Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 1819
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Abaglo, A. J.
    et al.
    Bonalda, C.
    Pertusa, Emeline
    KTH.
    Environmental Digital Model: Integration of BIM into environmental building simulations2017In: CISBAT 2017 International ConferenceFuture Buildings & Districts – Energy Efficiency from Nano to Urban Scale, Elsevier, 2017, Vol. 122, p. 1063-1068Conference paper (Refereed)
    Abstract [en]

    The digital model and the BIM are creating a revolution with a transition from 2D to 3D models. However, environmental professions carry out building simulations with a wide range of software with little or no communication between them. This often leads to the realization of several 3D models and therefore a significant loss of time, as well as possible inconsistencies of geometrical information. Our research aims to use the interoperability potential offered by BIM-friendly software to develop gateways to optimize the modeling phase and improve the restitution of the studies through visual integration in a digital mockup.

  • 2.
    Abbasi, Abdul Ghafoor
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Communication Systems, CoS.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Communication Systems, CoS.
    Hotamov, I.
    Web contents protection, secure execution and authorized distribution2010In: Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010, 2010, p. 157-162Conference paper (Refereed)
    Abstract [en]

    This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources in PKCS#7, extended secure execution environment for Java Web Server, eXtensible Access Control Markup Language (XACML) based authorization policies, and secure Web proxy. Design and implementation of our system is based on the concepts of generic security objects and component-based architecture that makes it compatible with exiting Web infrastructures without any modification.

  • 3.
    Abbasi, Bushra Qazi
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Awais, Samrah
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Playing mind gamification: Theoretical evidence of addictive nature of gamification and identification of addictive game elements used in mobile application design2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Gamification is a modern concept that makes physical and digital activities engaging and enjoyable just like games. Game elements are added to mobile applications for user retention and engagement. One of the dark sides of gamification i.e., addiction is explored in this novel study in the context of mobile application design. It uses a mixed-method approach to lay the foundation of the relation between gamification and Smartphone Addiction, which is critically explained in a limited literature review using existing theories and studies on gamification. Interviews with behavioral experts confirm the psychological aspects of the research. The study also identifies game elements that contribute to smartphone addiction by a survey analysis of 269 participants. Results reveal Scrolling and Tapping as most addictive game elements. Some elements also show a statistically significant relationship with daily smartphone usage in hours. There are many effective applications of gamification, and in the context of mobile application design, it indeed helps to increase user engagement, however, there is an ethical need to reflect on what the exaggerated form of this engagement can lead to. As future research, a longitudinal study and experiments are suggested to find out this relationship with the use of empirical data.

    Download full text (pdf)
    fulltext
  • 4.
    Abbasi, R.
    et al.
    Loyola Univ Chicago, Dept Phys, Chicago, IL 60660 USA.
    Botner, Olga
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Burgman, Alexander
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics. Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, FREIA.
    Glaser, Christian
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Hallgren, Allan
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    O'Sullivan, Erin
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Pérez de los Heros, Carlos
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Sharma, Ankur
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Valtonen-Mattila, Nora
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Zhang, Z.
    SUNY Stony Brook, Dept Phys & Astron, Stony Brook, NY 11794 USA.
    Combining Maximum-Likelihood with Deep Learning for Event Reconstruction in IceCube2022In: 37th International Cosmic Ray Conference (ICRC 2021) / [ed] Alexander Kappes; Bianca Keilhauer, Sissa Medialab Srl , 2022, article id 1065Conference paper (Refereed)
    Abstract [en]

    The field of deep learning has become increasingly important for particle physics experiments, yielding a multitude of advances, predominantly in event classification and reconstruction tasks. Many of these applications have been adopted from other domains. However, data in the field of physics are unique in the context of machine learning, insofar as their generation process and the laws and symmetries they abide by are usually well understood. Most commonly used deep learning architectures fail at utilizing this available information. In contrast, more traditional likelihood-based methods are capable of exploiting domain knowledge, but they are often limited by computational complexity.

    In this contribution, a hybrid approach is presented that utilizes generative neural networks to approximate the likelihood, which may then be used in a traditional maximum-likelihood setting. Domain knowledge, such as invariances and detector characteristics, can easily be incorporated in this approach. The hybrid approach is illustrated by the example of event reconstruction in IceCube.

    Download full text (pdf)
    fulltext
  • 5.
    Abbaszadeh Shahri, Abbas
    et al.
    Johan Lundberg AB, S-75450 Uppsala, Sweden.;Tyrens, Div Rock Engn, S-11886 Stockholm, Sweden..
    Shan, Chunling
    KTH, School of Architecture and the Built Environment (ABE), Civil and Architectural Engineering, Soil and Rock Mechanics. Tyrens, Div Rock Engn, S-11886 Stockholm, Sweden..
    Larsson, Stefan
    KTH, School of Architecture and the Built Environment (ABE), Civil and Architectural Engineering, Soil and Rock Mechanics.
    Johansson, Fredrik
    KTH, School of Architecture and the Built Environment (ABE), Civil and Architectural Engineering, Soil and Rock Mechanics.
    Normalizing Large Scale Sensor-Based MWD Data: An Automated Method toward A Unified Database2024In: Sensors, E-ISSN 1424-8220, Vol. 24, no 4, article id 1209Article in journal (Refereed)
    Abstract [en]

    In the context of geo-infrastructures and specifically tunneling projects, analyzing the large-scale sensor-based measurement-while-drilling (MWD) data plays a pivotal role in assessing rock engineering conditions. However, handling the big MWD data due to multiform stacking is a time-consuming and challenging task. Extracting valuable insights and improving the accuracy of geoengineering interpretations from MWD data necessitates a combination of domain expertise and data science skills in an iterative process. To address these challenges and efficiently normalize and filter out noisy data, an automated processing approach integrating the stepwise technique, mode, and percentile gate bands for both single and peer group-based holes was developed. Subsequently, the mathematical concept of a novel normalizing index for classifying such big datasets was also presented. The visualized results from different geo-infrastructure datasets in Sweden indicated that outliers and noisy data can more efficiently be eliminated using single hole-based normalizing. Additionally, a relational unified PostgreSQL database was created to store and automatically transfer the processed and raw MWD as well as real time grouting data that offers a cost effective and efficient data extraction tool. The generated database is expected to facilitate in-depth investigations and enable application of the artificial intelligence (AI) techniques to predict rock quality conditions and design appropriate support systems based on MWD data.

  • 6.
    Abdelraheem, Mohamed Ahmed
    et al.
    SICS Swedish ICT AB, SWE.
    Gehrmann, Christian
    SICS Swedish ICT AB, SWE.
    Lindström, Malin
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Nordahl, Christian
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Executing Boolean queries on an encrypted Bitmap index2016In: CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016, Association for Computing Machinery (ACM), 2016, p. 11-22Conference paper (Refereed)
    Abstract [en]

    We propose a simple and efficient searchable symmetric encryption scheme based on a Bitmap index that evaluates Boolean queries. Our scheme provides a practical solution in settings where communications and computations are very constrained as it offers a suitable trade-off between privacy and performance.

  • 7.
    Abdu, Mohammed
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Integrated Source Code and Architectural Quality Analysis Using Neo4j Graph Database2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the realm of software engineering, understanding the architecture and measuringthe quality of a source code is essential for maintaining and enhancing softwaresystems. However, many existing tools fall short in evaluating architectural aspects,such as detecting architectural erosion or addressing architecture-related metrics andconstraints tailored to the unique context of their systems or organisations. Thisdeficiency restricts proactive architecture governance and hinders the mitigation ofarchitecture-related risks, creating a critical gap in the analysis of software sourcecode.

    This thesis presents a novel approach to tackle these challenges. It proposes a graphdatabase as a data structure for analysing the source code and architecture quality andcalculating various architectural metrics of interest. The tool developed in this thesisrepresents the source code structural elements and their relationships in the graphdatabase, enabling an intuitive analysis of the source code architecture.

    The tool also integrates different code quality metrics parsed from Visual Studiocode metrics results, mapped to their correspondent nodes to assess the source codeoverall quality and identify potential areas of improvement. This empowers softwareengineers and developers to make informed decisions regarding refactoring, codeoptimisation, and architectural enhancements.

    Furthermore, the tool allows users to define the intended architecture in terms ofmodules to reveal any Architecture erosion (AEr). It also provides the flexibility toestablish custom constraints and metrics through tailored queries, accommodating theunique requirements of their system and company.

    A case study conducted on a real-world software project validates the effectivenessand usefulness of the proposed approach. The case study demonstrates how the toolanalysis reveals valuable insights into the source code health and identifies patternsthat can impact maintainability and scalability. The results of this research showcasethe potential of our tool as a powerful instrument for analysing the code qualityand architecture of source code, fostering more resilient and sustainable softwaresystems.

    Download full text (pdf)
    Integrated Source Code and Architectural Quality Analysis Using Neo4j Graph Database
  • 8.
    Abdullah, Nazri
    et al.
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Håkansson, Anne
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
    Moradian, E.
    Blockchain based approach to enhance big data authentication in distributed environment2017In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE Computer Society, 2017, p. 887-892Conference paper (Refereed)
    Abstract [en]

    Existing authentication protocols for Big Data system such as Apache Hadoop is based on Kerberos. In the Kerberos protocol, there are numerous security issues that have remained unsolved; replay attacks, DDoS and single point of failure are some examples. These indicate potential security vulnerabilities and Big Data risks in using Hadoop. This paper presents drawbacks of Kerberos implementations and identifies authentication requirements that can enhance the security of Big Data in distributed environments. The enhancement proposed is based on the rising technology of blockchain that overcomes shortcomings of Kerberos.

  • 9.
    Abdulrazzaq, Mohammed
    et al.
    Halmstad University, School of Information Technology.
    Wei, Yuan
    Halmstad University, School of Information Technology.
    Industrial Control System (ICS) Network Asset Identification and Risk Management2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Setting against the significant background of Industrial 4.0, the Industrial Control System (ICS) accelerates and enriches the upgrade the existing production infrastructure. To make the infrastructures “smart”, huge parts of manual operations have been automated in this upgrade and more importantly, the isolated controlled processes have been connected through ICS. This has also raised the issues in asset management and security concerns. Being the starting point of securing the ICS, the asset identification is, nevertheless, first dealt by exploring the definition of assets in the ICS domain due to insufficient documentation and followed by the introduction of ICS constituents and their statuses in the whole network. When the definition is clear, a well-received categorization of assets in the ICS domain is introduced, while mapping out their important attributes and their significance relating the core of service they perform. To effectively tackle the ever-increasing amount of assets, identification approaches are compared and a case study was performed to test the effectiveness of two open source software. Apart from the identification part, this thesis describes a framework for efficient asset management from CRR. The four cyclic modules proposed give an overview on how the asset management should be managed according the dynamics of the assets in the production environment.

    Download full text (pdf)
    fulltext
  • 10.
    Abghari, Shahrooz
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Boeva, Veselka
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Casalicchio, Emiliano
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Exner, Peter
    Sony R&D Center Lund Laboratory, SWE.
    An Inductive System Monitoring Approach for GNSS Activation2022In: IFIP Advances in Information and Communication Technology / [ed] Maglogiannis, I, Iliadis, L, Macintyre, J, Cortez, P, Springer Science+Business Media B.V., 2022, Vol. 647, p. 437-449Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose a Global Navigation Satellite System (GNSS) component activation model for mobile tracking devices that automatically detects indoor/outdoor environments using the radio signals received from Long-Term Evolution (LTE) base stations. We use an Inductive System Monitoring (ISM) technique to model environmental scenarios captured by a smart tracker via extracting clusters of corresponding value ranges from LTE base stations’ signal strength. The ISM-based model is built by using the tracker’s historical data labeled with GPS coordinates. The built model is further refined by applying it to additional data without GPS location collected by the same device. This procedure allows us to identify the clusters that describe semi-outdoor scenarios. In that way, the model discriminates between two outdoor environmental categories: open outdoor and semi-outdoor. The proposed ISM-based GNSS activation approach is studied and evaluated on a real-world dataset contains radio signal measurements collected by five smart trackers and their geographical location in various environmental scenarios.

  • 11.
    Abiri, Najmeh
    et al.
    Department of Astronomy and Theoretical Physics, Lund University, Lund, Sweden.
    Linse, Björn
    Department of Astronomy and Theoretical Physics, Lund University, Lund, Sweden.
    Edén, Patrik
    Department of Astronomy and Theoretical Physics, Lund University, Lund, Sweden.
    Ohlsson, Mattias
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research. Department of Astronomy and Theoretical Physics, Lund University, Lund, Sweden.
    Establishing strong imputation performance of a denoising autoencoder in a wide range of missing data problems2019In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 65, p. 137-146Article in journal (Refereed)
    Abstract [en]

    Dealing with missing data in data analysis is inevitable. Although powerful imputation methods that address this problem exist, there is still much room for improvement. In this study, we examined single imputation based on deep autoencoders, motivated by the apparent success of deep learning to efficiently extract useful dataset features. We have developed a consistent framework for both training and imputation. Moreover, we benchmarked the results against state-of-the-art imputation methods on different data sizes and characteristics. The work was not limited to the one-type variable dataset; we also imputed missing data with multi-type variables, e.g., a combination of binary, categorical, and continuous attributes. To evaluate the imputation methods, we randomly corrupted the complete data, with varying degrees of corruption, and then compared the imputed and original values. In all experiments, the developed autoencoder obtained the smallest error for all ranges of initial data corruption. © 2019 Elsevier B.V.

  • 12.
    Abrahamsson, Andreas
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.
    Pettersson, Rasmus
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Scientific Computing.
    Smoothing of initial conditions for high order approximations in option pricing2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this article the Finite Difference method is used to solve the Black Scholes equation. A second order and fourth order accurate scheme is implemented in space and evaluated. The scheme is then tried for different initial conditions. First the discontinuous pay off function of a European Call option is used. Due to the nonsmooth charac- teristics of the chosen initial conditions both schemes show an order of two. Next, the analytical solution to the Black Scholes is used when t=T/2. In this case, with a smooth initial condition, the fourth order scheme shows an order of four. Finally, the initial nonsmooth pay off function is modified by smoothing. Also in this case, the fourth order method shows an order of convergence of four. 

    Download full text (pdf)
    fulltext
  • 13.
    Adamov, Alexander
    et al.
    Kharkiv Natl Univ Radio Elect, NioGuard Secur Lab, Kharkov, Kharkiv Oblast, Ukraine..
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    A Sandboxing Method to Protect Cloud Cyberspace2015In: PROCEEDINGS OF 2015 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), IEEE Communications Society, 2015Conference paper (Refereed)
    Abstract [en]

    This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted attacks have been discovered by Kaspersky Lab. One of them - Duqu2 - successfully attacked the Lab itself. In this context, security researchers show rising concern about protecting corporate networks and cloud infrastructure used by large organizations against such type of attacks. This article describes a possibility to apply a sandboxing method within a cloud environment to enforce security perimeter of the cloud.

  • 14.
    Adamovic, Nadja
    et al.
    TU Wien, ISAS, Vienna, Austria..
    Asinari, Pietro
    Politecn Torino, Dept Energy, Turin, Italy..
    Goldbeck, Gerhard
    Goldbeck Consulting Ltd, St Johns Innovat Ctr, Cambridge, England..
    Hashibon, Adham
    Fraunhofer Inst Mech Mat IWM, Freiburg, Germany..
    Hermansson, Kersti
    Uppsala University, Disciplinary Domain of Science and Technology, Chemistry, Department of Chemistry - Ångström, Structural Chemistry.
    Hristova-Bogaerds, Denka
    DPI, Eindhoven, Netherlands..
    Koopmans, Rudolf
    Koopmans Consulting GmbH, Zurich, Switzerland..
    Verbrugge, Tom
    Dow Benelux BV, Hoek, Netherlands..
    Wimmer, Erich
    Mat Design, Le Mans, France..
    European Materials Modelling Council2017In: Proceedings Of The 4Th World Congress On Integrated Computational Materials Engineering (Icme 2017) / [ed] Mason, P Fisher, CR Glamm, R Manuel, MV Schmitz, GJ Singh, AK Strachan, A, Springer Publishing Company, 2017, p. 79-92Conference paper (Refereed)
    Abstract [en]

    The aim of the European Materials Modelling Council (EMMC) is to establish current and forward looking complementary activities necessary to bring the field of materials modelling closer to the demands of manufacturers (both small and large enterprises) in Europe. The ultimate goal is that materials modelling and simulation will become an integral part of product life cycle management in European industry, thereby making a strong contribution to enhance innovation and competitiveness on a global level. Based on intensive efforts in the past two years within the EMMC, which included numerous consultation and networking actions with representatives of all stakeholders including Modellers, Software Owners, Translators and Manufacturers in Europe, the EMMC identified and proposed a set of underpinning and enabling actions to increase the industrial exploitation of materials modelling in Europe. EMMC will pursue the following overarching objectives in order to bridge the gap between academic innovation and industrial application: enhance the interaction and collaboration between all stakeholders engaged in different types of materials modelling, including modellers, software owners, translators and manufacturers, facilitate integrated materials modelling in Europe building on strong and coherent foundations, coordinate and support actors and mechanisms that enable rapid transfer of materials modelling from academic innovation to the end users and potential beneficiaries in industry, achieve greater awareness and uptake of materials modelling in industry, in particular SMEs, elaborate Roadmaps that (i) identify major obstacles to widening the use of materials modelling and (ii) elaborate strategies to overcome them.

  • 15.
    Adewumi, Tosin
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Vadoodi, Roshanak
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Geosciences and Environmental Engineering.
    Tripathy, Aparajita
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Nikolaidou, Konstantina
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Liwicki, Foteini
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Liwicki, Marcus
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Potential Idiomatic Expression (PIE)-English: Corpus for Classes of Idioms2022In: Proceedings of the 13th Language Resources and Evaluation Conference / [ed] Nicoletta Calzolari; Frédéric Béchet; Philippe Blache; Khalid Choukri; Christopher Cieri; Thierry Declerck; Sara Goggi; Hitoshi Isahara; Bente Maegaard; Joseph Mariani; Hélène Mazo; Jan Odijk; Stelios Piperidis, European Language Resources Association (ELRA) , 2022, p. 689-696Conference paper (Refereed)
    Abstract [en]

    We present a fairly large, Potential Idiomatic Expression (PIE) dataset for Natural Language Processing (NLP) in English. The challenges with NLP systems with regards to tasks such as Machine Translation (MT), word sense disambiguation (WSD) and information retrieval make it imperative to have a labelled idioms dataset with classes such as it is in this work. To the best of the authors’ knowledge, this is the first idioms corpus with classes of idioms beyond the literal and the general idioms classification. Inparticular, the following classes are labelled in the dataset: metaphor, simile, euphemism, parallelism, personification, oxymoron, paradox, hyperbole, irony and literal. We obtain an overall inter-annotator agreement (IAA) score, between two independent annotators, of 88.89%. Many past efforts have been limited in the corpus size and classes of samples but this dataset contains over 20,100 samples with almost 1,200 cases of idioms (with their meanings) from 10 classes (or senses). The corpus may also be extended by researchers to meet specific needs. The corpus has part of speech (PoS) tagging from the NLTK library. Classification experiments performed on the corpus to obtain a baseline and comparison among three common models, including the state-of-the-art (SoTA) BERT model, give good results. We also make publicly available the corpus and the relevant codes for working with it for NLP tasks.

  • 16.
    Adomnita, Alexandr
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Balancing walled garden and open platform approaches for the Internet of Things: A case study of Husqvarna Group2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The term “Internet of Things” (IoT) was first introduced by a technology pioneer Kevin Ashton in 1999.Although the term is relatively new, the idea of making networks and computers communicate in order totrack and manage devices has been around for many years. As of now IoT is a rising topic in technicalcommunity. Some specialists are anticipating that by 2025 there will be around 100 billion connected IoTdevices with a worldwide economic impact of more than $11 trillion. On the other hand, Internet of Thingsemerges significant challenges. Currently the organization around world use two main approaches whenentering the IoT market. First one is an open platform and is represented by interoperability andcollaboration with devices from different vendors. Second one is a closed platform, or a “walled garden”approach. A “walled garden” approach is characterized by building “fences” around the user. In other words,the service provider has control over applications, content and media and also restricts the non-approvedcontent to reach the customer. Therefore, the research set out to explore these approaches and show thebenefits and limits they can have on an organization. The research was conducted in collaboration with aSwedish manufacturer of outdoor power products called Husqvarna Group. In order to fully acknowledgethe organization’s approach, 4 interviews were conducted with managers, back end developers andconsultants hired by Husqvarna Group. From the findings, some things should be taken in consideration.First, IoT involves big data being collected, therefore security and privacy are crucial when developingdevices and systems. Second, it is essential for an organization to have the same views when taking a newdirection. Third, when discussing Internet of Things, it means that things connect, devices to sensors,sensor to gateways and gateways to system. And there shouldn’t be a delimitation from a vendor to another.Therefore, open platform approach is seen as the way to diversity and innovation.

    Download full text (pdf)
    fulltext
  • 17.
    Aehle, Max
    et al.
    University of Kaiserslautern-Landau (RPTU), Germany.
    Tung Nguyen, Xuan
    University of Kaiserslautern-Landau (RPTU), Germany; National Institute for Nuclear Physics (INFN), Italy.
    Novák, Mihály
    European Organization for Nuclear Research (CERN), Switzerland/France.
    Dorigo, Tommaso
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab. National Institute for Nuclear Physics (INFN), Italy.
    Gauger, Nicolas R.
    University of Kaiserslautern-Landau (RPTU), Germany.
    Kieseler, Jan
    Karlsruhe Institute of Technology (KIT), Germany.
    Klute, Markus
    Karlsruhe Institute of Technology (KIT), Germany.
    Vassilev, Vassil
    Princeton University, USA.
    Efficient Forward-Mode Algorithmic Derivatives of Geant4Manuscript (preprint) (Other academic)
  • 18.
    af Ugglas, Adam
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Civil and Industrial Engineering, Industrial Engineering and Management.
    Artilleriplattform Amfibie - Tekniska sensorer för självskydd ur ett användarperspektiv: En kvalitativ intervjustudie om användares behov2022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Materiel acquisition for The Swedish Armed Forces (Försvarsmakten) is made by The Swedish Defence Materiel Administration (Försvarets materielverk) and is a rigorous and expensive process. The incentives to produce adequate material for the users are high, but how is the process of producing adequate material for the users best achieved? Theoutcome of these processes is to some extent judged by the satisfaction of the users. So wouldn't it be advantageous toinclude them in the process? By using theories of USCE (User centred systems engineering) and PD (Participatory Design) the purpose of this thesis is to examine future users expressed needs of technical sensors, for a high-speed artillery vessel with an integrated grenade launcher. The thesis also examines how theories and methods of USCEand PD can be applied to find out user needs in specific defined contexts. The study does so by using a series of scenarios presented in text and graphically. The interviewed users were asked to express their needs in relation to specific situations and threats in the scenario. The users’ expressed needs are later translated into a set of possible technical sensors for self-defence of the high-speed artillery vessel. The core idea of USCE is designing with the user in consideration. The core idea of PD is to design with the user, enabling for more valid information to be extractedand put into design. In this case it was done by presenting nine scenarios, where the respondents were asked what they wanted to know and what they wanted to do. In addition to answering questions, they were also encouragedto draw graphic information on the illustrations of the scenario material. This was done to enable transfer of additional knowledge and information from the respondents. The analysis suggests a combination of technical sensors that was found to correspond to the expressed user needs. It was also found that USCE and PD can be used to better identify user needs. However, the methods and activities for doing so can benefit from further studies. The presented combination of technical sensors for self-defence might reflect the expressed needs of users, it is however not necessarily the best solution for this high-speed artillery vessel. The best solution also needs to account for factors like budget and the role of the high-speed artillery vessel in a larger context. The presented sensor solution could be further validated if tested together with potential users. The result of this study might however contribute to more substantiated decisions for the final design of the artillery platform, as well as showing the importance of involving users and carefully chosen activities for doing so.

    Download full text (pdf)
    fulltext
  • 19.
    Afram, Rabi
    Gotland University, School of Game Design, Technology and Learning Processes.
    Puzzle Design in Adventure Games2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates the level of difficulty of puzzles in the adventure games and the implications thereof. The thesis contains an in-depth background, and a brief history about the genre. It brings up the main problem of the genre and looks into both the cause and effect that follows. To support this process, an analysis has been made of design documents and a survey was issued on the subject of adventure game puzzles.

    Download full text (pdf)
    Rabi Afram Puzzle Design In Adventure Games
  • 20.
    AGALOMBA, CHRISTINE AFANDI
    Örebro University, Örebro University School of Business.
    Factors contributing to failure of egovernment projects in developing countries: a literature review2012Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 21.
    Agirre, Jon
    et al.
    Univ York, England.
    Atanasova, Mihaela
    Univ York, England.
    Bagdonas, Haroldas
    Univ York, England.
    Ballard, Charles B.
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Basle, Arnaud
    Newcastle Univ, England.
    Beilsten-Edmands, James
    Diamond Light Source, England.
    Borges, Rafael J.
    Univ Campinas UNICAMP, Brazil.
    Brown, David G.
    Lab Servier SAS Inst Rech, France.
    Burgos-Marmol, J. Javier
    Univ Liverpool, England.
    Berrisford, John M.
    European Mol Biol Lab, England.
    Bond, Paul S.
    Univ York, England.
    Caballero, Iracema
    CSIC, Spain.
    Catapano, Lucrezia
    MRC Lab Mol Biol, England; Kings Coll London, England.
    Chojnowski, Grzegorz
    European Mol Biol Lab, Germany.
    Cook, Atlanta G.
    Univ Edinburgh, Scotland.
    Cowtan, Kevin D.
    Univ York, England.
    Croll, Tristan I.
    Univ Cambridge, England; Altos Labs, England.
    Debreczeni, Judit E.
    AstraZeneca, England.
    Devenish, Nicholas E.
    Diamond Light Source, England.
    Dodson, Eleanor J.
    Univ York, England.
    Drevon, Tarik R.
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Emsley, Paul
    MRC Lab Mol Biol, England.
    Evans, Gwyndaf
    Diamond Light Source, England; Rosalind Franklin Inst, England.
    Evans, Phil R.
    MRC Lab Mol Biol, England.
    Fando, Maria
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Foadi, James
    Univ Bath, England.
    Fuentes-Montero, Luis
    Diamond Light Source, England.
    Garman, Elspeth F.
    Univ Oxford, England.
    Gerstel, Markus
    Diamond Light Source, England.
    Gildea, Richard J.
    Diamond Light Source, England.
    Hatti, Kaushik
    Univ Cambridge, England.
    Hekkelman, Maarten L.
    Netherlands Canc Inst, Netherlands; Netherlands Canc Inst, Netherlands.
    Heuser, Philipp
    DESY, Germany.
    Hoh, Soon Wen
    Univ York, England.
    Hough, Michael A.
    Diamond Light Source, England; Univ Essex, England.
    Jenkins, Huw T.
    Univ York, England.
    Jimenez, Elisabet
    CSIC, Spain.
    Joosten, Robbie P.
    Netherlands Canc Inst, Netherlands; Netherlands Canc Inst, Netherlands.
    Keegan, Ronan M.
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England; Univ Liverpool, England.
    Keep, Nicholas
    Birkbeck Coll, England.
    Krissinel, Eugene B.
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Kolenko, Petr
    Czech Tech Univ, Czech Republic; Czech Acad Sci, Czech Republic.
    Kovalevskiy, Oleg
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Lamzin, Victor S.
    European Mol Biol Lab, Germany.
    Lawson, David M.
    John Innes Ctr, England.
    Lebedev, Andrey A.
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Leslie, Andrew G. W.
    MRC Lab Mol Biol, England.
    Lohkamp, Bernhard
    Karolinska Inst, Sweden.
    Long, Fei
    MRC Lab Mol Biol, England.
    Maly, Martin
    Czech Tech Univ, Czech Republic; Czech Acad Sci, Czech Republic; Univ Southampton, England.
    McCoy, Airlie J.
    Univ Cambridge, England.
    McNicholas, Stuart J.
    Univ York, England.
    Medina, Ana
    CSIC, Spain.
    Millan, Claudia
    Univ Cambridge, England.
    Murray, James W.
    Imperial Coll London, England.
    Murshudov, Garib N.
    MRC Lab Mol Biol, England.
    Nicholls, Robert A.
    MRC Lab Mol Biol, England.
    Noble, Martin E. M.
    Newcastle Univ, England.
    Oeffner, Robert
    Univ Cambridge, England.
    Pannu, Navraj S.
    Leiden Univ, Netherlands.
    Parkhurst, James M.
    Diamond Light Source, England; Rosalind Franklin Inst, England.
    Pearce, Nicholas
    Linköping University, Department of Physics, Chemistry and Biology, Bioinformatics. Linköping University, Faculty of Science & Engineering.
    Pereira, Joana
    Univ Basel, Switzerland; Univ Basel, Switzerland.
    Perrakis, Anastassis
    Netherlands Canc Inst, Netherlands; Netherlands Canc Inst, Netherlands.
    Powell, Harold R.
    Imperial Coll London, England.
    Read, Randy J.
    Univ Cambridge, England.
    Rigden, Daniel J.
    Univ Liverpool, England.
    Rochira, William
    Univ York, England.
    Sammito, Massimo
    Univ Cambridge, England; AstraZeneca, England.
    Rodriguez, Filomeno Sanchez
    Univ York, England; Diamond Light Source, England; Univ Liverpool, England.
    Sheldrick, George M.
    Georg August Univ Gottingen, Germany.
    Shelley, Kathryn L.
    Univ Washington, WA 98195 USA.
    Simkovic, Felix
    Univ Liverpool, England.
    Simpkin, Adam J.
    Lab Servier SAS Inst Rech, France.
    Skubak, Pavol
    Leiden Univ, Netherlands.
    Sobolev, Egor
    DESY, Germany.
    Steiner, Roberto A.
    European Mol Biol Lab, England; Univ Padua, Italy.
    Stevenson, Kyle
    Rutherford Appleton Lab, England.
    Tews, Ivo
    Univ Southampton, England.
    Thomas, Jens M. H.
    Univ Liverpool, England.
    Thorn, Andrea
    Univ Hamburg, Germany.
    Trivino Valls, Josep
    CSIC, Spain.
    Uski, Ville
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Uson, Isabel
    CSIC, Spain; ICREA, Spain.
    Vagin, Alexei
    Univ York, England.
    Velankar, Sameer
    European Mol Biol Lab, England.
    Vollmar, Melanie
    European Mol Biol Lab, England.
    Walden, Helen
    Univ Glasgow, Scotland.
    Waterman, David
    Rutherford Appleton Lab, England; Rutherford Appleton Lab, England.
    Wilson, Keith S.
    Univ York, England.
    Winn, Martyn D.
    Sci & Technol Facil Council, England.
    Winter, Graeme
    Diamond Light Source, England.
    Wojdyr, Marcin
    Global Phasing Ltd, England.
    Yamashita, Keitaro
    MRC Lab Mol Biol, England.
    The CCP4 suite: integrative software for macromolecular crystallography2023In: Acta Crystallographica Section D: Structural Biology , E-ISSN 2059-7983, Vol. 79, p. 449-461Article in journal (Refereed)
    Abstract [en]

    The Collaborative Computational Project No. 4 (CCP4) is a UK-led international collective with a mission to develop, test, distribute and promote software for macromolecular crystallography. The CCP4 suite is a multiplatform collection of programs brought together by familiar execution routines, a set of common libraries and graphical interfaces. The CCP4 suite has experienced several considerable changes since its last reference article, involving new infrastructure, original programs and graphical interfaces. This article, which is intended as a general literature citation for the use of the CCP4 software suite in structure determination, will guide the reader through such transformations, offering a general overview of the new features and outlining future developments. As such, it aims to highlight the individual programs that comprise the suite and to provide the latest references to them for perusal by crystallographers around the world.

    Download full text (pdf)
    fulltext
  • 22.
    Agnesson, Daniel
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Önder, Necip Yener
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Customer Maturity Analysis Tool: A case study in designing a Customer MaturityAnalysis Tool2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The IT consultancy industry is characterized by knowledge intensive implementationprojects related to varying levels of standardized information system software. When faced with a large implementation project at a previously unknown customer various assessmentsis usually conducted to identify the level of fit between the software and organizationin order to plan and structure the implementation process. However, there are several aspects of the customer organization that potentially can affect the end result as well as the implementation process that is unrelated to the fit between the software and the implementation organization as well as the potency of the implementation method. By conducting measurements of these maturity factors within the customer organization the implementing procedure can be modified based on the customer maturity level in order to become more aligned with the capabilities present in the customer organization.

    Research question: Which aspects need to be covered by a Customer Maturity Analysis Tool (CMAT) in order to evaluate the pre implementation maturity for potential customersof our case company and how should these aspects be organized and measured? The first task of the research process was to create an underlying model of maturity perspectives and aspects to structure the literature review as well as the empirical data collection. It was decided to adhere to a deductive approach where the theoretical model would be validated and if necessary modified in accordance to feedback from potential users of the CMAT within the case company. This procedure was repeated in the creation of measurements and maturity levels for the aspects to be used in the tool. The research process would therefore transition from a general model based on literature review, through a iterative feedback loop to a final model tailored to the specific requirementsof the case company. The final CMAT ended up containing four main perspectives of customer maturity; ITi nfrastructure, Culture, Process and Business Governance. These four perspectives were in turn divided into subgroups in order to be able to aggregate and compare differentaspects of the perspectives with each other.

    Download full text (pdf)
    FULLTEXT01
  • 23.
    Agües Paszkowsky, Núria
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Data Analysis of Earth Observation Data from Copernicus Satellites2020Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Open Data Cubes are platforms that contain open source satellite data and provide analysis tools for governments or organizations. The Swedish version is known as Swedish Space Data Lab (SSDL) and this master thesis was a part of it, providing the first analysis tools of the SSDL. Within a smaller project in the SSDL a drought analysis was done for the region of Mälardalen. The thesis work consisted on developing data analysis methods using packages for machine learning and statistical analysis in Python and Jupyter Notebooks. The drought analysis consisted of a two-year comparison between 2018 and 2019 due to limitations on the data availability. It was found that first year was drier than the second. However, longer time series would be needed in order to observe trends related to possible changes in the climate.

    Download full text (pdf)
    fulltext
  • 24.
    Ahlbäck, Sven
    Royal College of Music in Stockholm, Department of Folk Music. Kungliga Musikhögskolan, Stockholm.
    Computational Pronunciation Analysis in Sung Utterances2021Conference paper (Refereed)
  • 25.
    Ahlbäck, Sven
    Royal College of Music in Stockholm, Department of Folk Music. Kungliga Musikhögskolan, Stockholm.
    Low Resource Audio-To-Lyrics Alignment from Polyphonic Music Recordings2021In: ICASSP 2021 -21021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE conference proceedings, 2021Conference paper (Refereed)
  • 26.
    Ahlbäck, Sven
    Royal College of Music in Stockholm, Department of Folk Music. Kungliga Musikhögskolan, Stockholm.
    MSTRE-Net: Multistreaming Acoustic Modeling for Automatic Lyrics Transcription2021Conference paper (Refereed)
    Abstract [en]

    This paper makes several contributions to automatic lyrics transcription (ALT) research. Our main contribution is a novel variant of the Multistreaming Time-Delay Neural Network (MTDNN) architecture, called MSTRE-Net, which processes the temporal information using multiple streams in parallel with varying resolutions keeping the network more compact, and thus with a faster inference and an improved recognition rate than having identical TDNN streams. In addition, two novel preprocessing steps prior to training the acoustic model are proposed. First, we suggest using recordings from both monophonic and polyphonic domains during training the acoustic model. Second, we tag monophonic and polyphonic recordings with distinct labels for discriminating non-vocal silence and music instances during alignment. Moreover, we present a new test set with a considerably larger size and a higher musical variability compared to the existing datasets used in ALT literature, while maintaining the gender balance of the singers. Our best performing model sets the state-of-the-art in lyrics transcription by a large margin. For reproducibility, we publicly share the identifiers to retrieve the data used in this paper.

  • 27.
    Ahlbäck, Sven
    Royal College of Music in Stockholm, Department of Folk Music. Kungliga Musikhögskolan, Stockholm.
    Pitch-Informed Instrument Assignment using a Deep Convolutional Network with Multiple Kernel Shapes2021Conference paper (Refereed)
    Abstract [en]

    This paper proposes a deep convolutional neural network for performing note-level instrument assignment. Given a polyphonic multi-instrumental music signal along with its ground truth or predicted notes, the objective is to assign an instrumental source for each note. This problem is addressed as a pitch-informed classification task where each note is analysed individually. We also propose to utilise several kernel shapes in the convolutional layers in order to facilitate learning of timbre-discriminative feature maps. Experiments on the MusicNet dataset using 7 instrument classes show that our approach is able to achieve an average F-score of 0.904 when the original multi-pitch annotations are used as the pitch information for the system, and that it also excels if the note information is provided using third-party multi-pitch estimation algorithms. We also include ablation studies investigating the effects of the use of multiple kernel shapes and comparing different input representations for the audio and the note-related information.

  • 28.
    Ahlgren, Per
    et al.
    Department of Statistics, Uppsala University, Uppsala (Sweden).
    Chen, Yunwei
    Scientometrics & Evaluation Research Center (SERC), Chengdu Library and Information Center of Chinese Academy of Sciences, Chengdu, 610041 (China).
    Colliander, Cristian
    Umeå University, Faculty of Social Sciences, Department of Sociology. Umeå University, Umeå University Library.
    Jan van Eck, Nees
    Centre for Science and Technology Studies, Leiden University (The Netherlands).
    Enhancing Direct Citations: A Comparison of Relatedness Measures for Community Detection in a Large Set of PubMed Publications2020In: Quantitative Science Studies, E-ISSN 2641-3337, Vol. 1, no 2, p. 1-20Article in journal (Refereed)
    Abstract [en]

    In this contribution, the effects of enhancing direct citations, with respect to publication-publication relatedness measurement, by indirect citation relations (bibliographic coupling, co-citation, and extended direct citations) and text relations on clustering solution accuracy are analyzed. We include in the study, for comparison reasons, each approach that is involved in the enhancement of direct citations. In total, we investigate the relative performance of seven approaches. For the evaluation of the approaches, we use a methodology proposed by earlier research. However, the used evaluation criterion is based on MeSH, one of the most sophisticated publication-level classification schemes available. We also introduce an approach, based on interpolated accuracy values, by which overall relative clustering solution accuracy can be studied. The results show that the co-citation approach has the worst performance, and that the direct citations approach is outperformed by the other five investigated approaches. The extended direct citations approach has the best performance, followed by an approach in which direct citations are enhanced by the BM25 textual relatedness measure. An approach that combines direct citations with bibliographic coupling and co-citation performs slightly better than the bibliographic coupling approach, which in turn has a better performance than the BM25 approach.

    Download full text (pdf)
    fulltext
  • 29.
    Ahlgren, Per
    et al.
    KTH, Library, Bibliometrics.
    Colliander, C.
    Sjögårde, Peter
    KTH, School of Education and Communication in Engineering Science (ECE). Department of ALM, Uppsala University, Uppsala, Sweden.
    Exploring the relation between referencing practices and citation impact: A large-scale study based on Web of Science data2018In: Journal of the Association for Information Science and Technology, ISSN 2330-1635, E-ISSN 2330-1643, Vol. 69, no 5, p. 728-743Article in journal (Refereed)
    Abstract [en]

    In this large-scale contribution, we deal with the relationship between properties of cited references of Web of Science articles and the field normalized citation rate of these articles. Using nearly 1 million articles, and three classification systems with different levels of granularity, we study the effects of number of cited references, share of references covered by Web of Science, mean age of references and mean citation rate of references on field normalized citation rate. To expose the relationship between the predictor variables and the response variable, we use quantile regression. We found that a higher number of references, a higher share of references to publications within Web of Science and references to more recent publications correlate with citation impact. A correlation was observed even when normalization was done with a finely grained classification system. The predictor variables affected citation impact to a larger extent at higher quantile levels. Regarding the relative importance of the predictor variables, citation impact of the cited references was in general the least important variable. Number of cited references carried most of the importance for both low and medium quantile levels, but this importance was lessened at the highest considered level.

  • 30.
    Ahlgren, Per
    et al.
    Department of e-Resources, University Library, Stockholm University.
    Colliander, Cristian
    Umeå University, Faculty of Social Sciences, Department of Sociology.
    Persson, Olle
    Umeå University, Faculty of Social Sciences, Department of Sociology.
    Field normalized citation rates, field normalized journal impact and Norwegian weights for allocation of university research funds2012In: Scientometrics, ISSN 0138-9130, E-ISSN 1588-2861, Vol. 92, no 2, p. 767-780Article in journal (Refereed)
    Abstract [en]

    We compared three different bibliometric evaluation approaches: two citationbased approaches and one based on manual classification of publishing channels into quality levels. Publication data for two universities was used, and we worked with two levels of analysis: article and department. For the article level, we investigated the predictive power of field normalized citation rates and field normalized journal impact with respect to journal level. The results for the article level show that evaluation of journals based on citation impact correlate rather well with manual classification of journals into quality levels. However, the prediction from field normalized citation rates to journal level was only marginally better than random guessing. At the department level, we studied three different indicators in the context of research fund allocation within universities and the extent to which the three indicators produce different distributions of research funds. It turned out that the three distributions of relative indicator values were very similar, which in turn yields that the corresponding distributions of hypothetical research funds would be very similar.

  • 31.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Tutschku, Kurt
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Privacy and trust in cloud-based marketplaces for AI and data resources2017In: IFIP Advances in Information and Communication Technology, Springer New York LLC , 2017, Vol. 505, p. 223-225Conference paper (Refereed)
    Abstract [en]

    The processing of the huge amounts of information from the Internet of Things (IoT) has become challenging. Artificial Intelligence (AI) techniques have been developed to handle this task efficiently. However, they require annotated data sets for training, while manual preprocessing of the data sets is costly. The H2020 project “Bonseyes” has suggested a “Market Place for AI”, where the stakeholders can engage trustfully in business around AI resources and data sets. The MP permits trading of resources that have high privacy requirements (e.g. data sets containing patient medical information) as well as ones with low requirements (e.g. fuel consumption of cars) for the sake of its generality. In this abstract we review trust and privacy definitions and provide a first requirement analysis for them with regards to Cloud-based Market Places (CMPs). The comparison of definitions and requirements allows for the identification of the research gap that will be addressed by the main authors PhD project. © IFIP International Federation for Information Processing 2017.

  • 32.
    Ahmed Farah, Mariam
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A study on the acquisition of ICT literacy skills among Swedish immigrants with low ICT literacy skills2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Background: Sweden is getting digitalized rapidly, which puts a higher requirement on those who move to Sweden. The ability to adapt and handle different digital solutions is a determining factor in one's ability to exercise life choices fully, as well as being able to access public service and information. Citizens’ digital competencies are a key factor in the structural digital transformation that can occur. Problem: An area that has not been as well studied is immigrants’ acquisition of ICT skills, who do not have high ICT skills while using observation as a data collection method. There is a gap in this research area in locating problems they face when they acquire ICT skills. Research question: What problems do Swedish immigrants with low ICT literacy skills face when they acquire ICT skills? Method and sample: This thesis’s chosen research strategy was a case study executed in a municipality that offers ICT classes to its citizens who need to acquire ICT skills. The chosen methods to collect data were observation and semi-structured interviews, where two observations and eight interviews were performed, and thematic analysis was applied to the data. The participants were individuals who migrated to Sweden and lived in the chosen municipality, who also were partaking in different municipality initiatives and had limited digital skills. This study was limited to a municipality in Stockholm County. Results: Four themes emerged from the collected data. The first theme is course structure-how to develop skills, which describes how the course structure incorporates the basics of different Microsoft programs and physical computer trade words. The Swedish language would be embedded in the ICT exercise, and the students would practise and get more accustomed to using the keyboard and typing. The second theme, limited ICT experience and technology challenges, has shown that those students with formal education up to primary school and those students with minimum primary and up to secondary education i.e. both classes, were at the same low ICT skills level despite different educational background. They were not exposed to computer lessons and if they were exposed, they were not required to learn ICT skills. The third theme, language barrier -adaptation to technology, elements that have emerged were the extent to which Google Translate was used by the students. Some students would start to write on their phones in their native language and then write the translated text on the document. The teacher would also teach the students how to change language settings in programs to their native language so that language would not hinder them from using the program. The fourth and final theme, motivation for learning, shows a thirst and need to learn more ICT skills among the students in both classes, and according to them, they are required to have a certain digital skill level if they want to live and work in Sweden. There is a need to be more independent in their day-to-day life, as most interactions with the Swedish government are on ICT platforms and other aspects of daily life. This is also reflected in the course curriculum that was observed in EC and sfi classes. Conclusions: The challenges experienced by Swedish immigrants with low ICT skills were starting off with low ICT skills and learning ICT in a new foreign language. Also, the lack of ICT skills and language hinders their ability to be independent and confident when learning. Instead, they require confirmation from their teachers because they do not want to make a mistake. The lessons offered to them are limited in time, and they lack the opportunity and time to practice and learn ICT skills at home on their own. They need more resources to acquire the skills effectively.

  • 33.
    Ahmed, Salim Saif Saeed
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Identify the driving behaviour in a parking lot in terms of distance.2018Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Parking a vehicle can often lead to frustration, air pollution and congestion due to limited availability of parking spaces. With increasing population density this problem can certainly increase unless addressed. Parking lots occupy large areas of scarce land resource therefore it is necessary to identify the driving behaviour in a parking lot to improve it further. This Paper tries study the driving behaviour in the parking lot and for this endeavours it conducted direct observation in three parking lots and used GPS data that was collected prior to this study by the University of Dalarna.

    To evaluate the driving behaviour in the parking lot direct observation was conducted to obtain overall indices of the parking lot vehicles movement. The parking route taken by the driver was compared with the optimal path to identify the driving behaviour in parking lot in terms of distance. The collected data was evaluated, filtered and analysed to identify the route, the distance and the time the vehicle takes to find a parking space.

    The outcome of the study shows that driving behaviour in the parking lots varies significantly among the parking user where most of the observed vehicles took unnecessary long time to complete their parking. The study shows that 56% of the 430 observed vehicles demonstrated inefficient driving behaviour as they took long driving path rather the than the optimal path. The study trace this behaviour to two factors, first, the absent of parking guidance in the parking lots and the second is the selectivity of the drivers when choosing the parking space.

    The study also shows that the ability of GPS data to identify the driving behaviour in the parking lots varies based on the time interval and the type of the device that is being used. The small the time interval the more accurate the GPS data in detecting the driving behaviour in the parking lots.

    Download full text (pdf)
    fulltext
  • 34.
    Ahokas, Jakob
    et al.
    Linköping University, Department of Computer and Information Science.
    Persson, Jonathan
    Linköping University, Department of Computer and Information Science.
    Formal security verification of the Drone Remote Identification Protocol using Tamarin2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. To fully ensurethat the protocol is secure before real world implementation, we conduct a formal verification using the Tamarin Prover tool, with the goal of detecting possible vulnerabilities. Theunderlying technologies of the protocol are studied and important aspects are identified.The main contribution of this thesis is the formal verification of session key secrecy andmessage authenticity within the proposed protocol. Certain aspects of protocol securityare still missing from the scripts, but the protocol is deemed secure to the extent of themodel. Many features of both the protocol and Tamarin Prover are presented in detail,serving as a potential base for the continued work toward a complete formal verificationof the protocol in the future.

    Download full text (pdf)
    fulltext
  • 35.
    Ajuzie, Peter
    University of Skövde, School of Informatics.
    Utilization of information and communication technology and educational games in senior secondary schools in Owerri, Imo state Nigeria: Challenges and prospects2016Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Use of information and communication technology in formal education settings is a fundamental issue in management of education across the globe. But in Africa the issues takes a different turn as it regards to how to apply and utilize technology in education. Facility and technology experts have been on debate across board as the literature implies. Thus, understanding the digital native factors behind individuals’ application and utilization is central to the development of ICT in Nigeria and Africa in general. The main goal of this thesis was to explore factors influencing effective utilization of computer and ICT (Computer laboratories) in the secondary school level. However, in the literature the thesis identify issues affecting utilization of computer and ICT facilities in Sub-Sahara Africa (SSA), Nigeria and secondary schools (SS). The thesis proposed the use of educational games to drive the concept of utilization of computer and ICT facilities in the educational sector. In addition to the main goal of the thesis, use of computer and ICT facilities in secondary schools are explored alongside teachers and students interest in educational games. Qualitative interviews and a questionnaire survey were used in conduct of the study. Thematic and descriptive analysis was used to analyze the qualitative and quantitative data respectively.

    The results indicate that computer and ICT facilities (Computer laboratories) were poorly utilized by teachers and students due to lack of funds, poor infrastructure and technology knowledge. The results also demonstrate that teachers and students have knowledge about educational games and are willing to apply it in teaching and learning. But the issues of application of educational games into the mainstream could be hindered by Government curriculum policy and infrastructural facilities. The study indicates the relevance of applying educational games in secondary schools to reduce the level of digital divide among graduates. This thesis further argues that the inclusion of educational games would encourage teachers and students to effectively utilization of computer and ICT Facilities (Computer laboratory).

    Download full text (pdf)
    fulltext
  • 36.
    Ajvazaj, Albina
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Påverkande faktorer på internkommunikation: En fallstudie på en offentlig verksamhet2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 37.
    Akram, Muhammad Zain
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science.
    User Preference-Based Evaluation of Counterfactual Explanation Methods2023Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Explainable AI (XAI) has grown as an important field over the years. As more complicated AI systems are utilised in decision-making situations, the necessity for explanations for such systems is also increasing in order to ensure transparency and stakeholder trust. This study focuses on a specific type of explanation method, namely counterfactual explanations. Counterfactual explanations provide feedback that outlines what changes should be made to the input to reach a different outcome. This study expands on a previous dissertation in which a proof-of-concept tool was created for comparing several counterfactual explanation methods. This thesis investigates the properties of counterfactual explanation methods along with some appropriate metrics. The identified metrics are then used to evaluate and compare the desirable properties of the counterfactual approaches. The proof-of-concept tool is extended with a properties-metrics mapping module, and a user preference-based system is developed, allowing users to evaluate different counterfactual approaches depending on their preferences. This addition to the proof-of-concept tool is a critical step in providing field researchers with a standardised benchmarking tool.

    Download full text (pdf)
    fulltext
  • 38.
    Aksit, Kaan
    et al.
    Koç University, Turkey.
    Kade, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Özcan, Oguzhan
    Koç University, Turkey.
    Ürey, Hakan
    Koç University, Turkey.
    Head-worn Mixed Reality Projection Display Application2014In: ACM International Conference Proceedings Series (ICPS), 2014Conference paper (Refereed)
    Abstract [en]

    The main goal of this research is to develop a mixed real- ity (MR) application to support motion capture actors. This application allows seeing and exploring a digital environment without occluding the actor’s visual field. A prototype is built by combining a retro-reflective screen covering surrounding walls and a headband consisting of a laser scanning projector with a smartphone. Built-in sensors of a smartphone provide navigation capabilities in the digital world. The integrated system has some unique advantages, which are collectively demonstrated for the first time: (i) providing fixed field-of- view (50o in diagonal), fixed retinal images at full-resolution, and distortion-free images that are independent of the screen distance and shape; (ii) presenting different perspectives to the users as they move around or tilt their heads, (iii) allow- ing a focus-free and calibration-free display even on non-flat surfaces using laser scanning technology, (iv) enabling mul- tiple users to share the same screen without crosstalk due to the use of retro-reflectors, and (v) producing high brightness pictures with a projector of only 15 lm; due to a high-gain retro-reflective screen. We demonstrated a lightweight, com- fortable to wear and low cost head-mounted projection dis- play (HMPD) which acts as a stand-a-lone mobile system. Initial informal functionality tests have been successfully per- formed. The prototype can also be used as a 3D stereo system using the same hardware by additionally mounting polarized glasses and an active polarization rotator, while maintaining all of the advantages listed above. 

  • 39.
    Al Rahis, Anas
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Osman, Osman
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Improving Occupant’s sleep quality with the help of OURA ring and data from Smart Buildings2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Well-being is associated with comfort and health, and it represents wellness and quality of life. Sleep quality is an important index when evaluating a person’s well-being. KTH Live-in-lab performs Human-building interaction studies to explore the growing potential of how built environments, measured by Schneider Electric (SE), can influence humans and their well-being in their everyday lives. This thesis works as an explorative study of using the OURA ring to evaluate sleep quality for tenants living in KTH LiL. Specifically, this project aims to assess the quality of the data collected from the ring and SE sensors by using Total Data Quality Management (TDQM) and propose a Multilayer perceptron (MLP) model for predicting sleep scores. Results first showed that the OURA ring is an appropriate tool for evaluating sleep quality. Its data passed 11 TDQM’s dimensions, including accuracy, objectivity, relevancy, interpretability and understandability. Second, the OURA was able to capture the relationship between sleep quality and building’s temperature and humidity through its sleep scores. Results showed that higher sleep scores situated more around the suggested ideal ranges of temperature and humidity. However, some low sleep scores were also situated around these ideal ranges which suggests that an additional study needs to be conducted. Such a study would take in tenants’ feedback in order to distinguish sleep scores heavily affected by psychological and/or other factors rather than built environments. Third, we were able to create an MLP model to predict sleep scores based on temperature and humidity values as well as user-related information, like activity rate and total burn. The model had validation and training losses converging at 1.90-2.50. Those low loss rates suggest that the building's temperature and humidity along with information about tenants from the ring can be used to improve the sleep scores. This model can be extended into a recommendation model where buildings’ operators and tenants can benefit from. Buildings’ operators would get information and recommendations on how to properly administer their buildings to achieve higher well-being for their tenants. Also, tenants would get recommendations on how to increase their sleep scores and, ultimately, their sleep qualities and well-being. 

    Download full text (pdf)
    fulltext
  • 40. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    De Martino, Monica
    Demšar, Urška
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Hauska, Hans
    KTH, School of Architecture and the Built Environment (ABE), Urban Planning and Environment, Geoinformatics.
    Visual and Automatic Data Mining for Exploration of Geographical MetadataManuscript (Other academic)
  • 41. Albertoni, Riccardo
    et al.
    Bertone, Alessio
    Demšar, Urška
    KTH, Superseded Departments (pre-2005), Infrastructure.
    De Martino, Monica
    Hauska, Hans
    KTH, Superseded Departments (pre-2005), Infrastructure.
    Knowledge Extraction by Visual Data Mining of Metadata in Site PlanningManuscript (Other academic)
    Abstract [en]

    The paper describes a tool designed within the first stage of the European project INVISIP in order to explore geographical metadata in the site planning process. A visual data mining approach is applied to a database of geographical metadata to help the user find an optimal subset of the existing geographical datasets for his particular planning task. It allows the user to perform both confirmative and explorative analysis. The approach is implemented in the Visual Data Mining tool, which integrates different types of visualisations with various interaction functionalities. It includes the interactive communication with the user and the brushing and linking process between different visualisations. The paper also presents an example of an application on a test metadatabase which was created for this purpose.

  • 42.
    Albertsson, Marcus
    et al.
    Linköping University, Department of Computer and Information Science.
    Öberg Bustad, Adrian
    Linköping University, Department of Computer and Information Science.
    Sundmark, Mattias
    Linköping University, Department of Computer and Information Science.
    Gerde, Elof
    Linköping University, Department of Computer and Information Science.
    Boberg, Jessika
    Linköping University, Department of Computer and Information Science.
    Abdulla, Ariyan
    Linköping University, Department of Computer and Information Science.
    Danielsson, Oscar
    Linköping University, Department of Computer and Information Science.
    Johnsson Bittmann, Felicia
    Linköping University, Department of Computer and Information Science.
    Moberg, Anton
    Linköping University, Department of Computer and Information Science.
    Hur en webbapplikation kan utvecklas för att leverera säkerhet, handlingsbarhet och navigerbarhet: PimpaOvven – Utveckling av en e-butik för märken och accessoarer till studentoveraller2017Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [en]

    Among students in many of Sweden’s Universities the student overall is an established possession. Many students like to decorate their overalls with embroidered patches and other types of accessories, the supply of these is however limited. This report presents the development process and result of the web application “PimpaOvven” – an e-shop with the purpose of increasing the accessibility of patches and overall accessories. The development has been iterative and focused on building a secure web application that generates a useable environment regarding actability and navigability that also provides an impression of security to the user. The methods used which generated the resulting web application together with the reference framework form the basis of the report’s discussion. During the project plenty of usability tests and security tests were conducted, from these tests together with the report’s discussion the conclusion was drawn that the produced web application was secure and useable.

    Download full text (pdf)
    Kandidatarbete TDDD83 PimpaOvven
  • 43.
    Al-Dabbagh, Mustafa
    Örebro University, Swedish Business School at Örebro University.
    Electronic Government in Iraq: Challenges of development and implementation2011Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 44.
    Alemayehu, Brook
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Systems and Control.
    Johnsons, Fredrik
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Systems and Control.
    Maskininlärning inom kommersiella fastigheter: Prediktion av framtida hyresvakanser2018Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The purpose of this thesis is to investigate the possibilities of predicting vacancies in the real estate market by using machine learning models in terms of classification. These models were mainly based on data from contracts between a Swedish real estate company and their tenants. Attributes such as annual renting cost and rental area for each contract were supplemented with additional data regarding financial and geographical information about the tenants. The data was stored in three different formats with the first having binary classes which aim is to predict if the tenant is moving out within a year or more. The format of the second and third version were both multi classification problems that aims to classify if the tenants might terminate their contract within a specific interval with the length of three and six months.

    Based on the results from Microsoft Azure Machine Learning Studio, it is discovered that the multi classification problems perform rather poorly due to the classes being unbalanced. Regarding the  performance of the binary model, a more satisfying result was obtained but not to the extend to say that the model can be used to determine a vacancy with high accuracy. It should rather be used as a risk analysis tool to detect if a tenant is showing tendencies that could result in a future vacancy. A major pitfall of this thesis was the lack of data and the financial information not being specific enough. The performance of the models will likely increase with a larger dataset and more accurate financial information. 

    Download full text (pdf)
    fulltext
  • 45.
    Alenbring, Cornelia
    Mälardalen University, School of Innovation, Design and Engineering.
    In the search of the student's role in innovation ecosystems2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Abstract 

    Level: Master thesis in Innovation and design , 30 credits

    Institution: School of Innovation, Design and Technology, Mälardalen University

    Author: Cornelia Alenbring (98/05/24)  

    Title: In the search of the student's role in innovation ecosystems

    Supervisors: Anders Vikström, Erik Bjurström

    MDU examinator:Yvonne Eriksson

    Keywords: “ecosystems for innovation”, “eco systems for social innovation”, “social innovation ecosystems”, “quadruple helix” “students- innovation ecosystem” “students role in innovation ecosystems”

    Purpose: The purpose of this study is to explore the specific role of students in innovation ecosystems. By gaining a deeper understanding of their role, this research aims to contribute to a more nuanced micro-dynamic perspective on the role of students in innovation ecosystems. This thesis explores conceptualizations and metaphors of innovation ecosystems with the aim of exploring different theorizing in the field, related to the role of students within those. 

    Research question: What is the role of students in innovation ecosystems?

    Method: The study was based on a qualitative method. The empirical data was collected through semi-structured interviews and observations using focus groups with 5 actors within the public, academia, industry and civil society.

    Conclusion: The role of the student is at the heart of the innovation ecosystem metaphor - that of emergence and co-evolution. Rather, the empirical evidence of this thesis concurs that the roles available to students also depend on other actors taking them seriously, and that the reasons for less than optimal exchange between students and other actors deserves further investigation.  It is an interesting observation that students fall between the system perspective’s grand theorizing and pedagogics’ narrower focus on education: - So what is the point of pursuing a research approach where either students or ecosystems are not mentioned? There is an obvious gap in where the abstract level of the system perspective, whilst it can serve as an overview of the concept,  does not specify actors and misses to provide a micro perspective on what is occurring between actors, that could explain how it all happens. Are students rather representatives of the civil society, or of what Powell referred to ‘amphibians’, or representative of nothing but themselves as individuals-in-the-making, as a representative of becoming itself and emergence in itself – through their interaction on a campus which they don’t own, but inhabit? And what do companies really want when they want to be a campus? What is special about a campus and life on a campus? What is the very essence of it? 

    Download full text (pdf)
    In the search of the student's role in innovation ecosystems
  • 46.
    Alendal, Gunnar
    et al.
    Norwegian University of Science and Technology, Gjovik, Norway.
    Axelsson, Stefan
    Norwegian University of Science and Technology, Gjovik, Norway.
    Dyrkolbotn, Geir Olav
    Norwegian University of Science and Technology, Gjovik, Norway.
    Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol2019In: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / [ed] Gilbert Peterson & Sujeet Shenoi, Cham: Springer, 2019, p. 101-118Conference paper (Refereed)
    Abstract [en]

    The USB Power Delivery protocol enables USB-connected devices to negotiate power delivery and exchange data over a single connection such as a USB Type-C cable. The protocol incorporates standard commands; however, it also enables vendors to add non-standard commands called vendor-defined messages. These messages are similar to the vendor-specific commands in the SCSI protocol, which enable vendors to specify undocumented commands to implement functionality that meets their needs. Such commands can be employed to enable firmware updates, memory dumps and even backdoors.

    This chapter analyzes vendor-defined message support in devices that employ the USB Power Delivery protocol, the ultimate goal being to identify messages that could be leveraged in digital forensic investigations to acquire data stored in the devices.

    © IFIP International Federation for Information Processing 2019

  • 47.
    Alendal, Gunnar
    et al.
    NTNU, Norge.
    Axelsson, Stefan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Dyrkolbotn, Geir Olav
    NTNU, Norge.
    LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION2021In: Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / [ed] Gilbert Peterson; Sujeet Shenoi, Springer Nature , 2021, p. 111-133Chapter in book (Refereed)
    Abstract [en]

    Modern consumer devices present major challenges in digital forensic investigations due to security mechanisms that protect user data. The entire physical attack surface of a seized device such as a mobile phone must be considered in an effort to acquire data of forensic value. Several USB protocols have been introduced in recent years, including Power Delivery, which enables negotiations of power delivery to or from attached devices. A key feature is that the protocol is handled by dedicated hardware that is beyond the control of the device operating systems. This self-contained design is a security liability with its own attack surface and undocumented trust relationships with other peripherals and the main system-on-chips. This chapter presents a methodology for vulnerability discovery in USB Power Delivery implementations for Apple devices. The protocol and Apple-specific communications are reverse engineered, along with the firmware of the dedicated USB Power Delivery hardware. The investigation of the attack surface and potential security vulnerabilities can facilitate data acquisition in digital forensic investigations.

  • 48.
    Alendal, Gunnar
    et al.
    NTNU, Norge.
    Dyrkolbotn, Geir Olav
    NTNU, Norge.
    Axelsson, Stefan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    DIGITAL FORENSIC ACQUISITION KILL CHAIN – ANALYSIS AND DEMONSTRATION2021In: Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / [ed] Gilbert Peterson; Sujeet Shenoi, Springer Nature , 2021, p. 3-19Chapter in book (Refereed)
    Abstract [en]

    The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.

  • 49. Alexanderson, Petter
    et al.
    Tollmar, Konrad
    Department of Informatics, HCID Group.
    Being and mixing: designing interactive soundscapes2006In: Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, 2006, p. 252-261Conference paper (Refereed)
    Abstract [en]

    This paper describes a study of the auditory environment in a chemical factory, and how a group of process operators ascribe meaning to a selection of sound clips from their daily work environment. We argue for a design-oriented phenomenological approach to soundscape studies, and suggest an approach based on an exploration of how already occurring sounds are used. This knowledge will be used to inform the design of new useful auditory environments. Our study shows that the richness of the auditory environment is a crucial aspect of the distributed work environment. An important part of the design process is the operator’s contribution to the concepts suggested. From design workshops several design concepts aiming to explore and test different approaches for making sound affordances available have been developed. This has led us to a new understanding of how interactive soundscapes enable distributed awareness – what we refer to as ’Being and Mixing’.

  • 50.
    Alghamdi, Fayiq
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science.
    Dimensions of Professionalism: A Study of Computer Science Teaching in Saudi Arabia2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    In Saudi Arabia, new computing education programs have been introduced in alignment with the Saudi Vision 2030, which is a plan launched in 2017 to reduce Saudi Arabia's reliance on oil, diversify its economy, and develop its health, education, recreation, infrastructure and tourism. Computer science is a rapidly changing area, which places high demands on teachers in the subject to develop both their subject and pedagogical competence. This thesis explores computer science teachers’ perspectives on professional development from three viewpoints—the Saudi Teaching Competencies Standard, engagement in teachers’ awards and self-directed learning. The thesis examines the efforts of computer science teachers as they develop new pedagogies during their teaching careers as a result of the new regulations. The main question is ‘How do Saudi Arabian computer science teachers develop their teaching professionalism?’ Conclusions draw on the outcomes of four sub-studies. A mixed-methods approach consisting of interviews and questionnaires was used to collect data. The participants comprised 389 computer science teachers from different Saudi Arabian cities with different demographics and different teaching experience. The analysis drew on a theoretical framework that integrates elements of the Theory of Reasoned Action, the Theory of Planned Behaviour and the Adult Learning Theory. A model for pedagogical change was developed and used to understand how and why computer science teachers change their educational pedagogy. The model explains the teachers’ shift in pedagogy and answers the question of how and why computer science teachers adopt a new pedagogical strategy. The studies show that both internal and external factors motivate the study participants to engage in competency development. In the Saudi model, the Saudi Teaching Competencies Standard and awards are external factors as they include a preparatory period of intensive skills development. Teachers' experience from this informs the picture of Saudi teachers' training that is presented in the dissertation. Indeed, the trial participants stated that they mainly used self-directed learning for their competence development, drawing on internal motivation. One reason for this was that they felt that many of the skills development programs offered lacked timeliness and relevance. The studies on which the dissertation is based have been conducted in Saudi Arabia, but the results also provide insights into general challenges associated with regulating teachers' competence and the design of in-service training for teachers. The results clearly point out the importance of teachers' participation in the development of the profession in order for changes to be accepted and incorporated into their profession. Behavior change theories can be used to understand and predict how new regulations and pedagogical strategies will be received, and if they are likely to be accepted or rejected by teachers. These theories, therefore, constitute a useful tool in regulating teaching and the teaching profession.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
1234567 1 - 50 of 1819
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf