Change search
Refine search result
1 - 40 of 40
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Akiki, Cesar
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Torstensson, Daniel
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Hur routingtabellens storlek påverkar paketets fördröjning i en router eller L3 switch2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The internet is growing, and more devices are becoming connected for each day that passes by. This will increase the number of routes in the routing-table on the routers and L3 switches and as they are increasing it will affect the delay on the packets traversing between the source and destination. Or does it matter? Does the size of a routing table affect the delay? In this study, we have researched if there is a difference in the delay on the packets in a comparison to the size of the routing-table and this is compared between a router and L3 switch. During this study, we have been using a desktop computer that has two network interfaces installed in it and is connected to a router or L3 switch. We used three different programs on the computer that have been very helpful for completion of our work: Wireshark, to monitor and capture packets and the time between the two network interfaces on the desktop computer. Tftpd32, to copy the running-configurations from the router or L3 switch over to the desktop computer and back. Ostinato, is used to generate and send out packets on the network. All the results we got from our tests point to that there is no increase in delay no matter how much the routing-table is increasing. These results challenge previous studies that tells us the opposite, that the increase of a routing-table does have an increase in delay.

  • 2.
    Andréasson, Kim
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Hagberg, Daniel
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Undersökning av iBeaconannonsering via smartphoneapplikation: Objective c och ASP.NET2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This degree project is performed together with the company Sigma in relation with the education Datateknisk Systemutveckling at Högskolan Väst in Trollhättan. The purpose of this project is to examine the new technology iBeacon and study if it is to prefer over simi-lar technologies when developing a system to use for advertisement. To accomplish this, a smartphone application is developed aswell as an administration interface, to be able to perform a user test of the product with a random selection of people.

    The goal with the project is to develop a working product that can be tested and used for the examination of the hypothesis. This report explains how the project is performed and in the end, the result that the user test shows is discussed.

  • 3.
    Bennulf, Mattias
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Svedman, Jacob
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Automatiserat hem: med gränssnitt för anslutning av utrustning2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim is to find out how to develop a system for automated homes, where users can eas-ily connect custom built equipment. An example would be controlling a sprinkler or meas-uring wind speed. It should also be possible to develop more advanced accessories.

    To create a system that meets this, the system must have a central system to coordinate de-vices and data. We also need an open interface for communication between the central and the user devices. One should replace direct change in code and database center to instead create graphical interface to the users, it makes it easier for them to learn the system. One should not, however, restrict user freedom to develop units, more than the functionality of the interface and the center's configuration options. Parts of the requirements was imple-mented in a prototype, to confirm that the system works in reality. The prototype is based on a server with Debian as central in the home. For example, it can take a decision whether the alarm will go off or if a lamp should light. The user should easily be able to give in-structions to the central and reprogram how it should behave. Users can develop their own equipment and then simply connect it to the central and configure it via various web-based tools. In this way, accessories are created and connected without changing anything on the server more than the contents of the database. To test the system we created a modular house that is two walls in a cross, where equipment and central system are placed. Since power and lock bolt where used, this resulted in that some disruption where noticed and removed

  • 4.
    Berg, Gustaf
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Larsson, Daniel
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    En jämförande studie av tekniker för trådlös platsanalys vid Universeum2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis a comparison between a predictive site survey and two passive site surveys is performed, to see if only a predictive survey is enough to estimate a well-functioning wireless network. Some fundamental facts and techniques that are involved in wireless networks are presented and also the method of how the site surveys were planned and performed. The outcome is compiled in diagrams. The difference between a predictive and a passive site survey is analyzed, and shows if the prediction is trustworthy or needs to be verified.

  • 5.
    Bonilla Hernández, Ana Esther
    et al.
    University West, Department of Engineering Science, Research Enviroment Production Technology West.
    Beno, Tomas
    University West, Department of Engineering Science, Division of Production Engineering.
    Repo, Jari
    University West, Department of Engineering Science, Division of Manufacturing Processes.
    Wretland, Anders
    GKN Aerospace Engine Systems AB, Trollhättan, Sweden.
    Analysis of Tool Utilization from Material Removal Rate Perspective2015In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 29, 109-113 p.Article in journal (Refereed)
    Abstract [en]

    An end of life strategy algorithm has been used to study a CNC program to evaluate how the cutting inserts are used in terms of their full utilization. Utilized tool life (UTL) and remaining tool life (RTL) were used to evaluate if the insert has been used to its limits of expected tool life, or contributing to an accumulated tool waste. It is demonstrated that possible means to improvement exists to increase the material removal rate (MRR), thereby using the insert until its remaining tool life is as close to zero as possible. It was frequently found that inserts were used well below their maximum performance with respect to cutting velocity.

  • 6.
    Bradley, Jonatan
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Höglind, Fredrik
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Anti-Virus resursutnyttjande2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    How does Anti-Virus software affect the computer performance? Avast, Windows defender, Eset Nod32 and Symantec are a few of the big Anti-Virus companies that specialize in protecting your computer by removing virus, malware and trojans. Four Anti-Virus software and three scenarios was chosen to test cpu, memory, networks effect of the Anti-Virus software. Every scenario were tested three times ten minutes for every Anti-Virus software. Five minutes composed of a baseline and no test performed, after five minutes we conducted the test. Results differentiated between the different scenarios. Altogether, the Anti-Virus software differentiated minimal between each other. The data showed that the free Anti-Virus software was every bit as good as the paid Symantec version in utilizing the computer resources.

  • 7.
    De Blanche, Andreas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering. Institutionen för data- och informationsteknik, Datorteknik (Chalmers.
    A Slowdown Prediction Method to Improve Memory Aware Scheduling2016Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Scientific and technological advances in the area of integrated circuits have allowed the performance of microprocessors to grow exponentially since the late 1960's. However, the imbalance between processor and memory bus capacity has increased in recent years. The increasing on-chip-parallelism of multi-core processors has turned the memory subsystem into a key factor for achieving high performance. When two or more processes share the memory subsystem their execution times typically increase, even at relatively low levels of memory traffic. Current research shows that a throughput increase of up to 40% is possible if the job-scheduler can minimizes the slowdown caused by memory contention in industrial multi-core systems such as high performance clusters, datacenters or clouds. In order to optimize the throughput the job-scheduler has to know how much slower the process will execute when co-scheduled on the same server as other processes. Consequently, unless the slowdown is known, or can be fairly well estimated, the scheduling becomes pure guesswork and the performance suffers. The central question addressed in this thesis is how the slowdown caused by memory traffic interference between processes executing on the same server can be predicted and to what extent. This thesis presents and evaluates a new slowdown prediction method which estimates how much longer a program will execute when co-scheduled on the same multi-core server as another program. The method measures how external memory traffic affects a program by generating different levels of synthetic memory traffic while observing the change in execution time. Based on the observations it makes a first order prediction of how much slowdown the program will experience when exposed to external memory traffic. Experimental results show that the method's predictions correlate well with the real measured slowdowns. Furthermore, it is shown that scheduling based on the new slowdown prediction method yields a higher throughput than three other techniques suggested for avoiding co-scheduling slowdowns caused by memory contention. Finally, a novel scheme is suggested to avoid some of the worst co-schedules, thus increasing the system throughput.

  • 8.
    De Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Disallowing Same-program Co-schedules to Improve Efficiency in Quad-core Servers2017Conference paper (Other academic)
    Abstract [en]

    Programs running on different cores in a multicore serverare often forced to share resources like off-chip memory,caches, I/O devices, etc. This resource sharing often leadsto degraded performance, a slowdown, for the programsthat share the resources. A job scheduler can improve performance by co-scheduling programs that use different resources on the same server. The most common approachto solve this co-scheduling problem has been to make jobschedulers resource aware, finding ways to characterize andquantify a program’s resource usage. We have earlier suggested a simple, program and resource agnostic, scheme asa stepping stone to solving this problem: Avoid TerribleTwins, i.e., avoid co-schedules that contain several instancesfrom the same program. This scheme showed promising results when applied to dual-core servers. In this paper, weextend the analysis and evaluation to also cover quad-coreservers. We present a probabilistic model and empirical datathat show that execution slowdowns get worse as the numberof instances of the same program increases. Our schedulingsimulations show that if all co-schedules containing multiple instances of the same program are removed, the averageslowdown is decreased from 54% to 46% and that the worstcase slowdown is decreased from 173% to 108%.

  • 9.
    De Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Initial Formulation of Why Disallowing Same Program Co-schedules Improves Performance2017In: Co-Scheduling of HPC Applications / [ed] Carsten Trinitis, Josef Weidendorfer, Netherlands: IOS Press, 2017, 1, 95-113 p.Chapter in book (Refereed)
    Abstract [en]

    Co-scheduling processes on different cores in the same server might leadto excessive slowdowns if they use the same shared resource, like a memory bus. Ifpossible, processes with a high shared resource use should be allocated to differentserver nodes to avoid contention, thus avoiding slowdown. This article proposesthe more general principle that twins, i.e. several instances of the same program,should be allocated to different server nodes. The rational for this is that instancesof the same program use the same resources and they are more likely to be eitherlow or high resource users. High resource users should obviously not be combined,but a bit non-intuitively, it is also shown that low resource users should also notbe combined in order to not miss out on better scheduling opportunities. This isverified using both a probabilistic argument as well as experimentally using tenprograms from the NAS parallel benchmark suite running on two different systems.By using the simple rule of forbidding these terrible twins, the average slowdownis shown to decrease from 6.6% down to 5.9% for System A and from 9.5% to8.3% for System B. Furthermore, the worst case slowdown is lowered from 12.7%to 9.0% and 19.5% to 13% for systems A and B, respectively. Thus, indicating aconsiderable improvement despite the rule being program agnostic and having noinformation about any program’s resource usage or slowdown behavior.

  • 10.
    Eriksson, Kevin
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Seidl, Kristoffer
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Reservkraft i Vattenfalls norrlandsnät2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Today, the power grid in the Swedish province of Norrland is particularly sensitive to interruptions. With a high proportion of overhead and radial lines and increasing demand on reliability of the power supply means backup power supply is often necessary to meet the requirements.

    By studying interruption reports available at Vattenfall the necessary data about faults that exceed statutory periods was gathered. Observations in Vattenfalls network information system formed the basis for the assessment of the grid structure in the area.

    Information about the data on the relevant plant sections was retrieved via the manufacturers' datasheets.

    Today access to the back-up power is unevenly distributed where sensitive areas in general have considerably less access to back-up power than less sensitive areas. In addition, the available back-up power is not used to the extent it would be possible because it can be seen as a waste of resources. Relocation of some back-up power to areas with high fault rates is suggested in order to reduce the compensation that must be paid to the customers in case of long power outages.

    It was also examined during the project if proper fault disconnection within a reasonable time frame is met. This resulted in a table that can be used to verify if the connected power supply has the required short-circuit power to ensure fault disconnection.

  • 11.
    Freiholtz, Henrik
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Portabelt verktyg för testning av nätverkstjänster2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Networks of today employ a number of different services developed to support functioning infrastructures. In most cases, well established and functioning solutions exist for setting up a production server for any of these services, but for other purposes the market looks quite different. If you are looking for simple applications tailored for ease of use and quick deployment the selection is narrow. In order to solve this, a tool was developed, intended to be used for teaching, troubleshooting and temporary solutions, focusing on simplicity and portability. A list of requirements was created, according to which the tool was designed. The tool was to include the services DHCP, DNS, NTP, web and syslog. The tool was implemented as an x86 desktop application based on the Electron platform. The application uses a graphical user interface and is divided into modules, each of which represents a protocol. Each module is started individually and includes a few basic features from each protocol. A number of tests were created and implemented in order to verify that the application was built according to the established requirements. The test results showed that the application was built according to design and satisfied the requirements. The result was a tool that succeeded in partially filling the gap that existed in the market for tools designed for simplicity and ease of use.

  • 12.
    Gröning, Tomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Är NIT-studenterna bättre än företags It-tekniker på IPv6?2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis aims to find out whether the Network Technology and IT-security students is better at IPv6 than the corporate technicians. The result has been determined using a multiple-choice test that compares the knowledge between the corporate IT-technicians and the NIT students. Interviews were made with a spokesperson at each of the three companies to see how or if they make use of IPv6 and how that effects their IPv6 knowledge. The results show that the NIT students performs better than the corporations’ IT techni-cians and that none of the companies are using IPv6 in their daily work and doesn’t get any education in the subject.

  • 13.
    Gustavsson Christiernin, Linn
    et al.
    University West, Department of Engineering Science, Division of Production System.
    Augustsson, Svante
    University West, Department of Engineering Science, Division of Production System.
    Interacting with Industrial Robots: A Motion-based Interface2016In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces / [ed] Paolo Buono, Rosa Lanzilotti, Maristella Matera, New York: ACM Digital Library, 2016, 310-311 p.Conference paper (Refereed)
    Abstract [en]

    Collaborative industrial robot cells are becoming more and more interesting for industry through the new Industrie 4.0 initiative. In this paper we report early work on motion-based interaction with industrial robots. Human motion is tracked by a Kinect camera and translated into robot code. A group of tests subjects are asked to interact with the system and their activities are observed. Lessons learned on interaction challenges in a robot cell are reported.

  • 14.
    Hilmersson, Mikael
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Ivarsson, Olof
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Prestandamätning av en 10 Gbps-länk med olika paketstorlekar2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Today’s society requires faster connections which adds greater demands on our networks and it is important to utilize the maximum capacity of our links. This thesis examines how close the theoretical maximum speed it is possible to reach on a 10 Gbps link, depending on the packet size used. To determine this a series of tests was performed on a 10 Gbps link between two Cisco 6504. Packet sizes between 64B and 4 092B were used and compared against a calculated theoretical maximum speed according to the Ethernet standard IEEE 802.3-2015. The results show that it is difficult to achieve the theoretical maximum speed with small packets. When the packet size increases the difference between the test result and the theoretical maximum speed grows smaller and smaller. With a packet size of 4 092B a speed equivalent to 99.96% of the theoretical maximum was achieved.

  • 15.
    Hussain, Dena
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Gustavsson Christiernin, Linn
    University West, Department of Engineering Science, Division of Production System.
    Utilizing ICT Tools when Developing Healthcare Processes and Action Plans for Special Needs Children2016In: Proceedings 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), IEEE Computer Society, 2016, 334-335 p., 7545853Conference paper (Refereed)
    Abstract [en]

    Technological advances lead to the development of an increasing number of computer-based devices and software applications, used in the healthcare sector. Recently, rehabilitation programs involving special need children in Sweden have been the focused for these applications. The aim of this project is to create an evidence-based online platform that can be used on a computer or media pads directly together with the child. The platform should help different caretakers to structure their work, hence forward and enhance action plans for individuals with special needs. A secondary aim is to identify gaps in the existing approach to stimulate future research efforts to develop new Information and Communication Technologies (ICT) in this context. By utilizing ICT tools to create a more integrated communication platform between different regions in the healthcare sector and rehabilitation programs, we hope to verify, via this study, the growths and understanding of how improved communication affects can change the process in regards to creating action plans and support organizations in creating efficient connections.

  • 16.
    Jansson, Edvin
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Jenssen, Johan
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Social engineering and publik säkerhet2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis examines how Social Engineering works. An experiment was performed where persons were misled to unwittingly give away their user data used on the Internet. This report explains the common techniques of Social Engineering, such as Phishing, Man-in-theMiddle, Pretexting and Shoulder-surfing. In today's society, Social Engineering is a growing problem. Social Engineering is difficult to defend against because these attacks are difficult to detect. Therefore, it is important to know how the attack works, and what consequences it creates. Using Social Engineering, a person can use various means to mislead, deceive and pretend to be a person they are not. With the right strategic planning, Social Engineering is a strong tool to access sensitive information. It means big losses for both individuals and companies. To find out how Social Engineering works, an experiment with a selected method was chosen. The method was based on the Phising technique. The goal of the experiment was to try to get people to log into Facebook via a computer. Theoretically, a keylogger could have been installed on the computers that were used, and user data could have been recorded. A fictitious experiment was created to mislead people. The fictitious experiment concealed the true experiment so that people would not become suspicious. To find out how the public sees on the Internet Security and Social Engineering they were asked to fill in a questionnaire about the experiment. The results generated by the experiment showed that it's easy to fool people to unknowingly give away their sensitive information. Date

  • 17.
    Johansson, Anders
    University West, Department of Engineering Science, Research Enviroment Production Technology West. Global Industrial Development, Scania CV AB, Södertälje.
    Money talks while volume and value should run the show: An evaluation of financial parameters for decision making duringmanufacturing system acquisition2017Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Market economic values have for the last decades been given an increasing role with the establishment of financial institutes and global organisations with a capitalistic focus as a consequence. As a counter reaction, the concept of sustainable development has emerged complementing the economic focus with environmental and social aspects. However, there are still challenges on how to make balanced decisions based on all three view points and consequently the decision makers still primarily reside to the established tangible financial data. Within the industrial setting there is no difference. The manufacturing system design is based on multiple criteria and requirements, but commonly the final investment decision is primarily based on what can be financially justified. Longterm solutions probably lies in combining the tangible economy with the less tangible soft values that cannot be valued in monetary means. Therefore, to find this sweet spot, the purpose of this research is to in-depth investigate the world of economy, but from an engineers' point of view. A financial analysis is done to understand the economical components and how these are related to the manufacturing system. Furthermore, to connect cost with contributed value of the manufacturing system, a holistic business value chain analysis is done to ensure that less tangible aspects can be understood and utilised. The result of this research, highlights for example that sales volume has a larger impact on the manufacturing profitability, than that of the initial investment cost. Therefore, manufacturing systems should also be evaluated on the bases of how well it can meet the volatility in market demands. Another result presented is a portfolio of new graphical representation used as a support tool for investment decisions. Furthermore, to be able to invest in manufacturing systems that contribute to a more competitive company, the wider business value with manufacturing is discussed.

  • 18.
    Johansson, Anders
    et al.
    University West, Department of Engineering Science, Research Enviroment Production Technology West. Global Industrial Development, Scania CV AB, Södertälje.
    Gustavsson Christiernin, Linn
    University West, Department of Engineering Science, Division of Production System.
    Pejryd, Lars
    School of Science and Technology, Örebro University.
    Manufacturing System Design for Business Value, a Holistic Design Approach2016In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 50, 659-664 p.Article in journal (Refereed)
    Abstract [en]

    When designing and developing manufacturing systems, many aspects need to be considered. Typically, the manufacturing design objectives are specified to achieve certain operational requirements around quality, capacity, cost etc. They are also specified withthe intention to ensure efficient processes related to manufacturing, such as maintenance, logistics, not to mention the main process of manufacturing the actual part. This study proposes that a wider company perspective should be considered during manufacturing system design, to achieve a greater business value. The manufacturing system should be designed to create value to other core business processes, such as product development, marketing, sales and services. This paper also presents examples on value perspectives to consider and how this approach can be implemented.

  • 19.
    Johansson, Anders
    et al.
    University West, Department of Engineering Science, Research Enviroment Production Technology West. Global Industrial Development, Scania CV AB, Södertälje.
    Pejryd, Lars
    School of Science and Technology, Örebro University.
    Gustavsson Christiernin, Linn
    University West, Department of Engineering Science, Division of Production System.
    Production support model to manage market demand volatility risks2016In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 57C, 664-668 p.Article in journal (Refereed)
    Abstract [en]

    In the investment selection process during the design of new manufacturing systems, both the technical attributes and the expected financial performance need to be evaluated. To manage the financial risks with market volatility, it is important to understand the composition of fixed and variable cost factors in relation to the expected volume interval. The support model developed in this paper will in a simple and intuitive way visualise the effect on production cost due to changes in market demands. It can also be used to evaluate the volume sensitivity of existing manufacturing systems, even compare systems making different products.

  • 20.
    Järpestam, David
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Brattlöf, Magnus
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Prestandaskillnad på ett platt och hierarkiskt internetleverantörsnätverk2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Den här rapporten är en jämförande studie som mäter svarstid på två olika nätverksdesigner, en platt- och en hierarkisk-design. Den platta designen är en nuvarande lösning hos en viss internetleverantör i Göteborg. Internetleverantören tjänstgör flera hundra kunder med uppkoppling, samt upprätthåller kunders servrar som står placerade hos internetleverantören. Det innebär att kunder ställer höga krav på låg latens genom internetleverantörens nätverk och ut mot internet för att klara dagens krav på uppkopplad realtidstrafik. För närvarande är leverantörens nätverk suboptimalt utformat och de är i behov av förbättring för att uppfylla kraven i tillgänglighet, prestanda och stabilitet.Mätningar har utförts på två nerskalade modeller av internetleverantörens nätverk i två olika scenarier. Resultatet visade att den hierarkiska nätverksdesignen gav en förbättrad svarstid gentemot den platta i två olika scenarier

  • 21.
    Karlfeldt, Johan
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Kostnadseffektiv nätverksövervakning med Raspberry Pi 2 och Cacti2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Prestandan i våra nätverk spelar en allt större roll i takt med att vi hittar nya sätt att kommunicera och verka genom dem. Nätverk har idag också en viktig roll hos många företag och organisationer. Prestandaförluster och oplanerade driftstopp kan få stora konsekvenser vilket medför att implementeringen av nätverksövervakning i våra nätverk blir viktigt. Det här examensarbetet syftar till att undersöka hur en Raspberry Pi 2, med mjukvaran Cacti, klarar av att hantera de uppgifter som ett nätverksövervakningssystem ställs inför. Datainsamling sker genom att utläsa hur systemets genomsnittliga processorbelastning sett ut under de senaste fem och femton minuterna vid olika typer av scenarion. Systemet har belastats genom att öka antalet övervakade nätverksenheter samt genom att generera grafer av insamlad data. Resultatet visar att en Raspberry Pi 2 med Cacti fungerar utmärkt att använda för övervakning av nätverksmiljöer men får problem med långa laddningstider när flera grafer ska genereras samtidigt, vilket försämrar användarupplevelsen.

  • 22.
    Larsson, Johan
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Karlsson, Andreas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Modell för optimering av diagnos och felsökning, Volvo Personvagnar AB2007Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 23.
    Larsson, Kevin
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Olofsson, Simon
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Analys av fragmentering i krypterade tunnlar2017Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Sending data over public networks demands a lot from transfer methods and intermediate systems that forwards secure traffic. A popular solution is Virtual Private Networks. When traversing a VPN traffic is effected depending on options on clients and devices that are responsible for the forwarding of data. Fragmentation of packets can occur when the size of the datagram exceeds the allowed Maximum Transmission Unit size of the link.  This degree project is focused on the fragmentation of traffic traversing VPN with differing transformsets, layer 3 and, layer 4 protocols. Datagrams are analyzed before, inside, and after the tunnel.  Fragmentation is more frequent when it comes to User Datagram Protocol than Transport Control Protocol, because of TCP functions that counteract fragmentation.  The project showed clearly that the overhead which is a direct result from using a VPN solution can cause fragmentation if the protocol used does not have any builtin functions to counteract fragmentation. A notable result was an IPv6 TCP transmission that was fragmented inside the tunnel despite the IPv6 design-specifications clearly state that IPv6 datagrams may only be fragmented by senders, and not intermediary devices.

  • 24.
    Larsson, Martin
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Karlsson, Rickard
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Raspberry Pi – En genväg till IPv62014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Internet Protocol version 4 addresses are running low. Research has led to Internet Protocol version 6, which is about to take over and replace the Internet Protocol version 4. A new technique leads to a lot of new knowledge that many in today's society can´t handle. In this project, we produced a new product that makes it easier for those who want to take the plunge into the new technology. We used a Raspberry Pi which was configured to an Internet Protocol Version 6-gateway by creating a 6in4-tunnel to the ISP Hurricane Electric. To get connected to the Internet Protocol version 6-internet using our product you just need a quick configuration and an Internet connection. After a lot of testing we know that our product is most suitable for home-LAN:s and small business-networks. It is capable of managing traffic at a rate of 43.66 Mbits/s.

  • 25.
    Larsson, Tony
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Hansson Carlberg, Johan
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    En jämförelsestudie av antal attacker mot olika internetleverantörers nät med hjälp av Honeypots2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis is about installing, configuring and comparing honeypots in different Internet Service Providers (ISP) networks. The ISPs that was used in this study was Telia, Bredbandsbolaget and Sunet. Each of the networks had a honeypot installed in it. The number of attacks against the honeypots was collected under the period 22-02-2017 - 08-03-2017, with the help of the sensors p0f, Kippo, Snort and Dionaea. The software “Modern Honey Network” and “Splunk” was used for the collection of data from these sensors. Data showed that the different amount of attacks against the honeypots between Telia and Bredbandsbolaget wasn’t significant, but it did show that the honeypot on Sunet had more attacks aimed towards it. This is interesting because the honeypots on Telia and Bredbandsbolaget had more unique attacks (attacks from unique IP-addresses). Apart from the number of attacks, the result also shows what ports have been targeted the most, what operating systems that had been used in the attacks, the usernames, passwords and commands that had been used in SSH connections, signatures that had generated Snort-alerts and from where the attacks originated geographically. Date

  • 26.
    Lindström, Tobias
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Carlsson, Victor
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Gör SPDY webben snabbare?2014Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A large part of the population on earth uses the Internet to surf to different webpages each

    day. HTTP is used when a webpage is downloaded from the webserver to the client's web

    browser. The web is not the same today as it was when it arrived and became popular in

    the 1990s. Today the webpages contain more objects, which means that more resources

    need to be downloaded and that increases the page load times.

    Google started a project where they developed SPDY. It is an application protocol that was

    developed because Google wanted to try to get shorter page load times.

    The purpose of this work is to compare SPDY with HTTPS and HTTP to see if the web

    can be made faster with SPDY and in which cases it will be faster. Measurements on page

    load times are first made on a webpage taken from the Internet that has been uploaded on

    our webservers in the lab environment. Different bandwidths and latencies are being used

    in the tests. After that more tests are being done on synthetic test pages where the number

    of objects and object size are varied. Finally the effect of packet loss is tested on the protocols.

    The results from the measurements show that at low latencies there is not much difference

    between the protocols but as the latency increase SPDY is getting shorter page load times

    than HTTPS and HTTP. The page load times for SPDY is shorter than the other protocols

    as the number of objects increase. There was not much difference between the protocols

    when the object size was 400KB regardless the number of objects. Packet loss affected

    SPDY harder than the other protocols. The impact was bigger at higher latencies than at

    lower. At 3% packet loss the page load times was longer for SPDY than the other protocols

  • 27.
    Lundqvist, Thomas
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    De Blanche, Andreas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Andersson, Robert
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Thing-to-thing electricity micro payments using blockchain technology2017In: Global Internet of Things Summit (GIoTS), 2017: Proceedings of a meeting held 6-9 June 2017, Geneva, Switzerland, Institute of Electrical and Electronics Engineers (IEEE), 2017, 1-6 p.Conference paper (Refereed)
    Abstract [en]

    Thing-to-thing payments are a key enabler in the Internet of Things (IoT) era, to ubiquitously allow for devices to pay each other for services without any human interaction. Traditional credit card-based systems are not able to handle this new paradigm, however blockchain technology is a promising payment candidate in this context. The prominent example of blockchain technology is Bitcoin, with its decentralized structure and ease of account creation. This paper presents a proof-of-concept implementation of a smart cable that connects to a smart socket and without any human interaction pays for electricity. In this paper, we identify several obstacles for the widespread use of bitcoins in thing-to-thing payments. A critical problem is the high transaction fees in the Bitcoin network when doing micro transactions. To reduce this impact, we present a single-fee micro-payment protocol that aggregates multiple smaller payments incrementally into one larger transaction needing only one transaction fee. The proof-of concept shows that trustless, autonomous, and ubiquitous thing-to-thing micro-payments is no longer a future technology.

  • 28. MacKinnon, S.N.
    et al.
    Hartler, J.
    Olindersson, F.
    Gustavsson Christiernin, Linn
    University West, Department of Engineering Science, Division of Production System.
    How do experienced mariners perceive vessel risk in constricted navigation settings?2016In: Proc. of 19th International Navigation Simulator Lecturers' Conference (INSLC'16), 2016Conference paper (Other academic)
  • 29.
    Naamanka, Jani
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Prestandaundersökning av en Cisco Catalyst 3560 v2 med stora mängder ACL:er2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In today’s datacentre, security is put on the gateway or on an ASA. Now there’s a new technology being developed that’s called VXLAN. With this new technology Cisco and VMware are choosing to put security at the virtual machines. Cisco’s solution is to put the security on so called leaf switches and VMware’s solution is to put their security on virtual gateways. The aim of this study was to see how a Cisco Catalyst 3560 v2 reacts with big chunks of ACLs configured on it. What this investigation wanted to attain was to see if a switch can manage the big chunks of ACLs but also to see how the switch reacts, either it restarts or becomes so slow that the network can’t be used.. The investigation was done by connecting several computers to a switch and after that send packets in wire speed.

  • 30.
    Nielsen, Tim
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Grafikortsberäkningar på Android: utvärdering av Renderscript2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I denna rapport kommer möjligheten att använda grafikkortet för att göra beräkningar som normalt utförs på processorn att undersökas och fokus kommer att läggas på Renderscript.Valet av att fokusera på Renderscript föll sig naturligt då Renderscript inte har studerats och utvärderats i samma utsträckning som OpenGL ES och OpenCL. Som testplattformer används Samsung Galaxy S3 och Samsung Galaxy S5 men resultaten är applicerbara på alla bärbara enheter som använder Android som operativsystem.Genom att undersöka tidsåtgången hos olika lösningar för GPGPU på Androidmobiler har en jämförelse kunnat göras mellan Renderscript och det idag mer frekvent använda OpenGL ES.Renderscript är mer användarvänligt än OpenGL ES något som eftersöks hos GPGPU lösningaroch i detta arbete visas Renderscript också kunna exekvera mycket snabbt. Mendetta var bara i bästa fall men dessa resultat kunde inte replieras i egna skript för att nå det bästa fallet kommer utvecklare behöva mer hjälp i form av bättre dokumentation eller exempel som saknas i nuläget. Resultaten från de skript som skrevs med Renderscript var så dåliga att OpenGL ES i nuläget fortfarande är det främsta valet för GPGPU på Androidmen Renderscript ser ut att vara ett lovande alternativ.

  • 31.
    Nielsen, Tobias
    University West, Department of Economics and IT, Division of Computer Engineering.
    Prestandaanalys av läs- och skrivoperationer mot SAN genererat av virtuella maskiner.2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Ett SAN fungerar som en gemensam delad pool av den totala kapaciteten från ett antal ihopkopplade lagringsenheter. Denna mängd diskutrymme kan dynamiskt tilldelas och om allokeras till datorer på nätverket. Detta öppnar för många fördelar som till exempel backup-lösningar, fildelning, dynamiskt förändringsbara och hanterbara primära aktiva logiska operativsystems partitioner. En annan teknik som har berörts i denna rapport är virtualisering av fysiska datorer. Vilket innebär att man delar in fysiska datorer i flera logiska datorer, då den fysiska datorns resurser fördelas över de logiska maskinerna. Samtliga tester i denna rapport sker baserade på trafik som är genererad av virtuella maskiner mot Högskolan Väst SAN. Dessa tekniker har ökat i popularitet i takt med att priserna på hårdvaran har sjunkit. I denna rapport undersöks ett SAN som används på Högskolan Väst med fokus på prestanda under ett antal olika tester och topologi förändringar. För att avgränsa detta stora ämne kommer rapporten inrikta sig på frågeställningar som:

    Vad är det som sätter begränsningarna i topologin? Kommer prestandan leva upp till den prestandan som leverantören av systemet utlovar?

  • 32.
    Nilsson, Eric
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Carlzon, Conny
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Comparing how iSCSI is affected on different switch models, regarding buffers and ASICs2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis explores and measures if an iSCSI storage solution is better suited with per-port, per ASIC or a shared buffer memory switch environment. A real topology with physical equipment was used, in order to get as accurate measurements as possible.Variables such as number of ASICs and link speed were included in the test method

  • 33.
    Olsson, Emrik
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Boberg, Filip
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Prestanda i en konsumentrouter: Jämförelse mellan Netgear firmware och DD-WRT2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The most common way today to connect to the Internet is through a consumer router. A consumer router is adapted for the user to perform settings in the router. A routers function and the ability to display a graphical user interface depends on a software that is called firmware. This firmware varies based on the router manufacturer. There are also third-party firmwares to implement in a consumer router to extend its features, design and performance.  This report provides a background to various techniques that are used by wireless networks, LANs and WANs. The report also deals with performance comparisons between Netgear's firmware and Dresden Wireless router (DD-WRT) [7]. Questions raised in the report are whether there is any difference in performance in terms of throughput, goodput, signal strength or start-up times between them. Measured performance linked to the test types mentioned is presented and the results are analyzed and conclusions are drawn from the results and the analysis.  From the performance tests made it was found that Netgear´s firmware performs better regarding to WAN and WLAN speeds while DD-WRT is faster at booting the firmware.

  • 34.
    Pasic, Anel
    et al.
    University West, Department of Economics and IT, Divison of Informatics.
    Cetinkaya, Talat
    University West, Department of Economics and IT, Divison of Informatics.
    Integration mellan system: En undersökning av olika framgångsfaktorer2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This paper exposes the problems and challenges organizations face when integrating aged systems, web based systems and web services. The paper focuses on how people with different titles in an organization experience systems integration and the factors that contribute to project failure or success. The research methodology used in this is Grounded Theory and the resulting theory of this paper has taken form through the coding of transcribed interviews, which have gone through a constant comparing to other theories in the area of interest, mostly articles about success factors in system integration. The resulting outcome is a success model aimed to describe the underlying indicators to achieve project success.

    The success model consists of three factors that contribute to success in integration projects. The factors are: globalization, governance and balance. Integration projects are very complex in nature, more so than normal projects as there are more stakeholders involved and more interests to take into consideration. Due to the complex nature of integration projects, the need for a holistic view arises. It's crucial for an integration project that stakeholders take the interests and needs of other projects taking place simultaneously into consideration. The governance aspect of systems integration deals with the planning of strategies, communication and cooperation with other stakeholders involved within the integration project. It's crucial for integration projects to shift focus from individual goals and individual interest to mutual goals and interests. The third and final factor contributing to success in integration projects is balance. The balance between technical issues and organizational issues is crucial for the success of projects. It's very common that organizations focus on technical issues and neglect the organizational issues.

  • 35.
    Pettersson, Sebastian
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Reneland, Tobias
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    PearlDiary2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    PearlDiary is a mobile application developed for an external client with the goal of digitaliz-ing the process of documenting and logging information when dealing with a severe disease. This report will focus on cancer and specifically children with cancer. Documenting and handling the information given by hospitals can be overwhelming to the patient, or the parents of the patient, and therefore PearlDiary was developed to explore the possibilities of documenting the process in a more modern way. In this thesis report a comparison be-tween the methods used today and the application developed in the project is made, as well as an evaluation of the developed application. PearlDiary was developed as a web applica-tion in HTML5, which is able to run on most modern mobile platforms. The comparison is done by testing the application with the help of a closed test group consisting of users previously experienced with the methods used today. The result shows that the test group was overall positive to use PearlDiary as a substitute or as a complement to the methods they're already using and that PearlDiary was easy to use as a method of documenting their treatment

  • 36.
    Ragnarsson, Sebastian
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Undersökning av hur en SSD påverkas av hög belastning2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    A big part of the public and companies have a high demand to be able to store information with high speeds. Thanks to this, SSDs are becoming more common. This thesis is about putting high loads on an SSD and seeing how the performance changes. The collection of data is done during a 14-day period with intervals of 12 hours between each data collection. The results show a marginal and barely noticeable difference in performance after the 14 days despite that the reported health status has decreased drastically.

  • 37.
    Rytterlund, Håkan
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Bornstrand, Daniel
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Engelbrektsson, Linus
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    HTML5 istället för mobila applikationer: – en utvärdering2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this report is to evaluate the advantages and disadvantages related to a portation of a native mobile application to a web application. Thus a prototype was built based on the Android application Virtual Tycoon, a product by the company Mindark, with the purpose to imitate the native app to the highest degree possible. This prototype was used as a base of evaluations for this project. The main advantage of creating a web application is that it can be made cross-platform. This causes the product to have a broader user base as well as reduces the development costs. With today's means of web development nearly all aspects of a native app can be imitated in terms of graphics and performance. A portation of this kind is not without compromise. When creating a web application the developer cannot interact with the operating system of the device or use its native functions. Security-wise the web application will be vulnerable to more types of attacks, and the code integrity will be impaired since all code executed in the web browser is visible to the user. By the accomplishment of this project, the conclusion drawn is that web applications is a worthy substitute to native mobile applications

  • 38.
    Stenberg, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Larsson, Oskar Bjärne
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    OSPFv2 och OSPFv3 mot Address Families i en jämförelsestudie av SPF-beräkningstid och konvergeringstid2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    When implementing OSPF in a network that uses both IPv4 and IPv6 addresses there are two ways. One either use OSPFv2 for IPv4 and OSPFv3 for IPV6 at the same time but each with their own separate process or one could use OSPFv3 Address Families for both IPv4 and IPv6 under one process.This university diploma thesis looks at which of the two ways of implementing OSPF that has the quickest SPF-calculation and which one that has the lowest convergence time.The routers used in the tests were of model Cisco 2901 with IOS version 15.4. The results show that OSPFv3 Address Families performs SPF-calculation better than OSPFv2 and OSPFv3 when faced with 1250 or more networks. Even though Address Families has a quicker SPF-calculation it has a higher convergence time than OSPFv2 and OSPFv3.

  • 39.
    Swaroop Rodda, Theja
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    The reasons for outsourcing IT projects to India and their Effectiveness2015Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In today's' global economy, the outsourcing rate is increasing at rapid phase especially in larger organizations. Whenever there is outsourcing, the inherent risk factors are also associated with it and the project manager plays a greater role in reducing such risk.

    Therefore, the current study aims to explore the relationship between the project manager's efficiency in terms of their hard and soft skills with the successful completion of the IT outsourced projects in Indian companies. The study adopted explorative, qualitative study design, where the project managers working in IT outsourcing companies were selected as the target population and the semi structured interview method was used to collect the data. Based on the interview scripts themes were identified which explores their skills, effectiveness and the importance of the project managers to overcome the challenges and issues involved in IT Outsourcing. The findings showed that quality of the product, timely delivery and technological support were identified as the critical factors of IT outsourcing. Majority of the respondents stated that the project manager skills (Hard and soft Skill) were important for the success of the project.

  • 40.
    Vaern, Johan
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    En jämförelse av hybridapplikationer utvecklade i Intel XDK2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, when accessing information and services on the Internet on desktop computers it has become the norm to use web browsers. In mobile devices the situation is different, where the users prefer dedicated applications. The market for mobile devices is fragmented with many different operating systems and manufacturers. Because of this fragmentation each application needs to be developed in different versions Lately, methods have been introduced for developing applications with a shared code base; this technology makes it possible to run an application on any type of operating system. This type of application is often called a hybrid application, and uses web technologies such as HTML5, JavaScript and CSS3. To be able to access the native features of the device it is necessary to use API libraries.

    Intel XDK was introduced in 2013 and is a development environment for hybrid applications, it gives developers several opportunities to choose from different runtime environments, API-libraries and frameworks for design of user interfaces. With the help of benchmark tests this report compares the performance of the different options available.

    The report also presents recommendations on which options to use for development of applications targeting the Android OS using Intel XDK 

1 - 40 of 40
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf