Högskolan i Skövde

his.sePublications
Change search
Refine search result
1 - 15 of 15
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Andersson, Martin
    University of Skövde, School of Humanities and Informatics.
    SANDBUNKERSEGMENTERING FÖR SMARTPHONES: Automatisk positionsuppskattning av sandbunkrar för smartphone som golfcaddie2011Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Ett av många nya användningsområden för smartphones är att använda dem som

    caddie på golfbanan. Golfaren kan få hjälp med avståndsuppskattning till intressanta

    punkter på banan genom att dessa punkter programmeras in och jämförs med

    smartphonens inbyggda positioneringssystem. Den här rapporten visar hur det med en

    bildsegmenteringsalgoritm går att slippa det manuella arbetet med att lägga in

    positioner för sandbunkrar på golfbanan. Algoritmen som tagits fram arbetar på

    satellitbilder som smartphonen kan ladda ned via dess Internetanslutning. Golfaren

    kan i ett tänkt scenario ge sig ut på en godtycklig golfbana och få hjälp med

    avståndsbedömning enbart med hjälp av satellitbilder och smartphonens gps. I snitt

    hittar den framtagna segmenteringsalgoritmen cirka 70 % av sandbunkrarna på en

    satellitbild, en siffra som i en verklig applikation skulle behöva ökas och förslag på

    hur detta kan göras ges i slutet av rapporten. Tre olika upplösningar på satellitbilderna

    har utvärderats och testkörts i en nyare smartphone. Även om den högsta

    upplösningen används tar en hel golfbana endast cirka 15 sekunder att segmentera

    vilket bör hinnas med under loppet av en vanlig golfrunda som i regel tar 3 till 5

    timmar.

    I ett vidare perspektiv går det att tänka sig helt andra tillämpningar där det finns

    behov av positionsuppskattning av objekt i en satellitbild i sin smartphone. Det bör på

    ett förhållandevis enkelt sätt gå att utvidga slutsatserna som dragits i rapporten till att

    gälla annat än enbart sandbunkrar, t.ex. sjöar, fält, åkrar och givetvis andra delar av

    golfbanan som vattenhinder och greener.

    Download full text (pdf)
    fulltext
  • 2.
    Andersson, Tommy
    University of Skövde, School of Humanities and Informatics.
    Avvaktande AJAX- anrop: En avlastningsteknik för 3G-nätet2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Den ökade användningen av nätuppkopplade mobilapplikationer har resulterat i en överbelastning i 3G-nätet. Förslag för att avlasta nätet har bland annat varit genom alternativa uppkopplingar, vilket innebär en uppoffring av 3G-nätets tillgänglighet. Detta leder till frågor om andra avlastningsmetoder. Arbetets målsättning var att se hur en applikations datatrafik påverkas av att klassiska intervallanrop ersätts av avvaktande AJAX-anrop. Detta görs genom att implementera respektive anropsmetod i två identiska alfapetapplikationer. Mätdata erhölls genom att låta användare spela längre omgångar av respektive applikation, vilket även genererar realistiska uppdateringar. Resultaten visar att den klientgenererade bandbreddskonsumtionen minskas vid användning av avvaktande AJAX-anrop. Detta gör den, i kontrast med klassiska intervallanrop, till en möjlig avlastningsmetod.

    Download full text (pdf)
    Examensarbete_AJAX_a09toman_2012
  • 3.
    Barrera Diaz, Carlos Alberto
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Oscarsson, Jan
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Lidberg, Simon
    Volvo Car Corporation, Skövde, Sweden.
    Sellgren, Tommy
    Volvo Car Corporation, Skövde, Sweden.
    A Study of Discrete Event Simulation Project Data and Provenance Information Management in an Automotive Manufacturing Plant2017In: Proceedings of the 2017 Winter Simulation Conference / [ed] W. K. V. Chan; A. D’Ambrogio; G. Zacharewicz; N. Mustafee; G. Wainer; E. Page, IEEE, 2017, , p. 12p. 4012-4023Conference paper (Refereed)
    Abstract [en]

    Discrete Event Simulation (DES) project data management is a complex and important engineering activity which impacts on an organization’s efficiency. This efficiency could be decreased by the lack of provenance information or the unreliability of existing information regarding previous simulation projects, all of which complicates the reusability of the existing data. This study presents an analysis of the management of simulation projects and their provenance data, according to the different types of scenarios usually found at a manufacturing plant. A survey based on simulation projects at an automotive manufacturing plant was conducted, in order to categorize the information regarding the studied projects, map the available provenance data and standardize its management. This study also introduces an approach that demonstrates how a structured framework based on the specific data involved in the different types of scenarios could allow an improvement of the management of DES projects.

  • 4.
    Bjurén, Johan
    University of Skövde, School of Informatics.
    USING CASE-BASED REASONING FOR PREDICTING ENERGY USAGE2013Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    In this study, the inability to in a future meet the electricity demand and the urge to change the consumption behavior considered. In a smart grid context there are several possible ways to do this. Means include ways to increase the consumer’s awareness, add energy storages or build smarter homes which can control the appliances. To be able to implement these, indications on how the future consumption will be could be useful. Therefore we look further into how a framework for short-term consumption predictions can be created using electricity consumption data in relation to external factors. To do this a literature study is made to see what kind of methods that are relevant and which qualities is interesting to look at in order to choose a good prediction method. Case Based Reasoning seemed to be able to be suitable method. This method was examined further and built using relational databases. After this the method was tested and evaluated using datasets and evaluation methods CV, MBE and MAPE, which have previously been used in the domain of consumption prediction. The result was compared to the results of the winning methods in the ASHRAE competition. The CBR method was expected to perform better than what it did, and still not as good as the winning methods from the ASHRAE competition. The result showed that the CBR method can be used as a predictor and has potential to make good energy consumption predictions. and there is room for improvement in future studies.

    Download full text (pdf)
    fulltext
  • 5.
    Carlsson, Henric
    University of Skövde, School of Informatics.
    Using A Recommender To Influence Consumer Usage2013Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    In this dissertation, the issues of the increased awareness of energy use are considered. Energy technologies are continuously improved by energy retailers and academic researchers. The Smart Grid are soon customary as part of the energy domain. But in order to improve energy efficiency the change must come from the consumers. Consumers should be active decision makers in the Smart Grid domain and therefor a Recommender system suits the Smart Grid and enables customers. Customers will not use energy in the way energy retailers, and politicians advocates instead they will do what fits them. By investigating how a Recommender can be built in the Smart Grid we focus on parameters and information that supports the costumers and enables positive change. An investigation of what customers perceive as relevant is pursued as well as how relevancy can adjust the system. A conceptual model of how to build a Recommender is rendered through a literature review, a group interview and a questionnaire.

    Download full text (pdf)
    fulltext
  • 6.
    Danielsson, Oscar
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Syberfeldt, Anna
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Holm, Magnus
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Wang, Lihui
    KTH Royal Institue of Technology, Stockholm, Sweden.
    Operators perspective on augmented reality as a support tool in engine assembly2018In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 72, p. 45-50Article in journal (Refereed)
    Abstract [en]

    Augmented Reality (AR) has shown its potential in supporting operators in manufacturing. AR-glasses as a platform both in industrial use are emerging markets, thereby making portable and hands-free AR more and more feasible. An important aspect of integrating AR as a support tool for operators is their acceptance of the technology. This paper presents the results of interviewing operators regarding their view on AR technology in their field and observing them working in automotive engine assembly and how they interact with current instructions. The observations and follow-up questions identified three main aspects of the information that the operators looked at: validating screw torque, their current assembly time, and if something went wrong. The interviews showed that a large amount of the operators were positive towards using AR in assembly. This has given an insight in both the current information interaction the operators do and their view on the potential in using AR. Based on these insights we suggest a mock-up design of an AR-interface for engine assembly to serve as a base for future prototype designs.

    Download full text (pdf)
    fulltext
  • 7.
    Derenius, Fredrik
    University of Skövde, School of Humanities and Informatics.
    Framställandet av en säker LiveCD för distansarbetare: Ett projekt baserat på öppen källkod2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Studien ämnar undersöka hur en LiveCD kan stödja en säkrare datormiljö för distansarbetarepå ett enkelt sätt. Distansarbetare arbetar utanför arbetsplatsens säkrare datormiljö vilket gördem till en mer utsatt grupp av datoranvändare. Många av dagens datoranvändare tyckerdessutom säkerhet relaterat till datorer och nätverk är komplicerat. Implementerad lösningtillhandahåller därför möjligheten att med hjälp av en LiveCD och ett USB-minne få tillgångtill både en säker fjärranslutning och fjärrskrivbord, genom att enbart skriva in ett lösenord.Tjänsterna konfigureras alltså automatiskt i bakgrunden; användaren behöver inte hålla redapå mer än ett lösenord. En LiveCD är också ett skrivskyddat medium vilket innebär attskadlig kod har svårt att få fäste i systemet. Resultatet är att distansarbetare med olika behovoch kunskapsnivå gällande dator- och nätverksäkerhet erbjuds möjligheten till en säkraredatormiljö på ett enkelt sätt.

    Download full text (pdf)
    fulltext
  • 8.
    Jiang, Yuning
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Vulnerability Analysis for Critical Infrastructures2022Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. Therefore, the need to improve cybersecurity expectations of CIs through vulnerability assessments cannot be overstated. Yet, CI cybersecurity has intrinsic challenges due to the convergence of information technology (IT) and operational technology (OT) as well as the crosslayer dependencies that are inherent to CPS based CIs. Different IT and OT security terminologies also lead to ambiguities induced by knowledge gaps in CI cybersecurity. Moreover, current vulnerability-assessment processes in CIs are mostly subjective and human-centered. The imprecise nature of manual vulnerability assessment operations and the massive volume of data cause an unbearable burden for security analysts. Latest advances in machine-learning (ML) based cybersecurity solutions promise to shift such burden onto digital alternatives. Nevertheless, the heterogeneity, diversity and information gaps in existing vulnerability data repositories hamper accurate assessments anticipated by these ML-based approaches. Therefore, a comprehensive approach is envisioned in this thesis to unleash the power of ML advances while still involving human operators in assessing cybersecurity vulnerabilities within deployed CI networks.Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level of automation in vulnerability analysis. The proposed methodology follows design science research principles to support the development and validation of scientifically-sound artifacts. More specifically, the proposed data-driven cybersecurity architecture orchestrates a range of modules that include: (i) a vulnerability data model that captures a variety of publicly accessible cybersecurity-related data sources; (ii) an ensemble-based ML pipeline method that self-adjusts to the best learning models for given cybersecurity tasks; and (iii) a knowledge taxonomy and its instantiated power grid and manufacturing models that capture CI common semantics of cyberphysical functional dependencies across CI networks in critical societal domains. This research contributes data-driven vulnerability analysis approaches that bridge the knowledge gaps among different security functions, such as vulnerability management through related reports analysis. This thesis also correlates vulnerability analysis findings to coordinate mitigation responses in complex CIs. More specifically, the vulnerability data model expands the vulnerability knowledge scope and curates meaningful contexts for vulnerability analysis processes. The proposed ML methods fill information gaps in vulnerability repositories using curated data while further streamlining vulnerability assessment processes. Moreover, the CI security taxonomy provides disciplined and coherent support to specify and group semanticallyrelated components and coordination mechanisms in order to harness the notorious complexity of CI networks such as those prevalent in power grids and manufacturing infrastructures. These approaches learn through interactive processes to proactively detect and analyze vulnerabilities while facilitating actionable insights for security actors to make informed decisions.

    Download full text (pdf)
    fulltext
  • 9.
    Karlberg, Christoffer
    University of Skövde, School of Informatics. christoffer.karlberg94@gmail.com.
    Spatiala och Diegetiska Användargränssnitts Effekter på Känslan av Närvaro i VR-miljöer: En jämförande studie2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna studie har undersökt effekterna som spatiala och diegetiska användargränssnitt har på känslan av närvaro i VR-miljöer för att lokalisera fallgropar och bidra till att fastställa uppdaterade designkonventioner vid utveckling av VR-applikationer. Introduktionen ger en överblick över hur arbetet gått till och vad frågeställningen varit. I bakgrunden förklaras och definieras viktiga termer samt fokus för arbetet. Därefter beskrivs metoden som nyttjades under undersökningen. Två artefakter togs fram i samband med undersökningen. Utvecklingsprocessen av dessa artefakter beskrivs i kapitel 4: genomförande. Artefakterna kombinerades med semistrukturerade kvalitativa intervjuer och observationer för att samla in data till slutsatserna. Från datan som samlades in kunde det utläsas att det diegetiska användargränssnittet verkade ha en positiv inverkan på användarnas känsla av närvaro i VR-miljön samtidigt som det spatiala var lättare och effektivare att använda. Framtida forskning kan använda denna studie som stöd för att utforska användargränssnitt i fler genrer, användningsområden och applikationer inom VR.

    Download full text (pdf)
    fulltext
  • 10.
    Karvosenoja, Kari
    et al.
    University of Skövde, Department of Engineering Science.
    De Vin, Leo
    University of Skövde, Department of Engineering Science.
    Ujvari, Sandor
    University of Skövde, Department of Industrial Management.
    A wireless platform for short range communication within multi-agent manufacturing environments2003In: Knowledge Driven Manufacturing: Proceedings of the 20th International Manufacturing Conference IMC20 3rd to 5th September 2003 / [ed] Matthew Cotterell, Cork: Cork Institute of Technology Press , 2003, p. 634-641Conference paper (Refereed)
  • 11.
    Li, Xiaoxia
    et al.
    College of Informatics, Huazhong Agricultural University, Wuhan, China.
    Lu, Xin
    Department of Computing and Informatics, Bournemouth University, United Kingdom.
    Wang, Wei
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Jing, Yanguo
    Faculty of Business, Computing and Digital Industries, Leeds Trinity University, United Kingdom.
    Review on Learning-based Methods for shop Scheduling problems2022In: Proceedings 2022 IEEE International Conference on e-Business Engineering ICEBE 2022: 14–16 October 2022 Bournemouth, United Kingdom, IEEE, 2022, p. 294-298Conference paper (Refereed)
    Abstract [en]

    Shop scheduling is an effective way for manufacturers to improve their manufacturing performances. However, due to its complexity, it is difficult to deal with shop scheduling problems (SSP). Thus, SSP has received a lot of attention from industry and academia. Various kinds of methods have been proposed to solve SSP. Learning-based method is just one of the most representative methods for SSP. This paper focuses on reviewing the learning-based methods for SSP. Firstly, the methods for SSP are briefly introduced. Then, its description and model are provided and its classification is discussed. Next, the learning-based methods for SSP are classified according to the machine learning technique used in the methods. Based on the classification, the related work on each type of learning-based methods for SSP is summarized and further analyzed and compared with other traditional methods. Finally, the future research opportunities and challenges of the learning-based methods for SSP are summarized. 

  • 12.
    Rocha Flores, Waldo
    et al.
    Industrial Information and Control Systems, Royal Institute of Technology, Stockholm, Sweden.
    Holm, Hannes
    Swedish Defense Research Agency (FOI), Linköping, Sweden.
    Nohlberg, Marcus
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ekstedt, Mathias
    Industrial Information and Control Systems, Royal Institute of Technology, Stockholm, Sweden.
    An empirical investigation of the effect of target-related information in phishing attacks2014In: IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations EDOCW 2014: 1-2 September 2014 Ulm, Germany: Proceedings / [ed] Georg Grossmann; Sylvain Hallé; Dimka Karastoyanova; Manfred Reichert; Stefanie-Rinderle-Ma, IEEE Computer Society, 2014, p. 357-363Conference paper (Refereed)
    Abstract [en]

    Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first experiment included a traditional mass-email attack with no target-related information, and the second experiment was a targeted phishing attack in which we included specific information related to the targeted employees' organization. The results showed that the number of organizational employees falling victim to phishing significantly increased when target-related information was added in the attack. During the first experiment 5.1 % clicked on the malicious link compared to 27.2 % of the second phishing attack, and 8.9 % of those executed the binary compared to 3.2 % of the traditional phishing attack. Adding target-related information is an effective way for attackers to significantly increase the effectiveness of their phishing attacks. This is the first study that has showed this significant effect using organizational employees as a sample. The implications of the results are further discussed.

  • 13.
    Wang, Jiacheng
    et al.
    University of Skövde, School of Engineering Science.
    Domingos, Luzaisso
    University of Skövde, School of Engineering Science.
    Developing of Data Logging System for Flow Test Station in Industrial Laboratory2016Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    CEJN is a leading transnational company with long history and professional background providing high-tech quick connect products in global market. The headquarters of the com-pany in Skövde, Sweden, is the birthplace and core location of the entire corporation. In the headquarters, the engineer tests their products at their flow test laboratory. In the laboratory, there are flow test stations for all product ranges. Within them, the most basic are flow test benches for air, water and hydraulic oil products. The flow test benches are aim to test the products under International/Swedish standard conditions to determine the performance.

    This project is aimed in upgrading the test benches by engineering both hardware and soft-ware, to achieve higher level of automation of the data logging system used in the lab. All three test benches were designed and installed following requirements in corresponding in-ternational standards. The principles of testing are similar, but they are not developed from the same era, and the automation level of each test bench differs. As a result, the need of up-grading in the benches is different.

    In the laboratory, the recorded test results are reorganized and processed by a report genera-tor developed on Microsoft Excel. The Excel report generator is used for organize test results, calibrate the deviation of the instruments, calculate the flow coefficient of the product, gener-ate performance diagrams of the products, generate test reports for different purpose of use, and save the test data and results on the server of the company.

    Above all, an upgrade of the data logging system for the three flow test benches was needed. Depending on the conditions of each test bench, the project is implemented and designed the following three parts:

    • A hardware upgrading (flow rate computer) for the air flow test benchA new signal indicating device for replacing the old flow rate computer is purchased from Italy by the company. The new instrument contains filter function to stabilize the flow rate value.

    • A software upgrading (Excel report generator) for all the test benchesVisual Basic for Applications (VBA) programming language is used for developing functions such as data communication, signal decoding and user interface developing in Excel.

    • Develop of an automated data visualizing system for the air flow test benchData communication from the new instrument to a PC through serial port and Mod-bus RTU interface is established. The data visualizing function is compiled in the Ex-cel report generator for the air flow test, realized by VBA programming.

    Download full text (pdf)
    Developing of Data Logging System for Flow Test Station in Industrial Laboratory
  • 14.
    Yavariabdi, Amir
    et al.
    Mechatronics Engineering Department, Faculty of Engineering, KTO Karatay University, Konya, Turkey.
    Kusetogullari, Huseyin
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Department of Computer Science, Blekinge Institute of Technology, Karlskrona, Sweden.
    Celik, Turgay
    School of Electrical and Information Engineering and the Wits Institute of Data Science, University of the Witwatersrand, Johannesburg, South Africa ; School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China .
    Cicek, Hasan
    Mechatronics Engineering Department, Faculty of Engineering, KTO Karatay University, Konya, Turkey.
    FastUAV-NET: A multi-UAV detection algorithm for embedded platforms2021In: Electronics, E-ISSN 2079-9292, Vol. 10, no 6, p. 1-19, article id 724Article in journal (Refereed)
    Abstract [en]

    In this paper, a real-time deep learning-based framework for detecting and tracking Unmanned Aerial Vehicles (UAVs) in video streams captured by a fixed-wing UAV is proposed. The proposed framework consists of two steps, namely intra-frame multi-UAV detection and the inter-frame multi-UAV tracking. In the detection step, a new multi-scale UAV detection Convolutional Neural Network (CNN) architecture based on a shallow version of You Only Look Once version 3 (YOLOv3-tiny) widened by Inception blocks is designed to extract local and global features from input video streams. Here, the widened multi-UAV detection network architecture is termed as FastUAV-NET and aims to improve UAV detection accuracy while preserving computing time of one-step deep detection algorithms in the context of UAV-UAV tracking. To detect UAVs, the FastUAV-NET architecture uses five inception units and adopts a feature pyramid network to detect UAVs. To obtain a high frame rate, the proposed method is applied to every nth frame and then the detected UAVs are tracked in intermediate frames using scalable Kernel Correlation Filter algorithm. The results on the generated UAV-UAV dataset illustrate that the proposed framework obtains 0.7916 average precision with 29 FPS performance on Jetson-TX2. The results imply that the widening of CNN network is a much more effective way than increasing the depth of CNN and leading to a good trade-off between accurate detection and real-time performance. The FastUAV-NET model will be publicly available to the research community to further advance multi-UAV-UAV detection algorithms. 

    Download full text (pdf)
    fulltext
  • 15.
    Åstrand, Erik
    University of Skövde, School of Informatics.
    Rendering och manipulering av dom: Undersökning av AngularJS och ReactJS2016Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Webben växer och webbapplikationer blir mer och mer komplexa och innehållsrika. Med detta så ska dessa växande applikationer även kunna presenteras på ett tilltalande och effektivt sätt. Jättarna Facebook, Twitter, Instagram och små bloggar har alla börjat använda sig av en teknik för att kunna dynamiskt ladda in ytterligare innehåll på en sida utan att behöva ladda om den. Denna teknik kallas för Infinite Scroll eller oändlig scrollning. Infinite Scroll kan resultera i enormt stort innehåll vilket tidigare studier visar på att det bidrar till bristande prestanda för rendering och manipulering av innehållet. Arbetet kommer utföra ett experiment där målet är att undersöka hur två populära SPA-ramverk AngularJS och ReactJS hanterar detta problem. 

    Download full text (pdf)
    fulltext
1 - 15 of 15
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf