his.sePublications
Change search
Refine search result
1234567 101 - 150 of 857
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Bernedixen, Jacob
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Ng, Amos H. C.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Multiple Choice Sets and Manhattan Distance Based Equality Constraint Handling for Production Systems OptimizationIn: Computers & Operations Research, ISSN 0305-0548, E-ISSN 1873-765XArticle in journal (Refereed)
    Abstract [en]

    Many simulation-based optimization packages provide powerful algorithms to solve industrialproblems. But most of them fail to oer their users the techniques they needto eectively handle multiple-choice problems involving a large set of decision variableswith mixed types (continuous, discrete and combinatorial) and problems that are highlyconstrained (e.g., with many equality constraints). Yet such issues are found in manyreal-world production system design and improvement problems. Thus, this paper introducesa method to eectively embed multiple choice sets and Manhattan-distancebasedconstraint handling into multi-objective optimization algorithms like NSGA-II andNSGA-III. This paper illustrates and evaluates how these two techniques have been appliedtogether to solve optimal workload, buer and workforce allocation problems. Anexample follows, showing their application to a complex production system improvementproblem at an automotive manufacturer.

  • 102.
    Bernedixen, Jacob
    et al.
    University of Skövde, The Virtual Systems Research Centre. University of Skövde, School of Engineering Science.
    Ng, Amos H. C.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Bandaru, Sunith
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    On the convergence of stochastic simulation-based multi-objective optimization for bottleneck identificationIn: International Journal of Production Research, ISSN 0020-7543, E-ISSN 1366-588XArticle in journal (Refereed)
    Abstract [en]

    By innovatively formulating a bottleneck identication problem into a bi-objective optimization,simulation-based multi-objective optimization (SMO) can be eectively used as a new method for gen-eral production systems improvement. In a single optimization run, all attainable, maximum throughputlevels of the system can be sought through various optimal combinations of improvement changes ofthe resources. Additionally, the post-optimality frequency analysis on the Pareto-optimal solutions cangenerate a rank order of the attributes of the resources required to achieve the target throughput levels.Observing that existing research mainly put emphasis on measuring the convergence of the optimizationin the objective space, leaving no information on when the solutions in the decision space have convergedand stabilized, this paper represents the rst eort in increasing the knowledge about the convergence ofSMO for the rank ordering in the context of bottleneck analysis. By customizing the Spearman's footruledistance and Kendall's tau, this paper presents how these metrics can be used eectively to provide thedesired visual aid in determining the convergence of bottleneck ranking, hence can assist the user todetermine correctly the terminating condition of the optimization process. It illustrates and evaluatesthe convergence of the SMO for bottleneck analysis on a set of scalable benchmark models as well as twoindustrial simulation models. The results have shed promising direction of applying these new metrics tocomplex, real-world applications.

  • 103.
    Bernedixen, Jacob
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Ng, Amos H. C.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Bandaru, Sunith
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Variables Screening Enabled Multi-Objective Optimization for Bottleneck Analysis of Production SystemsManuscript (preprint) (Other academic)
    Abstract [en]

    Bottleneck analysis can be defined as the process that includes both bottleneck identification and improvement. In the literature most of the proposed bottleneck-related methods address mainly bottleneck detection. By innovatively formulating a bottleneck analysis into a bi-objective optimization method, recent research has shown that all attainable, maximized TH of a production system, through various combinations of improvement changes of the resources, can be sought in a single optimization run. Nevertheless, when applied to simulation-based evaluation, such a bi-objective optimization is computationally expensive especially when the simulation model is complex and/or with a large amount of decision variables representing the improvement actions. The aim of this paper is therefore to introduce a novel variables screening enabled bi-objective optimization that is customized for bottleneck analysis of production systems. By using the Sequential Bifurcation screening technique which is particularly suitable for large-scale simulation models, fewer simulation runs are required to find the most influenacing factors in a simulation model. With the knowledge of these input variables, the bi-objective optimization used in the bottleneck analysis can customize the genetic operators on these variables individually according to their rank of main effects with the target to speed up the entire optimization process. The screening-enabled algorithm is then applied to a set of experiments designed to evaluate how well it performs when the number of variables increases is a scalable, benchmark model, as well as two real-world industrial-scale simulation models found in the automotive industry. The results have illustrated the promising direction of incorporating the knowledge of influencing variables and variable-wise genetic operators into a multi-objective optimization algorithm for bottleneck analysis.

  • 104.
    Biederbeck, Anders
    University of Skövde, Department of Computer Science.
    Integrating Automatic Run-time Network Maintenance into Network Management using CORBA1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    This work address the adding, removing and upgrading of network elements in a computer network at run-time. This is already accomplished by Sun Microsystems Jini architecture, but we have investigated if it is possible to create a maintenance system that can handle this, using CORBA. We also want the manual intervention to be minimal. We have discovered that it is possible to create such a system, using CORBA, and that this solution also can handle upgrading a network element at run-time. This report outlines the design of this system, realizing automatic run-time network maintenance.

  • 105.
    Birgersson, Sebastian
    University of Skövde, Department of Computer Science.
    Vilka funktionskrav ställs på MPS-system för plastindustrin?2000Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Vilka funktionskrav ställs på MPS-system för plastindustrin? Vad är det för faktorer som medför att existerande standardiserade MPS-system inte kan användas inom processindustrin? Det är dessa frågeställningar ligger till grund för denna rapport.

    Rapporten inleds med en genomgång av hur kravspecifikationer bör utformas, vad material- och produktionsstyrning innebär samt en introduktion till process- och plastindustrin. I de fallstudier som presenteras diskuteras processen från order till leverans med avseende på material- och produktionsstyrning.

    De funktionskrav, som identifieras som viktigast för ett MPS-system för plast-industrin, kan innefattas i följande punkter:

    · Prognoshantering som kan omvandla försäljningsprognos till leveransplan.

    · Verktygshantering som klarar en koppling mellan produkt och verktyg.

    · Materialbehovsberäkning som kan hantera ingöt kontra produkt.

    · Spårning vid felsökning.

  • 106.
    Birgisson, Ragnar
    University of Skövde, Department of Computer Science.
    Improving Testability of Applications in Active Real-Time Database Environments1998Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The test effort required to achieve full test coverage of an event-trigered real-time system is very high. In this dissertation, we investigate a method for reducing this effort by constraining behavior of the system. We focus on system level testing of applications with respect to timeliness. Our approach is to define a model for constraining real-time systems to improve testability. Using this model applicability of our constraints is easily determined because all the pertinent assumptions are clearly stated. We perform a validation of a test effort upper bound for event-triggered real-time systems with respect to this model. Effects that constraints for improving testability have on predictability, efficiency, and scheduling are investigated and validated. Specific design guidelines for selection of appropriate constraint values are presented in this work. Finally, we discuss mechanisms for handling constraint violations.

  • 107.
    Birgisson, Ragnar
    et al.
    University of Skövde, Department of Computer Science.
    Mellin, Jonas
    University of Skövde, Department of Computer Science.
    Andler, Sten F.
    University of Skövde, Department of Computer Science.
    Bounds on Test Effort for Event-Triggered Real-Time Systems1999Report (Other academic)
    Abstract [en]

    The test effort required for full test coverage is much higher in an event-triggered than in a time-triggered real-time system. This makes it difficult to attain confidence in the correctness of event-triggered real-time applications by testing, which is a necessary complement to other verification methods. We present a more general upper bound on the test effort of constrained event-triggered real-time systems, assuming multiple resources (a refinement of previous results). The emphasis is on system level testing of application timeliness, assuming that sufficient confidence in its functional correctness has been attained. Covered fault types include incorrect assumptions about temporal attributes of application and execution environment, and synchronization faults. An analysis of the effects that our constraints have on predictability and efficiency shows that the use of designated preemption points is required. A key factor in this approach is the ability to reduce the number of required test cases while maintaining full test coverage.

  • 108.
    Birkås, Philip
    University of Skövde, School of Informatics.
    När tekniken behöver hinna ikapp affärsbehoven: En studie med fokus på hur data virtualization kan komplettera ett data warehouse2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Data warehouse has for a long time been, and still is, an important asset for organizations to store data for analysis. In the last decade, an exponential increase in data has taken place, giving organizations increasingly greater opportunities to make data-driven decisions in completely new ways. Nevertheless, in many cases, it also puts pressure on organizations to use data as an asset to react and take advantage of opportunities in a harder business climate, or even to maintain competitiveness. In order to enable organizations to be able to react in time, flexibility requirements are imposed on the techniques used to handle data for analysis. The traditional best practices for data warehouse is predicted to soon be out of date. Organizations need to find new ways to quickly change and adapt to the needs of the market. Many organizations currently have a traditional data warehouse, and this study examines how well data virtualization can help increase flexibility by being added as a complement. This is examined through the question:How can data virtualization complement and improve a traditional data warehouse?To answer this question, a literature analysis, and a case study followed by an implementation is carried out, in which the data collection consists primarily of tests performed on the implementation result, observations and interviews.The result shows a divided picture, where performed tests can potentially be seen as questioning parts of the interview results and existing literature. Based on the result, some findings can be made about in which use-cases data virtualization does not fit, and gives a picture of when it can be an alternative. Data virtualization should be seen as an extension of a data warehouse that enables the federation, transformation and computation of data, where data structures can be changed at any time. However, an organization that embraces this more flexible solution must be prepared for substantially increased response times in data extraction.

  • 109.
    Biro, Zoltan
    University of Skövde, Department of Computer Science.
    Exploring possible organizations for visually-guided orientation1997Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This dissertation is concerned with exploring the behaviour and the internal properties of agent controllers which employ recurrent artificial neural networks, whose internal dynamics have been evolved by an evolutionary algorithm for coping with a visually-guided orientation task. Guided by a very simple fitness function, defined at behaviour level, the evolution allowed for emergence of different strategies, two of which are analysed in detail using traditional connectionist analysis methods. The examined strategies succeed in the orientation task by inherently handling a simple form of the object persistence problem in the limited environment, and by employing behaviours which include passive and active search, object tracking, obstacle avoidance, and a simple form of discrimination, each of which were observed to correspond to hidden unit activation subspaces.

  • 110.
    Biro, Zoltan
    et al.
    University of Skövde, Department of Computer Science.
    Ziemke, Tom
    University of Skövde, Department of Computer Science.
    Evolution of visually-guided approach behaviour in recurrent artificial neural network robot controllers1998Report (Other academic)
    Abstract [en]

    Analysis of internal structures of embodied and situated agents may provide insights into the mechanisms underlying adaptive behaviour. This paper is concerned with the evolution and analysis of visually-guided approach behaviour in a simulated robotic agent controlled by a recurrent artificial neural network, whose connection weights have been evolved using evolutionary algorithms. Analysis of the evolved behaviours and their network-internal mechanisms reveals a behavioural structure and organization resembling a Brooksian subsumption architecture. The task decomposition, as well as the resulting individual behaviours and their integration, however, are realized as network-internal state space dynamics, evolved in the course of agent-environment interaction, i.e. with a minimum of designer intervention.

  • 111.
    Bjurén, Johan
    University of Skövde, School of Humanities and Informatics.
    Från modell till modell: Transformering av information från ett modellspråk till ett annat2011Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Detta arbete undersöker möjligheterna att ta fram riktlinjer för en transformation från modelltyperna i EKD, som är ett mindre formellt semi-formellt modelleringsspråk, till UML, som är ett mer formellt semi-formellt modelleringsspråk, i syfte att komma närmare en systemspecifikation som kan implementeras som ett IT-system. Arbetet är utfört med en designansats som grund för hur arbetsprocessen sett ut. Processen följer genom hela arbetet och kan läsas om under metodkapitlet. Arbetet tar upp frågor som vilka modelltyper som är lämpliga att transformera till, vilken information som kan transformeras, vilken information som inte kan transformeras och vad som kan göras med denna. Riktlinjerna testas i valideringssyfte även på EKD modeller som skapats i annat syfte än för denna rapport.

  • 112.
    Björk, Lotta
    University of Skövde, Department of Computer Science.
    SET: Framtidens betalningssystem för kontokortsbetalning via Internet?1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Rapporten behandlar en undersökning av SET (Secure Electronic Transacion) vilket är ett system för säkra kontokortsbetalningar över Internet. Min undersökning har inkluderat företag och banker som erbjuder sina kunder möjligheten att betala varor med SET. Rapporten tar upp vilka åsikter och erfarenheter parterna har när det gäller SET och dess framtid som betalningssätt.

    I rapporten behandlas Internet och dess uppbyggnad, elektronisk handel och olika sätt att betala varor som beställs via Internet, kryptering och vad som krävs för att ett betalningssystem skall anses säkert samt SET och dess funktioner vid betalning över Internet.

    Jag har genom litteraturstudier, intervjuer och enkäter kommit fram till att SET är en bra teknik, men som ännu inte slagit igenom hos användarna. Bankerna tror på SET som betalningssystem, medan företagen anser att SET troligtvis spelat ut sin rätt.

  • 113.
    Björk, Monica
    University of Skövde, Department of Computer Science.
    Riktlinjer vid montering mot kundorder: en studie av orderprocessen och materialförsörjningsprocessen1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    En mängd slutprodukter kan fås med hjälp av olika ihopsättningar av olika komponenter, vilket görs för att tillfredställa kunders unika behov. Det är väldigt riskabelt och kostsamt för företagen att lagerföra alla dessa olika varianter av produkter i ett färdigvarulager eftersom det kanske inte blir någon större efterfrågan på alla dessa olika varianter. Det är därför många företag väljer att montera mot kundorder.

    I detta examensarbete sammanställs vad litteraturen tar upp om montering mot kundorder och utifrån detta presenteras de riktlinjer företag kan använda sig av när de vill montera mot kundorder. Utifrån litteraturstudierna, som har används som en referensmodell, har en undersökning gjorts på företaget Forbo Forshaga för att se hur de ligger till utifrån modellen. I nuläget tillverkar företaget mot lager men funderar på att börja montera mot kundorder i stället vilket de verkar ligga bra till för att kunna göra inom den närmsta framtiden.

  • 114. Blasch, Erik
    et al.
    Valin, Pierre
    Bosse, Eloi
    Nilsson, Maria
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    van Laere, Joeri
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Shahbazian, Elisa
    Implication of Culture: User Roles in Information Fusion for Enhanced Situational Understanding2009In: Information Fusion, 2009. FUSION '09. 12th International Conference on, IEEE conference proceedings, 2009, p. 1272-1279Conference paper (Refereed)
    Abstract [en]

    Information Fusion coordinates large-volume data processing machines to address user needs. Users expect a situational picture to extend their ability of sensing events, movements, and activities. Typically, data is collected and processed for object location (e.g. target identification) and movement (e.g. tracking); however, high-level reasoning or situational understanding depends on the spatial, cultural, and political effects. In this paper, we explore opportunities where information fusion can aid in the selection and processing of the data for enhanced tacit knowledge understanding by (1) display fusion for data presentation (e.g. cultural segmentation), (2) interactive fusion to allow the user to inject a priori knowledge (e..g. cultural values), and (3) associated metrics of predictive capabilities (e.g. cultural networks). In a simple scenario, cultural information impacts on situational understanding from deception is demonstrated using the Technology-Emotion-Culture-Knowledge (TECK) attributes of the Observer-Orient-Decide-Act (OODA) model.

  • 115.
    Bodén, Mikael
    University of Skövde, Department of Computer Science.
    A Connectionist Variation on Inheritance1996Report (Other academic)
    Abstract [en]

    A connectionist architecture is outlined which makes use of RAAM to generate representations for objects in inheritance networks and extended learning to make such representations context-sensitive. The architecture embodies inheritance quite differently by relying on associative similarities and regions in representational space. The model avoids many of the problems identified for traditional inheritance.

  • 116.
    Bodén, Mikael
    et al.
    University of Skövde, Department of Computer Science.
    Narayanan, Ajit
    Department of Computer Science, University of Exeter, UK.
    A Connectionist Model of Nonmonotonic Reasoning: Handling Exceptions in Inheritance Hierarchies1992Report (Other academic)
    Abstract [en]

    Nonmonotonic reasoning is a core problem in AI. An example of nonmonotonic reasoning is the type of default reasoning which occurs with inheritance structures which allow exceptions. This paper describes a connectionist model of a hierarchical inheritance structure with exceptions. Existing symbolic and related connectionist research are described, and their limitations summarized. The requirements for an adaptable connectionist model are laid out, and a representational architecture is constructed. The architecture requires relations (i.e. links between objects) to be bi-directional or directional, where the former is meant to capture those relations for which it is useful to have the inverse relation (e.g. `isa', `part-of'). The general assumption is that inferential distances are best captured by relying on representational similarities in the semantic features of tokens and types. Both the encoding mechanism and the decoding mechanism (for checking the uniqueness of the distributed representations) are described in detail. The representational architecture is implemented in recursive autoassociative memory. The model is successful, and future adaptation or handling multiple inheritance with exceptions is briefly explored.

  • 117.
    Bodén, Mikael
    et al.
    University of Skövde, Department of Computer Science.
    Narayanan, Ajit
    Department of Computer Science, University of Exeter, UK.
    A Representational Architecture for Nonmonotonic Inheritance Structures1993Report (Other academic)
    Abstract [en]

    This paper describes a connectionist system for representing and reasoning with multiple inheritance structures with exceptions. The representational architecture has three characteristics. First, it merges relational with taxonomic representations. Secondly, it handles conflicts generated by exceptions and the use of multiple superclasses. Thirdly, it uses fully distributed representations. One novel feature is that, since the distributed representation of an entity is influenced by its position in the inheritance structure, representations of assertions are influenced by the context of the entities. An extension to the model which implements and makes use of confluent inference is described.

  • 118.
    Bodén, Mikael
    et al.
    University of Skövde, Department of Computer Science.
    Niklasson, Lars
    University of Skövde, Department of Computer Science.
    Features of distributed representations for tree-structures: A study of RAAM1995Report (Other academic)
    Abstract [en]

    This paper presents an in-depth analysis of properties of patterns, generated by the Recursive Auto-Associative Memory, based on the idea that representational features can be detected by a classification network. The intension of this analysis is to examine the actual reasons for the success of connectionist processes acting on super-positional activity vectors generated in the fashion described. We show that the structure supplied during training is maintained and is extractable from the generated pattern. Further, we show that the influence of the actual constituents in the structures supplied during training is not necessarily available, in the generated patterns, for holistic processing. The outlook for holistic processing is therefore limited unless new forms can be found which take into account, what Sharkey and Jackson call, `whole net' representations.

  • 119.
    Bogner, Jonas
    University of Skövde, Department of Computer Science.
    Traditionell industri: ny teknik2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Detta arbete behandlar ämnet elektronisk affärskommunikation och i vilken omfattning detta används i stål- och plåtbranschen. Elektronisk affärskommunikation är ett sätt att sköta ett företags affärer via något sorts datamedia.

    Rapportens syfte är att undersöka hur långt stål- och plåtbranschen har kommit med att införa elektronisk affärskommunikation och även ta fram för- och nackdelar med detta. Det kanske viktigaste mediet för sådan affärskommunikation är antagligen Internet, även om EDI fortfarande är mycket stort. Till grund för arbetet ligger intervjuer med personliga besök hos åtta företag inom stål- och plåtbranschen. Dessa sträcker sig från plåtslagare med ett fåtal anställda till multinationella järnverk med tusentals anställda.

    Elektronisk affärskommunikation sträcker sig från att vara e-post och/eller hemsida till att vara hela affärssystem som införs för att hjälpa till i företagets dagliga skötsel. Sådana saker kan vara att leverantörer håller kontroll på företagets lagernivå och levererar när så behövs. På detta sätt behöver företaget inte kontrollera sina lager, de behöver inte lägga beställningar och behöver inte heller fundera på att sänka lagernivåerna för att spara pengar.

    Nyckelord: Elektroniska affärskommunikation, Internet, EDI, E-närvaro, E-handel, E-business.

  • 120.
    Bolldén, Jonas
    University of Skövde, School of Humanities and Informatics.
    Webbaserat behörighetssystem inom ramen för MedView-projektet2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    MedView-projektet, som startades 1995, är en av många organisationer som söker webbasera sin information. Projektet är ett tvärvetenskapligt samarbete mellan disciplinerna oral medicin och datavetenskap och inom projektet har en samling av applikationer tagits fram som kan lagra samt presentera data. Den insamlade informationen sparas i en filbaserad kunskapsbas.

    Tanken är nu, vilket angavs i projektets anslagsansökan till Vinnova 2003, att webbasera denna kunskapsbas så att kliniker inom oral medicin samt andra intresserade inom området skall ha tillgång till informationen. Detta arbete behandlar framtagandet av en central webbplats med ett tillhörande behörighetssystem.

    I detta arbete visas att UNIX behörighetsmodell kan användas som utgångspunkt för att skapa ett webbaserat behörighetssystem samt att de krav som identifierats kan implementeras tillsammans med behörighetssystemet i en central webbplats för MedView

  • 121.
    Boman, Maria
    University of Skövde, Department of Computer Science.
    XML/EDI - EDI med XML-format?2000Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Electronic data interchange (EDI) är en teknik vilken används för att utbyta elektroniska dokument mellan köpare och säljare. Dessa dokument överförs på en strikt elektronisk standardiserad väg, dokumenten kan vara fakturor, beställningsformulär, leveransplaner etc. EDI har funnits i över 25år och är vida spridd över världen. För att använda EDI krävs det stora resurser i form av kapital och kunskap. Små och medelstora företag har ofta inte de resurser som krävs för att kunna använda EDI.

    Nya tekniker utvecklas ständigt. Extensibel Markup Language (XML) är en ny teknik vilken är avsedd att användas främst på Internet. XML delar upp dokumenten med hjälp av etiketter vilket hjälper läsaren att identifiera innehållet i dokumenten. XML har väckt EDI-samhällets intresse då XML anses ha kapaciteten att kunna användas som ett EDI-format samtidigt som XML är Internetanpassat vilket betyder att EDI enklare skulle kunna användas på Internet.

    I mitt examensarbete har jag utrett om EDI-användande företag avser använda XML/EDI. Jag har genomfört intervjuer för att besvara problemformuleringen. Resultaten jag kommit fram till är att företagen avser använda XML/EDI om en ordentlig standard blir framtagen. Företagen är dessutom positivt inställda till XML/EDI samt Internetbaserad EDI. Anledningen till den positiva inställningen är främst att XML/EDI samt Internetbaserad EDI skulle innebära lägre kostnader vilket i sin tur skulle innebära att även små och medelstora företag skulle kunna använda tekniken.

  • 122.
    Borg, Olivia
    University of Skövde, School of Informatics.
    Educational Data Mining: En kvalitativ studie med inriktning på dataanalys för att hitta mönster i närvarostatistik2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The study focuses on finding different patterns in attendance statistics for students who are not present at school. The information provided by the results can thereafter be used as a basis for decision-making for schools or for other organizations interested in EDM within attendance statistics.

    The work carried out a qualitative method approach with a case study that consisted a literature study and an implementation. The literature study was used to gain an understanding of common approaches within EDM, which subsequently formed the basis for the implementation that used the working method CRISP-DM.

    The project resulted in five different patterns defined by data analysis. The patterns show absence from a time perspective and per subject and can form the basis for future decision-making.

  • 123.
    Borén, Mattias
    University of Skövde, Department of Computer Science.
    Komprimering av eBooks enligt Open eBook Publication Structure2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    I denna rapport undersöks hur elektroniska böcker (eBooks) enligt standarden Open eBook Publication Structure kan komprimeras på ett effektivt sätt. Anledningen till att området valts är att en välanvänd standard för eBooks inte finns för tillfället. Standarden är relativt ny och senaste versionen av specifikationen har kommit ut under 2002. Med i utvecklingen av standarden finns många stora företag som exempelvis Adobe Systems Inc. och Palm Digital Media. En litterär undersökning för passande komprimeringsalgoritmer har gjorts och två algoritmer för komprimering av eBooks har efter undersökningen utvecklats. Tester och slutsatser angående komprimeringseffektiviteten hos komprimeringsalgoritmerna finns också dokumenterade i rapporten.

  • 124.
    Boström, Henrik
    et al.
    University of Skövde, School of Humanities and Informatics.
    Andler, Sten F.
    University of Skövde, School of Humanities and Informatics.
    Brohede, Marcus
    University of Skövde, School of Humanities and Informatics.
    Johansson, Ronnie
    University of Skövde, School of Humanities and Informatics.
    Karlsson, Alexander
    University of Skövde, School of Humanities and Informatics.
    van Laere, Joeri
    University of Skövde, School of Humanities and Informatics.
    Niklasson, Lars
    University of Skövde, School of Humanities and Informatics.
    Nilsson, Marie
    University of Skövde, School of Humanities and Informatics.
    Persson, Anne
    University of Skövde, School of Humanities and Informatics.
    Ziemke, Tom
    University of Skövde, School of Humanities and Informatics.
    On the Definition of Information Fusion as a Field of Research2007Report (Other academic)
    Abstract [en]

    A more precise definition of the field of information fusion can be of benefit to researchers within the field, who may use uch a definition when motivating their own work and evaluating the contribution of others. Moreover, it can enable researchers and practitioners outside the field to more easily relate their own work to the field and more easily understand the scope of the techniques and methods developed in the field. Previous definitions of information fusion are reviewed from that perspective, including definitions of data and sensor fusion, and their appropriateness as definitions for the entire research field are discussed. Based on strengths and weaknesses of existing definitions, a novel definition is proposed, which is argued to effectively fulfill the requirements that can be put on a definition of information fusion as a field of research.

  • 125.
    Bratt, Dennis
    University of Skövde, School of Informatics.
    Det oanvända verktyget SAP BI2017Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [sv]

    Informationssystem är något som företag använder för att bättre hantera i stort sätt allaaspekter av verksamheten. Företag investerar stora summor pengar på nya system samtutveckling av befintliga system i en strävan efter bättre konkurrenskraft. Idag försöker mångaföretag att komma åt ”Business Intelligence” aspekten av deras informationssystem, menkunskapen om detta område är det inte många som besitter. En del informationssystem, elleraffärssystem(ERP) som det även kan kallas, är väldigt omfattande när det kommer till trenderoch utveckling inom IS(Informationssystem) och BI (Business Intelligence)områdena. SAP ärett av dessa ERPn som anses vara en av världens största affärssystem. Företag som Pfizer och Volvo lyckas använda SAP och dess funktionalitet för att utföra sinauppgifter inom de kunskapsområdena som användare besitter. Detta kan vara kunskaper omförvaltning eller processhantering vid tillverkning och dylikt. Problemet uppstår vid deaspekter av SAP som ingen eller få på företaget har kunskap om, vilket i detta fall är själva BIaspekten.Området ”BI” är någon som SAP tar hänsyn till, men till vilken utsträckning? Finns detanledningar till varför individer på företag som Pfizer har problem med att använda verktygetSAP BI ? Och framförallt, vad kan göras åt saken?För att besvara dessa frågor så användes en systematisk litteraturstudie för att hitta relevantforskning som tar upp faktorer som berör dessa frågor. Detta i kombination med intervjuer avpersoner som jobbar på ekonomiavdelningen på Pfizer som försöker använda verktyget. Undersökningen hittar att olika modeller kan förklara användares acceptans av BI och medhjälp av faktorer som förekommer i dessa modeller samt jämförelse med förda intervjuer såskapas en modell. En modell med syftet att fokusera på relationen mellan icke experter av BIoch designkrav som behövs för att icke experter enklare ska kunna använda BI i deras arbete. 

  • 126.
    Brax, Christoffer
    University of Skövde, Department of Computer Science.
    Recurrent neural networks for time-series prediction.2000Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Recurrent neural networks have been used for time-series prediction with good results. In this dissertation recurrent neural networks are compared with time-delayed feed forward networks, feed forward networks and linear regression models on a prediction task. The data used in all experiments is real-world sales data containing two kinds of segments: campaign segments and non-campaign segments. The task is to make predictions of sales under campaigns. It is evaluated if more accurate predictions can be made when only using the campaign segments of the data.

    Throughout the entire project a knowledge discovery process, identified in the literature has been used to give a structured work-process. The results show that the recurrent network is not better than the other evaluated algorithms, in fact, the time-delayed feed forward neural network showed to give the best predictions. The results also show that more accurate predictions could be made when only using information from campaign segments.

  • 127.
    Brax, christoffer
    University of Skövde, Department of Computer Science.
    Studie av utvecklingsverktyg med inriktning mot PLC-system1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Datoranvändningen i samhället växer för varje dag. Det är då viktigt att programvara håller hög kvalité, då vissa programvaror styr kritiska maskiner som exempelvis flygplan. Ett sätt att få kvalitativa programvaror är att använda bra utvecklingsverktyg. I detta arbete utvärderas fem olika utvecklingsverktyg: GNAT (Ada), Microsoft Visual C++, Microsoft J++, Borland Delphi och Active Perl. Inriktningen på utvärderingen är mot utveckling av programvara för PLC-system. Det som utvärderats är effektivitet av genererad kod, kompileringstid, storlek på genererad kod, kodportabilitet och utbud av färdiga komponenter. Undersökningen har genomförts med hjälp av praktiska tester.

  • 128.
    Bringle, Per
    University of Skövde, Department of Computer Science.
    Data Quality in Data Warehouses: a Case Study1999Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Companies today experience problems with poor data quality in their systems. Because of the enormous amount of data in companies, the data has to be of good quality if companies want to take advantage of it. Since the purpose with a data warehouse is to gather information from several databases for decision support, it is absolutely vital that data is of good quality. There exists several ways of determining or classifying data quality in databases. In this work the data quality management in a large Swedish company's data warehouse is examined, through a case study, using a framework specialized for data warehouses. The quality of data is examined from syntactic, semantic and pragmatic point of view. The results of the examination is then compared with a similar case study previously conducted in order to find any differences and similarities.

  • 129.
    Brodin, Anette
    University of Skövde, Department of Computer Science.
    Applying DB-transaction semantics to agent interactions2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Both artificial intelligence (AI) and database (DB) communities have advantages in incorporating features from each other's areas. From a DB view, handling of complexity in today's information systems can be aided by incorporating AI features, and database environments could gain in flexibility by entrusting some of their functionality to agent systems. Contemplated from the AI view, agent systems could gain in robustness by being based on DB-systems.

    By applying the semantics of database-transaction to interactions between agents in a multiagent-system, and analysing the consequences, this project endeavours to cross borders of the two research areas. In the project, states where drop-out of some agent is severe to the task fulfilment, of the system, have been identified, and examined after applying transaction semantics to the agent interactions. An existing system for multiagent applications, JADE, has been examined in order to investigate how problem situations are handled in practice. The result from this work shows the feasibility to contemplate both type of systems as very similar, but modelled and viewed in different ways.

  • 130.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A Framework for GDPR Compliance for Small- and Medium-Sized Enterprises2019In: European Journal for Security Research, ISSN 2365-0931, E-ISSN 2365-1695, Vol. 4, no 2, p. 243-264Article in journal (Refereed)
    Abstract [en]

    The EU’s General Data Protection (GDPR) is an EU regulation that affects everyone in the EU and all organisations outside the EU that wants to do business with the EU. GDPR introduces tougher requirements for processing personal data, which may be difficult for many small- and medium-sized enterprises (SMEs) to follow without major adjustments. This work uses design science to develop a framework for SMEs to adapt to GDPR. The framework was empirically evaluated in three different types of organisations, resulting of GDPR compliance according to their Data Protection Officers. It was also theoretical evaluated against scientific literature including the identified implications of GDPR. In this paper the framework is presented, from initial analysis and design to implementation and future work, with advice on how to work with each part to achieve compliance. The paper also highlights some of the most important changes in GDPR compared to its predecessor, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (DIR95).

  • 131.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB.
    BYOD vs. CYOD: What is the difference?2016In: Proceedings of the 9th IADIS International Conference: Information Systems 2016 / [ed] Miguel Baptista Nunes, Pedro Isaías, Philip Powell, IADIS Press, 2016, p. 55-62Conference paper (Refereed)
    Abstract [en]

    During the last years mobile devices have become very popular to use both for work and pleasure. Different strategies have evolved to increase productivity and to satisfy the employees. In this paper, we look at the two most popular strategies and look at the strengths and weaknesses of those. This is done by a systematic literature review and semi-structured interviews with CIO’s or equivalent roles. We conclude that BYOD and CYOD comes with similar strengths, but CYOD brings a little fewer security risks.

  • 132.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Combining ISMS with strategic management: The case of BYOD2015In: Information Systems 2015: Proceedings of the 8th IADIS International Conference / [ed] Miguel Baptista Nunes, Pedro Isaias, Philip Powell, IADIS Press, 2015, p. 161-168Conference paper (Refereed)
    Abstract [en]

    Bring Your Own Device (BYOD) (where employees use their private devices for work) causes problems for organisations since their management systems are seldom designed for this purpose. If BYOD is not adequately regulated, many security and privacy issues may result. This paper proposes an analysis-design-action framework for designing a suitable security management strategy by combining Johnson and Scholes’ strategic management model with the ISO/IEC 27000-series.

  • 133.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Management of Mobile Devices: How to Implement a New Strategy2016In: Proceedings of The 27th International Business Information Management Association Conference: Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth / [ed] Khalid S. Soliman, International Business Information Management Association (IBIMA), 2016, p. 1261-1268Conference paper (Refereed)
    Abstract [en]

    Since smartphones entered the market the need for them has exploded, today 85 % believe that their mobile is a central part of their life. Despite the major focus on mobile devices and increased budgets, there are still many organisations missing a strategy for mobile devices. This article investigates the most important steps to take when implementing a mobile device strategy by conducting an empirical study with interviews with CIO or equivalent roles in 13 organisations with 50 to 15 000 employees. The result is an improved framework for mobile device implementation.

  • 134.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB.
    Mobile Device Strategy: A management framework for securing company information assets on mobile devices2016Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy.

    The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.

  • 135.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB.
    Mobile Device Strategy: From a Management Point of View2017In: Journal of Mobile Technologies, Knowledge and Society, ISSN 2155-4811, E-ISSN 2155-4811, Vol. 2017, article id 593035Article in journal (Refereed)
    Abstract [en]

    In recent years, mobile devices have become an indispensable part of working life. However, in many cases the same device is also used privately, which has blurred the line between personal and company data. This situation needs to be analysed, and a long-term strategy implemented for organisations not to lose control of their data. This article is based on interviews with executives and a theoretical framework for managing mobile devices. Empirical input from practice is used to update the framework to help organisations to better respond to emerging trends for mobile devices.

  • 136.
    Brodin, Martin
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Actea Consulting AB, Sweden.
    Security strategies for managing mobile devices in SMEs: A theoretical evaluation2017In: Proceedings of the 8th International Conference on Information, Intelligence, Systems & Applications (IISA), IEEE, 2017, p. 89-94Conference paper (Refereed)
    Abstract [en]

    With mobile devices connecting personal and business lives together creating opportunities for both employees and employers the need for a longtime mobile strategy increases. The scientific literature provides four different approaches which are analyzed together with an approach from a governmental agency. As basis for the analysis is identified security challenges which are adopted to a SMEs environment. The conclusion is that most of the framework manage the security challenges well, but only two take benefits with mobile devices into account.

  • 137.
    Brodin, Martin
    et al.
    University of Skövde, The Informatics Research Centre. University of Skövde, School of Informatics.
    Rose, Jeremy
    University of Skövde, The Informatics Research Centre. University of Skövde, School of Informatics.
    Åhlfeldt, Rose-Mharie
    University of Skövde, The Informatics Research Centre. University of Skövde, School of Informatics.
    Management issues for Bring Your Own Device2015In: Proceedings of 12th European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015) / [ed] Kostantinos Lambrinoudakis, Vincenzo Morabito & Marinos Themistocleous, European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS) , 2015Conference paper (Refereed)
    Abstract [en]

    Bring Your Own Device (BYOD) is an emerging research area focusing on the organisational adoption of (primarily mobile) devices used for both private and work purposes. There are many information security related problems concerning the use of BYOD and it should therefore be considered an issue of strategic importance for senior managers. This paper presents a systematic literature analysis using a BYOD strategic management framework to assess developing research trends. The analysis reveals early work in the analysis and design aspects of BYOD strategies, but a lack of research in operationalizing (planning, implementation and evaluating) strategy – the action phase. The resulting research agenda identifies twelve management issues for further research and four overall research directions that may stimulate future research.

  • 138.
    Brohede, Marcus
    University of Skövde, School of Humanities and Informatics.
    Bounded recovery in distributed discrete real-time simulations2006Report (Other (popular scientific, debate etc.))
    Abstract [en]

    This thesis proposal defines the problem of recovery in distributed discrete real-time simulations with external actions; real-time simulations with simulation actions in the real world. A problem that these simulations encounter is that they cannot rely on rollback-based recovery (use of checkpoints) for two reasons. First, some actions in the "real world" cannot be undone, and second, the time allowed for recovery tends to be short and bounded. As a result there is a need for some form of error masking for this category of simulations. We propose an infrastructure for these simulations with external actions based on an active distributed real-time database that features replication of the distributed simulation. The degree of replication is based on the dependability requirements of the individual nodes in the simulation.

    A guideline for how to decompose a distributed real-time simulation into parts with different requirements on the replication protocol is also defined as an interesting topic to investigate further. We introduce the simulation infrastructure "Simulation DeeDS" featuring a replication-based recovery strategy for the category of simulations mentioned. We also show that some information fusion applications are indeed examples of applications that need real-time simulation with external actions and as such can benefit from the proposed infrastructure.

  • 139.
    Brohede, Marcus
    University of Skövde, Department of Computer Science.
    Real-Time Database Support for Distributed Real-Time Simulations2001Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Simulation is a good way to gain insight into a system, for example during development, without having to run or build the actual system. This is especially true for real-time systems, which often operate in hazardous environments or control critical entities in the 'real' world, making testing of these systems in their real environment unsafe during development.

    When building simulations, one simulator is not likely to fit every type of simulation project. Therefore, different simulators, which focus on different aspects of simulation, are built. The High Level Architecture (HLA) from the Defense Modeling and Simulation Office (DMSO) is an architecture for distributed simulations providing a means to communicate between different simulations.

    However, the HLA standard has limitations if viewed from a real-time perspective. For example, there is no built-in support for fault tolerance. In this thesis some of the limitations in HLA are identified and an extended architecture that uses a distributed active real-time database as a way to overcome these limitations is presented. One of the major advantages with this new extended HLA architecture is that it is still compliant with HLA, i.e., no modifications have been made to the HLA interfaces.

  • 140.
    Brohede, Marcus
    et al.
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten F
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    A Distributed Whiteboard Infrastructure for Information Fusion Simulations2009In: Proceedings of the 32nd Annual IEEE Software Engineering Workshop (SEW-32) / [ed] Breitman, K; Sterritt, R; Bohner, S, IEEE Computer Society Press , 2009, p. 134-142Conference paper (Refereed)
    Abstract [en]

    We argue that architecural ideas from DeeDS, a distributed real-time database, can be used to create a whiteboard infrastructure usable in information fusion applications as well as in fault tolerant simulations. We discuss the need for faulttolerant real-time simulation in information fusion, and how this can be supported by the whiteboard infrastructure. There are many reasons to perform real-time simulations (including environment simulation) - the use of real hardware or systems can be prohibitively expensive or dangerous to people and equipment, or may simply not be available at all. The combination of real and simulated objects, or nodes, is of particular interest when it is prohibitively expensive, dangerous, or impossible to test sufficient numbers of collaborating nodes in a realistic application. The need for fault tolerance of such real-time simulations, with a mixture of real and simulated nodes, occurs because it is difficult/impossible to restart physical nodes or wait for restart of simulated nodes, if one or more simulation instances fail. The key problem when mixing real and simulated nodes is the occurrence of "external actions" that cannot easily be undone and redone when a failure has occurred. We describe a natural approach to support multiple degrees of fault tolerance in realtime simulations, based on optimistic synchronization on top of a whiteboard architecture. The whiteboard architecture is a natural and useful infrastructure metaphor for information fusion, an information-based exchange that allows real and simulated nodes to be freely mixed.

  • 141.
    Brohede, Yvonne
    University of Skövde, Department of Computer Science.
    Designstruktur för komponentbaserad applikation med relationsdatabas1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Det blir allt mer vanligt förekommande att utvecklingen av applikationer sker enligt objektorienterade metoder, ofta som komponentbaserade applikationer. Samtidigt är användandet av traditionella relationsdatabaser fortfarande mycket utbrett. En kombination av komponentbaserad applikation och traditionell relationsdatabas har idag blivit vanlig. Här beskrivs en designstruktur som visar hur beteendet, vilket inte kan lagras i relationsdatabasen, bör tas om hand för att möjliggöra delad åtkomst samt återanvändning av programkoden. Beteendet implementeras som applikationens programkod i form av regler, beräkningar och operationer. Det har tagits i beaktning både hur uppdelningen av olika typer av beteende kan göras och var i systemet det bör implementeras, för att uppnå en generell lösning. För att underlätta framtagandet av applikationer med den framtagna designstrukturen, beskrivs de olika arbetsmoment som ingår. I lösningen används ett mellanlager med transaktionshanterare samt resurshanterare. Resultatet visar att designstrukturen fungerar för alla möjliga grundläggande konstruktioner som används i den beskrivna tekniken.

  • 142.
    Buason, Gunnar
    University of Skövde, Department of Computer Science.
    Competitive co-evolution of sensory-motor systems2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    A recent trend in evolutionary robotics and artificial life research is to maximize self-organization in the design of robotic systems, in particular using artificial evolutionary techniques, in order to reduce the human designer bias. This dissertation presents experiments in competitive co-evolutionary robotics that integrate and extend previous work on competitive co-evolution of neural robot controllers in a predator-prey scenario with work on the ‘co-evolution’ of robot morphology and control systems. The focus here is on a systematic investigation of tradeoffs and interdependencies between morphological parameters and behavioral strategies through a series of predator-prey experiments in which increasingly many aspects are subject to self-organization through competitive co-evolution. The results show that there is a strong interdependency between morphological parameters and behavioral strategies evolved, and that the competitive co-evolutionary process was able to find a balance between and within these two aspects. It is therefore concluded that competitive co-evolution has great potential as a method for the automatic design of robotic systems.

  • 143.
    Buason, Gunnar
    University of Skövde, Department of Computer Science.
    Competitive co-evolution of sensory-motor systems: Appendix2002Report (Other academic)
    Abstract [en]

    This serves as an appendix to report HS-IDA-MD-02-004, and documents in further detail the experimental results discussed therein.

  • 144.
    Bukuru, Axel
    University of Skövde, School of Informatics.
    En prestandajämförelse mellan relationella databaser och ickerelationella databaser: I samband med händelsedrivna MES system2018Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The purpose of this work was to evaluate whether NoSQL databases could work and offer better performance than SQL databases with event-driven MES Systems. The evaluation took place at a development team at Volvo Group It in Skövde, which provides these systems. The method of work was a laboratory experiment, where different databases were tested on a test bench offered by the development team. The test bench had an existing system for testing performance on the databases. The examined NoSQL databases were column-oriented databases with associated Cassandra platform and document-oriented databases with associated MongoDB platform. MongoDB was not fully implemented and was left for future work. A test application implemented in .Net with the language C # developed by the development team was used to test performance on the databases. The result that the work showed was that column-oriented databases could work with event-driven MES systems and could perform better because of their ability to denormalize data. SQL databases are still good for many systems.

  • 145.
    Burek, Dariusz Piotr
    University of Skövde, Department of Computer Science.
    Nivåbaserad åtkomstkontroll i distribuerade databaser2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Detta arbete handlar om att ge riktlinjer för hur nivåbaserad åtkomstkontroll kan hanteras vid sammanslagning och replikering av distribuerade databaser. Dagens komplexa distribuerade databaser kräver hög säkerhet och det räcker ofta inte med lösenord för åtkomstkontroll. Nivåbaserad åtkomstkontroll ger möjlighet till att förbättra säkerheten genom att både användare och objekt klassas i olika säkererhetsklasser. Arbetet behandlar, utfrån specifika exempel, hantering av nivåbaserad åtkomstkontroll vid sammanslagning och replikering av distribuerade databaser. Metoden som används i arbetet är litteraturstudie. Material som används i arbetet är artiklar inom området.

    Efter att ha givit allmänna definitioner på begrepp som används i den senare delen av arbetet, diskuteras specifika fall med distribuerade databaser som slås samman och replikeras. Utifrån dessa fall och andra forskares teorier skapas det mer generella teorier enligt den problemställning som finns. Det ges även förslag på fortsatt arbete inom detta område.

  • 146.
    Burman, Per
    University of Skövde, Department of Computer Science.
    Extending CDIF to support Enterprise Modeling1997Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In recent years organizations developing information systems have started to demand that there should be an explicit connection between the rationale of the system developed and the system itself. In the "From Fuzzy to Formal" project an attempt to develop a methodology supporting this was made. Within the project a method called Enterprise Modeling was developed, aiming at creating this connection. This method contains five different sub-models. The sub-models are connected to each other by inter-model links. The models developed using EM are of high complexity. Therefore tool and repository support should be provided. To be flexible and extendible, such a tool set should be based upon a standardized meta-model. CDIF is an example of such a standard.

    In this dissertation we develop a meta-model capable of capturing the information that is created using the Enterprise Modeling technique. We use the extensibility mechanism that is provided with the CDIF standard to extend the existing CDIF Integrated meta-model to support the models used in this work. We also develop a procedure supporting the mapping between the representations. Finally we discuss the functionality of a tool capable of supporting the work with the models.

  • 147.
    Byhlén, Kristoffer
    University of Skövde, Department of Computer Science.
    Organisationshinder mot komponentbaserad systemutveckling2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Komponentbaserad informationssystemutveckling är en metod där system utvecklas och byggs med komponenter. Dessa komponenter är utbytbara och tanken är att organisationer ska kunna minska utvecklingstiden och utvecklingskostnaderna för informationssystem. I det här arbetet har en undersökning gjorts där personer inom några organisationer intervjuats. Undersökningens mål har varit att svara på frågan om det finns någon skillnad mellan unga och gamla organisationers hinder mot införandet av komponentbaserad informationssystemutveckling. Undersökningen har kommit fram till att unga organisationer stöter på ett mindre motstånd mot förändringsarbetet än gamla organisationer och att detta kan bero på att unga organisationer har en organisationskultur som är mer öppen för förändringar.

  • 148.
    Bäckman, Anna
    University of Skövde, Department of Computer Science.
    En utredning av vad som bör beaktas i relationen mellan kund och leverantör vid en outsourcingprocess2000Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Denna rapport behandlar ämnet outsourcing vilket är en växande företeelse bland svenska och internationella företag idag. Det finns många tolkningar av innebörden till begreppet och generellt kan sägas att outsourcing innebär att ett företag överlåter delar av sin verksamhet till en extern leverantör. Outsourcing förekommer inom många områden och branscher. I denna rapport avser begreppet outsourcing området informationsteknik (IT).

    Problemställningen i denna rapport har inneburit att undersöka vad som bör beaktas i relationen/samarbetet mellan kund och leverantör vid en outsourcingprocess. Detta har gjorts genom ett antal företagsintervjuer samt genom en litteraturstudie. Som svar på problemställningen har ett antal faktorer framkommit vilka bör beaktas i relationen mellan kund och leverantör. Dessa faktorer har resulterat i ett antal punkter vilka innehåller nyckelord för vad som bör beaktas i relationen mellan kund och leverantör. Exempel på dessa nyckelord är; långsiktig relation, kompetens, kommunikation och engagemang.

  • 149.
    Bärkås, Karina
    University of Skövde, School of Humanities and Informatics.
    Nätverksoperativsystem för lokala nätverk1998Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Val av nätverksoperativsystem är något som blivit viktigt att besluta i många företag och organisationer. Nätverken får fler och fler tjänster, många som ursprungligen utvecklades för Internet. Organisationerna och företagen måste hänga med i utvecklingen för att kunna få ett nätverk som är lätt att administrera och som är användarvänligt. Det finns ett flertal nätverksoperativsystem att välja på. De två vanligaste är Windows NT och Novell NetWare.

    Denna rapport innehåller en undersökning av ett flertal faktorer som kan vara viktiga att ta hänsyn till vid val av nätverksoperativsystem. Faktorerna som tas upp är hanterbarhet, skalbarhet, prestanda, säkerhet, feltolerans, Internet verktyg, integrering, kompatibilitet och migrering. Undersökningen tar fram olikheter mellan NT och NetWare avseende faktorerna. Integrering har varit viktigt att undersöka för att kunna lösa problem med flera användarplattformar. Detta för att underlätta systemadministration och göra systemet mer användarvänligt. Metoden som använts för att få fram fakta är en litteraturstudie av böcker och aktuella datatidskrifter.

  • 150.
    Börjesson, Mathias
    University of Skövde, Department of Computer Science.
    Kritisk granskning av XML, utifrån dess användning inom området Elektronisk handel2000Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Alla prognoser tyder på en explosionsartad ökning för elektronisk handel, företag emellan. Detta ställer krav på att det tas fram verktyg och tekniker som möjliggör för små och medelstora företag att vara med och handla elektroniskt.

    XML är något som bedöms ha stora möjligheter att underlätta denna process. XML är en standard som antogs 1998 av World Wide Web Consortium, W3C. XML är ett märkspråk som används för att strukturera data på ett sätt som är plattforms- och applikationsoberoende. Detta möjliggör för applikationer som har stöd för XML att utbyta information på ett sätt som tidigare inte var möjligt.

    I undersökningen studerar jag fördelar och nackdelar och genomför en kritisk granskning av XML. Undersökningen genomfördes med litteraturstudie och intervju som metoder.

    Det resultat jag kom fram till är att XML kommer spela en framträdande roll som meddelandeformat för informationsöverföring, då både internt inom verksamheter och externt mellan företag.

1234567 101 - 150 of 857
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf