Högskolan i Skövde

his.sePublications
Change search
Refine search result
123 1 - 50 of 143
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Al Mamun, Abdullah
    et al.
    Division of Software Engineering Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden.
    Berger, Christian
    Division of Software Engineering Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden.
    Hansson, Jörgen
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Explicating, Understanding and Managing Technical Debt from Self-Driving Miniature Car Projects2014In: Proceedings 2014 6th IEEE International Workshop on Managing Technical Debt: MTD 2014, Los Alamitos, CA: IEEE Computer Society, 2014, p. 11-18Conference paper (Refereed)
    Abstract [en]

    Technical debt refers to various weaknesses in the design or implementation of a system resulting from trade-offs during software development usually for a quick release. Accumulating such debt over time without reducing it can seriously hamper the reusability and maintainability of the software. The aim of this study is to understand the state of the technical debt in the development of self-driving miniature cars so that proper actions can be planned to reduce the debt to have more reusable and maintainable software. A case study on a selected feature from two self-driving miniature car development projects is performed to assess the technical debt. Additionally, an interview study is conducted involving the developers to relate the findings of the case study with the possible root causes. The result of the study indicates that "the lack of knowledge" is not the primary reason for the accumulation of technical debt from the selected code smells. The root causes are rather in factors like time pressure followed by issues related to software/hardware integration and incomplete refactoring as well as reuse of legacy, third party, or open source code.

  • 2.
    Aliahmadipour, Laya
    et al.
    Department of Applied Mathematics, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran.
    Torra, Vicenç
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Eslami, Esfandiar
    Department of Pure Mathematics, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran.
    Eftekhari, Mahdi
    Department of Computer Engineering, Faculty of Engineering, Shahid Bahonar University of Kerman, Kerman, Iran.
    A definition for hesitant fuzzy partitions2016In: International Journal of Computational Intelligence Systems, ISSN 1875-6891, E-ISSN 1875-6883, Vol. 9, no 3, p. 497-505Article in journal (Refereed)
    Abstract [en]

    In this paper, we define hesitant fuzzy partitions (H-fuzzy partitions) to consider the results of standard fuzzy clustering family (e.g. fuzzy c-means and intuitionistic fuzzy c-means). We define a method to construct H-fuzzy partitions from a set of fuzzy clusters obtained from several executions of fuzzy clustering algorithms with various initialization of their parameters. Our purpose is to consider some local optimal solutions to find a global optimal solution also letting the user to consider various reliable membership values and cluster centers to evaluate her/his problem using different cluster validity indices.

  • 3.
    Arias Ramos, Ceferino
    University of Skövde, School of Technology and Society.
    Programming and Image Processing in a Compact Production Cell2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In recent years, control system in the automation industries has become more and more useful, covering a wide range of fields, for example, industrial instrumentation, control and monitoring systems. Vision systems are used nowadays to improve products quality control, saving costs, time, and obtaining a better accuracy than a human operator in the manufacturing process of companies. Combining a vision system with a suitable automated system allow companies to cover a wide range of products and rapid production. All these factors are considered in this project.

    The aim of this project is to upgrade the functionality of a Nokia-Cell, which was used in a quality control process for the back shells of Nokia cell phones. The project includes design, upgrade and implementation of a new system in order to make the cell work properly. The Nokia-Cell is composed of the following basic modules: vision and image recognition system, automation system devices (PC and PLC, robot), and other mechatronics devices. The new system will consist of a new camera, due to the poor connectivity and quality of the old camera. For the same reason, a new PC will replace two older ones for communication and vision recognition. The new system will also include a new PLC of Beckhoff to replace the aging one of Omron so as to facilitate the connections using the same language. In addition, IEC-61499 Function Blocks standard is adopted for programming the Nokia-Cell.

    It is expected that the results of this project will contribute to both research and education in the future. In addition, it would be correctly to apply the results to industries in vision-based quality control systems.

    Download full text (pdf)
    Programming and Image Processing in a Production Compact Cell
  • 4.
    Athanasopoulos, George
    et al.
    Department of Econometrics and Business Statistics, Monash University, Australia.
    Kourentzes, Nikolaos
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    On the evaluation of hierarchical forecasts2023In: International Journal of Forecasting, ISSN 0169-2070, E-ISSN 1872-8200, Vol. 39, no 4, p. 1502-1511Article in journal (Refereed)
    Abstract [en]

    The aim of this paper is to provide a thinking road-map and a practical guide to researchers and practitioners working on hierarchical forecasting problems. Evaluating the performance of hierarchical forecasts comes with new challenges stemming from both the structure of the hierarchy and the application context. We discuss several relevant dimensions for researchers and analysts: the scale and units of the time series, the issue of intermittency, the forecast horizon, the importance of multiple evaluation windows and the multiple objective decision context. We conclude with a series of practical recommendations. 

  • 5.
    Ayani, Mikel
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Ng, Amos H. C.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Birtic, Martin
    University of Skövde, School of Engineering Science.
    Optimizing Cycle Time and Energy Efficiency of a Robotic Cell Using an Emulation Model2018In: Advances in Manufacturing Technology XXXII: Proceedings of the 16th International Conference on Manufacturing Research, incorporating the 33rd National Conference on Manufacturing Research, September 11–13, 2018, University of Skövde, Sweden / [ed] Peter Thorvald; Keith Case, Amsterdam: IOS Press, 2018, Vol. 8, p. 411-416Conference paper (Refereed)
    Abstract [en]

    Industrial automated systems are mostly designed and pre-adjusted to always work at their maximum production rate. This leaves room for important energy consumption reductions considering the production rate variations of factories in reality. This article presents a multi-objective optimization application targeting cycle time and energy consumption of a robotic cell. A novel approach is presented where an existing emulation model of a fictitious robotic cell was extended with low-level electrical components modeled and encapsulated as FMUs. The model, commanded by PLC and Robot Control software, was subjected to a multi-objective optimization algorithm in order to find the Pareto front between energy consumption and production rate. The result of the optimization process allows selecting the most efficient energy consumption for the robotic cell in order to achieve the required cycle.

  • 6.
    Barrera Diaz, Carlos Alberto
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Oscarsson, Jan
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Lidberg, Simon
    Manufacturing Engineering, Research and Simulation, Volvo Car Corporation, Skövde, Sweden.
    Sellgren, Tommy
    Manufacturing Engineering, Research and Simulation, Volvo Car Corporation, Skövde, Sweden.
    Discrete Event Simulation Output Data-Handling System in an Automotive Manufacturing Plant2018In: Procedia Manufacturing, E-ISSN 2351-9789, Vol. 25, p. 8p. 23-30Article in journal (Refereed)
    Abstract [en]

    Discrete Event Simulation is a comprehensive tool for the analysis and design of manufacturing systems. Over the years, considerable efforts to improve simulation processes have been made. One step in these efforts is the standardisation of the output data through the development of an appropriate system which presents the results in a standardised way. This paper presents the results of a survey based on simulation projects undertaken in the automotive industry. In addition, it presents the implementation of an automated output data-handling system which aims to simplify the project’s documentation task for the simulation engineers and make the results more accessible for other stakeholders.

    Download full text (pdf)
    fulltext
  • 7.
    Bartha, Lars
    University of Skövde, School of Informatics.
    Biometriska säkerhetslösningars inverkan på IT-forensik inom polisen: En kvalitativ intervjustudie2018Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Passwords have long been the users’ preferred method of choice to protect user accounts and sensitive data. In a strive to find simpler, quicker and more secure forms of authentication methods, biometric security solutions have seen an increased in popularity. Most mobile phones now include a type of biometrical sensors as an option for authentication.

    By conducting a qualitative interview study with IT-forensics employed by the police force in different districts in Västra Götaland county, this study aims to investigate the research question: How have biometric security solutions in comparison to passwords influenced the working methods of IT-forensics at the Swedish Police Authority?

    The study shows that biometric security solutions give no added benefit to security in comparison to passwords, because there is always an underlying security code that is ready to be used in case the biometric authentication fails to work. Therefore, biometric devices suffer from the same kinds of weaknesses that have always plagued passwords.

    Keywords: biometrics, passwords, security, ethics, law, IT-forensics.

    Download full text (pdf)
    fulltext
  • 8.
    Beldar, Pedram
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Battarra, Maria
    School of Management, University of Bath, United Kingdom.
    Laporte, Gilbert
    School of Management, University of Bath, United Kingdom ; Department of Decision Sciences, HEC Montréal, Canada.
    Non-identical parallel machines batch processing problem to minimize the makespan: Models and algorithms2024In: Computers & Operations Research, ISSN 0305-0548, E-ISSN 1873-765X, Vol. 168, article id 106708Article in journal (Refereed)
    Abstract [en]

    This paper studies a parallel heterogeneous machine batching and scheduling problem in which weighted jobs are first batched, and the batches are then assigned and sequenced on machines of varying capacities. The duration of a batch is the longest time needed to process a job, and the objective is that of minimizing the makespan, or the sum of the batches durations on the machine finishing last. The authors develop polynomial-size mathematical formulations and a variable neighborhood search metaheuristic. Extensive computational results suggest that the flow-based formulation outperforms a compact formulation, despite its larger number of variables. The metaheuristic is capable of producing high-quality solutions within a limited computing time.

    Download full text (pdf)
    fulltext
  • 9.
    Berg Marklund, Björn
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Backlund, Per
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Dahlin, Carl-Johan
    ius information AB, Skövde, Sweden.
    Engström, Henrik
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Wilhelmsson, Ulf
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A Game-Based Approach to Support Social Presence and Awareness in Distributed Project-Based Learning2014In: International Journal of Games Based Learning, ISSN 2155-6849, E-ISSN 2155-6857, Vol. 4, no 1, p. 1-20Article in journal (Refereed)
    Abstract [en]

    An important factor for success in project-based learning (PBL) is that the involved project groups establish an atmosphere of social interaction in their working environment. In PBL-scenarios situated in distributed environments, most of a group's work-processes are mediated through the use of production-focused tools that are unconcerned with the important informal and social aspects of a project. On the other hand, there are plenty of tools and platforms that focus on doing the opposite and mainly support informal bonding (e.g., Facebook), but these types of environments can be obtrusive and contain distractions that can be detrimental to a group's productivity and are thus often excluded from working environments. The aim of this paper is to examine how a game-based multi-user environment (MUVE) can be designed to support project-based learning by bridging the gap between productivity-focused and social software. To explore this, the authors developed a game-based MUVE which was evaluated in a PBL-scenario. The result of the study revealed several crucial design elements that are needed to make such a MUVE work effectively, and that the acceptance towards game-based MUVEs is high, even with a rudimentary execution.

  • 10.
    Bergqvist, Emil
    University of Skövde, School of Informatics.
    Auditory displays: A study in effectiveness between binaural and stereo audio to support interface navigation2014Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis analyses if the change of auditory feedback can improve the effectiveness of performance in the interaction with a non-visual system, or with a system used by individuals with visual impairment. Two prototypes were developed, one with binaural audio and the other with stereo audio. The interaction was evaluated in an experiment where 22 participants, divided into two groups, performed a number of interaction tasks. A post-interview were conducted together with the experiment. The result of the experiment displayed that there were no great difference between binaural audio and stereo regarding the speed and accuracy of the interaction. The post-interviews displayed interesting differences in the way participants visualized the virtual environment that affected the interaction. This opened up interesting questions for future studies.

    Download full text (pdf)
    Bergqvist, E., Thesis
  • 11.
    Bergström, Erik
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Pehrsson, Helen
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Performance Assessments in Computer Science - An example of student perceptions2014In: Next Generation Learning Conference: Conference Summary / [ed] Erik Brunnert Walfridsson, 2014, p. 4-16Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 12.
    Birtic, Martin
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Senington, Richard
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Syberfeldt, Anna
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Exploring Production System Knowledge Graph Applications Using a Simulation Framework2024In: Sustainable Production through Advanced Manufacturing, Intelligent Automation and Work Integrated Learning: Proceedings of the 11th Swedish Production Symposium (SPS2024) / [ed] Joel Andersson; Shrikant Joshi; Lennart Malmsköld; Fabian Hanning, IOS Press, 2024, p. 268-279Conference paper (Refereed)
    Abstract [en]

    Knowledge graphs are generating significant interest in industry and research. These graphs can be enriched with data to represent aspects of production systems such as their structure, component interrelationships, and conditions. This provides opportunities to gain insights into system behavior, performance, and states. Such insights could potentially be leveraged by a wide range of technologies for a multitude of purposes and applications such as system control, process optimization, and informed decision making. However, the existing literature addressing industrial applications of knowledge graphs related to production systems remains limited in scope and depth. This underscores the importance of developing methods for exploring the potential use and implementation of knowledge graphs in such systems. The primary focus of this study centers on facilitating such exploration by developing a virtual commissioning simulation framework. A modular production system is modelled that leverages physics, moving product dynamics, and incorporates authentic PLC and robot programs. A knowledge graph is integrated and enriched with data representing various aspects of the system. An application is developed to facilitate product routing and prioritization. A service-oriented approach is used that leverages graph data processing and exchange for service registration and matching. System simulations are conducted and subsequently the framework is evaluated for outcomes and findings. This study demonstrates the successful design and implementation of a production system simulation framework that uses knowledge graphs for system functionality. It demonstrates the exploration of knowledge graph applications through the development of a modular and service-oriented system that includes system functionality supported by the graph. The results highlight the potential of simulation suggesting its capacity for valuable exploration regarding potential applications of knowledge graphs within production systems. 

    Download full text (pdf)
    fulltext
  • 13.
    Bjurén, Johan
    University of Skövde, School of Informatics.
    USING CASE-BASED REASONING FOR PREDICTING ENERGY USAGE2013Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    In this study, the inability to in a future meet the electricity demand and the urge to change the consumption behavior considered. In a smart grid context there are several possible ways to do this. Means include ways to increase the consumer’s awareness, add energy storages or build smarter homes which can control the appliances. To be able to implement these, indications on how the future consumption will be could be useful. Therefore we look further into how a framework for short-term consumption predictions can be created using electricity consumption data in relation to external factors. To do this a literature study is made to see what kind of methods that are relevant and which qualities is interesting to look at in order to choose a good prediction method. Case Based Reasoning seemed to be able to be suitable method. This method was examined further and built using relational databases. After this the method was tested and evaluated using datasets and evaluation methods CV, MBE and MAPE, which have previously been used in the domain of consumption prediction. The result was compared to the results of the winning methods in the ASHRAE competition. The CBR method was expected to perform better than what it did, and still not as good as the winning methods from the ASHRAE competition. The result showed that the CBR method can be used as a predictor and has potential to make good energy consumption predictions. and there is room for improvement in future studies.

    Download full text (pdf)
    fulltext
  • 14.
    Bogers, Toine
    et al.
    Department of Communication & Psychology, Aalborg University, Copenhagen, Denmark.
    Koolen, Marijn
    Huygens ING, Royal Netherlands Academy of Arts and Sciences, Netherlands.
    Mobasher, Bamshad
    School of Computing, DePaul University, United States.
    Said, Alan
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Tuzhilin, Alexander
    Stern School of Business, New York University, United States.
    Workshop on Recommendation in Complex Scenarios (ComplexRec 2017)2017In: RecSys’17: Proceedings of the Eleventh ACM Conference on Recommender Systems, Association for Computing Machinery (ACM), 2017, p. 380-381Conference paper (Other academic)
    Abstract [en]

    Recommendation algorithms for ratings prediction and item ranking have steadily matured during the past decade. However, these state-of-the-art algorithms are typically applied in relatively straightforward scenarios. In reality, recommendation is often a more complex problem: it is usually just a single step in the user's more complex background need. These background needs can often place a variety of constraints on which recommendations are interesting to the user and when they are appropriate. However, relatively little research has been done on these complex recommendation scenarios. The ComplexRec 2017 workshop addressed this by providing an interactive venue for discussing approaches to recommendation in complex scenarios that have no simple one-size-fits-all-solution.

  • 15.
    Butler, Simon
    et al.
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Gamalielsson, Jonas
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Lundell, Björn
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Brax, Christoffer
    Combitech AB, Linköping, Sweden.
    Mattsson, Anders
    Husqvarna AB, Huskvarna, Sweden.
    Gustavsson, Tomas
    PrimeKey Solutions AB, Stockholm, Sweden.
    Feist, Jonas
    RedBridge AB, Stockholm, Sweden.
    Kvarnström, Bengt
    Saab AB, Linköping, Sweden.
    Lönroth, Erik
    Scania CV AB, Södertälje, Sweden.
    Considerations and challenges for the adoption of open source components in software-intensive businesses2022In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 186, article id 111152Article in journal (Refereed)
    Abstract [en]

    Component-Based Software Development is a conventional way of working for software-intensive businesses and OpenSource Software (OSS) components are frequently considered by businesses for adoption and inclusion in softwareproducts. Previous research has found a variety of practices used to support the adoption of OSS components, in-cluding formally specified processes and less formal, developer-led approaches, and that the practices used continue todevelop. Evolutionary pressures identified include the proliferation of available OSS components and increases in thepace of software development as businesses move towards continuous integration and delivery. We investigate workpractices used in six software-intensive businesses in the primary and secondary software sectors to understand currentapproaches to OSS component adoption and the challenges businesses face establishing effective work practices to eval-uate OSS components. We find businesses have established processes for evaluating OSS components and communitiesthat support more complex and nuanced considerations of the cost and risks of component adoption alongside matterssuch as licence compliance and functional requirements. We also found that the increasing pace and volume of softwaredevelopment within some businesses provides pressure to continue to evolve software evaluation processes.

    Download full text (pdf)
    fulltext
  • 16.
    Casas-Roma, Jordi
    et al.
    Faculty of Computer Science, Multimedia and Telecommunications, Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Barcelona, Spain.
    Herrera-Joancomartí, Jordi
    Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, Bellaterra, Spain.
    Torra, Vicenç
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A survey of graph-modification techniques for privacy-preserving on networks2017In: Artificial Intelligence Review, ISSN 0269-2821, E-ISSN 1573-7462, Vol. 47, no 3, p. 341-366Article in journal (Refereed)
    Abstract [en]

    Recently, a huge amount of social networks have been made publicly available. In parallel, several definitions and methods have been proposed to protect users’ privacy when publicly releasing these data. Some of them were picked out from relational dataset anonymization techniques, which are riper than network anonymization techniques. In this paper we summarize privacy-preserving techniques, focusing on graph-modification methods which alter graph’s structure and release the entire anonymous network. These methods allow researchers and third-parties to apply all graph-mining processes on anonymous data, from local to global knowledge extraction.

  • 17.
    Colonese, Emilia
    et al.
    Instituto Tecnológico de Aeronáutica, São José dos Campos, Brazil.
    de Oliveira, Jose Parente
    Instituto Tecnológico de Aeronáutica, São José dos Campos, Brazil.
    Yano, Edgar
    Instituto Tecnológico de Aeronáutica, São José dos Campos, Brazil.
    Amorim, Joni
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten F.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Gustavsson, Per
    Swedish National Defence College, Stockholm, Sweden.
    Cyber Security for Middleware System Architectures2014In: Proceedings of the 9Th International Conference on Cyber Warfare and Security (ICCWS-2014) / [ed] S. Liles, Reading: Academic Conferences Limited, 2014, p. 361-365Conference paper (Refereed)
    Abstract [en]

    This work‐in‐progress paper presents a proposal on how to consider cyber security for the middleware system architecture. The text discusses the steps needed to incorporate cyber security aspects to the Interoperability Reference Model Architecture. The Interoperability Reference Model Architecture was chosen since it provides an effective communication process among components of distributed Real‐Time Systems. The process reduces architectural layers and the development effort due to the formalized reference model design. Also, it may be pointed that the decision for the selection of this framework benefits from a previous research in which the Interoperability Reference Model Architecture was applied in a Real‐Time System prototype to test and validate it. In this research, the focus will be the incorporation of cyber security aspects to Interoperability Reference Model Architecture.

  • 18.
    Crowston, Kevin
    et al.
    Syracuse University, Syracuse, NY, USA.
    Hammouda, ImedUniversity of Gothenburg, Sweden.Lundell, BjörnUniversity of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.Robles, GregorioGSyC, Universidad Rey Juan Carlos, Madrid, Spain.Gamalielsson, JonasUniversity of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.Lindman, JuhoChalmers, Gothenburg, Sweden ; University of Gothenburg, Gothenburg, Sweden.
    Open Source Systems: Integrating Communities: 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedings2016Collection (editor) (Refereed)
    Abstract [en]

    This book constitutes the refereed proceedings of the 12th International IFIP WG 2.13 International Conference on Open Source Systems, OSS 2016, held in Gothenburg, Sweden, in May/June 2016. The 13 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics related to free, libre, and open source software, including: organizational aspects of communities; organizational adoption; participation of women; software maintenance and evolution; open standards and open data; collaboration; hybrid communities; code reviews; and certification.

  • 19.
    Dahlbom, Anders
    et al.
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Nordlund, Per-Johan
    Aeronautics, Saab AB, Linköping, Sweden.
    Detection of Hostile Aircraft Behaviors using Dynamic Bayesian Networks2013In: Proceedings of the 16th International Conference on Information Fusion, IEEE Press, 2013, p. 2033-2040Conference paper (Refereed)
    Abstract [en]

    Aircraft Combat Survivability in military air operations is concerned with survival of the own aircraft. This entails analysis of information, detection and estimation of threats, and the implementation of actions to counteract detected threats. Beyond visual range weapons can today be fired from one hundred kilometers away, making them difficult to detect and track. One approach for providing early warnings of such threats is to analyze the kinematic behavior of enemy aircraft in order to detect situations that may point to malicious intent. In this paper we investigate the use of dynamic Bayesian networks for detecting hostile aircraft behaviors.

  • 20.
    Danielsson, Oscar
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Augmented reality smart glasses as assembly operator support: Towards a framework for enabling industrial integration2020Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Operators are likely to continue to play an integral part in industrial assembly for the foreseeable future. This is in part because increasingly shorter life-cycles and increased variety of products makes automation harder to achieve. As technological advancements enables greater digitalization, the demands for increased individual designs of products increases. These changes, combined with a global competition, does put an increasing strain on operators to handle large quantities of information in a short timeframe. Augmented reality (AR) has been identified as a technology that can present assembly information to operators in an efficient manner. AR smart glasses (ARSG) is an implementation of AR suitable for operators since they are hands-free and can provide individual instructions in the correct context directly in their real work environment. There are currently early adopters of ARSG in production within industry and there are many predictions that ARSG usage will continue to grow. However, to fully integrate ARSG as a tool among others in a modern and complex factory there are several perspectives that a company need to take into consideration. This thesis investigates both the operator perspective and the manufacturing engineering perspective to support industry in how to make the correct investment decisions as regards to ARSG.

    The aim of this licentiate thesis is to provide a basis for a framework to enable industry to choose and integrate ARSG in production as a value adding operator support. This is achieved by investigating the theoretical basis of ARSG related technology and its maturity as well as the needs operators have in ARSG for their usage in assembly. The philosophical paradigm that is followed is that of pragmatism. The methodology used is design science, set in the research paradigm of mixed methods. Data has been collected through experiments with demonstrators, interviews, observations, and literature reviews. This thesis provides partial answers to the overall research aim.

    The thesis shows that the topic is feasible, relevant to industry, and a novel scientific contribution. Observations, interviews, and a literature review gave an overview of the operator perspective. Some highlights from the results are that operators are willing to work with ARSG, that operators need help in unlearning old tasks as well as learning new ones, and that optimal weight distribution of ARSG is dependent on the operators’ head-positioning. Highlights from the preliminary findings for the manufacturing engineering perspective include a general lack of standards for AR as regards vertical industrial application, improved tools for faster instruction generation, and large variations in specifications of available ARSG.

    Future work includes a complete answer to the manufacturing engineering perspective as well as combining all the results to create a framework for ARSG integration in industry.

    Download full text (pdf)
    fulltext
  • 21.
    Derenius, Fredrik
    University of Skövde, School of Humanities and Informatics.
    Framställandet av en säker LiveCD för distansarbetare: Ett projekt baserat på öppen källkod2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Studien ämnar undersöka hur en LiveCD kan stödja en säkrare datormiljö för distansarbetarepå ett enkelt sätt. Distansarbetare arbetar utanför arbetsplatsens säkrare datormiljö vilket gördem till en mer utsatt grupp av datoranvändare. Många av dagens datoranvändare tyckerdessutom säkerhet relaterat till datorer och nätverk är komplicerat. Implementerad lösningtillhandahåller därför möjligheten att med hjälp av en LiveCD och ett USB-minne få tillgångtill både en säker fjärranslutning och fjärrskrivbord, genom att enbart skriva in ett lösenord.Tjänsterna konfigureras alltså automatiskt i bakgrunden; användaren behöver inte hålla redapå mer än ett lösenord. En LiveCD är också ett skrivskyddat medium vilket innebär attskadlig kod har svårt att få fäste i systemet. Resultatet är att distansarbetare med olika behovoch kunskapsnivå gällande dator- och nätverksäkerhet erbjuds möjligheten till en säkraredatormiljö på ett enkelt sätt.

    Download full text (pdf)
    fulltext
  • 22.
    Ding, Jianguo
    et al.
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Department of Computer Science, Blekinge Institute of Technology, Karlskrona, Sweden.
    Naserinia, Vahid
    University of Skövde, School of Informatics.
    Blockchain for future renewable energy2022In: Decentralized Frameworks for Future Power Systems: Operation, Planning and Control Perspectives / [ed] Mohsen Parsa Moghaddam; Reza Zamani; Hassan Haes Alhelou; Pierluigi Siano, Academic Press, 2022, p. 129-146Chapter in book (Refereed)
    Abstract [en]

    To better optimize and control the renewable energy system and its integration with traditional grid systems and other energy systems, corresponding technologies are needed to meet its growing practical application requirements: decentralized management and control, support for decentralized decision-making, fine-grained and timely data sharing, maintain data and business privacy, support fast and low-cost electricity market transactions, maintain the security and reliability of system operation data, and prevent malicious cyberattacks. Blockchain is based on core technologies such as distributed ledgers, asymmetric encryption, consensus mechanisms, and smart contracts and has some excellent features such as decentralization, openness, independence, security, and anonymity. These characteristics seem to meet the technical requirements of future renewable energy systems partially. This chapter will systematically review how blockchain technology can potentially solve the challenges with decentralized solutions for future renewable energy systems and show a guideline to implement blockchain-based corresponding applications for future renewable energy. 

  • 23.
    Einevik, Johan
    et al.
    University of Skövde, School of Engineering Science.
    Kurri, John
    University of Skövde, School of Engineering Science.
    Emulering av en produktioncell med Visionguidning: Virtuell idrifttagning2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Using a virtual twin of a production cell, makes it possible for programming and different functional testing of panels to be performed in early stages of development. A virtual twin contributes to a simpler debugging and to identify problems and minimize cost in commissioning of the production cell. The aim for the project is to investigate how well an emulated cell will perform compared to the real production cell in a factory acceptance test. Another objective is to investigate how you can use real CAD models in the emulation and what type of criteria the models should meet. The project had a lot of challenges and one of them was the difficulty to emulate the safety systems. This was solved by bypassing the safety in the PLC program. One important thing about emulation is communication between the different software used in the system. In this project, it proved successful to distribute the software on three computers to ease the workload of the programs used in the emulation. To use the emulated model instead of the real system is still in the research phase but in this project a lot of useful applications could be identified that could change commissioning in the future.

    Download full text (pdf)
    fulltext
  • 24.
    Ekanayake, Hiran
    et al.
    Stockholm University, Forum 100, Kista, Sweden ; University of Colombo School of Computing, Sri Lanka.
    Backlund, Per
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Ziemke, Tom
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Ramberg, Robert
    Stockholm University, Forum 100, Kista, Sweden.
    Hewagamage, Kamalanath P.
    University of Colombo School of Computing.
    Lebram, Mikael
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Comparing Expert and Novice Driving Behavior in a Driving Simulator2013In: Interaction Design and Architecture(s) Journal - IxD&A, ISSN 1826-9745, no 19, p. 115-131Article in journal (Refereed)
    Abstract [en]

    This paper presents a study focused on comparing driving behavior of expert and novice drivers in a mid-range driving simulator with the intention of evaluating the validity of driving simulators for driver training. For the investigation, measurements of performance, psychophysiological measurements, and self-reported user experience under different conditions of driving tracks and driving sessions were analyzed. We calculated correlations

    between quantitative and qualitative measures to enhance the reliability of the findings. The experiment was conducted involving 14 experienced drivers and 17 novice drivers. The results indicate that driving behaviors of expert and novice drivers differ from each other in several ways but it heavily depends on the characteristics of the task. Moreover, our belief is that the analytical framework proposed in this paper can be used as a tool for selecting appropriate driving tasks as well as for evaluating driving performance in driving simulators.

  • 25.
    Ekelund, Kalle
    University of Skövde, School of Humanities and Informatics.
    Q-Learning: Ett sätt att lära agenter att spela fotboll2013Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Den artificiella intelligensen i spel brukar ofta använda sig utav regelbaserade tekniker för dess beteende. Detta har gjort att de artificiella agenterna blivit förutsägbara, vilket är väldigt tydligt för sportspel. Det här arbetet har utvärderat ifall inlärningstekniken Q-learning är bättre på att spela fotboll än en regelbaserade tekniken tillståndsmaskin. För att utvärdera detta har en förenklad fotbollssimulering skapats. Där de båda lagen har använts sig av varsin teknik. De båda lagen har sedan spelat 100 matcher mot varandra för att se vilket lag/teknik som är bäst. Statistik ifrån matcherna har använts som undersökningsresultat. Resultatet visar att Q-learning är en bättre teknik då den vinner flest match och skapar flest chanser under matcherna. Diskussionen efteråt handlar om hur användbart Q-learning är i ett spelsammanhang.

    Download full text (pdf)
    a10kalek_examensarbete
  • 26.
    Ericsson, AnnMarie
    et al.
    University of Skövde, School of Humanities and Informatics.
    Berndtsson, Mikael
    University of Skövde, School of Humanities and Informatics.
    Detecting Design Errors in Composite Events for Event Triggered Real-Time Systems Using Timed Automata2006In: SCW 2006: IEEE Services Computing Workshops: 18-22 September 2006, Chicago, Illinois: Proceedings / [ed] Malu Castellanos, Jian Yang, IEEE, 2006, p. 39-47Conference paper (Refereed)
    Abstract [en]

    Many applications need to detect and respond to occurring events and combine these event occurrences into new events with a higher level of abstraction. Specifying how events can be combined is often supported by design tools specific to the current event processing engine. However, the issue of ensuring that the combinations of events provide the system with the correct combination of information is often left to the developer to analyze. We argue that analyzing correctness of event composition is a complex task that needs tool support. In this paper we present a novel development tool for specifying composition of events with time constraints. One key feature of our tool is to automatically transform composite events for real-time systems into a timed automaton representation. The timed automaton representation allow us to check for design errors, for example, whether the outcome of combining events with different operators in different consumption policies is consistent with the requirement specification

  • 27.
    Eriksson, Fredrik
    University of Skövde, School of Informatics.
    Modell för lösenordsklassning: Utveckling av lösenordsklassificering2017Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    In modern society, computers are a fundamental part of our lives. For most people, the computer is a tool used in work as well as in home activities. Unfortunately, there is a darker side where people use the computer to commit crimes. The so-called IT-related crimes keep rising in numbers and according to the Swedish Brå:s report from 2016 (Andersson, Hedqvist, Ring & Skarp, 2016) the number of crimes related to it has increased with 949% in Sweden between 2006 and 2015 according to official criminal statistics.

    To arrest the criminals, evidence is needed. One way to collect the evidence is to enter the computer system to collect proof of the suspect. However, if the suspect feels he or she might be a possible target for an investigation, what might happen? It’s possible the suspect tries to make it as difficult as possible to enter the computer system. This can be done by encryption of the system and use a so-called encryption algorithm to lock down the system. This encryption might be very difficult to decrypt and it might be easier so simply trying to find the correct password instead.

    The purpose of the study is to develop a model for password classification. With this model, it may be possible to identify and to categorize strategies users use to create their passwords. This study could contribute to create a foundation to support the IT-forensics working at the police departments. With this model, different strategies users use when creating passwords could be of a certain type that the strategy could perhaps be ranged and categorized in its own category. If a classification can be made it might ease the workload for several IT-forensics and hurry up the progress decoding the password.

    The study is conducted by using a qualitative method. By conducting qualitative interviews, information is collected and analyzed. This information will then be used to develop a model for password classification. The work with developing a model for password classification has been an iterative process with collected feedback from the several interview participants. A draft model, based on the existing research was made. The draft of the model was sent out to the interview participants and this draft was discussed and then updated in an iterative process. Feedback of the updated model was collected and applied to the model. The model was then validated by applying real passwords leaked to the Internet and then test these passwords against the model of password classification.

    Download full text (pdf)
    fulltext
  • 28.
    Ferm, Linus
    University of Skövde, School of Informatics. ferm.ferm@hotmail.se.
    How the graphical representation of the HUD affects the usability of a third person game2018Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The HUD is what allows players to interact with the game world and therefore the visual representation of it is of importance to usability. Usability being broken down into three components: effectiveness, efficiency and satisfaction. To study the subject a third person action game was made for the purpose. The game contained two different HUD versions to test different approaches to UI design. Results for the study were, in relation to usability, inconclusive due to a lack of participants and varying degrees of experience within the pool of participants. Preferences were gathered however, and preferences towards the stylized HUD were shown. Further study is promising as other genres could more easily adapt theories from other software fields.

    Download full text (pdf)
    fulltext
  • 29.
    Ferm, Linus
    University of Skövde, School of Informatics.
    How the Graphical Representation of the HUD Affects the Usability of a Third Person Game2018Independent thesis Basic level (degree of Bachelor of Fine Arts), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The HUD is what allows players to interact with the game world and therefore thevisual representation of it is of importance to usability. Usability being broken down intothree components: effectiveness, efficiency and satisfaction. To study the subject athird person action game was made for the purpose. The game contained two differentHUD versions to test different approaches to UI design. Results for the study were, inrelation to usability, inconclusive due to a lack of participants and varying degrees ofexperience within the pool of participants. Preferences were gathered however, andpreferences towards the stylized HUD were shown. Further study is promising as othergenres could more easily adapt theories from other software fields.

    Download full text (pdf)
    fulltext
  • 30.
    Fox Franke, Daniel
    et al.
    Akamai Technologies, Cambridge, USA.
    Sibold, Dieter
    Physikalisch-Technische Bundesanstalt, Braunschweig, Germany.
    Teichel, Kristof
    Physikalisch-Technische Bundesanstalt, Braunschweig, Germany.
    Dansarie, Marcus
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Sundblad, Ragnar
    Netnod, Sweden.
    Network Time Security for the Network Time Protocol2020Report (Refereed)
    Abstract [en]

    This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).

    NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.

  • 31.
    Frick, Erik
    University of Skövde, School of Informatics.
    Dynamisk grafik med WebGL och Canvas: Atlas och context-switch2015Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Att ha grafiska applikationer i webben har blivit allt mer vanligt sedan World Wide Web kom till i slutet på 80-talet. Till en början handlade det om effektfulla interaktiva element så som reklamskyltar, logotyper och menyknappar. Idag år 2015 har webbläsarna utvecklats så pass långt att inga tredjepartsprogram krävs för att interaktiv grafik ska fungera, vilket tidigare var fallet. Grafiska funktioner och bibliotek finns nu istället inbyggda i webbläsaren. De tekniker som denna rapport/arbete ska behandla är Canvas och WebGL. Dessa är tekniker som används för att presentera interaktiv grafik på webben. WebGL är ett grafiskt bibliotek som bygger på ett känt grafiskt bibliotek vid namnet OpenGL, men konstruerat för webben. Grafiken är hårdvaruaccelererad precis som OpenGL, vilket innebär att tekniken kan åstadkomma relativt kraftfull grafik för att vara en webbapplikation. För en utbildad webbutvecklare kan WebGL upplevas som en svårare värld jämfört med Canvas som ligger närmare en webbutvecklares kunskapsområde. Canvas har även en större tillgänglighet bland webbläsare än WebGL. Detta arbete ska redovisa hur dessa två tekniker förhåller sig till varandra i utritningshastighet tillsammans med en bildteknik kallad Atlas. Atlas teknik är enkelt förklarat när ett bildobjekt är som en atlas med flertal bildobjekt där i som hade kunnat motsvara separata bildobjekt. Detta examensarbete kommer jämföra alla fallen i ett experiment för att kunna ge svar på hur prestanda i utritningshastighet står sig mellan teknikerna Canvas och WebGL med eller utan Atlas teknik.

    Download full text (pdf)
    fulltext
  • 32.
    Gamalielsson, Jonas
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lundell, Björn
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    On Involvement in Open Standards: How Do Organisations Contribute to W3C Standards Through Editorship?2016In: Open Source Systems: Integrating Communities: 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedings / [ed] Kevin Crowston; Imed Hammouda; Björn Lundell; Gregorio Robles; Jonas Gamalielsson; Juho Lindman, Cham: Springer, 2016, 1, Vol. 472, p. 57-70Chapter in book (Refereed)
    Abstract [en]

    Over the years, a number of open standards have been developed and implemented in software for addressing a number of challenges, such as lock-in, interoperability and longevity of software systems and associated digital artefacts. Understanding organisational involvement and collaboration in standardisation is important for informing any future policy and organisational decisions concerning involvement in standardisation. The overarching goal of the study is to establish how organisations contribute to open standards development through editorship. Specifically, the focus is on open standards development in W3C. Through an analysis of editorship for all W3C recommendations we contribute novel findings concerning organisational involvement and collaboration, and highlight contributions from different types of organisations and countries for headquarter of each organisation. We make three principal contributions. First, we establish an overall characterisation of organisational involvement in W3C standardisation. Second, we report on organisational involvement in W3C standardisation over time. Third, we establish organisational collaboration in W3C standardisation through social network analysis.

  • 33.
    Gamalielsson, Jonas
    et al.
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Lundell, Björn
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Grahn, Alexander
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Andersson, Stefan
    RedBridge AB, Kista, Sweden.
    Feist, Jonas
    RedBridge AB, Kista, Sweden.
    Gustavsson, Tomas
    PrimeKey Solutions AB, Solna, Sweden.
    Strindberg, Henrik
    Findwise AB, Göteborg, Sweden .
    Towards a reference model on how to utilise Open Standards in Open Source projects: experiences based on Drupal2013In: Open Source Software: Quality Verification / [ed] Etiel Petrinja; Giancarlo Succi; Nabil El Ioini; Alberto Sillitti, Springer Berlin/Heidelberg, 2013, p. 257-263Conference paper (Refereed)
    Abstract [en]

    It is known that standards implemented in Open Source software (OSS) can promote a competitive market, reduce the risk for lock-in and improve interoperability, whilst there is limited knowledge concerning the relationship between standards and their implementations in OSS. In this paper we report from an ongoing case study conducted in the context of the ORIOS (Open Source software Reference Implementations of Open Standards) project in which influences between OSS communities and software standard communities are investigated. The study focuses on the Drupal project and three of its implemented standards (RDFa, CMIS, and OpenID).

  • 34.
    Gellerstedt, Martin
    Department for Studies of Work, Economics and Health, University of Trollhättan, Uddevalla, Sweden.
    Statistical issues: significantly important in medical research2002In: Allergy. European Journal of Allergy and Clinical Immunology, ISSN 0105-4538, E-ISSN 1398-9995, Vol. 57, no 2, p. 76-82Article, review/survey (Other academic)
  • 35.
    Ghorbani, Ali
    et al.
    University of New Brunswick, Canada.
    Torra, VincençUniversity of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.Hişil, HüseyinYasar University, Turkey.Miri, AliRyerson University, Canada.Koltuksuz, AhmetYasar University, Turkey.Zhang, JieNanyang Technological University, Singapore.Sensoy, MuratOzyegin University, Turkey.García-Alfaro, JoaquínTélécom SudParis, France.Zincir, IbrahimYasar University, Turkey.
    2015 Thirteenth Annual Conference on Privacy, Security and Trust2015Conference proceedings (editor) (Refereed)
  • 36.
    Goienetxea Uriarte, Ainhoa
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Urenda Moris, Matías
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Ng, Amos H. C.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Oscarsson, Jan
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Lean, Simulation and Optimization: A Win-Win combination2016In: Proceedings of the 2015 Winter Simulation Conference / [ed] L. Yilmaz, W. K. V. Chan, I. Moon, T. M. K. Roeder, C. Macal, and M. D. Rossetti, Piscataway, New Jersey: IEEE Computer Society, 2016, p. 2227-2238Conference paper (Refereed)
    Abstract [en]

    Lean and simulation analysis are driven by the same objective, how to better design and improve processes making the companies more competitive. The adoption of lean has been widely spread in companies from public to private sectors and simulation is nowadays becoming more and more popular. Several authors have pointed out the benefits of combining simulation and lean, however, they are still rarely used together in practice. Optimization as an additional technique to this combination is even a more powerful approach especially when designing and improving complex processes with multiple conflicting objectives. This paper presents the mutual benefits that are gained when combining lean, simulation and optimization and how they overcome each other´s limitations. A framework including the three concepts, some of the barriers for its implementation and a real-world industrial example are also described.

  • 37.
    Grünloh, Christiane
    et al.
    School of Computer Science and Communication, KTH Royal Institute of Technology, Stockholm, Sweden / Institute of Informatics, Technische Hochschule Köln, University of Applied Sciences, Gummersbach, Germany.
    Myreteg, Gunilla
    Department of Business Studies, Uppsala University, Uppsala, Sweden.
    Cajander, Åsa
    Department of Information Technology, Uppsala University, Uppsala, Sweden.
    Rexhepi, Hanife
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    "why do they need to check me?" patient participation through ehealth and the doctor-patient relationship: Qualitative study2018In: Journal of Medical Internet Research, E-ISSN 1438-8871, Vol. 20, no 1, article id e11Article in journal (Refereed)
    Abstract [en]

    Background: Roles in the doctor-patient relationship are changing and patient participation in health care is increasingly emphasized. Electronic health (eHealth) services such as patient accessible electronic health records (PAEHRs) have been implemented to support patient participation. Little is known about practical use of PAEHR and its effect on roles of doctors and patients. Objective: This qualitative study aimed to investigate how physicians view the idea of patient participation, in particular in relation to the PAEHR system. Hereby, the paper aims to contribute to a deeper understanding of physicians' constructions of PAEHR, roles in the doctor-patient relationship, and levels and limits of involvement. Methods: A total of 12 semistructured interviews were conducted with physicians in different fields. Interviews were transcribed, translated, and a theoretically informed thematic analysis was performed. Results: Two important aspects were identified that are related to the doctor-patient relationship: roles and involvement. The physicians viewed their role as being the ones to take on the responsibility, determining treatment options, and to be someone who should be trusted. In relation to the patient's role, lack of skills (technical or regarding medical jargon), motives to read, and patients' characteristics were aspects identified in the interviews. Patients were often referred to as static entities disregarding their potential to develop skills and knowledge over time. Involvement captures aspects that support or hinder patients to take an active role in their care. Conclusions: Literature of at least two decades suggests an overall agreement that the paternalistic approach in health care is inappropriate, and a collaborative process with patients should be adopted. Although the physicians in this study stated that they, in principle, were in favor of patient participation, the analysis found little support in their descriptions of their daily practice that participation is actualized. As seen from the results, paternalistic practices are still present, even if professionals might not be aware of this. This can create a conflict between patients who strive to become more informed and their questions being interpreted as signs of critique and mistrust toward the physician. We thus believe that the full potential of PAEHRs is not reached yet and argue that the concept of patient empowerment is problematic as it triggers an interpretation of "power" in health care as a zero-sum, which is not helpful for the maintenance of the relationship between the actors. Patient involvement is often discussed merely in relation to decision making; however, this study emphasizes the need to include also sensemaking and learning activities. This would provide an alternative understanding of patients asking questions, not in terms of "monitoring the doctor" but to make sense of the situation.

    Download full text (pdf)
    fulltext
  • 38.
    Gustavsson, Per M.
    et al.
    Saab, Sweden ; C4I Center, George Mason University, United States.
    Hieb, Michael R.
    C4I Center, George Mason University, United States.
    Niklasson, Lars
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Moore, Philip
    De Montfort University, United Kingdom.
    Eriksson, Patric
    De Montfort University, United Kingdom.
    Formalizing operations intent and effects for network-centric applications2009In: Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS: 5-8 January 2009 Waikoloa, Big Island, Hawaii / [ed] Ralph H. Sprague Jr., IEEE Computer Society, 2009Conference paper (Refereed)
    Abstract [en]

    A Network-Centric approach enables systems to be interconnected in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments require commanders to plan for more flexible missions that allow organizations from various nations and agencies to join or separate from the teams performing the missions, depending on the situation. The uncertainty inherent in an actual mission, and the variety of potential organizations that support the mission after it is underway, makes Command Intent (CI) a critical concept for the mission team. Both humans and computerized decision support services need to have the ability to communicate and interpret a shared CI. This paper presents the Operations Intent and Effects Model (OIEM) - a model that relates CI to Effects, and supports both traditional military planning and Effects Based Operation. In the provided example the suggested Command and Control Language is used to express Operations Intent and Effects. © 2009 IEEE.

  • 39.
    Hallin, Jonas
    University of Skövde, School of Informatics.
    Svärm-AI i shooters2015Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Svärm-AI är en variant av artificiell intelligens (AI) som används för att simulera ett bettende liknande det man kan se i svärmar, flockar eller stim. Syftet med detta arbete är att undersöka ifall man kan använda svärm-AI för att förbättra en AI i ett top down shooter spel där två lag slåss mot varandra. Ett program skapades för att testa detta där de två lagen båda var datorstyrda enheter och fick slåss mot varandra för att samla mätvärden. Resultaten visar att svärm-AI presterade bättre i labyrintliknande banor utan stora tomma områden. De visade även att svärm-AI använde betydligt mycket mer prestanda.

    Download full text (pdf)
    fulltext
  • 40.
    Hansson, Jörgen
    et al.
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Helton, Steve
    The Boeing Company, USA.
    Feiler, Peter H.
    Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, USA.
    ROI Analysis of the System Architecture Virtual Integration Initiative2018Report (Other academic)
    Abstract [en]

    The System Architecture Virtual Integration (SAVI) initiative is a multiyear, multimillion dollar program that is developing the capability to virtually integrate systems before designs are implemented and tested on hardware. The purpose of SAVI is to develop a means of countering the costs of exponentially increasing complexity in modern aerospace software systems. The program is sponsored by the Aerospace Vehicle Systems Institute, a research center of the Texas Engineering Experiment Station, which is a member of the Texas A&M University System. This report presents an analysis of the economic effects of the SAVI approach on the development of software-reliant systems for aircraft compared to existing development paradigms. The report describes the detailed inputs and results of a return-on-investment (ROI) analysis to determine the net present value of the investment in the SAVI approach. The ROI is based on rework cost-avoidance attributed to earlier discovery of requirements errors through analysis of virtually integrated models of the embedded software system expressed in the SAE International Architecture Analysis and Design Language (AADL) standard architecture modeling language. The ROI analysis uses conservative estimates of costs and benefits, especially for those parameters that have a proven, strong correlation to overall system-development cost. The results of the analysis, in part, show that the nominal cost reduction for a system that contains 27 million source lines of code would be $2.391 billion (out of an estimated $9.176 billion), a 26.1% cost savings. The original study, reported here, had a follow-on study to validate and further refine the estimated cost savings.

  • 41.
    Heljegård, Filip
    University of Skövde, School of Informatics.
    HTML5 Canvas object rendering: Rendering av olika objekt i olika webbläsare2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna rapport tar upp tester av renderingstider av olika Canvas objekt. Objeken är unika från varandra och pressar olika webbläsare för att ta reda på information om renderingsmotorn i webbläsaren.

    Download full text (pdf)
    HTML5 Canvas object rendering
  • 42.
    Hernández Rentería, Luis Alejandro
    University of Skövde, School of Informatics.
    Gamified layer for Google Classroom to improve the user experience and engagement of students with ADHD2017Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    The implementation of a Course Management System into an educational institution oriented to students with learning disabilities such as ADHD,  represents a big challenge since these students experience persistent impairments in attention (or concentration) that impact negatively on their learning outcomes, engagement and motivation. It’s crucial to adapt and enhance these environments having in consideration the students’ special learning needs, in order to improve their user experience and engagement during their learning process. This thesis address the design and development of gamified layer that brings a current analog gamification practice into a Course Management System Environment, Google Classroom (GC). The prototype developed retrieves, transforms and shows the GC data in form of game elements such as points, badges, and progress bars, among others. After using the prototype during three weeks, the students showed an easy familiarization with the gamified layer of GC and an active participation and persistence during their course activities.

    Download full text (pdf)
    gamified-layer-googleclassroom-adhd
  • 43.
    Hesselbom, Anton
    University of Skövde, School of Informatics.
    Neuroevolution med tävlingsinriktad samevolution i flera miljöer med ökande komplexitet2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    NEAT är en neuroevolutionsteknik som kan användas för att träna upp AI-kontrollerade robotar utan att behöva tillföra någon mänsklig expertis eller tidigare kunskap till systemet. Detta arbete undersöker hur väl denna teknik fungerar tillsammans med samevolution för att utveckla robotar i en tävlingsmiljö, med fokus på att testa tekniken på flera olika nivåer med varierande mängd komplexitet i form av väggar och hinder.

    Tekniken utvärderas genom att låta robotarna tävla mot varandra, deras kompetens mäts sedan från resultaten av dessa tävlingar. Exempelvis deras förmåga att vinna matcher.

    Resultaten visar att tekniken fungerade bra på nivån med låg komplexitet, men att robotarna har vissa svårigheter att lära sig kompetenta strategier på nivåerna med högre komplexitet. Tekniken har dock potential för flera olika varianter och förbättringar som potentiellt kan förbättra resultatet även på de mer komplexa nivåerna.

    Download full text (pdf)
    fulltext
  • 44.
    Holgersson, Jesper
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Linköping University, Sweden.
    Melin, Ulf
    Linköping University, Sweden.
    Lindgren, Ida
    Linköping University, Sweden.
    Axelsson, Karin
    Linköping University, Sweden.
    Exploring User Participation Practice in Public E-Service Development: Why, How and in Whose Interest?2018In: The Electronic Journal of e-Government, ISSN 1479-439X, Vol. 16, no 1, p. 72-86Article in journal (Refereed)
    Abstract [en]

    User participation is seen as an important enabler for successful public e-service development. However, at the same time development of public e-services is still often characterised by an internal government perspective with little consideration for external users’ perspectives. This paper challenges the overly positive attitude that is surrounding user participation in e-government research. The paper aims to illustrate and problematize various aspects that influence why, how, and in whose interest user participation is conducted in public e-service development. First, via a literature review, we identify a set of dimensions for critically exploring how, why, and in whose interest user participation is conducted in public e-service development projects. Second, we use these dimensions in order to characterise and analyse three empirical public e-service development cases in order to test the utility, usefulness, and feasibility of the identified dimensions. Our findings highlight the importance of questioning and elaborating on the motives behind user participation (the why) in public e-service development. We also identify two basic forms of how user participation is addressed in public e-service development projects: 1) veneered participation, and 2) ad-hoc participation. Furthermore, we argue that any decisions made regarding user participation in public e-service development should be based on conscious and informed choices concerning why user participation is needed and what it may bring for different stakeholders and their interests.

    Download full text (pdf)
    fulltext
  • 45.
    Huskaj, Gazmend
    et al.
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Swedish Defence University, Stockholm, Sweden.
    Iftimie, Ion A.
    NATO Defense College, Rome, Italy / European Union Research Center, George Washington School of Business, Washington, DC, United States.
    Wilson, Richard L.
    Towson University, United States / Hoffberger Center for Professional Ethics, University of Baltimore, United States.
    Designing attack infrastructure for offensive cyberspace operations2020In: Proceedings of the 19th European Conference on Cyber Warfare and Security: a virtual conference hosted by University of Chester UK 25-26 June 2020 / [ed] Thaddeus Eze, Lee Speakman, Cyril Onwubiko, Reading, UK: Academic Conferences and Publishing International Limited, 2020, p. 473-482Conference paper (Refereed)
    Abstract [en]

    This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 

  • 46.
    Iftimie, Ion A.
    et al.
    NATO Defense College, Rome, Italy / European Union Research Center, George Washington School of Business, Washington, D.C. / Central European University, Vienna, Austria.
    Huskaj, Gazmend
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Swedish Defence University, Stockholm, Sweden.
    Strengthening the cybersecurity of smart grids: The role of artificial intelligence in resiliency of substation intelligent electronic devices2020In: Proceedings of the 19th European Conference on Cyber Warfare and Security: a virtual conference hosted by University of Chester UK 25-26 June 2020 / [ed] Thaddeus Eze, Lee Speakman, Cyril Onwubiko, Reading, UK: Academic Conferences and Publishing International Limited, 2020, p. 143-150Conference paper (Refereed)
    Abstract [en]

    The Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure—issued by the President of the United States, calls for an evaluation of the “readiness and gaps in the United States’ ability to manage and mitigate consequences of a cyber incident against the electricity subsector.” In May of 2018, the Office of Management and Budget finished evaluating the 96 risk assessments conducted by various agencies and published Federal Cybersecurity Risk Determination Report and Action Plan (Risk Report). While the report embraced a broad defending forward strategy, it made no reference to smart grids or their vulnerable intelligent substations and did not address how federal agencies plan to respond to emerging threats to these systems. While the paper does not discuss how to attack the smart grids in the cyber domain, the contribution to the academic debate lies in validating some of the vulnerabilities of the grid’s substations in order for government, private industry, academia, and civil society to better collaborate in disrupting or halting malicious cyber activities before they disrupt the power supply of the United States and its Transatlantic allies. We also discuss how Artificial Intelligence and related techniques can mitigate security risks to cyber-physical systems. Until this technology becomes available, however, standardization of cyber security efforts must be enforced through regulatory means, such as the enforcement of security-by-design Intelligent Electronic Devices and protocols for the smart grid. 

  • 47.
    Igelmo, Victor
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Syberfeldt, Anna
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Hansson, Jörgen
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Aslam, Tehseen
    University of Skövde, School of Engineering Science. University of Skövde, Virtual Engineering Research Environment.
    Enabling Industrial Mixed Reality Using Digital Continuity: An Experiment Within Remanufacturing2022In: SPS2022: Proceedings of the 10th Swedish Production Symposium / [ed] Amos H. C. Ng; Anna Syberfeldt; Dan Högberg; Magnus Holm, Amsterdam; Berlin; Washington, DC: IOS Press, 2022, p. 497-507Conference paper (Refereed)
    Abstract [en]

    In the digitalisation era, overlaying digital, contextualised information on top of the physical world is essential for an efficient operation. Mixed reality (MR) is a technology designed for this purpose, and it is considered one of the critical drivers of Industry 4.0. This technology has proven to have multiple benefits in the manufacturing area, including improving flexibility, efficacy, and efficiency. Among the challenges that prevent the big-scale implementation of this technology, there is the authoring challenge, which we address by answering the following research questions: (1) “how can we fasten MR authoring in a manufacturing context?” and (2) “how can we reduce the deployment time of industrial MR experiences?”. This paper presents an experiment performed in collaboration with Volvo within the remanufacturing of truck engines. MR seems to be more valuable for remanufacturing than for many other applications in the manufacturing industry, and the authoring challenge appears to be accentuated. In this experiment, product lifecycle management (PLM) tools are used along with internet of things (IoT) platforms and MR devices. This joint system is designed to keep the information up-to-date and ready to be used when needed. Having all the necessary data cascading from the PLM platform to the MR device using IoT prevents information silos and improves the system’s overall reliability. Results from the experiment show how the interconnection of information systems can significantly reduce development and deployment time. Experiment findings include a considerable increment in the complexity of the overall IT system, the need for substantial investment in it, and the necessity of having highly qualified IT staff. The main contribution of this paper is a systematic approach to the design of industrial MR experiences.

    Download full text (pdf)
    fulltext
  • 48.
    Istanbullu, Alexander
    University of Skövde, School of Humanities and Informatics.
    Prestandajämförelse av textbaserade och binära dataformat för AJAX2013Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Introduktionen av AJAX har möjliggjort skapandet av dynamiska webbapplikationer på Internet. Dessa dynamiska webbapplikationer bygger på att skicka data mellan klient och server med hjälp av asynkrona förfrågningar. Detta görs med hjälp av ett serialiseringsformat som används för att kompaktera data och möjliggöra kommunikation mellan olika programmeringsspråk. Binära serialiseringsformat har konsistent visat sig prestera bättre än de textbaserade alternativen på plattformar som tillåter binär transport av data. AJAX är en plattform som endast tillåter textbaserad transport av data. Detta arbete syftar till att jämföra prestandan av textbaserade och binära serialiseringsformat för AJAX med hjälp av bland annat round-trip time. Arbetet har utförts genom att skapa en webbapplikation som utför prestandamätningar med hjälp av olika datamängder med varierande storlek och innehåll. Resultaten visar att binära serialiseringsformat endast skulle kunna vara ett tänkbart alternativ när det rör sig om webbapplikationer som skickar mycket sifferdominant data.

    Download full text (pdf)
    Prestandajämförelse av textbaserade och binära dataformat för AJAX
  • 49.
    Javeed, Ashir
    et al.
    Aging Research Center, Karolinska Institutet, Stockholm, Sweden ; Department of Health, Blekinge Institute of Technology, Karlskrona, Sweden.
    Saleem, Muhammad Asim
    Center of Excellence in Artificial Intelligence, Machine Learning and Smart Grid Technology, Department of Electrical Engineering, Chulalongkorn University, Bangkok, Thailand.
    Dallora, Ana Luiza
    Department of Health, Blekinge Institute of Technology, Karlskrona, Sweden.
    Ali, Liaqat
    Department of Electrical Engineering, University of Science and Technology Bannu, Pakistan.
    Sanmartin Berglund, Johan
    Department of Health, Blekinge Institute of Technology, Karlskrona, Sweden.
    Anderberg, Peter
    University of Skövde, School of Health Sciences. University of Skövde, Digital Health Research (DHEAR). Department of Health, Blekinge Institute of Technology, Karlskrona, Sweden.
    Decision Support System for Predicting Mortality in Cardiac Patients Based on Machine Learning2023In: Applied Sciences, E-ISSN 2076-3417, Vol. 13, no 8, article id 5188Article in journal (Refereed)
    Abstract [en]

    Researchers have proposed several automated diagnostic systems based on machine learning and data mining techniques to predict heart failure. However, researchers have not paid close attention to predicting cardiac patient mortality. We developed a clinical decision support system for predicting mortality in cardiac patients to address this problem. The dataset collected for the experimental purposes of the proposed model consisted of 55 features with a total of 368 samples. We found that the classes in the dataset were highly imbalanced. To avoid the problem of bias in the machine learning model, we used the synthetic minority oversampling technique (SMOTE). After balancing the classes in the dataset, the newly proposed system employed a (Formula presented.) statistical model to rank the features from the dataset. The highest-ranked features were fed into an optimized random forest (RF) model for classification. The hyperparameters of the RF classifier were optimized using a grid search algorithm. The performance of the newly proposed model ((Formula presented.) _RF) was validated using several evaluation measures, including accuracy, sensitivity, specificity, F1 score, and a receiver operating characteristic (ROC) curve. With only 10 features from the dataset, the proposed model (Formula presented.) _RF achieved the highest accuracy of 94.59%. The proposed model (Formula presented.) _RF improved the performance of the standard RF model by 5.5%. Moreover, the proposed model (Formula presented.) _RF was compared with other state-of-the-art machine learning models. The experimental results show that the newly proposed decision support system outperforms the other machine learning systems using the same feature selection module ((Formula presented.)). 

    Download full text (pdf)
    fulltext
  • 50.
    Jeusfeld, Manfred A.
    Tilburg University, Department of Information Management, The Netherlands.
    Metamodeling and method engineering with ConceptBase2009In: Metamodeling for Method Engineering / [ed] Manfred A. Jeusfeld; Matthias Jarke; John Mylopoulos, Cambridge, Massachusetts, USA: MIT Press, 2009, p. 89-168Chapter in book (Other academic)
    Abstract [en]

    This chapter provides a practical guide on how to use the meta datarepository ConceptBase to design information modeling methods by using meta-modeling. After motivating the abstraction principles behind meta-modeling, thelanguage Telos as realized in ConceptBase is presented. First, a standard factualrepresentation of statements at any IRDS abstraction level is defined. Then, thefoundation of Telos as a logical theory is elaborated yielding simple fixpointsemantics. The principles for object naming, instantiation, attribution, andspecialization are reflected by roughly 30 logical axioms. After the languageaxiomatization, user-defined rules, constraints and queries are introduced. The firstpart is concluded by a description of active rules that allows the specification ofreactions of ConceptBase to external events. The second part applies the languagefeatures of the first part to a full-fledged information modeling method: The Yourdanmethod for Modern Structured Analysis. The notations of the Yourdan method aredesigned along the IRDS framework. Intra-notational and inter-notational constraintsare mapped to queries. The development life cycle is encoded as a software processmodel closely related to the modeling notations. Finally, aspects managing themodeling activities are addressed by metric definitions.

    Download full text (pdf)
    fulltext
123 1 - 50 of 143
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf