Change search
Refine search result
123 1 - 50 of 115
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abdallah, Houda
    et al.
    University West, Department of Engineering Science.
    Saleh, Najat
    University West, Department of Engineering Science.
    Cyberattacks through Stegomalware2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Stegomalware is a type of malware that utilizes steganography to evade detection. It hides amalicious code inside an innocuous cover medium. The cover medium could be of any type: image, audio, video or even network protocols. Stegomalware has also shown to be a highly effective method to bypass detection. This has led it to increase in popularity among cybercriminals. In this thesis, the aim is to shed light on these cyberattack techniques and show the potential harm that could impact organizations, people, and transmitted data over the network. This is done by exploring the following: state of the art, the use of malware steganography in cyberattacks, most used techniques, and how to defend against them. The prevalent tools used by cybercriminals along with various existing stegomalware prevention and detection techniques have been surveyed and studied. A practical implementation was done with the purpose of observing the technical process that takes place at the point of data hiding. In total two tests were done, with both using the Least Significant Bit (LSB) algorithmto achieve the desired results. 

  • 2.
    Abdi, Abdurazak
    et al.
    University West, Department of Engineering Science.
    Omar, Hassan
    University West, Department of Engineering Science.
    Undersökning av två faktorer autentiseringsmöjligheter för inloggning till Linux-server samt Microsoft-Azure MFA2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Två-faktorautentisering är en tvåstegsverifieringsprocess som syftar till att ge ytterligare säkerhetsnivå genom att kräva att användaren verifierar sig med hjälp av en sekundär metod,för att säkerställa att personer som försöker få tillgång till ett online-konto är rätt person och utan 2fa kan hackare få tillgång till känslig information eller konto enbart genom att känna till offrets lösenord.I denna studie kommer mest använt 3 olika alternativa två faktor autentiseringsmöjligheter för inloggning till Linux servrar undersökas för att se vilken 2fa som är både användarvänlig och säker att använda. Faktorer som kommer att undersökas är kostnad, plattformskompatibilitet, tillförlitlighet, säkerhetsmässigt och tid samt backupalternativ.undersökningen kommer vara baserat på intervjuer om Högskolan Västs IT avdelnings nya två faktor autentiseringssystem för anställda. Det kommer ställas frågor till systemspecialist som har tagit fram två faktorer autentiseringslösningen och Högskolans anställda som kommer använda azure mfa lösningen. Frågorna kommer vara baserad anställdas behov av två faktor autentiseringssystem och hur de anställda upplever den nya två faktor autentiseringslösningen.Resultaten från de praktiska testerna påvisar att Yubikey var den mest säkra autentiseringsmetoden och duo var den mest användarvänliga metoden. Resultaten som samlats från intervjuerna visade att anledningen till att Högskolan Västs IT-avdelning vill implementera två faktorer autentiseringen var att skydda mot Phishing attacker som kan vara svåra att upptäcka

  • 3.
    Ahmed, Abdirahman
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Ibrahim, Ahmed
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Säkerhetsanalys av CNAP-nätet i Högskolan Väst2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Since the birth of the internet, new advanced technologies have emerged that have affected how people live, work and interact with each other as well as the human view of the world. This has become the basis of the today’s information society. Today's information society is dependent on information and the threat to this information society has increased with the pace of digitalization. In order to prevent the attacks directed to the information society, information security has been developed, which is the core of how to protect society, both businesses and individuals. Businesses, authorities and other societal actors carry out security analyzes to find vulnerabilities that exist in their systems to prevent attacks at an early stage so that attackers are not given the opportunity to exploit the vulnerabilities that exist in the system.This thesis is about a security analysis carried out on a network called the CNAP network at a university. The purpose of this project is to identify network devices that the CNAP network consists, identify security threats directed to these networks, identify vulnerabilities using a vulnerability-scanning tool called Nessus and based on the identified vulnerabilities, make some suggestions on how these vulnerabilities can be counteracted. 194 network devices and 726 open ports have been identified using NetworkMapper (Nmap). Based on these network devices and open ports, various types of security threats have been identified such as open ports that should not be open and vulnerabilities such as Cisco Smart Install Remote Code Execution and Denial of Service Vulnerability. Improvements and countermeasures to these security threats and vulnerabilities have been suggested, such as upgrading the network devices to the latest version and disabling the open ports and services that are not used or pose a security threat to the system.

  • 4.
    Akiki, Cesar
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Torstensson, Daniel
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Hur routingtabellens storlek påverkar paketets fördröjning i en router eller L3 switch2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The internet is growing, and more devices are becoming connected for each day that passes by. This will increase the number of routes in the routing-table on the routers and L3 switches and as they are increasing it will affect the delay on the packets traversing between the source and destination. Or does it matter? Does the size of a routing table affect the delay? In this study, we have researched if there is a difference in the delay on the packets in a comparison to the size of the routing-table and this is compared between a router and L3 switch. During this study, we have been using a desktop computer that has two network interfaces installed in it and is connected to a router or L3 switch. We used three different programs on the computer that have been very helpful for completion of our work: Wireshark, to monitor and capture packets and the time between the two network interfaces on the desktop computer. Tftpd32, to copy the running-configurations from the router or L3 switch over to the desktop computer and back. Ostinato, is used to generate and send out packets on the network. All the results we got from our tests point to that there is no increase in delay no matter how much the routing-table is increasing. These results challenge previous studies that tells us the opposite, that the increase of a routing-table does have an increase in delay.

  • 5.
    Almström, Love
    et al.
    University West, Department of Engineering Science.
    Carlsson, Henry
    University West, Department of Engineering Science.
    Proposing a new mobile solution for 2FA in Linux based on One-Time Passwords and QR-codes2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Denna uppsats föreslår en ny lösning för ett tvåfaktors-autentisering system (2FA) som används vid Secure Shell (SSH) inloggning till en Linux server och jämför denna nya lösning med industristandarden, med fokus på enkelhet och användarvänlighet av systemen. Eftersom användningen av digitala tjänster och system ökar, och användare använder säkrare system för att spara sin data på, måste nya sätt att skydda sig utvecklas. Idag kan hackare få tillgång till eller bryta sig igenom den traditionella enfaktors-autentiseringen av användarnamn och lösenord enklare än någonsin tidigare vilket är anledningen till att 2FA uppfanns, där en ytterligare faktor, eller enhet, används efter inloggningsförsöket för att bekräfta att det är den rätta användaren försöker få åtkomst. Flera lösningar för detta existerar redan, den mest använda sådana är Google Authenticator, förkortat till GA. Google Authenticator funkar bra, men kan behöva flera förbättringar. Denna avhandling syftar till att föreslå och utveckla ett nytt 2FA-system som är enkelt och lätt att använda, och fixar mycket av den negativa feedback som Google Authenticator fått online. Denna avhandling ger också en analys av detta föreslagna system som har byggts, och Google Authenticator, och jämför dessa. Krav har samlats in, mål har fastställts och ett prototypsystem/applikation har byggts. I slutändan visar det utvecklade prototyp systemet jämfört med Google Authenticator en ökning av både enkelhet och användarvänlighet, och uppmärksammar vad som kan ändras och implementeras för att göra nuvarande 2FA-system bättre överlag.

  • 6.
    Amponsah, Nana Frimpong
    University West, Department of Engineering Science.
    Securing connected vehicles with the MITRE ATT&CK Framework: A risk based approach2023Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the rapidly evolving landscape of connected vehicles, the threat of cyberattacks has emerged as a significant concern. This research embarked on a journey to develop a riskbased strategy to protect these vehicles, leveraging the MITRE ATT&CK framework. An exhaustive literature review laid the foundation, revealing gaps in current defense mechanisms and highlighting the urgency of addressing vulnerabilities in connected vehicles.Using the MITRE ATT&CK framework, specific vulnerabilities in connected vehicles were identified. A bespoke risk assessment model was then crafted, which prioritized these vulnerabilities based on their potential impact and exploitability. This prioritization was not just data-driven but was further refined with insights from industry experts.To address the identified vulnerabilities, countermeasures were developed, rooted in the principles of the Layered Security Model. These countermeasures underwent rigorous testing in simulated environments, ensuring their robustness against potential cyber threats. Continuous monitoring mechanisms were also established to ensure the long-term efficacy of these countermeasures.The culmination of this research offers a comprehensive strategy to safeguard connected vehicles against cyber threats. The findings not only contribute significantly to the existing body of knowledge but also provide actionable insights for industry practitioners. The journey, from identifying vulnerabilities to developing and testing countermeasures, underscores the importance of a holistic, risk-based approach in the realm of connected vehicle cybersecurity

  • 7.
    Andersson, Carl
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Bränfeldt, Jonathan
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Användare, hot och beteende i nätverket2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis contains a security analysis primarily focusing on the users and their behaviors in relationship to their daily IT usage.

    The thesis was possible due to the help via an international e-commerce company leading in their field of operation.

    The company which this thesis has been carried out with is a leading international e-commerce company in its industry. Their Swedish office has 35 employees all of whom use IT-related equipment daily in their daily tasks. Their interest is to learn more about IT security and in particular internal security.

    Through research of both network devices, user devices, interviews and a survey, the security on layer 2 as well as the users behaviour and knowledge have been examined. Following this research, results have been extracted regarding possible vulnerabilities and recommendations for further development within the area to improve the matters of today.

  • 8.
    Andersson, H. Robert H.
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    de Blanche, Andreas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Flipping the Data Center Network: Increasing East-West Capacity Using Existing Hardware2017In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 9-12 Oct. 2017, IEEE, 2017, p. 211-214, article id 8109355Conference paper (Refereed)
    Abstract [en]

    In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they are better suited for the north-southbound traffic between hosts and the Internet. One suggested solution for this capacity problem is to adopt a folded CLOS topology, also known as spine-leaf, which often relies on software defined network (SDN) controllers to manage traffic. This paper shows that it is possible to implement a spine-leaf network using commodity-ofthe-shelf switches and thus improve the east-west traffic capacity. This can be obtained using low complexity configuration and edgerouting for load balancing, eliminating the need for a centralized SDN controller.

  • 9.
    Andersson, Jonathan
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Birgersson, Alexander
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    IPv4 vs. IPv6: Vilket ska du surfa med?2020Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report addresses latency and response-time comparisons between the IPv4 and IPv6 protocols. These protocols are necessary to deliver data to the right recipient on the Internet as it is the TCP/IP model that is used. IPv6 is a newer version of IPv4 and was created in the late 1990's because the IPv4 addresses will not be enough for all devices that will come to need it. In association with the transition to IPv6, an opportunity was taken to optimize the protocol with fewer fields in the header and thus try to increase the latency and response times over IPv4.

    The report shows similarities and differences in latency and response times between IPv4 and IPv6 when browsing popular websites, a relevant use case that occurs daily. Measurements are made by downloading the web pages with the http protocol with both the IPv4 and the IPv6 protocols and then analyzing the different response times between them. This is done for three different internet providers: Telia, Bahnhof and Sunet. Telia also uses a different IPv6 solution than the other two, which will be another factor in the analysis.

    The results of the measurements show that IPv4 performs somewhat faster for all internet providers but does not make a directly noticeable difference for an end user. The traffic takes largely the same route regardless of which of the two protocols is used. The time for DNS lookups takes considerably longer for Sunet as an Internet provider than for the other two. The difference in route choice depending on which protocol is used is most noticeable for Bahnhof. 6RD performs a better average time than Sunets native IPv6.

  • 10.
    Andersson, Leon
    University West, Department of Engineering Science.
    En undersökning om Linux förmåga att hantera processer som överkonsumerar minnet2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Minneshanteringen i operativsystemet Linux för processer som överkonsumerar minnet kan variera beroende på vilken Linux baserad distribution som används. Detta innebär att systembelastningen av ett minnestungt program kan ha olika effekt på olika system. I denna rapport presenteras två typer av systemlösningar med avsikten att hantera scenarion då minneskonsumtionen är ohållbar för att undersöka och jämföra respektive systems agerande och betydelsen detta har för det fullständiga systemet. En lösning agerar i kernel space och en som agerar i user space hos systemet. Av dessa agerar user space lösningen som ett komplement till kernel space lösningen. Inte alla Linux distributioner använder denna konfiguration. Genom att skapa ett program som medvetet överkonsumerar systemets minne testas båda lösningar. Programmet agerar som ett stresstest där resurskonsumtion berörande programmet samt totala systemet undersöks. Resultat indikerar att user space lösningen komplimenterar kernel space lösningen på ett noterbart sätt genom att agera proaktivt och förebyggande genom att förhindra överkonsumtion av systemets minne. Medans kernel space lösningen enbart agerar som en nödlösning när systemets totala minnesresurser har förbrukats.

  • 11.
    Andersson, Sara
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Mänsklig faktor: hur kan man få den svagaste länken inom IT-säkerhet starkare?2018Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    In today´s IT environments, the role of the users becomes more important. In 2016 there were 200,000 crimes in Sweden that could be linked to social engineering attacks. These attacks are targeting the users and it is therefore important that users are aware of what they look like. This report is conducted in cooperation with a municipality in Västergötland, Sweden, and investigate four different methods to use when sharing IT information to their users. The methods differ not only in implementation but also in difficulty in the choice of words and expressions. The first method is a document of information taken from the municipality´s intranet. The second is also a document but is rewritten to simplify for the users. The third method is a video presentation and the fourth was made as a lecture with the possibility of interaction between the lecturer and the users. To evaluate these four methods two surveys were conducted. The first survey was performed before the users received IT information to create a baseline. After one and a half month the second survey was made. The surveys are compared to see how much the users remember and which method was most effective. The results indicate that the information on the municipality´s intranet is difficult to understand for the users. The other three methods provide a greater positive change in the user’s questionnaire response, indicating that users need a different form and structure when information is to be provided for them.

  • 12.
    Andlovic, Mihael
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    How real-world IP-distribution affects load balancing2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This essay looks at how IP addresses on the last octet are distributed and how they are balanced by different load balancer algorithms. We collected the data from a data center in Sweden to get real data. The IP addresses we collected were used with a load balancer using IP source algorithms. We used 4 different algorithms in different scenarios: the entire IP address, the first 3 octets, and the last octet with and without hash between two to five links/servers. The results were that the efficiency of the algorithm depends on the setup that is being used. Each of these algorithms did not have an even distribution, when comparing between two to five links/servers. The best overall distribution that did not have any weaknesses compared to the other algorithms was Nginx that uses the Bob Jenkins hash algorithm.

  • 13.
    Andréasson, Kim
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Hagberg, Daniel
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Undersökning av iBeaconannonsering via smartphoneapplikation: Objective c och ASP.NET2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This degree project is performed together with the company Sigma in relation with the education Datateknisk Systemutveckling at Högskolan Väst in Trollhättan. The purpose of this project is to examine the new technology iBeacon and study if it is to prefer over simi-lar technologies when developing a system to use for advertisement. To accomplish this, a smartphone application is developed aswell as an administration interface, to be able to perform a user test of the product with a random selection of people.

    The goal with the project is to develop a working product that can be tested and used for the examination of the hypothesis. This report explains how the project is performed and in the end, the result that the user test shows is discussed.

  • 14.
    Araya, Abel Russom
    et al.
    University West, Department of Engineering Science.
    Aden, Mohamud Abdullahi
    University West, Department of Engineering Science.
    Best Practice enligt ramverket ITIL: en studie om ITIL i praktiken2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    We conduct dissertations on the investigation of routines, models and systems on how companies and organizations should use IT operations. One of the systems is ITIL (Information Technology Infrastructure Library). As we do research on, how it works in practice in the workplace and whether there is a difference between companies. There are others such as Devops (Software development and IT operation), Agil, Scrum, ISO / IEC standards, Practical guide for policy analysis etc.

    Today, there are many different established methods, standards, models and routines for how companies and organizations should use IT operations. There are many systems that are process oriented for how companies and organizations conduct IT operations and support. One of the systems is ITIL (Information Technology Infrastructure Library). ITIL consists of five books that together form a framework for how to conduct management, operation and support in a process oriented manner.

    This thesis is based on a study of how ITIL is structured and how relevant it is today through research / interviews with various organizations that have adopted the framework specifically for ITIL's sub-processes problem management, access management and incident management. If it is experienced positively and is adaptable where previous surveys show that the implementation of ITIL has not fully worked on operations.

    We have investigated and focused more closely on some of ITIL's sub-processes Access, Problem and Incident Management. The ITIL framework that a collection of best practices can use during the implementation of IT operations. According to the results, ITIL has quite a large impact on the various operations. The effect it has on the operations is that after adapting this framework, the operations could have a better, more efficient and structured way of working.

    The framework is useful and helpful for the businesses as they do not have to invent their own methods or processes to get started, but they have the framework as method support, and they can work effectively. ITIL is too complex, and the organizations cannot make full use of the framework and more knowledge and time is needed to be able to complete the implementation of the framework, but this is also a resource issue for many organizations. However, you have your own solutions for the parts that you have not chosen to implement from the framework, which benefits the organization based on their needs. It is simply considered and said that we are satisfied with these parts and do not need to bother our staff or the business with implementing other parts.

  • 15.
    Ardstål, Linus
    et al.
    University West, Department of Engineering Science.
    Starborg, Mikael
    University West, Department of Engineering Science.
    Oskärmad vs skärmad nätverkskabel; Hur stor skillnad gör det egentligen?2023Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    UTP (Unshielded Twisted Pair) och STP (Shielded Twisted Pair) är två typer av kablar som används för att överföra data över ett nätverk. Båda typerna av kablar används för liknande ändamål, men de har vissa skillnader som kan vara betydande i vissa distributions scenarier. I småskaliga distributioner kanske UTP- och STP-kablar inte har någon signifikant skillnad i prestanda eller tillförlitlighet. Detta beror på att kablarna i ett litet nätverk vanligtvis inte behövs för att överföra data över långa avstånd eller i miljöer med höga nivåer av Electromagnetic Interference (EMI).UTP-kablar består av par med tvinnade ledningar, utan skärmning runt ledningarna. De är vanligtvis billigare än STP-kablar och enklare att installera eftersom de är lättare och mer flexibla. UTP-kablar används ofta i småskaliga distributioner som hem, små kontor och klassrum. I småskaliga distributioner kanske fördelarna med STP-kablar inte är nödvändiga, eftersom avståndet över vilket kablarna behöver överföra data vanligtvis är kort och det finns mindre risk för störningar. Dessutom kan UTP-kablar ge tillräcklig prestanda och tillförlitlighet för de flesta småskaliga nätverk. Vår metod för att introducera störning är att vira en lång UTP-kabel runt många strömkablar och tillhörande kopplad utrustning samt runt en stark strömkälla, en mikrovågsugn, för att se om dessa representationer av lågstörningsmiljöer är tillräckligt för att störa trafiken, trafiken mäts med iperf3 och Ubuntus egna felrapportering.Resultatet blev att nej, dessa scenarion var otillräckliga för att skapa någon nämnvärd störning av trafiken, mer efterforskning behövs och ännu starkare källor av störning bör tillämpas för att kunna se om det blir någon påverkan på trafiken med dessa mätmetoder.Detta innebär att i alla vardagliga scenarion är skärmad kabel helt överflödig och bör undvikas, en besparing både ekonomiskt och resursmässigt.

  • 16.
    Aziz, Hakar
    et al.
    University West, Department of Engineering Science.
    Linder, Jonatan
    University West, Department of Engineering Science.
    Visualization boards and their applications in manufacturing and daily management2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With digitalization becoming increasingly more important in the way that companies can increase their efficiency by allowing the employees to see the production in the way of visualization. This thesis explores how the design and implementation of digitalized visualization board in the form of the Mevisio platform can help Sansera streamline their production. The data collection was performed through daily communication with the workers and qualitative interviews. The results gathered from the communication and interviews showed that there was a lot of unnecessary information. The machine operators only cared about how much they had produced and how much they would and that it should be as simple as possible. Another thing gathered from the interviews was that it was easy to make errors when they used to visualize everything on whiteboards and paper. The conclusion was that with the help of a digitalized visualization board tailored for their needs they could more easily pay attention to the problems that arise and decrease the risk of human errors.

  • 17.
    Babu, Challa
    et al.
    Audisankara college of engineering and technology, Department of electrical and electronics engineering, Gudur, A.P, India (IND).
    Kumar, D. Dinesh
    Audisankara college of engineering and technology, Department of electrical and electronics engineering, Gudur, A.P, India (IND).
    Kumar, K
    SV College of Engineering, Tirupathi, AP, India (IND).
    Reddy, K Jyotheeshwara
    Sree Vidayanikethan Engineering College, Tirupathi, A.P., India (IND).
    Ramasamy, Sudha
    University West, Department of Engineering Science, Division of Production Systems.
    Power Monitoring and Control System for Medium Voltage Smart Grid Using IoT2020In: IOP Conference Series: Materials Science and Engineering, IOP Publishing , 2020, Vol. 906, article id 12007Conference paper (Refereed)
    Abstract [en]

    This paper presents a power monitoring and control system for a medium voltage smart grid system. The smart grid interconnects the power sources between solar PV panel and 220V distribution network. This system consisting major components of inverters, measuring meters, solar charge controllers, relays, Arduino NANO and Raspberry Pi. The Current, power and energy readings are duly recorded. The Internet of Things (IoT) plays the vital role in the data communication between the sensors and electric power system. The voltage and current sensor data is used for the protection of power system network. In the traditional systems only the communication is uni-directional. The reliability of power supply is increased by used the bi directional network communication medium such as IoT. The tabulated results of voltage levels between 203.5V up to 212.8V shows the feasibility and effectiveness of proposed design. The proposed IoT model demonstrated the bidirectional communication from the sensors to the control unit and vice versa.

    Download full text (pdf)
    fulltext
  • 18.
    Bennulf, Mattias
    et al.
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Svedman, Jacob
    University West, Department of Engineering Science, Division of Computer and Electrical Engineering.
    Automatiserat hem: med gränssnitt för anslutning av utrustning2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim is to find out how to develop a system for automated homes, where users can eas-ily connect custom built equipment. An example would be controlling a sprinkler or meas-uring wind speed. It should also be possible to develop more advanced accessories.

    To create a system that meets this, the system must have a central system to coordinate de-vices and data. We also need an open interface for communication between the central and the user devices. One should replace direct change in code and database center to instead create graphical interface to the users, it makes it easier for them to learn the system. One should not, however, restrict user freedom to develop units, more than the functionality of the interface and the center's configuration options. Parts of the requirements was imple-mented in a prototype, to confirm that the system works in reality. The prototype is based on a server with Debian as central in the home. For example, it can take a decision whether the alarm will go off or if a lamp should light. The user should easily be able to give in-structions to the central and reprogram how it should behave. Users can develop their own equipment and then simply connect it to the central and configure it via various web-based tools. In this way, accessories are created and connected without changing anything on the server more than the contents of the database. To test the system we created a modular house that is two walls in a cross, where equipment and central system are placed. Since power and lock bolt where used, this resulted in that some disruption where noticed and removed

  • 19.
    Berg, Gustaf
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Larsson, Daniel
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    En jämförande studie av tekniker för trådlös platsanalys vid Universeum2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis a comparison between a predictive site survey and two passive site surveys is performed, to see if only a predictive survey is enough to estimate a well-functioning wireless network. Some fundamental facts and techniques that are involved in wireless networks are presented and also the method of how the site surveys were planned and performed. The outcome is compiled in diagrams. The difference between a predictive and a passive site survey is analyzed, and shows if the prediction is trustworthy or needs to be verified.

  • 20.
    Boklund, Andreas
    et al.
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Namaki, Nima
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Jiresjö, Christian
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    A characterisation tool for the impact of network deficiencies on HPC applications2008In: Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, 2008, p. 888-894Conference paper (Other academic)
  • 21.
    Bonilla Hernández, Ana Esther
    et al.
    University West, Department of Engineering Science, Research Enviroment Production Technology West.
    Beno, Tomas
    University West, Department of Engineering Science, Division of Production Engineering. University West, Department of Engineering Science, Division of Subtractive and Additive Manufacturing.
    Repo, Jari
    University West, Department of Engineering Science, Division of Manufacturing Processes.
    Wretland, Anders
    GKN Aerospace Engine Systems AB, Trollhättan, Sweden.
    Analysis of Tool Utilization from Material Removal Rate Perspective2015In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 29, p. 109-113Article in journal (Refereed)
    Abstract [en]

    An end of life strategy algorithm has been used to study a CNC program to evaluate how the cutting inserts are used in terms of their full utilization. Utilized tool life (UTL) and remaining tool life (RTL) were used to evaluate if the insert has been used to its limits of expected tool life, or contributing to an accumulated tool waste. It is demonstrated that possible means to improvement exists to increase the material removal rate (MRR), thereby using the insert until its remaining tool life is as close to zero as possible. It was frequently found that inserts were used well below their maximum performance with respect to cutting velocity.

  • 22.
    Bradley, Jonatan
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Höglind, Fredrik
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Anti-Virus resursutnyttjande2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    How does Anti-Virus software affect the computer performance? Avast, Windows defender, Eset Nod32 and Symantec are a few of the big Anti-Virus companies that specialize in protecting your computer by removing virus, malware and trojans. Four Anti-Virus software and three scenarios was chosen to test cpu, memory, networks effect of the Anti-Virus software. Every scenario were tested three times ten minutes for every Anti-Virus software. Five minutes composed of a baseline and no test performed, after five minutes we conducted the test. Results differentiated between the different scenarios. Altogether, the Anti-Virus software differentiated minimal between each other. The data showed that the free Anti-Virus software was every bit as good as the paid Symantec version in utilizing the computer resources.

  • 23.
    Bragander, Vilma
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Berner, Madeleine
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Surfar den yngre generationen säkrare på internet?2021Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The general opinion is usually that the younger generation is acting safer on the Internet, since this generation has grown up with technology in their lives. But is this really true? In this study we find out about this by publishing an online survey for the general public and gather answers from different age groups. The survey covers multiple topics that we considered to be important aspects of the individual safety on the Internet. The issues that are answered is this study is: Has a certain age group been exposed to more cyberattacks than others? Do some age groups have higher security considerations on the Internet than others? What does the general password management look like in the different age groups? We gathered and analysed the answers from all the respondents and came to the conclusion thar the theory we had in the beginning of this work did not match the results. The younger generation creates and builds stronger passwords and use services to make intrusion into user accounts more difficult. However, this is the only aspect that the younger respondents handle better. The result clearly showed that the older respondents usually had greater security concerns than the younger ones and generally acted safer on the Internet. 

  • 24.
    Bäckberg, Erik
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Wissmach, Toni
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    IPv6 latensprestandastudie över Internet2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis is about a comparison of latency between IPv6 and IPv4 in a live environment, the Internet. When IPv4 was developed in the 1980s it was not foreseen how great the need for IP addresses would be. For this reason, the Internet Engineering Task Force began to develop IPv6 in the 1990s. IPv6 extends the number of available IP addresses manifold and eliminate the need for NAT. The protocol was also optimized for more efficient package handling with fewer fields in the header. Migration to IPv6 from IPv4 is inevitable, the question is whether there will be differences in latency.

    This report is based on a hypothesis that IPv6 should perform better than IPv4 in form of latency since low response time is fundamental when it comes to for example online games, live video streaming and web surfing. Measurements from Sunet and Telia have been performed with ping and traceroute against 55 nodes that support both protocols. IPv6 does not show any clear indication of lower latency than IPv4. The performance measured differed significantly depending on which ISP was used.

  • 25.
    Carlsson, Konrad
    et al.
    University West, Department of Engineering Science.
    Bertauskas, Lukas
    University West, Department of Engineering Science.
    An analysis of agentless automation tools and their suitability for network device management2022Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The overall focus of this paper is to identify the more suitable agentless automation tool for network automation, here we compare Puppet Bolt and Ansible, which are both rather popular in the networking world. But which one is actually more suitable from the perspective of installation, initial setup, user friendliness and suitability for networking device configuration? This is the question that is answered here. During the writing of this paper, we have both invested several hours of our time in learning these tools, documenting our experiences and using this experience in constructing this paper while staying highly objective. During the testing phase of this paper, a decision was made to push NTP server configurations to the target devices (Cisco routers). This configuration consists of an IP address of an NTP server for the hosts to use as their source for time calibrations. All necessary changes were made to make the tools functional. Playbooks/Manifests were created to be as similaras possible to each other to make this paper as objective as possible. The same type of modules were used in the creation of these Playbooks/Manifests, again to make the comparison as objective as possible. The only difference between these configuration files was the language in which they were written (XML for Bolt and YAML for Ansible). Their purpose was the same.Installation and user-friendliness was also compared during the testing phase. Ansible turned out to be the most user friendly tool with the best online support, easiest configuration and the snappiest operation. 

  • 26.
    Daher, Amir
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Nadjati-Yazdi, Artin
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Optimization of warehouse logic and structure2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Products flow in and out of different warehouses all over the world every day all the time, while the technology is improving, warehouses remain as they are unless major developments occur in the industry which require the modern warehouses to follow. Major changes in warehouses cost a fortune for the companies which require the owners to find changes that cost as little as possible while resulting in as high efficiency in the warehouse as possible. The purpose of this project is to find ways to optimize the current logic in the Warehouse Management System named Warehouse Administration Service System or WASS. By analyzing the WASS-systems database, reading the WASS-manual, creating tools to visualize the warehouse both theoretically and practically, interviewing workers, then shortcomings and optimizations can be found. The resultis that the current logic in the warehouse is very unoptimized by analysing the warehouse with the help of visualizing the warehouse and feedback from an interview. Improvements are suggested from analysing the heatmap and through visualizing the issues the improvements can be implemented. By creating a visualization of the optimal structure which can be used as areference for implementing a better structure in the actual production. The visualization tool and the heatmaps can help future warehouses that log goods inwards and outwards find shortcomings in their A,B,C-structure and improve their warehouse logic.

  • 27.
    Danyang, Cui
    et al.
    University West, Department of Engineering Science, Division of Industrial Engineering and Management, Electrical- and Mechanical Engineering. Department of Electrical Engineering Uppsala University Uppsala; Department of Engineering Science, University West, Trollhättan (SWE).
    Max, Lena
    University West, Department of Engineering Science, Division of Industrial Engineering and Management, Electrical- and Mechanical Engineering.
    Boström, Cecilia
    Department of Electrical Engineering Uppsala University Uppsala (SWE).
    Ekergård, Boel
    University West, Department of Engineering Science, Division of Industrial Engineering and Management, Electrical- and Mechanical Engineering.
    Design of Spoke Type Traction Motor with Ferrite Material for EV Application2022In: 2022 International Conference on Electrical Machines (ICEM): Proceedings 5-8 Sept. 2022, Institute of Electrical and Electronics Engineers (IEEE), 2022, p. 315-320Conference paper (Refereed)
    Abstract [en]

    Motor design for electric vehicle application using non-rare-earth permanent magnetic materials has become a research hotspot due to cost reduction and environmental issues. Among different motor topologies, permanent magnet synchronous motor (PMSM) with spoke-type ferrite magnets has great potential because of its competitive performance. In this paper, a novel design of a spoke-type synchronous motor using ferrite Y40 and non-magnetic steel material is presented, with optimizations on the overall structure and considerations on the effects of pole numbers. The performance of the designed motor verified with magnetic simulations shows that it has a high probability to be a candidate for replacing the conventional PMSM with rare-earth materials in Electric Vehicles (EV) application. © 2022 IEEE.

  • 28.
    de Blanche, Andreas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering. Institutionen för data- och informationsteknik, Datorteknik (Chalmers.
    A Slowdown Prediction Method to Improve Memory Aware Scheduling2016Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Scientific and technological advances in the area of integrated circuits have allowed the performance of microprocessors to grow exponentially since the late 1960's. However, the imbalance between processor and memory bus capacity has increased in recent years. The increasing on-chip-parallelism of multi-core processors has turned the memory subsystem into a key factor for achieving high performance. When two or more processes share the memory subsystem their execution times typically increase, even at relatively low levels of memory traffic. Current research shows that a throughput increase of up to 40% is possible if the job-scheduler can minimizes the slowdown caused by memory contention in industrial multi-core systems such as high performance clusters, datacenters or clouds. In order to optimize the throughput the job-scheduler has to know how much slower the process will execute when co-scheduled on the same server as other processes. Consequently, unless the slowdown is known, or can be fairly well estimated, the scheduling becomes pure guesswork and the performance suffers. The central question addressed in this thesis is how the slowdown caused by memory traffic interference between processes executing on the same server can be predicted and to what extent. This thesis presents and evaluates a new slowdown prediction method which estimates how much longer a program will execute when co-scheduled on the same multi-core server as another program. The method measures how external memory traffic affects a program by generating different levels of synthetic memory traffic while observing the change in execution time. Based on the observations it makes a first order prediction of how much slowdown the program will experience when exposed to external memory traffic. Experimental results show that the method's predictions correlate well with the real measured slowdowns. Furthermore, it is shown that scheduling based on the new slowdown prediction method yields a higher throughput than three other techniques suggested for avoiding co-scheduling slowdowns caused by memory contention. Finally, a novel scheme is suggested to avoid some of the worst co-schedules, thus increasing the system throughput.

  • 29.
    de Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Disallowing Same-program Co-schedules to Improve Efficiency in Quad-core Servers2017In: Proceedings of the Joined Workshops COSH 2017 and VisorHPC 2017 / [ed] Clauss, Carsten; Lankes, Stefan; Trinitis, Carsten; Weidendorfer, Josef, 2017, p. 1-7Conference paper (Refereed)
    Abstract [en]

    Programs running on different cores in a multicore server are often forced to share resources like off-chip memory,caches, I/O devices, etc. This resource sharing often leads to degraded performance, a slowdown, for the program sthat share the resources. A job scheduler can improve performance by co-scheduling programs that use different resources on the same server. The most common approachto solve this co-scheduling problem has been to make job schedulers resource aware, finding ways to characterize and quantify a program’s resource usage. We have earlier suggested a simple, program and resource agnostic, scheme as a stepping stone to solving this problem: Avoid Terrible Twins, i.e., avoid co-schedules that contain several instances from the same program. This scheme showed promising results when applied to dual-core servers. In this paper, we extend the analysis and evaluation to also cover quad-core servers. We present a probabilistic model and empirical data that show that execution slowdowns get worse as the number of instances of the same program increases. Our scheduling simulations show that if all co-schedules containing multiple instances of the same program are removed, the average slowdown is decreased from 54% to 46% and that the worst case slowdown is decreased from 173% to 108%.

  • 30.
    de Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Initial Formulation of Why Disallowing Same Program Co-schedules Improves Performance2017In: Co-Scheduling of HPC Applications / [ed] Carsten Trinitis, Josef Weidendorfer, Netherlands: IOS Press, 2017, 1, p. 95-113Chapter in book (Refereed)
    Abstract [en]

    Co-scheduling processes on different cores in the same server might leadto excessive slowdowns if they use the same shared resource, like a memory bus. Ifpossible, processes with a high shared resource use should be allocated to differentserver nodes to avoid contention, thus avoiding slowdown. This article proposesthe more general principle that twins, i.e. several instances of the same program,should be allocated to different server nodes. The rational for this is that instancesof the same program use the same resources and they are more likely to be eitherlow or high resource users. High resource users should obviously not be combined,but a bit non-intuitively, it is also shown that low resource users should also notbe combined in order to not miss out on better scheduling opportunities. This isverified using both a probabilistic argument as well as experimentally using tenprograms from the NAS parallel benchmark suite running on two different systems.By using the simple rule of forbidding these terrible twins, the average slowdownis shown to decrease from 6.6% down to 5.9% for System A and from 9.5% to8.3% for System B. Furthermore, the worst case slowdown is lowered from 12.7%to 9.0% and 19.5% to 13% for systems A and B, respectively. Thus, indicating aconsiderable improvement despite the rule being program agnostic and having noinformation about any program’s resource usage or slowdown behavior.

  • 31.
    de Blanche, Andreas
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Lundqvist, Thomas
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Node Sharing for Increased Throughput and Shorter Runtimes: an Industrial Co-Scheduling Case Study2018In: Proceedings of the 3rd Workshop on Co-Scheduling of HPC Applications (COSH 2018): Held together with HiPEAC 2018 / [ed] Trinitis, Carsten; Weidendorfer, Josef, 2018, p. 15-20Conference paper (Refereed)
    Abstract [en]

    The allocation of jobs to nodes and cores in industrial clusters is often based on queue-system standard settings, guesses or perceived fairness between different users and projects. Unfortunately, hard empirical data is often lacking and jobs are scheduled and co-scheduled for no apparent reason. In this case-study, we evaluate the performance impact of co-scheduling jobs using three types of applications and an existing 450+ node cluster at a company doing large-scale parallel industrial simulations. We measure the speedup when co-scheduling two applications together, sharing two nodes, compared to running the applications on separate nodes. Our results and analyses show that by enabling co-scheduling we improve performance in the order of 20% both in throughput and in execution times, and improve the execution times even more if the cluster is running with low utilization. We also find that a simple reconfiguration of the number of threads used in one of the applications can lead to a performance increase of 35-48% showing that there is a potentially large performance increase to gain by changing current practice in industry.

    Download full text (pdf)
    COSH2018-deBlanche-Lundqvist
  • 32.
    de Blanche, Andreas
    et al.
    University West, School of Business, Economics and IT, Division of Computer Science and Informatics.
    Mankefors-Christiernin, Stefan
    University West, Department of Technology, Mathematics and Computer Science, Division for Computer Science.
    Availability of Unused Computational Resources in an Ordinary Office Environment2010In: Journal of Circuits, Systems and Computers, ISSN 0218-1266, Vol. 19, no 3, p. 557-572Article in journal (Refereed)
    Abstract [en]

    The study presented in this paper highlights an important issue that was subject for discussionsand research about a decade ago and now have gained new interest with the current advances ofgrid computing and desktop grids. New techniques are being invented on how to utilize desktopcomputers for computational tasks but no other study, to our knowledge, has explored theavailability of the said resources. The general assumption has been that there are resources andthat they are available. The study is based on a survey on the availability of resources in anordinary o±ce environment. The aim of the study was to determine if there are truly usableunder-utilized networked desktop computers available for non-desktop tasks during the off-hours. We found that in more than 96% of the cases the computers in the current investigationwas available for the formation of part-time (night and weekend) computer clusters. Finally wecompare the performance of a full time and a metamorphosic cluster, based on one hypotheticallinear scalable application and a real world welding simulation.

  • 33.
    Didricksson, Tobias
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Norlander, Christian
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    IPv4 eller IPv6 för gemene man i Sverige2021Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This work compares the time it takes to download a website over IPv4 and IPv6 to then be able to conclude about which protocol a regular user should use to get the best user experience. The starting point is the two older works that have been done on this subject, specifically the newest of these because their method was most similar to ours. The idea was to see if the result would be different if we increased the amount of data collected for analysis. Data has been collected over a whole week, which has given a quantity of 16,749 separate measurements made on 100 different web pages. This data has been analyzed and the specific parts that make up a download of a website have been examined in detail and compared between the IP protocols to see where it differs. The result confirmed our idea that there would be a difference between this and last year's work. However, it was IPv4 that performed significantly worse rather than IPv6 performing better. The result of this work is that IPv6 is faster. 

  • 34.
    Djebbar, Fatiha
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Nordström, Kim
    Cybersecurity Product Compliance Group,Stockholm (SWE).
    A Comparative Analysis of Industrial Cybersecurity Standards2023In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 85315-85332Article in journal (Refereed)
    Abstract [en]

    Cybersecurity standards provide a structured approach to manage and assess cybersecurity risks. They are the primary source for security requirements and controls used by organizations to reduce the likelihood and the impact of cybersecurity attacks. However, the large number of available cybersecurity standards and frameworks make the selection of the right security standards for a specific system challenging. The absence of a comprehensive comparison overlap across these standards further increases the difficulty of the selection process. In situations where new business needs dictate to comply or implement additional security standard, there may be a risk of duplicating existing security requirements and controls between the standards resulting in unnecessary added cost and workload. To optimize the performance and cost benefits of compliance efforts to standards, it is important to analyze cybersecurity standards and identify the overlapping security controls and requirements. In this work, we conduct a comparative study to identify possible overlaps and discrepancies between three security standards: ETSI EN 303 645 v2.1.1 for consumer devices connected to the internet, ISA/IEC 62443-3-3:2019 for industrial automation and control systems, and ISO/IEC 27001:2022 for information security management systems. The standards were carefully chosen for their broad adoption and acceptance by the international community. We intentionally selected standards with different areas of focus to illustrate the significant overlaps that can exist despite being designed for different environments. Our objective is to help organizations select the most suitable security controls for their specific needs and to simplify and clarify the compliance process. Our findings show a significant overlap among the three selected standards. This information can help organizations gain a comprehensive understanding of common security requirements and controls, enabling them to streamline their compliance efforts by eliminating duplicated work especially when meeting the requirements of multiple standards.

    Download full text (pdf)
    fulltext
  • 35.
    Eklund, Sara
    et al.
    University West, Department of Engineering Science.
    Kaalstad Pettersson, Patrik
    University West, Department of Engineering Science.
    A Hololens 2 experiment on subtle guidance2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    New technology is created every day and the buzz around you keeps getting noisier. Because of this, people are turning their minds towards calm technology. Here you try to make equipment and programs interact with the user in a quieter way. A way of doing so in AR is the use of subtle hints instead of flickering highlighters as a guidance. This paper describes an experiment using subtle guidance in HoloLens 2, an augmented reality head worn device. We want to research to what level subtle guidance can affect the given task and what parameters makes the subtle hint comfortable touse. It is also of interest to use the eyetracking in the HoloLens to determine when the subtle hints make an effect on the user. In the study we used a puzzle-program especially designed for this task containing puzzles with and without subtle guidance. The participants who were recruited for the experiment, were in addition to the puzzle-test interviewed, and their answers among with there corded data was analyzed and discussed at the end of the study.

  • 36.
    Ekström, Philip
    University West, Department of Engineering Science.
    Implementation av Python via NETCONFoch RESTCONF: En jämförelsestudie2023Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Det går att hantera nätverksenheter och nätverk på olika sätt. Två av dessa sätt är RESTCONF och NETCONF. Denna undersöknings syfte är att ta reda på vilken av dessa två protokoll som är snabbast och om storlek på nätverket har påverkan på vilket att dessa protokoll som bör användas. Resultatet visar att RESTCONF är snabbare än NETCONF på ett nät med tre routrar och två switchrar. RESTCONF är även snabbare än NETCONF på ett nätverk som består av 17 routrar och fem switchrar. Både NETCONF och RESTCONF tar längre tid i nätverket med fler nätverksenheter än i nätverket med färre nätverksenheter.

    Download full text (pdf)
    fulltext
  • 37.
    Eriksson, Kevin
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Seidl, Kristoffer
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Reservkraft i Vattenfalls norrlandsnät2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Today, the power grid in the Swedish province of Norrland is particularly sensitive to interruptions. With a high proportion of overhead and radial lines and increasing demand on reliability of the power supply means backup power supply is often necessary to meet the requirements.

    By studying interruption reports available at Vattenfall the necessary data about faults that exceed statutory periods was gathered. Observations in Vattenfalls network information system formed the basis for the assessment of the grid structure in the area.

    Information about the data on the relevant plant sections was retrieved via the manufacturers' datasheets.

    Today access to the back-up power is unevenly distributed where sensitive areas in general have considerably less access to back-up power than less sensitive areas. In addition, the available back-up power is not used to the extent it would be possible because it can be seen as a waste of resources. Relocation of some back-up power to areas with high fault rates is suggested in order to reduce the compensation that must be paid to the customers in case of long power outages.

    It was also examined during the project if proper fault disconnection within a reasonable time frame is met. This resulted in a table that can be used to verify if the connected power supply has the required short-circuit power to ensure fault disconnection.

    Download full text (pdf)
    fulltext
  • 38.
    Ferizi, Fatlum
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Kutsomihas, Rickard
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Molnhonungsfällan: en studie om attacker på molntjänsteleverantörsbelägna virtuella maskiner2020Independent thesis Basic level (professional degree), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis is about installing honeypots on different providers cloud based virtual machines, gathering the data from the honeypots and comparing the data between the providers, and analyse it with regards to differences and similarities in attacks.

    The study focuses on three of the largest cloud based VM providers: Google Cloud, Microsoft Azure and Digital Ocean.

    The honeypots used for the study are Cowrie, Elastichoney, Dionea and the sensor p0f, along with the deployment tool MHN and the data analytics tool Splunk.

    The information gathering process was performed over the period of 11 days, on the dates 2020-07-28 – 2020-08-08, with a total of 240 hours of data collection.

  • 39.
    Freiholtz, Henrik
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Portabelt verktyg för testning av nätverkstjänster2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Networks of today employ a number of different services developed to support functioning infrastructures. In most cases, well established and functioning solutions exist for setting up a production server for any of these services, but for other purposes the market looks quite different. If you are looking for simple applications tailored for ease of use and quick deployment the selection is narrow. In order to solve this, a tool was developed, intended to be used for teaching, troubleshooting and temporary solutions, focusing on simplicity and portability. A list of requirements was created, according to which the tool was designed. The tool was to include the services DHCP, DNS, NTP, web and syslog. The tool was implemented as an x86 desktop application based on the Electron platform. The application uses a graphical user interface and is divided into modules, each of which represents a protocol. Each module is started individually and includes a few basic features from each protocol. A number of tests were created and implemented in order to verify that the application was built according to the established requirements. The test results showed that the application was built according to design and satisfied the requirements. The result was a tool that succeeded in partially filling the gap that existed in the market for tools designed for simplicity and ease of use.

  • 40.
    Fält, Sebastian
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Spine-leaf model i ett campusnätverk2020Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Nätverksdesignen Spine-leaf har ökat i popularitet de senaste åren då den har en bättre förmåga att möta hastighet- och prestandakraven som förekommer i ett datacenter. En stor nackdel med spine-leaf designen är mängden kablar som krävs. Detta arbete kommer att fokusera på en lösning för att försöka minska antalet kablar som behövs för att koppla ihop ett eller flera spine-leaf nätverk med varandra utan att bryta själva konceptet med ett spine-leaf. Arbetet kommer att baseras på ett antal tester som kommer visa om denna design är funktionell eller inte. Resultaten indikerar en funktionell design dock i behov av smärre justeringar för att prestera optimalt.

  • 41.
    Gadaan Jörgensen, Albin
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Kajtezovic, Enis
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Jämförelser mellan olika Small Office/Home Office routrar2021Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The following thesis is based on a comparison between routers from different Internet Service Providers and a few self-purchased routers. In the thesis specific services are wanted in the different routers, where the result should be able to explain which router the user gets the most out of. 

    The purpose of the thesis is to be able to help in the jungle of Internet Service Providers and is expected to answer which router gives the user the most value

  • 42.
    Gebl, Emil
    et al.
    University West, Department of Engineering Science.
    Åkesson, Emil
    University West, Department of Engineering Science.
    Utveckling av rekryteringssystem för reducering av fel som orsakas av den mänskliga faktorn2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Detta examensarbete är en fallstudie som utförts på Trinax AB i Trollhättan, där ett nytt rekryteringssystem togs fram baserat på en föråldrad digital process. Syftet med examensarbetet var att undersöka hur ett IT-system för rekrytering kunde utvecklas så att de fel som orsakas av den mänskliga faktorn för Trinax ABs föråldrade process kunde reduceras och därmed leda till en förbättring.

    De frågeställningar som examensarbetet skulle besvara var följande:

    • Hur ska ett IT-system utvecklas för att reducera de fel som kan orsakas av den mänskliga faktorn i en föråldrad process?

    • Vilka för- och nackdelar finns det med det nyutvecklade IT-systemet?

    Metoden som togs fram byggde på en grundlig analys av den föråldrade processen för att kunna matcha problemområden mot tidigare forskning. Detta tillsammans med framställda krav låg till grund för ett nytt system där automatisering skedde i de steg där fel tidigare kunnat inträffa, för att på så sätt kunna reducera felen. Genom författarnas testning av systemet och utvärderingen av de ansvariga på Trinax AB kunde det konstateras att de fel som tidigare kunnat uppstå hade reducerats med det nya IT-systemet. Slutsatsen som drogs för detta arbete var att metoden som tagits fram för att reducera fel fungerade i detta fall och kan tillämpas för att i synnerhet reducera fel i andra rekryteringsprocesser hos företag med liknande förutsättningar. Däremot kan metoden inte generaliseras för alla typer av processer. Fördelar med det nya systemet är tidsbesparing, bättre kommunikation och en klar förbättring av processens rutiner och design. Det som kan anses som nackdelar för det nya IT-systemet är ett opersonligt bemötande till den sökande av en tjänst, samt huruvida etiskt rätt det är att ett IT-system ersätter mänskligt utförande av uppgifter.

  • 43.
    Gellerstedt, Martin
    University West, Department of Studies of Work, Economics and Health.
    Statistical issues: significantly important in medical research.2002In: Allergy. European Journal of Allergy and Clinical Immunology, ISSN 0105-4538, E-ISSN 1398-9995, Vol. 57, no 2, p. 76-82Article, review/survey (Other academic)
  • 44.
    Gröning, Tomas
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Är NIT-studenterna bättre än företags It-tekniker på IPv6?2016Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This thesis aims to find out whether the Network Technology and IT-security students is better at IPv6 than the corporate technicians. The result has been determined using a multiple-choice test that compares the knowledge between the corporate IT-technicians and the NIT students. Interviews were made with a spokesperson at each of the three companies to see how or if they make use of IPv6 and how that effects their IPv6 knowledge. The results show that the NIT students performs better than the corporations’ IT techni-cians and that none of the companies are using IPv6 in their daily work and doesn’t get any education in the subject.

  • 45.
    Grönstedt, Elliot
    et al.
    University West, Department of Engineering Science.
    Wass, Hampus
    University West, Department of Engineering Science.
    Rogue Access Points: Överblick av en attack2022Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Rogue Access Point's (RAPs) have very low complexity in relation to efficiency. This report aims to show this in a practical way and give the reader an insight into different perspectives from the attack.

    An internal network was built in a lab environment together with two internal servers, a Web Server (HTTP) and a Domain Name System (DNS) server. In the internal network, there was a wireless environment for internal clients that a threat actor joined and relayed the connection to a RAP.

    When a user joins the RAP, all its traffic can be intercepted, manipulated, or hijacked by the threat actor. This report shows a passive approach, packetsniffing, using Wireshark. With the help it, the report manages to show how unencrypted protocols behave if they are intercepted.

    From the internal network's Wireless Lan Controller (WLC), the RAP is detected as a Rogue Access Point and a contain attack is performed. This means that dissociation and deauthentication frames are spammed to the connected clients with a spoofed source MAC address of the RAP. Which in practice means a Denial of Service (DoS) attack on the unexpecting client’s association with the RAP.

  • 46.
    Gustavsson Christiernin, Linn
    et al.
    University West, Department of Engineering Science, Division of Production Systems.
    Augustsson, Svante
    University West, Department of Engineering Science, Division of Production Systems.
    Interacting with Industrial Robots: A Motion-based Interface2016In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces / [ed] Paolo Buono, Rosa Lanzilotti, Maristella Matera, New York: ACM Digital Library, 2016, p. 310-311Conference paper (Refereed)
    Abstract [en]

    Collaborative industrial robot cells are becoming more and more interesting for industry through the new Industrie 4.0 initiative. In this paper we report early work on motion-based interaction with industrial robots. Human motion is tracked by a Kinect camera and translated into robot code. A group of tests subjects are asked to interact with the system and their activities are observed. Lessons learned on interaction challenges in a robot cell are reported.

  • 47.
    Götlind, Hampus
    et al.
    University West, Department of Engineering Science.
    Olsson, Rickard
    University West, Department of Engineering Science.
    Russia’s war against Ukraine: The effect on IT security in Sweden’s municipalities2023Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report aims to look at how Russia’s war in Ukraine has affected the work with IT security at Swedish municipalities, what actions have been taken, if any, and see if there has been an increase in attacks towards the municipalities’ networks. This was done by sending out a questionnaire to all of Sweden’s 290 municipalities via email with four questions regarding their IT security. 103 of Sweden’s municipalities responded to the email. Ten municipalities declined to participate in the report, which means that 32% (93) of Sweden’s municipalities participated in this survey. We chose to evaluate the Swedish municipalities and their preparedness in case of war for several reasons. They are a uniform group which we believed adhere to the same guidelines and regulations regarding cybersecurity, and the fact that they store and engage with critical and sensitive data about Sweden and its population, making them prime targets for attacks by foreign powers.

    The results were presented anonymously and based on the voluntary responses of the municipalities. Answers were then compiled and sorted into the five main categories from the NIST framework for cybersecurity. The report concludes that Swedish municipalities have taken significant actions to protect their networks in response to Russia’s war and aggressions towards Ukraine. For example, 18 municipalities reported that they had trained their staff in some way, which was the most common measure, and 11 municipalities had implemented two-factor authentication. However, more can be done in terms of responding to threats and enhancing recovery plans and systems.

    In summary, there seemed to be a lack of consensus on how municipalities should handle their own IT-security, as there was a high variation in the responses.

    The follow-up questions revealed a significant increase in attacks towards the municipalities’ networks, with many considering their networks potential targets for future attacks from foreign powers. 

  • 48.
    Hansson, Viktor
    et al.
    University West, Department of Engineering Science.
    Ackemo, Stefan
    University West, Department of Engineering Science.
    Jämförelse mellan DMVPN Spoke-toSpoke och Site-to-Site GRE-IPsec VPN2022Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This report compared two different VPN technologies, DMVPN Spoke-to-Spoke and Site-to-Site GRE-IPsec VPN. The VPN technologies were tested in two different scenarios. In the first scenario video-streamed material was sent from one PC to another PC. In the second scenario, a stress test was performed in which a large number of packets were sent from one PC to another for a limited time. Investigation showed the loss of packets that occurred through the VPN tunnel with these two VPN technologies. The implementation of these two VPN technologies was evaluated to see if one was easier to configure than the other and if they were suitable for different types of organizations.

    What was shown after the tests was that there was no difference in loss of packets between these two VPN technologies. In terms of implementation, DMVPN was the better VPN technology to choose from, as it allows for better scalability and simpler configuration. 

  • 49.
    Hilmersson, Mikael
    et al.
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Ivarsson, Olof
    University West, Department of Engineering Science, Division of Computer, Electrical and Surveying Engineering.
    Prestandamätning av en 10 Gbps-länk med olika paketstorlekar2017Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Today’s society requires faster connections which adds greater demands on our networks and it is important to utilize the maximum capacity of our links. This thesis examines how close the theoretical maximum speed it is possible to reach on a 10 Gbps link, depending on the packet size used. To determine this a series of tests was performed on a 10 Gbps link between two Cisco 6504. Packet sizes between 64B and 4 092B were used and compared against a calculated theoretical maximum speed according to the Ethernet standard IEEE 802.3-2015. The results show that it is difficult to achieve the theoretical maximum speed with small packets. When the packet size increases the difference between the test result and the theoretical maximum speed grows smaller and smaller. With a packet size of 4 092B a speed equivalent to 99.96% of the theoretical maximum was achieved.

  • 50.
    Hiort, Alexander
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Bandbreddmätning och paketanalys via Raspberry Pi2019Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The report will consist of a presentation, an installation and a setup of a network analyser. It can measure the speed usage of devices and analyse its traffic and is managed via its own Wi-Fi. It is made using a raspberry pi 3 with a touch screen and an external ethernet adapter as well a battery for not having to plug it into an electrical outlet.

    There will be tests to see if the prototype is useful in a home network or if it is possible to use it in a corporate network. The report will give results and conclusion that the prototype can be used in a home network but has some limitations for being used in company networks.

123 1 - 50 of 115
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf