Dissertations / Theses on the topic 'Other computer and information sciences'

To see the other types of publications on this topic, follow the link: Other computer and information sciences.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Other computer and information sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wu, Jiewen. "WHISK: Web Hosted Information into Summarized Knowledge." DigitalCommons@CalPoly, 2016. https://digitalcommons.calpoly.edu/theses/1633.

Full text
Abstract:
Today’s online content increases at an alarmingly rate which exceeds users’ ability to consume such content. Modern search techniques allow users to enter keyword queries to find content they wish to see. However, such techniques break down when users freely browse the internet without knowing exactly what they want. Users may have to invest an unnecessarily long time reading content to see if they are interested in it. Automatic text summarization helps relieve this problem by creating synopses that significantly reduce the text while preserving the key points. Steffen Lyngbaek created the SPORK summarization pipeline to solve the content overload in Reddit comment threads. Lyngbaek adapted the Opinosis graph model for extractive summarization and combined it with agglomerative hierarchical clustering and the Smith-Waterman algorithm to perform multi-document summarization on Reddit comments.This thesis presents WHISK as a pipeline for general multi-document text summarization based on SPORK. A generic data model in WHISK allows creating new drivers for different platforms to work with the pipeline. In addition to the existing Opinosis graph model adapted in SPORK, WHISK introduces two simplified graph models for the pipeline. The simplified models removes unnecessary restrictions inherited from Opinosis graph’s abstractive summarization origins. Performance measurements and a study with Digital Democracy compare the two new graph models against the Opinosis graph model. Additionally, the study evaluates WHISK’s ability to generate pull quotes from political discussions as summaries.
APA, Harvard, Vancouver, ISO, and other styles
2

Chinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.

Full text
Abstract:
Videoconferencing is increasingly becoming a trend worldwide in applications where clients need to access lectures, meeting proceedings, communicating with family and friends etc. It provides a platform enabling the visual, audio and video communication between clients. The aim of this project is to utilize the open source Java software to build a desktop application enabling communication between clients. When a user needs to transfer a secured file, it’s unsafe to send it using social networking sites because of lack of security. So, with the “Multi-Way Communication System” (MWCS) we resolve some security issues. The MWCS is a highly secure way for file transfer, text and video conferencing.
APA, Harvard, Vancouver, ISO, and other styles
3

Hawley, Eric S. "Understanding Unfolding Change and the Value of Strategic Unification in Recent USU Information Technology Functional Realignment." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/176.

Full text
Abstract:
This is a qualitative case study of the 2005-2008 Utah State University Information Technology reorganization from the perspective of key change advocates. The study identified and documented the unfolding change process involved in the reorganization in terms of dissatisfaction, executive changes, internal executive strategic planning, implementation and initial impacts, and continuous "in situ" strategic planning. The study also answered a set of supporting concluding questions indicating increased value to the institution in areas of customer service and confidence, organization, financial resources, planning and policy, security, and increased/improved services and service functions.
APA, Harvard, Vancouver, ISO, and other styles
4

Kura, Deekshit. "Categorization of Large Corpora of Malicious Software." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1746.

Full text
Abstract:
Malware is computer software written by someone with mischievous or, more usually, malicious and/or criminal intent and specifically designed to damage data, hosts or networks. The variety of malware is increasing proportionally with the increase in computers and we are not aware of newly emerging malware. Tools are needed to categorize families of malware, so that analysts can compare new malware samples to ones that have been previously analyzed and determine steps to detect and prevent malware infections. In this thesis, I developed a technique to catalog and characterize the behavior of malware, so that malware families, the level of potential threat, and the effects of malware can be identified. Combinations of complementary techniques, including third-party tools, are integrated to scan and illustrate how malware may harm a target machine, search for related malware behavior, and organize malware into families, based on a number of characteristics.
APA, Harvard, Vancouver, ISO, and other styles
5

Thakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.

Full text
Abstract:
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a popular social networking application. We will be forming an outline on how forensic investigators can extract useful information from WhatsApp and from similar applications installed on an Android platform. Our area of focus is extraction and analysis of application user data from non-volatile external storage and the volatile memory (RAM) of an Android device.
APA, Harvard, Vancouver, ISO, and other styles
6

Williams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.

Full text
Abstract:
Increased demand by governments and patients for better healthcare communication has seen a growth in adoption of electronic medical records, with general practice as the cornerstone of this distributed environment. In this progressively more electronic state, general practice is charged with the responsibility to ensure confidentiality and privacy of patient infonnation. However, evidence suggests that protection of patient information is poorly handled in general practice. The deficiency in awareness of vulnerability and risk, together with the lack of appropriate controls and knowledge, leaves medical practice insecure and potentially vulnerable to information security breaches.
APA, Harvard, Vancouver, ISO, and other styles
7

El-Ahmad, Adham. "A Study on the Relation between Software Quality & Test Quantity." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60287.

Full text
Abstract:
Testing is an essential phase of software development process. It helps to ensure the quality of the software by finding bugs, errors, and defects that may occur during the development or the deployment of the system. IT companies and field workers, spend a lot of efforts on testing a software. However, how far should testers go with testing? In this research, we study 80 open source real world projects, and explore how much testing code has been written in those projects, in comparison with production code. We also try to find if there is any relation between different project factors, such as: project size, number of contributors and the amount of testing that has been done in those projects. We also give some recommendations to help field workers determine the amount of testing needed for a software.
APA, Harvard, Vancouver, ISO, and other styles
8

Cox, Tyler L. "Development of ETSU Student Life Android Application." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/honors/231.

Full text
Abstract:
In this thesis, the author gives a description his journey creating and developing a Student Life Application for East Tennessee State University. This thesis will document his process with development as well as reflect on the struggles and victories in creation of this application.
APA, Harvard, Vancouver, ISO, and other styles
9

Björklund, Hanna, and Azize Ayhan. "Studentguiden Västerås : En rapport om hur en studentguide produceras - från uppdrag till leverans." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-8891.

Full text
Abstract:
Vårt examensarbete har varit att producera en studentguide om Västerås till företaget Västerås & Company. Västerås & Company har i uppdrag att marknadsföra Västerås Mälarstaden till externa kunder som en attraktiv stad för företagsetablering, boende, konferenser/kongresser, högskolestudier och fritidsturism. Västerås & Company har producerat ett antal broschyrer som är riktade till olika målgrupper. Syftet med vår studentguide är att den ska locka presumtiva studenter till Västerås stad men även innehålla nyttiga fakta för nyinflyttade studenter. För att uppnå bästa resultat med vår studentguide har riktlinjerna i informationsdesign använts. Vi har under arbetets gång använt oss av Rune Petterssons modell ” 2001, sid.51-55 Från uppdrag till leverans – en kreativ process” (Pettersson).Vid insamling av material och vid utformning av broschyren har vi vänt oss till vår målgrupp. De har via två webbenkäter, en fokusgrupp och en utprovning hjälpt oss att kunna tillfredsställa målgruppen. Vi har även gjort en textanalys av materialet för att få en uppfattning om dess läsbarhet. Våra slutsatser är att det av högsta grad är viktigt att lära känna sin målgrupp och att inte underskatta den tid det kan ta att lära känna den. Att använda sig av riktlinjerna för informationsdesign gör att materialet blir mer användaranpassat. Dessutom har ”meddelandet” en bättre chans att nå fram och tillfredsställa mottagaren. Petterssons modell ” sid.51-55 Från uppdrag till leverans – en kreativ process”en passande modell att utgå från för ett arbete som detta. (Pettersson, 2001,)
APA, Harvard, Vancouver, ISO, and other styles
10

Bakibinga, Stella. "User Acceptance of Information Systems among Local Governments in Uganda : The Pilot of the Education Management Information System in Jinja District." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-17227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kjell, Edvin, and Sebastian Frisenfelt. "Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177184.

Full text
Abstract:
The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. The list was used to create our datasets, collected through active scans with testssl.sh. This thesis has through the mentioned datasets compared domains in regards to several security aspects and analyzed how they handle security and convenience. We performed our scans over the course of two weeks to analyze each domain's level of security. As well as looking at top domains for several popular categories. Our analysis mainly focused on comparing the domains on their choice of Transport Layer Security (TLS) version, cipher suite, support for HSTS, and if they were exposed to any vulnerabilities. The subset of domains that we looked at saw about 50% implementation of TLS 1.3. We discovered that the most popular domains tend to choose availability as one of their highest priorities, leaving them exposed to vulnerabilities in earlier versions of the TLS protocol. Most domains that showed exposure to one vulnerability, in general, also were exposed to BEAST. This was also the most prominent vulnerability among all domains. We also showed that many of the negotiated cipher suites on the list of domains still utilize cipher block chaining, which is known to be weak. Our results show that different browsers, mobile operating systems, and the time of day had a negligible impact on the choice of TLS version. Most of the domains in the popular categories had not yet adopted TLS 1.3 and were overall more exposed to the tested vulnerabilities than those on the top million list. The support for HSTS was low in both the categories and on the Alexa top list. We conclude that upgrading to the latest recommended standard should always be a priority for server operators.
APA, Harvard, Vancouver, ISO, and other styles
12

Hiester, Luke. "File Fragment Classification Using Neural Networks with Lossless Representations." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/honors/454.

Full text
Abstract:
This study explores the use of neural networks as universal models for classifying file fragments. This approach differs from previous work in its lossless feature representation, with fragments’ bits as direct input, and its use of feedforward, recurrent, and convolutional networks as classifiers, whereas previous work has only tested feedforward networks. Due to the study’s exploratory nature, the models were not directly evaluated in a practical setting; rather, easily reproducible experiments were performed to attempt to answer the initial question of whether this approach is worthwhile to pursue further, especially due to its high computational cost. The experiments tested classification of fragments of homogeneous file types as an idealized case, rather than using a realistic set of types, because the types of interest are highly application-dependent. The recurrent networks achieved 98 percent accuracy in distinguishing 4 file types, suggesting that this approach may be capable of yielding models with sufficient performance for practical applications. The potential applications depend mainly on the model performance gains achievable by future work but include binary mapping, deep packet inspection, and file carving.
APA, Harvard, Vancouver, ISO, and other styles
13

Lendin, Emma. "Information som bevis inom arkiv- och informationsvetenskap och e-Discovery." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-37678.

Full text
Abstract:
Denna uppsats presenterar en kvalitativ undersökning som gjorts i syfte att visa vilka likheter och olikheter det finns på synen på bevarande av arkivinformation som bevis inom arkiv- och informationsvetenskap jämfört med e-Discovery. Målet med undersökningen var också att öka förståelsen för synen på vilka krav som ställs på bevarad information för att den ska kunna användas som bevis, både på kort och lång sikt. De data som samlats in består främst av akademiska artiklar och andra texter, där en kvalitativ innehållsanalys har använts för att tolka den latenta informationen i dessa texter. Den teori som använts som grund för denna analys är Records Continuum-teorin, där bevisaxeln har varit till störst användning. Resultatet visar att synen på bevarande av arkivinformation som bevis skiljer sig en del inom arkiv- och informationsvetenskapen och e-Discovery, men vissa likheter finns också. Det visar vidare också att tidsspannet som information anses värdefull att bevara skiljer sig mellan de två och att detta beror på att man fokuserar på olika saker. Detta påverkar slutligen vilka sammanhang information bevaras i, och vilket bevisvärde den får.
This essay presents a qualitative research undertaken with the purpose of showing similarities and differences in the views on preservation of records as evidence within archival and information sciences compared to the ones within e-Discovery. Further, the goal with the research was also to increase the understanding for how the demands are viewed, that are put on preserved information for it to be usable as evidence, both short and long term. The data which have been gathered are mainly academic articles and other texts, where a qualitative content analysis has been used to interpret the latent information in these texts. The theory used to conduct this analysis is the Records Continuum theory, where the Evidentiality axle has been of the most use. The result shows that the views on preservation pf records as evidence differ between the archival sciences and e-Discovery, but that there are also similarities. It also shows that the period of time in which information is considered worth preserving differs between the two and that this is due to the fact that their areas of focus are different. This ultimately affects in what contexts information is preserved, and also its value as evidence.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Tong. "A topic model-based approach for ontology extension in the computational materials science domain." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-172281.

Full text
Abstract:
With the continuous development and progress of human society, the demand for advanced materials in all walks of life is increasing day by day. No matter in the agrarian age or the information age, human beings have always been tireless in the study of materials science, and the field of computational materials science has been the exploration of computational methods in materials science. However, with the deepening of the research, the scale of research data related to materials science is getting larger and larger, and each research institution establishes their own material information management system. The diversity of the materials data structure and storage form causes the fuzziness of the data structure and the complexity of the integrated data. In order to make data findable and reusable, scientists introduce the concept of ontology in philosophy to generalize the context and structure of data. An ontology is mainly by the field representative extremely, including meaningful concepts and the relationship between concepts. There are a few ontologies found in the computational materials science domain, called Materials Design Ontology (MDO). This thesis mined the representative concepts and relations to extend the MDO. In order to achieve this goal, an improved Topmine framework was deployed, containing a new frequent phrase mining algorithm and an improved phrase-based Latent Dirichlet Allocation (LDA) topic model. The improved Topmine framework introduced the Part-of-Speech Tagging and defined weighted coefficients. The time and space complexity had been reduced from quadratic to linear. And the perplexity of the phrase-based LDA was reduced 26.7%, which means the results are more concentrated and accurate. Meanwhile, the concept lattice is constructed with the idea of formal concept analysis to extend the relations of the domain ontology. In brief, this paper studied the titles and abstracts of more than 9000 pieces of field literature collected to extend MDO, and demonstrate the practicability and practicality of this framework by comparing the experimental results with the existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
15

Arding, Petter, and Hugo Hedelin. "Computer virus : design and detection." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108484.

Full text
Abstract:
Computer viruses uses a few different techniques, with various intentions, toinfect files. However, what most of them have in common is that they wantto avoid detection by anti-malware software. To not get detected and stay unnoticed,virus creators have developed several methods for this. Anti-malwaresoftware is constantly trying to counter these methods of virus infections withtheir own detection-techniques. In this paper we have analyzed the differenttypes of viruses and their infection techniques, and tried to determined whichworks the best to avoid detection. In the experiments we have done we havesimulated executing the viruses at the same time as an anti-malware softwarewas running. Our conclusion is that metamorphic viruses uses the best methodsto stay unnoticed by anti-malware software’s detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
16

Younas, Muhammad. "A comparative analysis of Cisco Performance Routing (PfR) and other performance enhancing techniques - Cisco QoS and Path Control." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14669.

Full text
Abstract:
Eleven years ago Cisco introduced three types of applications on the same converged network and named it AVVID (Architecture for Voice, Video and Integrated Data). In spite of the initial interest and hype surrounding AVVID, the feature was and still is unable to confront problems such as: data priority, load balancing and network congestion. The work in this report addressed these issues within the network. Different Cisco Internetwork Operating System (IOS) methods: routing protocols, Cisco IOS QoS (including LLQ, LFI and Header Compression), Path Control and Cisco Performance Routing (PfR) were all tested to see which feature would work best at enhancing network performance. A practical network was created in which these features were carefully implemented one after another. In every step, the results were observed and recorded and if necessary repeated in order to check their validity. The results for RTT (Round Trip Time) and MOS (Mean Opinion Score) showed that in comparison to Path Control and Cisco IOS QoS (Quality of Service) mechanisms, Cisco PfR was able to generate routes on the fly during times of network congestion. This cannot be achieved with the use of Cisco QoS and Path Control which makes Cisco Performance Routing a far more superior feature. Although the focus of the work was VoIP (Voice over Internet Protocol) data, it is possible to construct a network with any application as Cisco PfR is able to reroute data. Cisco PfR is an easily accessible IOS feature which, once implemented, requires very little updating and maintenance.
APA, Harvard, Vancouver, ISO, and other styles
17

Braun, Christelle. "Quantitative Approaches to Information Hiding." Phd thesis, Ecole Polytechnique X, 2010. http://tel.archives-ouvertes.fr/tel-00527367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gande, Santhrushna. "Developing Java Programs on Android Mobile Phones Using Speech Recognition." CSUSB ScholarWorks, 2015. https://scholarworks.lib.csusb.edu/etd/232.

Full text
Abstract:
Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program. The program has been designed to pick up the Java constant keywords (such as ‘boolean’, ‘break’, ‘if’ and ‘else’), similar to the word received by the speech recognizer system in the application. The “Java Programming Speech Recognition Application” contains external plug-ins such as programming editor and a speech recognizer to record and write the program. These plug-ins come in the form of libraries and pre-coded folders which have to be attached to the main program by the developer.
APA, Harvard, Vancouver, ISO, and other styles
19

Nilsson, Karin. "Information och funktion i ett kapprum : Examensarbete mot informationsdesign." Thesis, Mälardalen University, Department of Innovation, Design and Product Development, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-720.

Full text
Abstract:

Rapporten beskriver arbetet med att ta fram ett förändringsförslag för ett kappprum. Kapprummet finns i Elimkyrkan i Eskilstuna. Vid framtagandet av förslaget skulle särskild uppmärksamhet ägnas åt information/anslagstavlor, men utan att försumma helheten. Den problemformulering som utformades som en sammanfattning av uppgiften var: Visualisering av förslag som förbättrar kommunikation och funktion i Elimkyrkans kapprum.

Resultatet visualiserades med hjälp av Open Source programmet Blender.

APA, Harvard, Vancouver, ISO, and other styles
20

Carlsson, Caroline, and Mimmi Dalmo. "Framsökning av riskobjekt och tillgängligheten av vägnätet samt järnvägen vid översvämning : I Karlstads kommun." Thesis, Karlstads universitet, Avdelningen för geografi och turism, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27059.

Full text
Abstract:
Karlstad ligger uppbyggt på och invid Klarälvsdeltat och är i riskzonen för översvämning då staden påverkas av både flöden i Klarälven och nivåer i Vänern. I och med översvämningsprogrammet, som togs fram av Karlstads kommun 2010, har man tagit ett heltäckande grepp om översvämningsproblematiken och klarlagt vilka åtgärder som bör vidtas på kort och lång sikt. I översvämningsprogrammet är det bestämt att Räddningstjänsten i Karlstadsregionen ska arbeta fram en beredskaps- och handlingsplan. Examensarbetet är utfört åt Räddningstjänsten och ligger till grund för fortsatt arbete med beredskaps- och handlingsplanen. Arbetets syfte har varit att söka fram och koordinatsätta samhällsviktiga riskobjekt samt visualisera vilka riskobjekt som drabbas vid olika översvämningsscenarier i Klarälven och Vänern. Sedan har viktiga vägar inom kommunen, som drabbas vid olika vattenflöden i Klarälven, visualiserats. Då viktiga vägar har svämmats över har alternativa vägval, för omledning av all typ av trafik, tagits fram genom nätverksanalys. Slutligen har järnvägar inom kommunen, som berörs vid de olika översvämningsscenarierna, visualiserats. Resultatet visar att många riskobjekt, vägar och järnvägar svämmas över och bevisar att Karlstad ligger i riskzon vid översvämningar.  Beredskapsplanens mål är att ge en tydlig bild av vad som behöver skyddas och i vilken ordning detta ska ske vid översvämning. Det kommer inte vara möjligt att rädda alla verksamheter. Riskobjektskartor med prioriteringsordning är därför viktiga så räddningsinsatser ska kunna planeras efter vilka åtgärder som bör vidtas.   I rapporten visas endast ett urval av alla riskobjekt och inga objektnamn, funktionsindelningar eller prioriteringar får visas i kartorna, då detta är sekretessbelagt. Allt arbete och kartor med denna information har överlämnats till Räddningstjänsten i Karlstadsregionen.
Karlstad is a city situated on and by the Klarälven river delta, a river that flows into the Lake Vänern. Both the water flow in Klarälven and the water levels in Vänern are contributing to the city being at risk of flooding. In 2010 the municipality of Karlstad developed a Flood program. This program contains a comprehensive approach to flooding problems, where is stated what action should be taken in short and long terms. As part of this Flood program it was decided that the Rescue services in the Karlstad region should develop a contingency- and action plan. This degree projekt is performed for the rescue services in the Karlstad region and forms the basis for further work on contingency and action plan. The purpose of this study is to identify and coordinate socially important critical objects and visualize these objects within different flood scenarios in Klarälven and Vänern. Further, identification which important roads within the municipality that are affected by different flood scenarios in Klarälven will be visualized. Through network analysis alternative routes for rerouting all types of traffic have been established for situations when the important roads are flooded. Finally, the railroads in the municipality affected by the different flood scenarios in Klarälven have been identified. The result shows that many critical objects, roads and railways are at risk of flooding and support the opinion that Karlstad is a city at severe risk of flooding. The aim of the contingency plan is to provide a clear picture of what needs to be protected and in what order this should be done,  in case of flooding. It will not be possible to rescue all activities in the city, therefore maps, showing critical objects with priority, are important to simplify rescue efforts.   This report only shows a selection of critical objects and no object names, function classifications or priorities may be shown in the maps, as this is confidential. All work and maps of such information is handed over to the Rescue services in the Karlstad region.
APA, Harvard, Vancouver, ISO, and other styles
21

Charupa, Thanaporn. "Perspectives on RFID Readiness : A Comparative Analysis Between Skanska and Datema." Thesis, University of Gävle, Department of Technology and Built Environment, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-6350.

Full text
Abstract:

In global supply chain management, radio frequency identification RFID has emerged within the last decade and became a superior technology for information storage. However, the technology has not yet been widely accepted or used in comparison to the barcode.

The underlying interest is to explore RFID technology, to understand the benefits and drawback that this innovation brings. Once functionality and application comprehension is overviewed, specific models such as SWOT analysis, Real Option Theory, Technology Push-Pull model and RFID Implementation stages can be applied to evaluate a firm’s RFID readiness.

The findings are based on two Swedish case companies Skanska Maskin AB and Datema. Information from the case companies are consolidated and aggregated to analyze and derive the methods used to discover the firm’s ability to adopt RFID. The analysis will discuss the factors involved with the technology and recommendations for future studies are given.

APA, Harvard, Vancouver, ISO, and other styles
22

Chowdhury, Ziaul Islam. "Implementation of an abstract module for entity resolution to combine data sources with the same domain information." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-87294.

Full text
Abstract:
Increasing digitalization is creating a lot of data every day. Sometimes the same real-world entity is stored in multiple data sources but lacks common reference. This creates a significant challenge on the integration of data sources and may cause duplicates and inconsistencies if not resolved correctly. The core idea of this thesis is to implement an abstract module for entity resolution to combine multiple data sources with similar domain information.  CRISP-DM process was used as the methodology in this thesis which started with an understanding of the business and data. Two open datasets containing product details from e-commerce sites are used to conduct the research (Abt-Buy and Amazon-Google). The datasets have similar structures and contain product name, description, manufacturer’s name, price. Both datasets contain gold-standard data to evaluate the performance of the model. In the data exploration phase, various aspects of the datasets are explored such as word-cloud containing important words in the product name and description, bigrams and trigrams of the product name, histograms, standard deviation, mean, min, max length of the product name. Data preparation phases contains NLP based preprocessing pipeline consists of normalization of case, removal of special characters and stop-words, tokenization, and lemmatization.  In the modeling phase of the CRISP-DM process, various similarity and distance measures are applied on the product name and/or description and the weighted scores are summed up to form total score of the fuzzy matching. A set of threshold values are applied to the total score and performance of the model is evaluated against the ground truth. The implemented model scored more than 60% F1-score in both datasets. Moreover, the abstract model can be applied to various datasets with similar domain information. The model is not deployed to the production environment which can be a future work. Moreover, blocking or indexing techniques can be also applied in the future with big data technologies which will reduce quadratic nature of entity resolution problem.
APA, Harvard, Vancouver, ISO, and other styles
23

Chanmongkolpanich, Kittiya, and Supasana Panthong. "The Internationalization Process of Telenor: A Case Study of Telenor in Thailand." Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-6712.

Full text
Abstract:

This thesis is to describe the internationalization process of Telenor in terms of entry modes and management of control. While reading this thesis, readers will be acknowledged more about the appropriate process that Telenor applied to Thailand. Moreover, the suitable control to manage Telenor’s international operation in Thailand is also shown herewith.

APA, Harvard, Vancouver, ISO, and other styles
24

Brunnberg, Fredrik. "Spelaren som medskapare : Hur uppfattas spelnarrativ som utvecklas till följd av spelande?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20566.

Full text
Abstract:
Ett digitalt spel har historiskt sätt varit färdigprogrammerat och narrativet nedskrivet när det släpps för konsumtion. Detta medför att det narrativ som upplevs av spelare inte går att förändra genom sitt spelande. Det här arbetet undersöker flera former av interaktiva narrativ i spel och andra medieformer. Frågeställningen som arbetet vill önska besvara är hur spelare upplever ett spelnarrativ där deras agerande har en direkt inverkan på narrativet. För att undersöka detta skapades en spelartefakt där spelarnas val och muntliga svar på en öppen fråga direkt påverkade hur en epilog skrevs för spelets narrativ. Epilogen följdes upp av en semi-strukturerad gruppintervju där spelarnas upplevelser av artefakten diskuterades. Efter analys av spelarnas svar kunde slutsatsen dras att deltagarna ansåg möjligheten att påverka spelnarrativet som positivt. För framtida forskning finns det utrymme att expandera antalet deltagare och på så sett få en mer nyanserad och säkrare bild av resultatet.
APA, Harvard, Vancouver, ISO, and other styles
25

Rivas, Diaz Juan Manuel. "Model-based object tracking with an infrared stereo camera." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-45442.

Full text
Abstract:
Object tracking has become really important in the field of robotics in the last years. Frequently, the goal is to obtain the trajectory of the tracked target over time and space by acquiring and processing information from the sensors. In this thesis we are interested in tracking objects at a very short range. The primary application of our approach is targeting the domain of object tracking during grasp execution with a hand-in-eye sensor setup. To this end, a promising approach investigated in this work is based on the Leap Motion sensor, which is designed for tracking human hands. However, we are interested in tracking grasped objects thus we need to extend its functionality. The main goal of the thesis is to track the 3D position and orientation of an object from a set of simple primitives (cubes, cylinders, triangles) over a video sequence. That is the reason we have designed and developed two different approaches for tracking objects with the Leap Motion device as stereo vision system.
APA, Harvard, Vancouver, ISO, and other styles
26

Askfelt, Simone, and Osmani Arbenita. "Ekologiskt hållbar med Business Intelligence : Stöd från BI vid ekologiskt hållbart arbete." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31868.

Full text
Abstract:
Verksamheter idag har krav på sig att arbeta ekologiskt hållbart. Att arbeta ekologiskt hållbart är i vissa fall en förutsättning för att fortsätta vara verksam på marknaden. Detta har lett till att verksamheter måste se över sitt sätt att arbeta för att minska sin påverkan på miljön. För att göra detta kan verksamheter ta stöd från system vilket har lett till att nya system har implementerats. Ett system för att stödja verksamheter att arbeta ekologiskt hållbart är BI. Med stöd från BI kan verksamheter samla, lagra samt analysera data som leder till att de blir informerade om hur deras processer påverkar den ekologiska hållbarheten. Fler studier kring sambandet mellan BI och ekologiskt hållbart arbete behövs då den teoretiska grunden i området är begränsad. I många fall tittar verksamheter på sitt ekologiskt hållbara arbete åtskilt från resterande delar av verksamheten. Huvudsyftet med studien är att kartlägga hur verksamheter arbetar för att vara ekologiskt hållbara med stöd från BI. Detta kartläggs för att slutligen uppnå delsyftet, vilket är att ta fram och presentera förslag på hur BI kan stärka verksamheternas arbete med ekologisk hållbarhet. Det empiriska materialet i studien samlades in via semistrukturerade intervjuer. Studiens resultat påvisar att tillverkande verksamheter inte tar stöd från sitt BI fullt ut vid sitt arbete med ekologisk hållbarhet. Därför presenteras förslag i studien på hur BI kan stärka verksamheternas ekologiskt hållbara arbete.
Working ecologically sustainable is in some cases essential for a business to continue to be active on the market. There is a larger demand on businesses today to work ecologically sustainable. This has led to businesses reviewing the way they work in order to reduce their environmental impact. The demand on businesses to reduce their environmental impact has led to implementations of new systems with the purpose of supporting their ecological sustainability. A system that is able to support working with ecological sustainability is BI. With the support from BI, businesses can collect, store and analyze data and hence become more informed about how their processes affect the ecological sustainability. However, studies regarding the relationship between BI and ecological sustainability are few. In many cases businesses overview their work with ecological sustainability separate from remaining part of the business. The main purpose of the study is to identify and map how businesses work with ecological sustainability in practice with support from BI. This is mapped in order to finally compose and present proposals on how BI could strengthen the way businesses work with ecological sustainability. The empirical data for this study were collected through semi-structured interviews. The result of the study shows that manufacturing businesses do not take full support from BI regarding their work with ecological sustainability. The study presents proposals of how BI could strengthen businesses work with ecological sustainability
APA, Harvard, Vancouver, ISO, and other styles
27

Letian, Wang, and Wang Hao. "Marketing Strategy for Mobile Application on iOS : An evaluation to marketing strategy made by Chinese small and medium-sized apps-making companies." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-20877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tilton, Peter. "Benchmarking Public and Private Blockchains and Understanding the Development of Private Blockchain Networks." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1963.

Full text
Abstract:
This thesis paper explores the developing technology blockchain by trying to understand the technology from a technical performance standpoint and also understanding the development process of blockchain networks and applications. The first half of this paper analyzes two research papers, "Bitcoing-NG: A Scalable Blockchain Protocol" and "Untangling Blockchain: A Data Processing View of Blockchain Systems," to understand and explain some of the technical differences and shortcomings of blockchain technologies. The second half of this paper then proceeds to develop a private blockchain network on the Ethereum network and deploy a smart contract on that private blockchain network. This process gives insight into the development of blockchain applications and identifies the struggles blockchain developers face.
APA, Harvard, Vancouver, ISO, and other styles
29

Malki, Khalil. "Automated Knowledge Extraction from Archival Documents." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2019. http://digitalcommons.auctr.edu/cauetds/204.

Full text
Abstract:
Traditional archival media such as paper, film, photographs, etc. contain a vast storage of knowledge. Much of this knowledge is applicable to current business and scientific problems, and offers solutions; consequently, there is value in extracting this information. While it is possible to manually extract the content, this technique is not feasible for large knowledge repositories due to cost and time. In this thesis, we develop a system that can extract such knowledge automatically from large repositories. A Graphical User Interface that permits users to indicate the location of the knowledge components (indexes) is developed, and software features that permit automatic extraction of indexes from similar documents is presented. The indexes and the documents are stored in a persistentdata store.The system is tested on a University Registrar’s legacy paper-based transcript repository. The study shows that the system provides a good solution for large-scale extraction of knowledge from archived paper and other media.
APA, Harvard, Vancouver, ISO, and other styles
30

Liang, Liang. "Managing innovation networks : a case of information system transformation in Chinese hospitals." Thesis, Kingston University, 2017. http://eprints.kingston.ac.uk/41967/.

Full text
Abstract:
The importance of innovation networks in health information system transformation has been recognised in research. It has been agreed that better-organised innovation networks can be related to better results of patient information system transformation. However, current research do not know much about how those innovation networks are organised, especially the structure of teamwork and information exchange in innovation networks. Thus, this study aims to improve the understanding about how innovation networks are organised and the influences on innovation results. Based on innovation network theory, this study develops and integrates three aspects, network dynamics, network structure and network influence, to explore innovation networks in patient information system transformation. Network dynamics represent complex interactions among people in the process of innovation; network structures show each person's roles and connections in the network; and and network influences link network structures to patient information system upgrade outcomes. Following this theoretical framework, this study answers three research questions: 1) what are the network patterns appearing frequently in network dynamics? 2) What are the patterns of the network structures? 3) To what extent innovation networks can influence the innovation outcomes? The data are collected form four patient record transformation projects in China. This study adopts network analysis method to demonstrate the fabrics of collaborations among the participants in innovation and quantify the regular network patterns and structures. Then, this study uses network regression modelling to explore the relations between innovation networks and innovation outcomes. This study contributes to innovation network research and by presenting 1) the patterns of innovation network dynamics. It demonstrates various patterns of innovation networks in each innovation stages; 2) the innovation network structures. This study identifies five types of brokers and two structures co-existing in the innovation network; 3) network influence. This study suggests that network structures significantly influence the outcomes.
APA, Harvard, Vancouver, ISO, and other styles
31

Samuelsson, Erika. "Arkivteoretiska krav på informationen i molnet : En studie om vilka kunskaper som leverantörer av molntjänster har angående arkivteoretiska kvalitetskrav på information." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19254.

Full text
Abstract:
Idag pratas det mycket om ett fenomen som kallas Cloud Computing, vilket kan kort beskrivas som tillhandahållning av datorresurser så som informationslagring, processorkraft och applikationer via Internet. Begreppet Cloud Computing har ingen direkt motsvarighet på svenska men kan översättas till exempelvis molnbaserade datortjänster eller molntjänster. Vanligtvis så innebär Cloud Computing att it-företag hyr ut en del av en server samt annan datorservice till en organisation. Cloud Computing är ett attraktivt alternativ för både den privata och offentliga sektorn och efterfrågas i allt större utsträckning.   Från ett arkivvetenskapligt perspektiv associeras Cloud Computing med många fördelar, men kanske med ännu fler nackdelar. De centrala problemföreställningarna relateras till tillit i en digital miljö. Frågor om hur information kan förbli autentisk, tillgänglig och fri från insyn från icke behöriga personer genom hela dess livscykel är framträdande i den arkivvetenskapliga debatten.   Syftet med uppsatsen är att undersöka medvetenheten hos svenska leverantörer av molntjänster gällande de särskilda krav som ställs på arkivinformation, som kvalitetskraven pålitlighet, autenticitet samt tillgänglighet. Detta är något som inte har diskuterats i så stor utsträckning inom arkivvetenskapen.   För att samla in det empiriska materialet genomfördes kvalitativa intervjuer med företag som på något sätt tillhandahåller molntjänster. Resultaten av intervjuerna analyserades med hjälp av teoretiskt material huvudsakligen baserat på The International Research on Permanent Authentic Records in Electronic Systems (InterPARES) forskning och begreppsbildningar.   Resultat från studien visar att de tillfrågade företagen som tillhandahåller molntjänster arbetar mycket med säkerhet för att på så vis kunna så långt det är möjligt säkerställa att informationen förvarat i molnet förblir enligt vad de definierar som autentiskt och att kundens krav säkerställs. De har skilda uppfattningar om vad autenticitet innebär och vilket även delvis skiljer sig från den arkivteoretiska tolkningen. Tillgänglighet är ett av de främsta kraven som kunden ställer på informationen och som således är något som it-företagen prioriterar i deras tjänster.
APA, Harvard, Vancouver, ISO, and other styles
32

Ishmael, Shu Aghanifor. "Information and Communication Technology in developing economies : A literature review on the reasons for failures of ICT; The case of Cameroon." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-17218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Thomas, Johan. "The Employee Value Proposition Impact : Developing an Application for Companies to Measure its Effectiveness." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-264861.

Full text
Abstract:
This project has been carried out by request of Universum Communications AB, a global market research company, specialised in the field of employer branding. Many of Universum’s clients are global companies with operations in several countries. From an employer branding standpoint, having people hired in different countries, comes with its challenges. On the one hand, most organisations want to communicate a consistent employer brand globally and on the other hand an employer brand that is perceived as attractive in one country, might not be attractive in another. Hence, it would be valuable for many global HR directors to have a tool that enables them to assess and compare how well their EVP resonates in different countries. The aim of this project is to build a demo version of such a tool, in order for Universum to evaluate: 1. Its usefulness for Universum’s clients. 2. If it could be incorporated into Universum’s product offering. The result was a web-based application that provides a global overview of a company’s EVP. The result is visualised on a world map and each country is colour coded according how well the company’s EVP resonates in the respective countries. The application gives a strong indication of how relevant and important it is to communicate different company attributes in different countries and provides the user with a holistic view of the result. Hence, the application proved useful in evaluating if Universum’s clients would benefit from such a tool and if such a tool should be incorporated in Universum’s product offering.
APA, Harvard, Vancouver, ISO, and other styles
34

Gestrelius, Sara. "Mathematical models for optimising decision support systems in the railway industry." Licentiate thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-27758.

Full text
Abstract:
After the deregulation of the Swedish railway industry, train operating companies compete for and on the same infrastructure. This makes the allocation of rail capacity a most delicate problem, and for a well-functioning railway system the allocation must be fair, efficient and functional. The capacity allocation tasks include e.g. constructing the yearly timetable and making track allocation plans for rail yards. The state of practice is that experienced planners construct the schedules manually with little or no decision support. However, as the planners are often faced with large combinatorial problems that are notoriously hard to solve there is a great potential in implementing optimising decision support systems. The research presented in this licentiate thesis aims at developing and examining mathematical models and methods that could be part of such support systems. The thesis focuses on two planning problems in particular, and the presented methods have been developed especially for the Swedish railway system. First of all, a model for optimising a train timetable with respect to robustness is presented. The model tries to increase the number of alternative meeting locations that can be used in a disturbed traffic situation and has an execution time of less than 5 minutes when solving the problem for the track section between Boden and Vännäs.                                                                                                                Secondly, the problem of generating efficient classification bowl schedules for shunting yards is examined. The aim is to find the track allocation that minimises the number of required shunting movements while still respecting all operational, physical and time constraints imposed by the yard.  Three optimisation models are presented, and simple planning rules are also investigated. The methods are tested on historic data from Hallsberg, the largest shunting yard in Sweden, and the results show that while the simple planning rules are not adequate for planning the classification bowl, two of the optimisation models consistently return an optimal solution within an acceptable execution time.
APA, Harvard, Vancouver, ISO, and other styles
35

Kade, Daniel. "Towards Immersive Motion Capture Acting : Design, Exploration and Development of an Augmented System Solution." Licentiate thesis, Mälardalens högskola, Inbyggda system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-25888.

Full text
Abstract:
Current and future animations seek for realistic motions to create a perception of authentic and human-like animations. A technology widely used for such purposes is motion capture. Therefore, to create such human-like animations, motion capture actors enrich the movements of digital avatars with realistic and believable motions and emotions. Acting for motion capture, as it is performed today, does not provide a natural acting environment. This is mostly because motion capture actors do not see and feel the virtual environment they act for, while acting. In many cases this can result in unnatural motions such as stiff looking and emotionless movements. To investigate ways to solve this, we first identify the challenges actors are facing as well as concepts to support a motion capture actor. Furthermore, we discussed, how the task of supporting motion capture actors was approached and which factors were discovered to provide support when designing and im- plementing a solution. Initial prototypes have been created to address the men- tioned issues and to find suitable solutions to support and immerse motion cap- ture actors during their performance. For this thesis, one goal was to conduct research by focusing on the question: What are the experiential qualities of immersion in an interactive system to create an immersive acting environment that supports motion capture actors. The developed application provides a flexibility to set up and modify digital assets and scenes quickly and with an easy to use interface. Furthermore, the prototype helps to provide an understanding on which hardware and software prototypes can be designed and used to build an immersive motion capture environment. The built prototype allows to investigate user experiences, user tests and the satisfaction of users and their effects on motion capture acting.
APA, Harvard, Vancouver, ISO, and other styles
36

Ohlsson, Oliver. "En forensisk analys av iOS." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23783.

Full text
Abstract:
Sedan Apple introducerade sin iPhone 2007 har användadet av smarta telefoner ökat ständigt. De används inte bara i hemmet utan även på företag och i militären. På företagsmobiler finns det mer och mer viktig information såsom mail, sms och viktiga filer. För en hacker skulle det därför vara möjligt att komma åt hela företaget genom att gå in på en mobiltelefon som används i verksamheten. För att motverka det har det implementerats säkerhetsfunktioner i dagens mobiltelefoner som tex kryptering. I detta arbetet har målet varit att undersöka dessa säkerhetsfunktioner och vad för information som går att utvinna ur en iPhone. Genom att undersöka vilka säkerhetsfunktioner som implementerats och hur mycket information som går att få ut kommer frågeställningarna besvaras. Det har skrivits ett antal arbeten om iOS-säkerhet, men de flesta är skrivna om äldre versioner av operativsystemet. I det här arbetet kommer det senaste, iOS 6.1.4, testas i programmet XRY.
APA, Harvard, Vancouver, ISO, and other styles
37

Johansson, Berit. "Informationssäkerhetsarbete på tillverkande småföretag." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35426.

Full text
Abstract:
Informationssäkerhet är ett mer aktuellt ämne än någonsin. Media rapporterar löpande om olika störningar, orsakade av både tekniskt haveri, mänskliga misstag samt sabotage. Stora förändringar har skett de senaste tjugo åren vad gäller teknik, genomloppstid för produkterna och bemanning. Att skydda sin strategiskt viktiga information borde vara viktigare än någonsin, för att skapa trovärdighet, undvika produktionsavbrott och undvika ekonomiska bortfall. Tidigare forskning har bidragit till att beskriva modeller för hur man skall arbeta för att öka informationssäkerheten inom en verksamhet. Kartläggningar har också gjorts över situationen i offentliga verksamheter, storföretag och hemmiljö. Syftet med detta examensarbete är att fylla den lucka som finns och beskriva hur situationen ute i tillverkande småföretag ser ut idag. Hur arbetar företagsledningen med informationssäkerheten? En kvalitativ studie har gjorts på tre mindre/medelstora tillverkningsindustrier i Småland och bygger på personliga intervjuer. Det som framgår tydligt i denna studie är att företagarna visserligen har gjort en del riskbedömningar och åtgärder men man arbetar inte systematiskt med informationssäkerheten. Den förändring som skett inom teknik, produkter och bemanning har inte följts upp av ett mer systematiskt säkerhetstänkande.
Information security is more than ever a current topic. Media report continuously about different disturbances, caused by technically breakdowns, human mistakes and sabotage. Big changes have occurred during the latest twenty years regarding technology, the lifespan of products and staffing. To protect the strategic information should be more important than ever, to create credibility, avoid interruptions in production and financial loss. Earlier research has contributed to describe models how to work to increase information security within an organization. Surveys have also been made regarding the situation in public service, big companies and homes. The purpose of this thesis is to fill that gap that exist and describe the situation of small manufacturing industries. How does the business management work with information security? A qualitative survey has been made at three small/ medium sized manufacturing industries in Småland and is based on personal interviews. In this survey it appears clearly that the entrepreneurs certainly have made some risk assessments and measures, but they do not work systematically with information security. The changes that have been made within technology, products and staffing have not been followed up with a more systematically security thinking.
APA, Harvard, Vancouver, ISO, and other styles
38

Karlsson, Jonathan. "Using WebGL to create TV-centric user interfaces." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107403.

Full text
Abstract:
In recent years the user interfaces of the TV platform have been powered by HTML, but since the platform is starting to support new techniques it might be time to change the focus. HTML is a good choice for interface development because of its high level and platform independence; however, when performance is critical and the requirements are high HTML can impose serious restrictions. WebGL is a technology released in 2011 that brings a low-level graphics API to the web. The API allows for development of advanced 3D graphics and visual effects that were impossible or impractical in the HTML world. The problem is that the hassle of using pure WebGL is in most cases too big to overcome. In this thesis a proof-of-concept was developed to investigate the issues and limitations of WebGL. A conclusion was made that even though the performance was not as good as expected it might still be viable for use in some settings.
APA, Harvard, Vancouver, ISO, and other styles
39

Ingers, Åsa, and Hanna Nilsson. "Stop starting, start finishing : En fallstudie om formell kompetensutveckling med fokus på utvärderingsfasen." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36395.

Full text
Abstract:
Vi lever idag i ett samhälle i ständig utveckling vilket ställer krav på verksamma företag att konstant driva på den egna utvecklingen. I detta arbete är kompetenta och kunniga medarbetare viktigt, men det är enligt Rekryteringsenkäten 2012 (Svenskt Näringsliv, 2012) svårt för företagare att anställa den kompetens de behöver. Om inte kompetensen finns på arbetsmarknaden är intern kompetensutveckling ett möjligtalternativ för att ta fram den kompetens som efterfrågas och detta är något som det årligen investeras stora summor i. Vilken effekt dessa investeringar har på företagen är dock något som inte utvärderas i någon större utsträckning (Pineda, 2010) vilket leder till att pengar riskerar att upprepade gånger investeras i overksamma insatser. Hur kan detta åtgärdas? Det finns ett flertal teoretiska modeller för utvärdering av kompetensutveckling, men det saknas empirisk forskning som visar hur företag arbetar med området och det är denna lucka uppsatsen bidrar till att fylla. Undersökningen syftar till att genom en fallstudie beskriva de olika stegen i formell kompetensutveckling på organisationsnivå, med särskilt fokus på utvärdering, och undersöka den problematik som finns kring dessa aspekter utifrån existerande modeller för formell kompetensutveckling och utvärdering av kompetensutvecklande insatser. Följande forskningsfrågor besvaras: 1. Vilka nyckelaktiviteter utförs i det formella kompetensutvecklingsarbetet? 2. Saknas några nyckelaktiviteter i jämförelse med teoretiska modeller för formell kompetensutveckling och utvärdering av kompetensutvecklande insatser? 3. Vilka hinder finns i arbetet med utvärdering av kompetensutveckling och hur kan dessa överbryggas? Undersökningen har antagit en deduktiv ansats och en kvalitativ metod. En fallstudie har genomförts där sex aktörer på olika nivåer i fallföretaget genom personliga intervjuer fått beskriva kompetensutvecklingsprocessen och hur kompetensutveckling utvärderas. Resultatet har därefter analyserats med hjälp utav ADDIE-modellen och Kirkpatricks fyra-nivå modell. Resultatet ger en bild av kompetensutvecklingsarbetet som ostrukturerat och omedvetet där utvärderingsarbetet till stor del är personberoende. Alla faser i ADDIE går att finna i det arbete företaget gör och de hinder som identifierats är övergripande av en strukturell karaktär. Förbättringsmöjligheterna för utvärderingsarbetet består främst av att tydliggöra rutiner, ansvar och praktiska hjälpmedel.
APA, Harvard, Vancouver, ISO, and other styles
40

Hasan, Mohammad Mahmudul. "Evaluation of Citizen Help Request (CHR) initiated by Bangladesh Police: A Case Study." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-26755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Husnain, Ali. "Identifying the existing status of e-services' sustainability research." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-26579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ngo, Duc Khanh. "Relief Planning Management Systems - Investigation of the Geospatial Components." Thesis, KTH, Geodesi och geoinformatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gonzalez, Sanchez Dina Pamela. "Resource Sharing and Network Deployment Games : In Open Wireless Access Markets." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-39480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hassan, Waqar Ul. "Pixel Based and Object Oriented Multi-spectral Remotely Sensed Data Analysis for Flood Risk Assessment and Vulnerability Mapping." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-64011.

Full text
Abstract:
Geographical information system with remotely sensed data can be instrumental in many ways for disaster management and post disaster rehabilitation. During last few decades the usage of remotely sensed data has extensively increased, although image interpretation tools are not highly accurate but still considered as fast, reliable and useful way to get information from imagery. Disaster assessment, management and rehabilitation are always creates challenge for experts. Population growth, expansion in settlements either in the rural or in the urban areas bring more problems not only for the humans but it also affect the global environment Such global changes on the massive scale disturbs the ecological processes. GIS along with Remote sensing data can change the whole scenario in very short period of time. All the departments concerning to strategic disaster planning process can share their information by using the single platform, so for this purpose spatial database can be helpful by providing the spatial data in digital format to the department concerned. Spatial phenomena can be observed by using different image analysis techniques and the resultant thematic map display the spatial variations and changes that describe the particular phenomenon whether it was any disaster or change in soil type or vegetation type. Remotely sensed data like aerial, satellite and radar images are very useful for disaster management strategy formulation process. Integration of GIS and remote sensing proved itself the best especially for land-use, land-cover mapping. For this purpose pixel based, sub-pixel based, pre-field and object oriented classification approach are being in use around the world. But thematic maps created from image analyzed by using object oriented classifiers contain more accuracy than any other techniques.
APA, Harvard, Vancouver, ISO, and other styles
45

Ibembe, John Daniel. "Mobile phone use and reproductive health care in Nakuru Provincial Hospital, Kenya." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-17217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wondie, Binyam Lewoyehu. "Prospect of employing e-voting scheme in Ethiopia: understanding perception of the government and opposition political parties." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-19440.

Full text
Abstract:
Abstract Over the years, the opposition parties argued that the existing election system in Ethiopia has many problems during the election process and the outcome of actual results and it is not a kind of election system they can trust.  Whereas the government officials claimed it was fair and free election system. The integrity of the election process is fundamental to the integrity of democracy itself. Hence, electronic voting (e-Voting) is a newly popular method to cast ballots of an election using electronic devices. This scheme is deployed highly as a main election system in some countries and still others are using a hybrid system. However, there are countries like Ethiopia which adopt the manual election scheme for several years till now. Therefore, the purpose of this study is to understand the perception of the government and opposition political parties towards the prospect of implementing e-voting scheme in the present context of Ethiopia.   Even though there are setbacks in implementing e-voting in the present political situation of Ethiopia. However, the benefits are deemed to be much useful. Therefore, it is in the hands of the public and the government to work in developing and adopting e-voting scheme in a way that is helpful for both stakeholders. This paper suggests the government and the oppositions should have a reasonable consensus and planned date for starting the campaign which gives the right for the people for free and fair election and the rise of new political arena.   Key words- e-voting, hybrid system, manual election scheme
APA, Harvard, Vancouver, ISO, and other styles
47

Didier, Mpah Nde Jacob. "Computerized ID cards and passports in Cameroon : What the police identification department perceive of the system." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-16386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Hao, and Yun Xie. "The use of Online Social Networks in Chinese Collaborative E-learning Education." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-16037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Egowan, Ritah Ejeckenbe. "Assessing e-services from a user perspective : A study of the Swedish electronic tax declaration." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-16045.

Full text
Abstract:
E-services including electronic tax declaration are becoming trendy in Sweden. Many resources are invested in their development but evaluation from user’s perspective is limited. Sweden has big plans to become the leading internet nation by 2015. Are citizens opinion taken into consideration during such initiatives? Are the citizens satisfied with the e-services they have in place? With a sample size of 90, this paper studies the e-tax system in Sweden from six information system success variables.  The DeLone and &McLean IS success model was adopted to analyze the research question “What is the user’s perception of electronic tax declaration in Sweden”.  Perception in this paper means physical impression interpreted in the light of experience. Online survey method was applied and results revealed that all six variables were successful. Time factor, security concerns and convenience influence e-service usage.  Elderly exclusion, adaptability and language barriers were the major problems with the e-tax system. On a whole, this paper aims at providing general contributions to e-service research in the future.
APA, Harvard, Vancouver, ISO, and other styles
50

Weber, Katharina. "Intranätet -Axet : Kartläggning av LRF:s användning av intranätet som verktyg för internkommunikationen." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography