configuration instantiated. In this work, OPC UA is used for communication between devices and the corresponding agents. All agents and their communication are handled by an Agent Handling System, consisting of an OPC UA HUB together with functions for device detection and agent instantiation. The HUB is used for transferring data between devices and their agents in the network by OPC UA protocols. When a device is connected to the network, it is detected, and a connection is automatically created to the HUB that becomes configured for transmitting data between the device and its corresponding agent. © 2019 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

  • 8.
    Bjurström, Erik
    et al.
    Mälardalen University (SWE).
    Schüler, Martin
    University West, Department of Social and Behavioural Studies, Division of Psychology, Pedagogy and Sociology.
    Strömberg, Anette
    Mälardalen University (SWE).
    Roxström, Git
    Swedish Defence Research Agency (SWE).
    Data quality and analysts’ role in AI enhanced C22023In: International Command and Control Research and Technology Symposium (ICCRTS) proceedings, 2023Conference paper (Refereed)
    Abstract [en]

    Artificial Intelligence (AI) in Command and Control (C2) raises questions about the interaction between operators on different levels on the one hand and AI-supported information systems on the other. For some purposes, the aggregation and analysis of large “big data”-sets creates potential for prediction and calculations of probabilities, while for other purposes human heuristics may be as promising depending on the situation. What has been more rarely discussed, is the very quality of data underpinning such calculations, and thus also operators’ awareness of the validity of predictions in relation to any specific situation. This is an urgent debate, considering the fact that full transparency may be impossible and underpinning data may be based on exercises, simulations, real-time data, or a mix thereof. Based on a fundamental classification of different kinds of uncertainties, this article discusses how data of different origins and quality can be managed and communicated to allow for operators to assess on what basis predictions are made. The article further suggests that looking at other fields of research may be useful for exploring unconventional ways of highlighting the existence and quality of different kinds of data of different origins in order to assess its predictive power. Finally, the article discusses how AI may change the role of analysts with regard to such issues.

  • 9.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Performance Prediction of Future Generation Computer Systems2006In: Proceedings of the International Conference on Applied Computing: San Sebastian, Spain, Feb 25-28, 2006, p. 42-48Conference paper (Other academic)
  • 10.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Wombat lurar nätskurkarna2006In: Datormagazin, ISSN 1650-1306, no 10, p. 86-90Article in journal (Other (popular science, discussion, etc.))
  • 11.
    Boklund, Andreas
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Johansson, Christer
    Lindell, Håkan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    A Comprative Study of Forward and Reverse Engineering in UML Tools2007In: Proceedings of the International Conference on Applied Computing: Salamanca 2007, Spain, IADIS , 2007, p. 535-540Conference paper (Refereed)
    Abstract [en]

    In the process of developing computer based applications the use of descriptive models to depict the architecture and design of the application is practical and brings many advantages. The most commonly used standard today is the Unified Modeling Language. There are many tools that implemented support for this standard for modeling, and they vary in functionality. A comparative study, including a selection of these tools, will show advantages and disadvantages for each tool. The purpose of this study is to test a selection of these modeling tools for a typical three-tier layered web service application. The tools tested in this study are Microsoft Visual Studio 2005 .NET Beta, PowerDesigner and Visual Paradigm. Rational Rose would have been included if it would have supported C#. In this study tests are performed in regard to modeling a class diagram, forward engineering to source code from the class diagram and reverse engineering from source code to class diagram. Despite the shortage of diagram types MS Visual Studio proved to be the most reliable tool for this particular type of applications.

  • 12.
    Boklund, Andreas
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Namaki, Nima
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Jiresjö, Christian
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    A characterisation tool for the impact of network deficiencies on HPC applications2008In: Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, 2008, p. 888-894Conference paper (Other academic)
  • 13. Bäckman, R
    et al.
    Christiernin, Linn G.
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Mankefors-Christiernin, Stefan
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics. University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    MIDAS: a process support tool for multi-layered designsIn: Journal of Information Technology Theory and Application, ISSN 1552-6496, E-ISSN 1532-4516Article in journal (Other academic)
  • 14. Calås, G.
    et al.
    Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Robustness Analysis and Technology Forecasting: Survey on a Missing Combination in Software Development2006In: Proceedings of the International conference on Software Engineering :: innsbruck, Austria, 2006, p. 329-334Conference paper (Other academic)
  • 15.
    Calås, Göran
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting2006In: Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on, 2006, p. 72-77Conference paper (Other academic)
    Abstract [en]

    This paper is based on an extensive study performed on a large software suite for over a decade. From the experiences derived from this study we created a first draft of a method combining an extended robustness analysis (RA) method with the future oriented method of technology forecasting (TF). In this method TF provides information about the systems future evolution to the RA which then generates the software design. The RA and TF methods then form a feedback loop, which results in an improved reusable and robust software design. The purpose of the RATF method is to predict the evolutional path of the software system, thus making preparations for (example) functionality that will be needed in future generations, i.e. utilizing the power-of-prediction to implement the base of tomorrow's functions today

  • 16.
    Calås, Göran
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Combining robust analysis and technology forecasting: A missing combination in contemporary methods2006In: Proceedings of the IASTED International Conference on Software Engineering: as part of the 24th IASTED International Multi-Conference on APPLIED INFORMATICS, Innsbruck, 2006, p. 329-334Conference paper (Other academic)
    Abstract [en]

    Seven software engineering methods and one general purpose system engineering method TRIZ was evaluated concerning their abilities to combine software technology forecasting, that is prediction of potential software evolution with robustness analysis, which is a method to model a system tolerant to changes. None of the investigated software engineering method or process concepts combines software technology forecasting with robustness analysis to any great extent. Several of the methods evaluated do contribute with techniques and principles, that potentially could be combined and give systematically technology forecasting with comprehensively robustness analysis though. This defines a new frontier for research into a combined "super class" method for software development.

  • 17.
    Christiernin Gustafsson, Linn
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Gustavsson, M.
    Ohlsson, A.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Prototyping a Multi-Layered Help - a User Involved Exploratory Design2006In: Proceedings of the International Conference on Applied Computing: San Sebastian, Spain. Feb 25-28, 2006, p. 315-323Conference paper (Other academic)
  • 18.
    Christiernin, Linn G.
    University West, Department of Economics and IT, Division of Computer Science and Informatics.
    Guiding the designer: a radar diagram process for applications with multiple layers2010In: Interacting with computers, ISSN 0953-5438, E-ISSN 1873-7951, Vol. 22, no 2, p. 107-122Article in journal (Refereed)
  • 19.
    Christiernin, Linn G.
    University West, Department of Economics and IT, Division of Computer Science and Informatics.
    Pros, cons and problems with the MLD concept: M+ a suggestion for the next generation of layered structuresIn: Journal of Computer Science and Technology, ISSN 1000-9000, E-ISSN 1860-4749Article in journal (Refereed)
  • 20.
    Christiernin, Linn G.
    et al.
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Mankefors-Christiernin, Stefan
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics. University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Olsson, A
    Boklund, Andreas
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    A case study evaluation of RDPM: a process confirmed successfulIn: Interacting with computers, ISSN 0953-5438, E-ISSN 1873-7951Article in journal (Refereed)
  • 21.
    de Blanche, Andreas
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Operativsystem: teori och praktiskt handhavande2008Book (Other academic)
  • 22.
    de Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    A methodology for estimating co-scheduling slowdowns due to memory bus contention on multicore nodes2014In: Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2014, ACTA Press, 2014, p. 216-223Conference paper (Refereed)
    Abstract [en]

    When two or more programs are co-scheduled on the same multicore computer they might experience a slowdown due to the limited off-chip memory bandwidth. According to our measurements, this slowdown does not depend on the total bandwidth use in a simple way. One thing we observe is that a higher memory bandwidth usage will not always lead to a larger slowdown. This means that relying on bandwidth usage as input to a job scheduler might cause non-optimal scheduling of processes on multicore nodes in clusters, clouds, and grids. To guide scheduling decisions, we instead propose a slowdown based characterization approach. Real slowdowns are complex to measure due to the exponential number of experiments needed. Thus, we present a novel method for estimating the slowdown programs will experience when co-scheduled on the same computer. We evaluate the method by comparing the predictions made with real slowdown data and the often used memory bandwidth based method. This study show that a scheduler relying on slowdown based categorization makes fewer incorrect co-scheduling choices and the negative impact on program execution times is less than when using a bandwidth based categorization method.

  • 23.
    de Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Addressing characterization methods for memory contention aware co-scheduling2015In: Journal of Supercomputing, ISSN 0920-8542, E-ISSN 1573-0484, Vol. 71, no 4, p. 1451-1483Article in journal (Refereed)
    Abstract [en]

    The ability to precisely predict how memory contention degrades performance when co-scheduling programs is critical for reaching high performance levels in cluster, grid and cloud environments. In this paper we present an overview and compare the performance of state-of-the-art characterization methods for memory aware (co-)scheduling. We evaluate the prediction accuracy and co-scheduling performance of four methods: one slowdown-based, two cache-contention based and one based on memory bandwidth usage. Both our regression analysis and scheduling simulations find that the slowdown based method, represented by Memgen, performs better than the other methods. The linear correlation coefficient (Formula presented.) of Memgen's prediction is 0.890. Memgen's preferred schedules reached 99.53 % of the obtainable performance on average. Also, the memory bandwidth usage method performed almost as well as the slowdown based method. Furthermore, while most prior work promote characterization based on cache miss rate we found it to be on par with random scheduling of programs and highly unreliable.

  • 24.
    de Blanche, Andreas
    et al.
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Availability of Unused Computational Resources in an Ordinary Office Environment2010In: Journal of Circuits, Systems and Computers, ISSN 0218-1266, Vol. 19, no 3, p. 557-572Article in journal (Refereed)
    Abstract [en]

    The study presented in this paper highlights an important issue that was subject for discussionsand research about a decade ago and now have gained new interest with the current advances ofgrid computing and desktop grids. New techniques are being invented on how to utilize desktopcomputers for computational tasks but no other study, to our knowledge, has explored theavailability of the said resources. The general assumption has been that there are resources andthat they are available. The study is based on a survey on the availability of resources in anordinary o±ce environment. The aim of the study was to determine if there are truly usableunder-utilized networked desktop computers available for non-desktop tasks during the off-hours. We found that in more than 96% of the cases the computers in the current investigationwas available for the formation of part-time (night and weekend) computer clusters. Finally wecompare the performance of a full time and a metamorphosic cluster, based on one hypotheticallinear scalable application and a real world welding simulation.

  • 25.
    Djebbar, Fatiha
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Securing IoT data using steganography: A practical implementation approach2021In: Electronics, E-ISSN 2079-9292, Vol. 10, no 21, article id 2707Article in journal (Refereed)
    Abstract [en]

    Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. In this paper, we present a noise-resilient, low-overhead, lightweight steganography solution adequate for use in the IoT environment. The accuracy of hidden data is tested against corruption using multiple modulations and coding schemes (MCSs). Additive white Gaussian noise (AWGN) is added to the modulated data to simulate the noisy channel as well as several wireless technologies such as cellular, WiFi, and vehicular communications that are used between communicating IoT devices. The presented scheme is capable of hiding a high payload in audio signals (e.g., speech and music) with a low bit error rate (BER), high undetectability, low complexity, and low perceptibility. The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.

    Download full text (pdf)
    Electronics
  • 26.
    Djebbar, Fatiha
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Nordström, Kim
    Cybersecurity Product Compliance Group,Stockholm (SWE).
    A Comparative Analysis of Industrial Cybersecurity Standards2023In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 85315-85332Article in journal (Refereed)
    Abstract [en]

    Cybersecurity standards provide a structured approach to manage and assess cybersecurity risks. They are the primary source for security requirements and controls used by organizations to reduce the likelihood and the impact of cybersecurity attacks. However, the large number of available cybersecurity standards and frameworks make the selection of the right security standards for a specific system challenging. The absence of a comprehensive comparison overlap across these standards further increases the difficulty of the selection process. In situations where new business needs dictate to comply or implement additional security standard, there may be a risk of duplicating existing security requirements and controls between the standards resulting in unnecessary added cost and workload. To optimize the performance and cost benefits of compliance efforts to standards, it is important to analyze cybersecurity standards and identify the overlapping security controls and requirements. In this work, we conduct a comparative study to identify possible overlaps and discrepancies between three security standards: ETSI EN 303 645 v2.1.1 for consumer devices connected to the internet, ISA/IEC 62443-3-3:2019 for industrial automation and control systems, and ISO/IEC 27001:2022 for information security management systems. The standards were carefully chosen for their broad adoption and acceptance by the international community. We intentionally selected standards with different areas of focus to illustrate the significant overlaps that can exist despite being designed for different environments. Our objective is to help organizations select the most suitable security controls for their specific needs and to simplify and clarify the compliance process. Our findings show a significant overlap among the three selected standards. This information can help organizations gain a comprehensive understanding of common security requirements and controls, enabling them to streamline their compliance efforts by eliminating duplicated work especially when meeting the requirements of multiple standards.

    Download full text (pdf)
    fulltext
  • 27.
    Dosé, Fredrik
    et al.
    University West, Department of Engineering Science.
    Andersson, Mathias
    University West, Department of Engineering Science.
    Python vs. Ansible: En jämföreslsestudie2023Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    With the increased complexity and size of today's networks compared to how it was before, automation of network devices is becoming more and more relevant. This thesis report takes a closer look at two network automation options available on the market, Ansible and Python. Through testing and fact-checking, this report will provide answers to questions about which option performs best in terms of speed, resource use and ease of use, and on this basis try to answer the question which tool you as a network technician should choose to use.

    By doing tests against Cisco networking devices, this study finds out the differences, and differences exist. Python turns out to be both faster and significantly less resource intensive than Ansible. The advantage that Ansible has is that it is a program specifically designed for network automation and therefore the management of skripts and devices is easier with Ansible.

  • 28.
    Ericsson, Mikael
    et al.
    University West, Department of Engineering Science, Division of Subtractive and Additive Manufacturing.
    Johansson, Dahniel
    University West, Department of Engineering Science, Division of Production Systems.
    Stjern, David
    AI-Based Quality Control of Wood Surfaces with Autonomous Material Handling2021In: Applied Sciences, E-ISSN 2076-3417, Vol. 11, no 21, p. 9965-9965Article in journal (Refereed)
    Abstract [en]

    The theory and applications of Smart Factories and Industry 4.0 are increasing the entry into the industry. It is common in industry to start converting exclusive parts, of their production, into this new paradigm rather than converting whole production lines all at once. In Europe and Sweden, recent political decisions are taken to reach the target of greenhouse gas emission reduction. One possible solution is to replace concrete in buildings with Cross Laminated Timber. In the last years, equipment and software that have been custom made for a certain task, are now cheaper and can be adapted to fit more processes than earlier possible. This in combination, with lessons learned from the automotive industry, makes it possible to take the necessary steps and start redesigning and building tomorrows automated and flexible production systems in the wood industry. This paper presents a proof of concept of an automated inspection system, for wood surfaces, where concepts found in Industry 4.0, such as industrial Internet of things (IIoT), smart factory, flexible automation, artificial intelligence (AI), and cyber physical systems, are utilized. The inspection system encompasses, among other things, of the shelf software and hardware, open source software, and standardized, modular, and mobile process modules. The design of the system is conducted with future expansion in mind, where new parts and functions can be added as well as removed.

    Download full text (pdf)
    fulltext
  • 29.
    Eurenius, Anders
    et al.
    University West, School of Business, Economics and IT.
    Härnströmer, Andreas
    University West, School of Business, Economics and IT.
    Mätning av attackbeteende och mönster med Cowrie2023Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis focuses on Cowrie, which is a honeypot for monitoring and analyzing attacks in networks. Honeypots were set up on Telia's network and data was collected for nine days using Modern Honey Network and Splunk on a Linode server. The results showed that one device received an exceptionally high number of attacks. This can probably be explained by the fact that three IP addresses deviate in the statistics. The results also showed that port 23 was more attacked than port 22. Attackers trying to gain access to the system used common usernames such as "root", "admin", "user" and "guest". These attackers also followed common password patterns, with popular choices like "admin", "123456", "123", "1234", "1" and "password". In attacks against port 23, it was observed that the attackers often used commands like "uname" to get information about the attacked systems. For attacks against port 22, commands such as "shell" and "system" were used, which gave the attackers the opportunity to take control of the system. Furthermore, the results showed that the majority of attacks came from Iran, followed by China. 

  • 30.
    Ferreira, Rafael Pereira
    et al.
    Federal Institute of Education, Science and Technology of Maranhão (IFMA), Campus Barra do Corda, Barra do Corda (BRA); Center for Research and Development of Welding Processes (Laprosolda), Federal University of Uberlândia (UFU), Uberlândia (BRA).
    Vilarinho, Louriel Oliviera
    Center for Research and Development of Welding Processes (Laprosolda), Federal University of Uberlândia (UFU), Uberlândia (BRA).
    Scotti, Americo
    University West, Department of Engineering Science, Division of Welding Technology. Center for Research and Development of Welding Processes (Laprosolda), Federal University of Uberlândia (UFU), Uberlândia (BRA).
    Development and implementation of a software for wire arc additive manufacturing preprocessing planning: trajectory planning and machine code generation2022In: Welding in the World, ISSN 0043-2288, E-ISSN 1878-6669Article in journal (Refereed)
    Abstract [en]

    To overcome a shortage of flexible and low-cost solutions for wire arc additive manufacturing (WAAM) preprocessing, this work´s objective was to develop and validate an in-house computational programme in an open-source environment for WAAM preprocessing planning. Algorithms for reading STL (stereolithography) files and implementing rotation, slicing, trajectory planning, and machine code generation were elaborated and implemented in the Scilab environment (free and open-source). A graphical interface was developed to facilitate user interaction, with 5 options for path planning. The functionality of each work step is detailed. For validation of the software, single and multiple-layer prints, with different geometrical complexity and printing challenges, were built in a CNC table geared by the generated machine code. The validation criteria were deposition imperfection, morphological, and dimensional tolerances. The outputs showed that the parts were successfully printed. Therefore, this work demonstrates that Scilab provides the necessary resources for companies and universities to implement and/or develop algorithms for planning and generating trajectories for WAAM. Moreover, emerging ideas can be reasonably easily implemented in such software, not always possible in commercial packages. 

    Download full text (pdf)
    Springer
  • 31.
    Flensburg, Per
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics. University West, School of Business, Economics and IT, Divison of Informatics.
    Om kopieringsskydd2007In: Digital life : magasinet för en digital livsstil, no 9Article in journal (Other (popular science, discussion, etc.))
  • 32.
    Gedik, Husein
    et al.
    University West, Department of Engineering Science.
    Shinwari, Folad
    University West, Department of Engineering Science.
    Wood Surface Inspection based on Artificial intelligence technology2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A common problem in the wood industry is that wood surfaces can have defects. Such as cracks, wood knots, wormholes and resin are common defects. These defects can be difficult to detect. Control of the various surfaces on wood materials is currently done through traditional non-automated methods where trained personnel have an extra eye for checking wood surfaces and their defects. In the Industry 4.0 the Swedish wood industry therefore strives to automate processes and develop tools to remedy these problems. Artificial intelligence (AI) is the technology needed to develop this technology to work. Artificial intelligence (AI) and object detection can detect the smallest defects on wooden surfaces that are not visible to employees to detect in a short time through ocular inspection.

    Instead of detecting defects manually, an automated system has been developed in this work with the help of trained AI, object detection and a system for collecting data and producing results that show detection of defects on the surface of the wood material.

    In this work, the term Artificial Intelligence (AI) has been chosen. In connection with this, an intelligent model is trained that can make decisions through visual data such as image and video. In this work, AI techniques and object detection are used. The project implements an Artificial Intelligence (AI) based software that through a camera can detect different types of defects that a piece of wood can have. After the software has detected various types of damage, it should be able to easily take pictures and store these images in a database where this data can be analyzed afterwards. YOLOv5 is the object detection algorithm that laid the foundation for the success of the work and the results achieved. The performance of the algorithm is very well capable of the scope of this project when it comes to detecting various damages on the wood surface.

  • 33.
    Gellerstedt, Martin
    et al.
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Petersen, Per Hyltoft
    University of Bergen, Bergen, Norway.
    Partitioning reference values for several subpopulations using cluster analysis.2007In: Clinical Chemistry and Laboratory Medicine, ISSN 1434-6621, E-ISSN 1437-4331, Vol. 45, no 8, p. 1026-32Article in journal (Refereed)
    Abstract [en]

    BACKGROUND: A crucial question when developing reference intervals is whether different subpopulations need their own reference interval or if a single joint reference interval can be used. It is reasonable to use partitioned reference intervals in situations where a single interval results in considerable variation in sensitivity between subpopulations. The aim of partitioning is to harmonize the sensitivity of the reference intervals, i.e., to make the sensitivity similar for all patients, regardless of patient characteristics. Statistical criteria to identify when partitioning is adequate have been developed over the last two decades. These criteria are applicable when considering two subpopulations, but recently a procedure for considering several subpopulations has been developed. When several subpopulations are considered, there is a possibility that some subpopulations could form a group or cluster that could share a common reference interval. However, there is no formal systematic approach to indicate how to divide these subpopulations into clusters. The aim of this study was to suggest such a systematic approach for clustering. METHODS: A clustering technique was applied to data including several subpopulations. The technique is based on measuring the distance between separated reference limits and successively pooling subpopulations divided by short distances. A cluster is defined by a group of subpopulations that are close to each other and that differ from subpopulations in another cluster. A cluster recruits new subpopulations as long as the subpopulations can be pooled without violating a partitioning criterion. CONCLUSIONS: We have suggested a procedure for partitioning a number of Gaussian (or Gaussian-transformable) subpopulations into clusters. This is the only formalized procedure indicating how to analyze several subpopulations and identify a suitable number of groups and reference intervals. Using a computer program developed for partitioning issues, the approach was easy to adopt.

  • 34.
    Guezo-Mevo, Ingrid Glory Evrard
    University West, School of Business, Economics and IT.
    Risk Assessment Framework for Cyber-physical Systems in the context of IoMT devices: A closer look at a health manufacturing company2023Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This master thesis delves into the field of cybersecurity in the context of Internet of Medical Things (IoMT) devices, particularly focusing on wearable sensor devices used in diapers and used by individual with incontinence. The study made use of the new NIS 2 Directive’s recommendation of utilizing the ENISA Risk Assessment Framework for critical infrastructure. By conducting a review of industry reports and academic research, the study identified various challenges and regulatory risks associated with Internet of Medical Things (IoMT) devices. Existing security standards and recommendations were carefully analyzed and integrated into a comprehensive risk assessment framework. The ENISA risk assessment methodology was then implemented within a health products manufacturing company, specifically evaluating risks in its Cyber-Physical Systems (CPS). The effectiveness of the methodology was assessed and compared to the ISO 14971 framework currently utilized by the company. The implementation of the ENISA framework reveals the identification of additional assets and threats, showcasing its superiority over ISO 14971 in terms of comprehensiveness and necessary steps for conducting a robust risk assessment. The study acknowledges limitations arising from restricted data availability and suggested future research to refine and validate the methodology. Overall, this research significantly contributed to enhancing the security of IoMT devices and advocated for the adoption of robust cybersecurity practices in the healthcare industry. 

  • 35.
    Gunnarsson, Maj
    et al.
    University West, Department of Informatics and Mathematics.
    Lindroth, Tomas
    University West, Department of Informatics and Mathematics.
    Magnusson, Maria
    University West, Department of Informatics and Mathematics.
    Rasmusson, Peo
    University West, Department of Informatics and Mathematics.
    Lundh Snis, Ulrika
    University West, Department of Informatics and Mathematics.
    Less is more: When IT comes to knowledge management2000In: Proceedings of IRIS23, 2000, Vol. 23Conference paper (Refereed)
    Abstract [en]

    In this work we take the point of departure from two thoroughly conducted casestudies, in which we have analysed certain knowledge work activities with followingimplications for design. Both studies clearly stated the call for a ICT-support whensearching information and sharing knowledge. For example, sharing bookmarksamong knowledge workers seemed to be a necessary and useful activity. Importantand valuable bookmarks often mirror what kind of information and knowledgepeople are looking for, and also what kind of forum they usually go to on the worldwide web. In this work we have developed a prototype, KnowMan, which managesbookmarks on the world wide web. The prototype is designed as a user-friendly"pad-interface" in which bookmarks can be collaboratively collected, shared andfurther explored and annotated by other knowledge workers. We end up with ageneral discussion about the possible effects of using KnowMan and what furtherdesign aspects that should be considered.

  • 36.
    Gustavsson Christiernin, Linn
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Layered design: concepts, case studies and processes - theories and implementations2007Doctoral thesis, comprehensive summary (Other academic)
  • 37.
    Gustavsson Christiernin, Linn
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Erstorp, Ulf
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Magnusson, Staffan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Ångfors, Peter
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Easylayer: MLD in an application portal with multiple user groups2007In: Proceedings of the Iadis International Conference Applied Computing 2007: Salamanca, Spain 18-20 February 2007, IADIS , 2007, p. 27-34Conference paper (Other academic)
    Abstract [en]

    In large organizations there are usually rather large groups of heterogeneous users with different tasks and different needs. Their requirements would most likely vary a lot when the system is designed to grant them access to different parts of the functions and applications In our earlier work we have tested the interface concept of Multi-Layered Design (MLD) on an operating system where each layer had a set of applications and tools. The users working with the system could get access to different applications depending on their level of experience or their different needs. The current paper presents how the MLD concept is taken one step further; implementing a layered design in a multi-user portal on a Citrix server. When a network solution is used, new available possibilities are given. The MLD approach can be combined with a role based access technique can the layered structure can be used in different ways for many different groups of users. In the study a MLD mushroom structure is employed where the user category decides the set of layers the different user groups can choose from while the individual user’s tasks and experience guide the choice of the specific layer. Thin clients are used to access the layer structure and five personas are made to represent the potential user groups. The results show that MLD can be used within a Citrix environment and that it is a viable alternative or complement for multi-user portals

  • 38.
    Gustavsson Christiernin, Linn
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Lindahl, Fredrik
    Chalmers University of Technology, Sweden.
    Torgersson, Olof
    Chalmers University of Technology, Sweden.
    Designing a multi-layered image viewer2004In: ACM International Conference Proceeding Series Vol 82: proceedings of the third Nordic conference on Human-computer interaction NordiCHI '04 , Tampere, Finland, ACM , 2004, p. 181-184Conference paper (Refereed)
  • 39.
    Haj-Bolouri, Amir
    University West, Department of Economics and IT.
    Semantiska webben och sökmotorer2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report deals with the definitions and terms main purpose has been to investigate how the semantic web affects search engines on the web. This has been done through an investigation consisting of ten different search engines. Nine of these search engines are considering being semantic search engines, and the last one being the most used one on the web today. The study is conducted as a descriptive and quantitative study. A literature review has also been implemented by the relevant sources about the semantic web and search engines. The conclusions drawn where that the semantic web is multifaceted with its definitions and that the result of how concrete search engines implements semantic web principles can vary depending on which search engine one interacts with.

    Download full text (pdf)
    FULLTEXT01
  • 40.
    Hansson, Felix
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Obayes, Farooq
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    En jämförande studie av analysverktyg i QGIS och ArcGIS utifrån ett användbarhetsperspektiv2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Geographic information system (GIS) is a computer system used for various purposes. The main purpose is to analyze different data to give a clear picture of what reality looks like based on measured data. The choice of a GIS program is at least as important. There are different types of GIS programs, those that have a license fee and those that are free. The work will focus on two well-established GIS programs: ArcGIS (license cost) and QGIS (free). The purpose of the work is that it should be an aid for users of GIS to choose which program suits their purpose. In order to fulfill the purpose, a closer examination is made in the programs. The survey was based on selected questions and tools. The work is aimed at those who are already familiar with GIS software.The method that has been used in this essay is data collection because the work has been based on experiments to test how fast the programs are able to produce a result, in other words the process time. Literature has been used only to explain the analysis tools included in the work to provide an overall understanding of them. Most analysis tools in each program have been tested a number of times with the collected data to measure process time and whether there are differences in the results produced. These aspects have a major impact on financial sustainability because municipalities, companies and individuals who use GIS pay a lot of money to use GIS programs that are not free.The analysis tools that have been used in this work are buffer, shortest path, overlap analysis, nearest neighbor, TIN interpolation, spline interpolation and IDW interpolation. The reason for choosing these tools is that they are commonly used in analysis. In each program, these tools have formed the basis for the comparison of the programs. The results of the tests vary from tool to tool. It is largely not possible to claim that one program is better than the other, but depending on the purpose of the user of the GIS program, it is possible to claim that one program is better than the other on some analysis tools

  • 41.
    Hirschfeldt, William
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Karlsson, Simon
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Kundportal med Microsoft Azure2021Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The company B3 wants a prototype of a customer portal to examine if the Azure AD B2C service works for identity management. Therefore, this project examined if Azure AD B2C is useful as an identity manager for a customer portal and how multi-factor authentication and privilege works within the service. There have also been requirements from the company on a few functionalities on what should be included which got implemented. These functionalities were for instance that the user should be able to create an account, log in, and the ability to invite other users if they have the right authorization level. Microsoft Azure is a cloud platform service which is owned by Microsoft and has a lot to offer. This has meant that while working with the project, there has been a lot to learn within Microsoft Azure. This has been done in the form of research where, for example, various services have been investigated in how they work and how these can be used in the implementation of the customer portal. The customer portal was built through the framework ASP. NET Core with the programming language C# to interact with Azure AD B2C. The functionalities that were included in the portal were taken from the requirements that were given. The final product consisted of a functional portal with an interactive interface which will make it easier for the company to expand on. The actual portal includes functionalities for logging in, group management, and the ability to invite other users.Azure AD B2C supports the functionality for multi-factor authentication and different types of multi-factor authentication methods. For privilege, can the service create groups which can divide the users. These groups cannot implement the privileges, this must be done within the applications that uses the service. All the requirements for the customer portal made the company satisfied except for one requirement which will be improved at a later opportunity. The requirement was how a user can be invited to the customer portal which works but not in the way the company expected. When it comes to the implementation of the functionalities, the basic was easy but got more advanced for the more complex functions.

  • 42.
    Hrastinski, Stefan
    et al.
    KTH Royal Institute of Technology,Division of Digital Learning, Stockholm, Sweden.
    Olofsson, Anders D.
    Umeå University, Department of Applied Educational Science, Umeå, Sweden.
    Arkenback, Charlotte
    University of Gothenburg, Department of Applied IT, Gothenburg, Sweden.
    Ekström, Sara
    University West, School of Business, Economics and IT, Division of Media and Design.
    Ericsson, Elin
    University of Gothenburg, Department of Applied IT, Gothenburg, Sweden.
    Fransson, Göran
    University of Gävle, Faculty of Education and Business Studies, Gävle, Sweden.
    Jaldemark, Jimmy
    Mid Sweden University, Department of Education, Sundsvall, Sweden.
    Ryberg, Thomas
    Aalborg University, Department of Communication and Psychology, Aalborg, Denmark.
    Öberg, Lena-Maria
    Mid Sweden University, Department of Computer and System Science, Östersund, Sweden.
    Fuentes Martinez, Ana
    University West, School of Business, Economics and IT, Division of Media and Design.
    Gustafsson, Ulrika
    Umeå University, Department of Applied Educational Science, Umeå, Sweden.
    Humble, Niklas
    Mid Sweden University, Department of Computer and System Science, Östersund, Sweden.
    Mozelius, Peter
    Mid Sweden University, Department of Computer and System Science, Östersund, Sweden.
    Sundgren, Marcus
    Mid Sweden University, Department of Education,Sundsvall, Sweden.
    Utterberg, Marie
    University of Gothenburg,Department of Applied IT, Gothenburg, Sweden.
    Critical Imaginaries and Reflections on Artificial Intelligence and Robots in Postdigital K-12 Education2019In: Postdigital Science and Education, ISSN 2524-485X, Vol. 1, no 2, p. 427-445Article in journal (Refereed)
    Abstract [en]

    It is commonly suggested that emerging technologies will revolutionize education. In this paper, two such emerging technologies, artificial intelligence (AI) and educational robots (ER), are in focus. The aim of the paper is to explore how teachers, researchers and pedagogical developers critically imagine and reflect upon how AI and robots could be used in education. The empirical data were collected from discussion groups that were part of a symposium. For both AI and ERs, the need for more knowledge about these technologies, how they could preferably be used, and how the emergence of these technologies might affect the role of the teacher and the relationship between teachers and students, were outlined. Many participants saw more potential to use AI for individualization as compared with ERs. However, there were also more concerns, such as ethical issues and economic interests, when discussing AI. While the researchers/developers to a greater extent imagined ideal future technology-rich educational practices, the practitioners were more focused on imaginaries grounded in current practice.

    Download full text (pdf)
    fulltext
  • 43.
    Hägglund, Tobias
    et al.
    University West, Department of Engineering Science.
    Söderbom, Joakim
    University West, Department of Engineering Science.
    Insamling av accelerometerdata med Linux som ett realtidsliknande system2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this paper a prototype is constructed with the purpose of collecting GPS- and accelerometer data from a small, electric vehicle. The collected data is sent to an external database, and visualized with Grafana. Accelerometer data is collected from sensors on the vehicle's front- and back axis, as well as a sensor mounted in between. Accelerometer data can be used to classify driver behavior, study the conditions of roads, and monitor wear and tear. The paper also explores how Linux can be used as a substitute for a real time system when it comes to collection of accelerometer data. The prototype's performance is compared to an ideal real time system as well as a general purpose system. Performance is measured by analyzing the timestamps of neighboring datapoints. The difference between two timestamps collected by an ideal real time system is exactly equal to the period of corresponding collection frequency. By optimization and using the PREEMPT_RT patch for Linux, the prototype can collect accelerometer data in up to 200 Hz, with a standard deviation of single microseconds for neighboring timestamps.

  • 44.
    Igugu Onajite, Johnson
    University West, Department of Engineering Science.
    LAPSync: a Location-Aware Protocol for Remote File Synchronization2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Commercial provisioning of file synchronization services (FSS) relies entirely on protocols that utilize a remote central server that is often located in the cloud to host important files. Updates at user computers are propagated to the central server and from the central server to other sources in need of such updates. Therefore, a synchronization operation between two computers located on the same network often results in file data transmission to and from this local network at least twice. This introduces an unnecessary bandwidth usage on a user’s local network and has become an issue, especially since there is an increase in the demands for internet resources.

    This thesis work presents a new file synchronization protocol towards FSS known as LAPSync (location-aware protocol for remote file synchronization). This paper also proposes a hierarchical synchronization mechanism by utilizing LAPSync. Our proposed solution relies on the ability of LAPSync clients to acquire knowledge about the location of clients participating in the synchronization operation to construct a hierarchical synchronization path. Finally, we implement our protocol into a prototype and conduct experiments to compare with drop-box (a popular file synchronization service). The results obtained show that LAPSync offers a reduction in bandwidth usage when the files to be synchronized exist on the same local network

    Download full text (pdf)
    A Location-Aware Protocol for Remote File Synchronization
  • 45.
    Islind, Anna Sigridur
    et al.
    Reykjavik University (ISL).
    Willermark, Sara
    University West, School of Business, Economics and IT, Division of Media and Design.
    Becoming a Designer: The value of sensitive design situations for teaching and learning ethical design and design theory2022In: Scandinavian Journal of Information Systems, ISSN 0905-0167, E-ISSN 1901-0990, no 1, p. 1-36Article in journal (Refereed)
    Abstract [en]

    Teaching and learning design theory are challenging tasks. To solely teach design theory through rules or codes of conduct, could be seen as a static way of approaching a complex phenomenon. In this paper, we argue for the importance of engagement in sensitive design situations, an approach that entails a process of de-emphasizing objectivity and promoting subjectivity through real-life sensitive cases to learn from, to foster reflectiveness for the future designers. This study aims to explore how sensitive design situations can be used when teaching and learning design theory. The research approach consists of a case study in a Nordic university, and a course in interaction design in a software engineering program. The sensitive design situation involves designing a digital artifact that can help children that have been diagnosed with cancer, cope with their cancer treatment. The main contribution is a teaching method for cultivating ethical design, which includes the application of sensitive design situations when teaching ethics to students. We illustrate that by forwarding three characteristics that can be used when teaching and learning ethical design through sensitive design situations.

  • 46.
    Jenkins, Samantha
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Kirk, Steven R.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    An investigation of the merging and collapsing of software2007In: Advances in Complex Systems, ISSN 0219-5259, Vol. 10, no 3, p. 379-393Article in journal (Refereed)
    Abstract [en]

    We explore the use of complex networks for understanding of the interaction of computer software applications written in the Java object-oriented language with the "library classes" that they use (those provided by the Java Runtime Environment) as, essentially, a merged network of classes. The dependence of the software on the library is quantified using a recently introduced model that identifies phases close to a second-order phase transition existing in scale-free networks. An example is given of a piece of software whose class network collapses without the presence of the library classes, providing validation of a novel structural coupling measure; Rcoupling. The structural properties of the merged software-Java class networks were found to correlate with the proportion of Java classes contained within the subset delimited by Rcoupling. A mechanism for the preservation of the software class network is also provided for the cases studied where the removal of the library classes does not cause collapse.

  • 47.
    Jiresjö, Christian
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Boklund, Andreas
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Benefits of Alternative Network Topologies For COTS Linux Clusters2006In: Proceedings of the International Conference on Applied Computing: San Sebastian, Spain. Feb 25-28, 2006, p. 457-461Conference paper (Other academic)
    Abstract [en]

    The focus of this paper is to evaluate the use of two different network topologies for Ethernet networks in small Common

    Off The Shelf (COTS) clusters. The fully meshed network topology was evaluated and its impact on latency and

    bandwidth was measured and compared to the more traditional switched network topology. This was done at MPI level

    by measuring the point-to-point round trip latency (ping-pong) and all-to-alla bandwidth for different sized messages.

    The results from the experiments are presented and the overall the benefits and drawbacks of the both approaches are

    discussed.

  • 48.
    Johansson, Daniel
    et al.
    University West, Department of Engineering Science, Division of Automation and Computer Engineering.
    Jibing, Gustav
    University West, Department of Engineering Science, Division of Automation and Computer Engineering.
    Krantz, Johan
    University West, Department of Engineering Science, Division of Automation and Computer Engineering.
    Prestandajämförelse mellan Amazon EC2 och privat datacenter2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Publika moln har sedan några år tillbaka blivit ett alternativ för olika företag att använda istället för lokala datacenter. Vad publika moln erbjuder är en tjänst som gör det möjligt för företag och privatpersoner att hyra datorkapacitet. Vilket gör att de inte längre behöver spendera pengar på resurser som inte används. Istället för att köpa en stor andel hårdvara och uppskatta hur stor kapacitet som man behöver kan man nu istället så smått börja utöka efter behov eller minska ifall det önskas. Därmed behöver företag inte spendera pengar på hårdvara som inte används eller har för lite datorkapacitet, vilket skulle kunna resultera i att stora batcharbeten inte blir färdiga i tid och i och med det kan företaget förlora potentiella kunder. Potentiella problem  kan dock uppstå när man i ett moln virtualiserar och försöker fördela datorkapacitet mellan flera tusen instanser. Där även skalbarhet inte ska ha några begränsningar, enligt moln-leverantörerna.

    I denna rapport har vi med hjälp av olika benchmarks analyserat prestandan hos den största publika moln-leverantören på marknaden, Amazon, och deras EC2- och S3-tjänster. Vi har genomfört prestandatester på systemminne, MPI och hårddisk I/O. Då dessa är några av de faktorer som hindrar publika moln från att ta över marknaden, enligt artikeln Above The Clouds -  A Berkely View of Cloud Computing [3].  Sedan har vi jämfört resultaten med prestandan på ett privat moln i ett datacenter. Våra resultat indikerar att prestandan på det publika molnet inte är förutsägbar och måste få en ordentlig skjuts för att stora företag ska ha en anledning till att börja använda det.

    Download full text (pdf)
    Exjobb_daniel_johan_gustav
  • 49.
    Johansson, Jim
    University West, Department of Engineering Science.
    Microsoft WebMatrix: Enkelheten i dynamiska webbaserade system2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study is based on problematic in an earlier system in which requests have been made to improve the system to a new one. The new system has become to a dynamic web-based system and implemented with the new development tool Microsoft WebMatrix. Microsoft says that developing websites with WebMatrix has never been easier, a statement which is considered as vague.The purpose of the study is to analyze this tool and its new technologies, then result if the statement according to Microsoft is partially true or not, if WebMatrix and its new technologies perceived simple to use. The study also describes the underlying problem and which techniques that have been implemented in the new system using WebMatrix. The purpose of the previously and the new system is service planning of the staff within the organization University West in Trollhättan. The goal is to simplify and improve the service planning.The study and implementation of the system has resulted in that WebMatrix perceived as simple and has a content of useful techniques that contribute to an effective development. The new system which has been created has resulted in being a positive solution which is simplifying service planning. The system contains only functionality that is relevant, have a better overview and a structure that makes it easier to administer. Unlike the previous system data is stored in a database, which has contributed to a very positive impression of the system's users, given the common availability.

    Download full text (pdf)
    Microsoft WebMatrix - Enkelheten i dynamiska webbaserade system
  • 50.
    Johansson, Lars-Olof
    et al.
    Halmstad University, Sweden.
    Lundh Snis, Ulrika
    University West, Department of Informatics and Mathematics.
    The dynamics of interaction: exploring a living lab innovation process from a community of practice perspective2011In: Proceedings of Pacific Asia Conference on Information Systems (PACIS) 2011, Association for Information Systems, 2011, article id 85Conference paper (Refereed)
    Abstract [en]

    This paper is based on a living lab project, which is an open, user-centric, innovation approach, where several actors from industry, user groups and academia are involved. The research question is: How can interaction dynamics be understood in a living lab innovation process? We applied an action-oriented research approach, where the empirical results are from The Find Project (TFP), which aim is to customize an ICT product based on the needs of a user group. The findings are analyzed from a community of practice perspective where three different communities, i) researchers from Halmstad Living Lab (HLL), ii) ICT developers (ICTD) and iii) next of kin of demented elderly persons (NOKD), represented the unit of analysis. We identified situations and activities that played a vital role for the innovation process in terms of boundary interaction dynamics. The contribution of our research to innovation theory is a combination and further exploration of the boundary spanning and communities of practice theories. We have developed a conceptual model describing the dynamics in boundary interactions of an ICT innovation process with regard to boundary objects-inuse and brokering. The conceptual model highlights two different levels of brokering: i) inner-level brokering and ii) outer-level brokering.

12 1 - 50 of 86
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf