his.sePublications
Change search
Refine search result
1234567 151 - 200 of 2834
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Andler, Sten F.
    et al.
    University of Skövde, School of Humanities and Informatics.
    Brohede, Marcus
    University of Skövde, School of Humanities and Informatics.
    Information Fusion from Databases, Sensors and Simulations: Annual Report 20062007Report (Other academic)
  • 152.
    Andler, Sten F.
    et al.
    University of Skövde, School of Humanities and Informatics.
    Brohede, Marcus
    University of Skövde, School of Humanities and Informatics.
    Information Fusion from Databases, Sensors and Simulations: Annual Report 20072008Report (Other academic)
  • 153.
    Andler, Sten F.
    et al.
    University of Skövde, School of Humanities and Informatics.
    Brohede, Marcus
    University of Skövde, School of Humanities and Informatics.
    Information Fusion from Databases, Sensors and Simulations: Annual Report 20082009Report (Other academic)
  • 154.
    Andler, Sten F.
    et al.
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Fredin, Mikael
    Saab Microwave Systems AB, Sweden.
    Gustavsson, Per M.
    George Mason Univ., USA.
    van Laere, Joeri
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Nilsson, Maria
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Svenson, Pontus
    Swedish Defence Research Agency, Sweden.
    SMARTracIn: a concept for spoof resistant tracking of vessels and detection of adverse intentions2009In: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII / [ed] Edward M. Carapezza, SPIE - International Society for Optical Engineering, 2009, p. 73050G-1-73050G-9, article id 73050GConference paper (Refereed)
    Abstract [en]

    The aim of maritime surveillance systems is to detect threats earlyenough to take appropriate actions. We present the results ofa study on maritime domain awareness performed during the fallof 2008. We analyze an identified capability gap of worldwidesurveillance in the maritime domain, and report from a userworkshop addressing the identified gap. We describe a SMARTracIn conceptsystem that integrates information from surveillance systems with background knowledgeon normal conditions to help users detect and visualize anomaliesin vessel traffic. Land-based systems that cover the coastal watersas well as airborne, space-borne and ships covering open seaare considered. Sensor data are combined with intelligence information fromship reporting systems and databases. We describe how information fusion,anomaly detection and semantic technology can be used to helpusers achieve more detailed maritime domain awareness. Human operators area vital part of this system and should be activecomponents in the fusion process. We focus on the problemof detecting anomalous behavior in ocean-going traffic, and a roomand door segmentation concept to achieve this. This requires theability to identify vessels that enter into areas covered bysensors as well as the use of information management systemsthat allow us to quickly find all relevant information.

  • 155.
    Andler, Sten F.
    et al.
    University of Skövde, Department of Computer Science.
    Hansson, Jörgen
    University of Skövde, Department of Computer Science.
    Eriksson, Joakim
    University of Skövde, Department of Computer Science.
    Mellin, Jonas
    University of Skövde, Department of Computer Science.
    Berndtsson, Mikael
    University of Skövde, Department of Computer Science.
    Eftring, Bengt
    University of Skövde, Department of Computer Science.
    DeeDS: Towards a Distributed and Active Real-Time Database Systems1996In: ACM Sigmod Record, Vol. 25, no 1, p. 38-40Article in journal (Refereed)
    Abstract [en]

    DeeDS combines active database functionality with critical timing constraints and integrated system monitoring. Since the reactive database mechanisms, or rule management system, must meet critical deadlines, we must employ methods that make triggering of rules and execution of actions predictable. We will focus on the scheduling issues associated with dynamic scheduling of workloads where the triggered transactions have hard, firm or soft deadlines, and how transient overloads may be resolved by substituting transactions by computationally cheaper ones. The rationale for a loosely coupled general purpose event monitoring facility, that works in tight connection with the scheduler, is presented. For performance and predictability, the scheduler and event monitor are executing on a separate CPU from the rest of the system. Real-time database accesses in DeeDS are made predictable and efficient by employing methods such as main memory resident data, full replication, eventual consistency, and prevention of global deadlocks.

  • 156.
    Andler, Sten F.
    et al.
    University of Skövde, School of Humanities and Informatics.
    Niklasson, Lars
    University of Skövde, School of Humanities and Informatics.
    Olsson, Björn
    University of Skövde, School of Humanities and Informatics.
    Persson, Anne
    University of Skövde, School of Humanities and Informatics.
    Planstedt, Tomas
    Ericsson Microwave Systems AB, Skövde, Sweden.
    De Vin, Leo J.
    University of Skövde, School of Technology and Society.
    Wangler, Benkt
    University of Skövde, School of Humanities and Informatics.
    Ziemke, Tom
    University of Skövde, School of Humanities and Informatics.
    Information Fusion from Databases, Sensors and Simulations: A Collaborative Research Program2005In: Proceedings: 29th Annual IEEE/NASA Software Engineering Workshop, IEEE Computer Society, 2005, p. 234-241Conference paper (Refereed)
    Abstract [en]

    This paper provides an overview of a collaborative research program in information fusion from databases, sensors and simulations. Information fusion entails the combination of data from multiple sources, to generate information that cannot be derived from the individual sources. This area is of strategic importance for industry and defense, as well as public administration areas such as health care, and needs to be pursued as an academic subject. A large number of industrial partners are supporting and participating in the development of the area. The paper describes the program’s general approach and main research areas, with a particular focus on the role of information fusion in systems development

  • 157.
    Andreas, Naess
    University of Skövde, School of Informatics.
    Var kommer myndigheters lösenordspolicys ifrån?: En kvalitativ studie om deras ursprung2019Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Society is getting more digitalized and more people are connecting to the Internet. This means that a lot of work that handles sensitive information is now done using computers. There is also a lot of services that requires personal information for registration and bank account information to order wares or subscribe to the service. This information is of interest to criminal who can use it to make money. Because of this the use of passwords has increased and to make sure that strong passwords are created guidelines are adhered to. The password guidelines are created and spread by authorities and expert organizations. However, there are no sources for where the guidelines came from or an explanation for how they were made.

    To shine a light on this, the study aims to explain the guidelines origins and what they were based on. This is a qualitative study where interviews were done with information security specialists from three governmental bodies and one expert organization. After the interviews were completed and data collected, they were analyzed using thematic analysis to identify the sources that were used during the creation of the guidelines. The study’s results show that the motivation for the guidelines vary. This can be observed through the differences in target group and focus. It also appears like there are no studies which could be referred to. Although there is a consistent pattern that the sources for the guidelines often seems to be based on the experiences and expertise of their employees. Except for this, inspiration is also drawn from organizations such as NIST.

  • 158.
    Andreasson, Rebecca
    University of Skövde, School of Informatics.
    Interruptions in manufacturing from a distributed cognition perspective2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis aims at portraying interruptions in the socio-technical domain of manufacturing industry, from a distributed cognition perspective. The research problem addressed is the lack of naturalistic inquiry in prior interruption research. Further, manufacturing is a complex socio-technical domain where interruptions have not previously been studied. In this thesis, a workplace study is applied with distributed cognition as its theoretical framework. The results of the study identify two new types of interruptions, as well as one new dimension of interruptions. This result shows that interruptions are a multifaceted phenomenon that frequently occurs within manufacturing. An integration of the theoretical background and the empirical work resulted in five recommendations concerning how to reduce the amount of interruptions and how to minimize their disruptive effects. This study complements prior interruption research, emphasises the importance of studying interruptions in natural settings, and provides several insights regarding future interruption research.

  • 159.
    Andreasson, Rebecca
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Department of Information Technology, Uppsala University, Uppsala, Sweden.
    Alenljung, Beatrice
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Billing, Erik
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lowe, Robert
    Department of Applied IT, University of Gothenburg, Gothenburg, Sweden.
    Affective Touch in Human–Robot Interaction: Conveying Emotion to the Nao Robot2018In: International Journal of Social Robotics, ISSN 1875-4791, E-ISSN 1875-4805, Vol. 10, no 4, p. 473-491Article in journal (Refereed)
    Abstract [en]

    Affective touch has a fundamental role in human development, social bonding, and for providing emotional support in interpersonal relationships. We present, what is to our knowledge, the first HRI study of tactile conveyance of both positive and negative emotions (affective touch) on the Nao robot, and based on an experimental set-up from a study of human–human tactile communication. In the present work, participants conveyed eight emotions to a small humanoid robot via touch. We found that female participants conveyed emotions for a longer time, using more varied interaction and touching more regions on the robot’s body, compared to male participants. Several differences between emotions were found such that emotions could be classified by the valence of the emotion conveyed, by combining touch amount and duration. Overall, these results show high agreement with those reported for human–human affective tactile communication and could also have impact on the design and placement of tactile sensors on humanoid robots.

  • 160.
    Andreasson, Rebecca
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Riveiro, Maria
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Effects of Visualizing Missing Data: An Empirical Evaluation2014In: 18th International Conference on Information Visualisation (IV) / [ed] Ebad Banissi, Mark W. McK. Bannatyne, Francis T. Marchese, Muhammad Sarfraz, Anna Ursyn, Gilles Venturini, Theodor G. Wyeld, Urska Cvek, Marjan Trutschl, Georges Grinstein, Vladimir Geroimenko, Sarah Kenderdine & Fatma Bouali, IEEE conference proceedings, 2014, p. 132-138Conference paper (Refereed)
    Abstract [en]

    This paper presents an empirical study that evaluates the effects of visualizing missing data on decision-making tasks. A comparison between three visualization techniques: (1) emptiness, (2) fuzziness, and (3) emptiness plus explanation, revealed that the latter technique induced significantly higher degree of decision-confidence than the visualization technique fuzziness. Moreover, emptiness plus explanation yield the highest number of risky choices of the three. This result suggests that uncertainty visualization techniques affect the decision-maker and the decisionconfidence. Additionally, the results indicate a possible relation between the degree of decision-confidence and the decision-maker's displayed risk behavior.

  • 161.
    Angi-Lazar, Robert
    University of Skövde, School of Informatics.
    Self-Service Business Intelligence: Hantering av utmaningarna inom SSBI i praktiken2018Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    I dagens affärsmiljöer är det kritiskt för organisationer att kunna ta del av sina affärsdata och använda denna för att fatta beslut och bli konkurrenskraftiga på arbetsmarknaden. Idag behöver människor i organisationer tillgång till data snabbare än någonsin vilket sätter en oerhört stor press på IT-avdelningen. Denna press gör att dem inte hinner med alla förfrågningar vilket leder till att dessa människor behöver få tillgång till och analysera data på egen hand för att fatta tidskritiska beslut. Denna miljö benämns self-service business intelligence (SSBI). Implementationen av SSBI visar sig vara svårare i praktiken än vad många organisationer räknar med då det finns många utmaningar. För att lyckas med SSBI är det kritiskt att organisationer lyckas hantera dessa utmaningar i praktiken. Denna studie besvarar frågan: ❖ Hur kan utmaningarna inom self-service BI hanteras i praktiken? Studien baseras på en litteraturanalys och en fallstudie med intervjuer för att undersöka hur erfarna människor i organisationer anser att dessa utmaningar kan hanteras i praktiken. Resultatet är en framtagen faktormodell som består av olika riktlinjer för hur respektive identifierad utmaning kan hanteras i praktiken.

  • 162.
    Anteryd, Fredrik
    University of Skövde, School of Informatics.
    Information Classification in Swedish Governmental Agencies: Analysis of Classification Guidelines2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Information classification deals with the handling of sensitive information, such as patient records and social security information. It is of utmost importance that this information is treated with caution in order to ensure its integrity and security. In Sweden, the Civil Contingencies Agency has established a set of guidelines for how governmental agencies should handle such information. However, there is a lack of research regarding how well these guidelines are followed as well as if the agencies have made accommodations of these guidelines of their own. This work presents the results from a survey sent to 245 governmental agencies in Sweden, investigating how information classification actually is performed today. The questionnaire was answered by 144 agencies and 54 agencies provided detailed documents of their classification process. The overall results show that the classification process is difficult, while those who provided documents proved to have good guidelines, but not always consistent with the existing recommendations.

  • 163.
    Antinyan, Vard
    et al.
    Department of Computer Science and Engineering, Chalmers University, Gothenburg, Sweden.
    Staron, Miroslaw
    Department of Computer Science and Engineering, Chalmers University, Gothenburg, Sweden.
    Derehag, Jesper
    Ericsson, Gothenburg, Sweden.
    Runsten, Mattias
    AB Volvo, Gothenburg, Sweden.
    Wikström, Erik
    Ericsson, Gothenburg, Sweden.
    Meding, Wilhelm
    Ericsson, Gothenburg, Sweden.
    Henriksson, Anders
    AB Volvo, Gothenburg, Sweden.
    Hansson, Jörgen
    University of Skövde, School of Informatics.
    Identifying Complex Functions: By Investigating Various Aspects of Code Complexity2015In: Proceedings of 2015 Science and Information Conference (SAI): July 28-30, 2015, London, United Kingdom, IEEE Press, 2015, p. 879-888Conference paper (Refereed)
    Abstract [en]

    The complexity management of software code has become one of the major problems in software development industry. With growing complexity the maintenance effort of code increases. Moreover, various aspects of complexity create difficulties for complexity assessment. The objective of this paper is to investigate the relationships of various aspects of code complexity and propose a method for identifying the most complex functions. We have conducted an action research project in two software development companies and complemented it with a study of three open source products. Four complexity metrics are measured, and their nature and mutual influence are investigated. The results and possible explanations are discussed with software engineers in industry. The results show that there are two distinguishable aspects of complexity of source code functions: Internal and outbound complexities. Those have an inverse relationship. Moreover, the product of them does not seem to be greater than a certain limit, regardless of software size. We present a method that permits identification of most complex functions considering the two aspects of complexities. The evaluation shows that the use of the method is effective in industry: It enables identification of 0.5% most complex functions out of thousands of functions for reengineering.

  • 164.
    Antinyan, Vard
    et al.
    Computer Science and Engineering, University of Gothenburg, Gothenburg, Sweden / Computer Science and Engineering, Chalmers, Gothenburg, Sweden.
    Staron, Miroslaw
    Computer Science and Engineering, University of Gothenburg, Gothenburg, Sweden / Computer Science and Engineering, Chalmers, Gothenburg, Sweden.
    Sandberg, Anna
    Ericsson, Sweden.
    Hansson, Jörgen
    University of Skövde, School of Informatics.
    A Complexity Measure for Textual Requirements2016In: Proceedings of the 26th International Workshop on Software Measurement (IWSM) and the 11th International Conference on Software Process and Product Measurement (Mensura) IWSM-Mensura 2016 / [ed] Jens Heidrich & Frank Vogelezang, IEEE, 2016, p. 148-158Conference paper (Refereed)
    Abstract [en]

    Unequivocally understandable requirements are vital for software design process. However, in practice it is hard to achieve the desired level of understandability, because in large software products a substantial amount of requirements tend to have ambiguous or complex descriptions. Over time such requirements decelerate the development speed and increase the risk of late design modifications, therefore finding and improving them is an urgent task for software designers. Manual reviewing is one way of addressing the problem, but it is effort-intensive and critically slow for large products. Another way is using measurement, in which case one needs to design effective measures. In recent years there have been great endeavors in creating and validating measures for requirements understandability: most of the measures focused on ambiguous patterns. While ambiguity is one property that has major effect on understandability, there is also another important property, complexity, which also has major effect on understandability, but is relatively less investigated. In this paper we define a complexity measure for textual requirements through an action research project in a large software development organization. We also present its evaluation results in three large companies. The evaluation shows that there is a significant correlation between the measurement values and the manual assessment values of practitioners. We recommend this measure to be used with earlier created ambiguity measures as means for automated identification of complex specifications.

  • 165.
    Antonsson, Tommy
    University of Skövde, Department of Computer Science.
    Sales & Operations Planning1998Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Sales & Operations Planning är den process som knyter ihop försäljningsplanen och produktionsplanen med affärsplanen. Detta sker löpande varje månad i aggregerad form. Den här typen av planering har rönt stor framgång i USA. Detta är i alla fall Richard C. Lings (1988) åsikt, men så var det också han som grundade Sales & Operations Planning.

    I mitt arbete kommer jag att visa vad Sales & Operations Planning är för något och hur det kan implementeras. Trots att det är ett populärt sätt att planera på i USA så har det inte nått samma framgång i Sverige. En av de viktigaste delarna i S&OP är familjeindelning. Jag kommer i mitt arbete visa hur Svenska företag delar in sina artiklar i familjer och hur litteraturen vill att det ska ske. Jag kommer även att ta upp fördelarna med simulering och hur Svenska företag planerar.

  • 166.
    Antonucci, Alessandro
    et al.
    Dalle Molle Institute for Artificial Intelligence (IDSIA), Lugano, Switzerland.
    Karlsson, Alexander
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Sundgren, David
    Stockholm University, Sweden.
    Decision Making with Hierarchical Credal Sets2014In: Information Processing and Management of Uncertainty in Knowledge-Based Systems: 15th International Conference, IPMU 2014, Montpellier, France, July 15-19, 2014, Proceedings, Part III / [ed] Anne Laurent, Oliver Strauss Oliver, Bernadette Bouchon-Meunier, Ronald R. Yager, Springer, 2014, p. 456-465Conference paper (Refereed)
  • 167.
    Arbman, Isak
    University of Skövde, School of Informatics.
    Berättande för Virtual Reality: Om empati och personligt utrymme i VR2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Berättande för Virtual Reality undersöker hur okonventionellt berättande kan påverka en spelares upplevda förhållande till en non-player character i vad som annars är en minimalistisk Virtual Reality-simulation.

    Studien innefattar en kvalitativ undersökning som utfördes på åtta testpersoner som alla fick spela igenom tre sociala scenarier i Virtual Reality och sedan intervjuas för att utvinna data till undersökningen. För att stödja undersökningens upplägg baserades arbetet på en bred bakgrund relaterad till bland annat berättartekniker och Virtual Reality-utveckling.

    Resultaten av undersökningen uppmärksammar potentialen som Virtual Reality har för att stärka den emotionella kopplingen mellan en spelare och en non-player character.

    Det lägger också en grund för vidare experimentering inom berättande i mediet i framtiden.

  • 168.
    Areizaga, Ander
    University of Skövde, School of Informatics.
    Programming learning games: Identification of game design patterns in programming learning games2019Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    There is a high demand for program developers, but the dropouts from computer science courses are also high and course enrolments keep decreasing. In order to overcome that situation, several studies have found serious games as good tools for education in programming learning. As an outcome from such research, several game solutions for programming learning have appeared, each of them using a different approach. Some of these games are only used in the research field where others are published in commercial stores. The problem with commercial games is that they do not offer a clear map of the different programming concepts. This dissertation addresses this problem and analyses which fundamental programming concepts that are represented in commercial games for programming learning. The study also identifies game design patterns used to represent these concepts.

    The result of this study shows topics that are represented more commonly in commercial games and what game design patterns are used for that. This thesis identifies a set of game design patterns in the 20 commercial games that were analysed. A description as well as some examples of the games where it is found is included for each of these patterns.

    As a conclusion, this research shows that from the list of the determined fundamental programming topics only a few of them are greatly represented in commercial games where the others have nearly no representation. This shows potential spots for future research in games for programming teaching.

  • 169.
    Arltoft, Emma
    et al.
    University of Skövde, School of Informatics.
    Benkö, Agnes
    University of Skövde, School of Informatics.
    Camp and Buried: Queer perceptions of queer tropes and stereotypes in games.2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The state of queer representation in games is poor, and queer consumers are growing increasingly vocal in their demands for nuanced portrayals. This thesis investigates how queer players perceive the tropes and stereotypes commonly used to portray them in games. By sorting through existing representation and using the most common tropes found, this study created two example characters which were represented both narratively and visually. These characters were then the subject of a study of 29 participants. The comments and opinions of these 29 participants were then analysed to find a largely negative consensus which is chiefly concerned with making portrayals less tragic. From this, this study proceeds to analyse the desires of queer consumers and contextualize them in relation to a world which still actively oppresses them.

  • 170.
    Armengol, Eva
    et al.
    CSIC - Spanish Council for Scientific Research, IIIA - Artificial Intelligence Research Institute, Bellaterra, Spain.
    Torra, Vicenç
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Generalization-Based k-Anonymization2015In: Modeling Decisions for Artificial Intelligence: 12th International Conference, MDAI 2015, Skövde, Sweden, September 21–23, 2015: Proceedings / [ed] Vicenç Torra & Yasuo Narukawa, Springer, 2015, p. 207-218Conference paper (Refereed)
    Abstract [en]

    Microaggregation is an anonymization technique consistingon partitioning the data into clusters no smaller thankelements andthen replacing the whole cluster by its prototypical representant. Mostof microaggregation techniques work on numerical attributes. However,many data sets are described by heterogeneous types of data, i.e., nu-merical and categorical attributes. In this paper we propose a new mi-croaggregation method for achieving a compliantk-anonymous maskedfile for categorical microdata based on generalization. The goal is to builda generalized description satisfied by at leastkdomain objects and toreplace these domain objects by the description. The way to constructthat generalization is similar that the one used in growing decision trees.Records that cannot be generalized satisfactorily are discarded, thereforesome information is lost. In the experiments we performed we prove thatthe new approach gives good results.

  • 171.
    Armengol, Eva
    et al.
    IIIA - Artificial Intelligence Research Institute, CSIC - Spanish Council for Scientific Research, Catalonia, Spain.
    Torra, Vicenç
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Partial Domain Theories for Privacy2016In: Modeling Decisions for Artificial Intelligence: 13th International Conference, MDAI 2016 Sant Julià de Lòria, Andorra, September 19–21, 2016, Proceedings, Springer, 2016, p. 217-226Conference paper (Refereed)
    Abstract [en]

    Generalization and Suppression are two of the most used techniques to achieve k-anonymity. However, the generalization concept is also used in machine learning to obtain domain models useful for the classification task, and the suppression is the way to achieve such generalization. In this paper we want to address the anonymization of data preserving the classification task. What we propose is to use machine learning methods to obtain partial domain theories formed by partial descriptions of classes. Differently than in machine learning, we impose that such descriptions be as specific as possible, i.e., formed by the maximum number of attributes. This is achieved by suppressing some values of some records. In our method, we suppress only a particular value of an attribute in only a subset of records, that is, we use local suppression. This avoids one of the problems of global suppression that is the loss of more information than necessary.

  • 172.
    Aronson, Johan
    University of Skövde, School of Humanities and Informatics.
    Tydlighet kontra realism vid karaktärsdesign2009Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    I lagbaserade, tävlingsinriktade dataspel är det viktigt att det är tydligt vem som är medspelare och vem som är motspelare, och jag har undersökt olika verktyg som en koncepttecknare kan använda för att uppnå detta i sin karaktärsdesign. Höga krav på realism begränsar dock hur dessa verktyg kan användas, och det är detta motsatsförhållande mellan krav på realism och krav på tydlighet som jag har undersökt i detta arbete. Jag har också försökt omsätta detta i praktiken genom att rita 46 karaktärskoncept till ett spelkoncept, med målet att det tydligt skall framgå vilka karaktärer som hör ihop och vilka som är varandras motståndare. Jag har kommit fram till att höga krav på realism avsevärt försvårar och begränsar hur tydlig en karaktär kan göras, och min slutsats är att spelkonceptet skulle tjäna i tydlighet om kraven på realism skulle lättas.

  • 173.
    Aronsson, Claes
    University of Skövde, Department of Computer Science.
    Evolution of Neural Controllers for Robot Teams2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This dissertation evaluates evolutionary methods for evolving cooperative teams of robots. Cooperative robotics is a challenging research area in the field of artificial intelligence. Individual and autonomous robots may by cooperation enhance their performance compared to what they can achieve separately. The challenge of cooperative robotics is that performance relies on interactions between robots. The interactions are not always fully understood, which makes the designing process of hardware and software systems complex. Robotic soccer, such as the RoboCup competitions, offers an unpredictable dynamical environment for competing robot teams that encourages research of these complexities. Instead of trying to solve these problems by designing and implement the behavior, the robots can learn how to behave by evolutionary methods. For this reason, this dissertation evaluates evolution of neural controllers for a team of two robots in a competitive soccer environment. The idea is that evolutionary methods may be a solution to the complexities of creating cooperative robots. The methods used in the experiments are influenced by research of evolutionary algorithms with single autonomous robots and on robotic soccer. The results show that robot teams can evolve to a form of cooperative behavior with simple reactive behavior by relying on self-adaptation with little supervision and human interference.

  • 174.
    Aronsson, Oscar
    University of Skövde, School of Informatics.
    Identifiering av kritiska problem vid implementering av ERP-system ur ett leverantörsperspektiv: En identifiering av bidragande faktorer till misslyckade implementeringsprocesser av affärssystem2018Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In recent years, the ERP system has been a key factor in successful information management and served as a foundation for many corporate organizations. Implementing a new business system is a complex process, which leads organizations having difficulties implementing the process. Implementation of business systems involves combining previously separated systems focusing on providing a more complete information resource for an organization. ERP systems accelerated during the millennium shift y2k, and many companies at the time had difficulties to implement the systems with a positive end result. Eighteen years later, the problem remains, despite the fact that ERP systems have evolved and businesses become more knowledgeable in the field. This shows a study from Panorama Consulting (2017) where it was found that 26 percent of companies failed with implementation. 74 percent exceed budget and 59 percent passed the intended schedule. To find a solution to the problem, most researchers have conducted studies focusing on identifying the negative contributing factors in ERP implementation. These factors are called "Critical failure factors". There is currently a lack of empirical research where information has been gathered from ERP providers. The research found is based on old theories for which factors contribute positively and negatively to an implementation process. These theories are being used by most researchers in their studies regarding the implementation of the ERP system. This study therefore focuses on ERP suppliers' perspectives on negative contributing factors in implementing ERP systems. Major emphasis has been placed on collecting factors from ERP providers in order that at a later stage in the study they can address the factors mentioned in previous studies to find relationships and possible deviations. The study used interviews as data collection method and five interviews have been conducted with experienced ERP providers. The result of the collected material from ERP providers identifies a number of critical factors that can be linked to factors from previous studies. Interestingly, the study also identified a number of factors that differ from previous studies. The conclusions that can be deduced from the study are that the implementation processes can be improved and become significantly more efficient with the help of the new insight into the problems that the ERP providers lifts up. Awareness of these negative contributing factors in implementing an ERP system contributes knowledge in the field of implementation processes, which in turn can be used by companies and individuals to facilitate and prevent the problems that may arise in such a process.

  • 175.
    Arweström Jansson, Anders
    et al.
    Department of Information Technology, Visual Information & Interaction, Uppsala University, Uppsala, Sweden.
    Axelsson, AntonDepartment of Information Technology, Visual Information & Interaction, Uppsala University, Uppsala, Sweden.Andreasson, RebeccaDepartment of Information Technology, Visual Information & Interaction, Uppsala University, Uppsala, Sweden.Billing, ErikUniversity of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Proceedings of the 13th Swecog conference2017Conference proceedings (editor) (Refereed)
  • 176.
    Ask, Lena
    University of Skövde, Department of Computer Science.
    Informationssäkerhet i datorjournal: en studie med användaren i fokus2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Inom vårdområdet hanteras en stor mängd känslig information och den bör finnas tillgänglig utan organisatoriska hinder. Många vårdanställda får snabbare och enklare tillgång till information genom informationsteknik (IT), men IT ställer även nya krav på medvetandet om informationssäkerhet.

    Den i detta arbete studerade litteraturen menar att användarna är den största orsaken till att brister uppkommer i informationssäkerheten. Det kan bland annat förebyggas genom upprättande av informationssäkerhetspolicy samt genom att ge information till och utbilda användaren vid införande av informationssystem.

    Syftet med arbetet var att fastställa hur användare av datorjournaler påverkas av kraven på informationssäkerhet och hur användarna påverkar informationssäkerheten. Vidare var syftet att ta reda på om de rekommendationer som Datainspektionen gett ut efterföljs av användarna. Observationer och intervjuer med vårdpersonal har legat till grund för att uppnå arbetets resultat. Resultatet av observationerna och intervjuerna visar att användaren fortfarande bidrar till att det finns brister i informationssäkerheten genom att in- och utloggningsfunktionen inte stödjer personalens arbetssätt. Resultatet visar också en tydlig tendens till att information och utbildning om informationssäkerhet bör ges regelbundet till användarna för att en medvetenhet om informationssäkerhet ska uppnås. Personalen bör även få möjlighet att diskutera och repetera handhavande av datorjournalsystem samt hantering av känslig information.

  • 177.
    Asklöf, Björn
    University of Skövde, School of Humanities and Informatics.
    Kommersiella spel som plattform för ledningssystem: En jämförande studie mellan klanledare och kompanichefers situationsmedvetenhet i form av riskbedömning.2007Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna rapport syftar till att undersöka i vilken utsträckning stridsvagnskompanichefer skiljer och/eller liknar ”commanders” (i spelet ”Battlefield 2”) i sitt sätt att skapa och upprätthålla situationsmedvetenhet med avseende på riskbedömning kopplat till fiendens position i slagfältet. Studien grundar sig på en tanke om att utnyttja positiva effekter från datorspelande, i morgondagens ledningssystem genom att bygga ledningssystem grundade på en kommersiell spelplattform. Resultaten pekar bland annat på skillnader mellan de båda aktörernas metoder för att uppnå full situationsmedvetenhet, men även på vissa likheter som till exempel att se på en situation med fiendens ögon för att bedöma hur denna kommer att agera.

  • 178.
    Aslam, Irfan
    University of Skövde, School of Informatics.
    Semantic frame based automatic extraction of typological information from descriptive grammars2019Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis project addresses the machine learning (ML) modelling aspects of the problem of automatically extracting typological linguistic information of natural languages spoken in South Asia from annotated descriptive grammars. Without getting stuck into the theory and methods of Natural Language Processing (NLP), the focus has been to develop and test a machine learning (ML) model dedicated to the information extraction part. Starting with the existing state-of-the-art frameworks to get labelled training data through the structured representation of the descriptive grammars, the problem has been modelled as a supervised ML classification task where the annotated text is provided as input and the objective is to classify the input to one of the pre-learned labels. The approach has been to systematically explore the data to develop understanding of the problem domain and then evaluate a set of four potential ML algorithms using predetermined performance metrics namely: accuracy, recall, precision and f-score. It turned out that the problem splits up into two independent classification tasks: binary classification task and multiclass classification task. The four selected algorithms: Decision Trees, Naïve Bayes, Support VectorMachines, and Logistic Regression belonging to both linear and non-linear families ofML models are independently trained and compared for both classification tasks. Using stratified 10-fold cross validation performance metrics are measured and the candidate algorithms  are compared. Logistic Regression provided overall best results with DecisionTree as the close follow up. Finally, the Logistic Regression model was selected for further fine tuning and used in a web demo for typological information extraction tool developed to show the usability of the ML model in the field.

  • 179.
    Aslam, Tehseen
    University of Skövde, School of Technology and Society. University of Skövde, The Virtual Systems Research Centre.
    Analysis of manufacturing supply chains using system dynamics and multi-objective optimization2013Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Supply chains are in general complex networks composed of autonomous entities whereby multiple performance measures in different levels, which in most cases are in conflict with each other, have to be taken into account. Hence, due to the multiple performance measures, supply chain decision making is much more complex than treating it as a single objective optimization problem. Thus, the aim of the doctoral thesis is to address the supply chain optimization problem within a truly Pareto-based multi-objective context and utilize knowledge extraction techniques to extract valuable and useful information from the Pareto optimal solutions. By knowledge extraction, it means to detect hidden interrelationships between the Pareto solutions, identify common properties and characteristics of the Pareto solutions as well as discover concealed structures in the Pareto optimal data set in order to support managers in their decision making. This aim is addressed through the SBO-framework where the simulation methodology is based on system dynamics (SD) and the optimization utilizes multi-objective optimization (MOO). In order to connect the SD and MOO software, this doctoral thesis introduced a novel SD and MOO interface application which allow the modeling and optimization applications to interact. Additionally, this thesis work also presents a novel SD-MOO methodology that addresses the issue of curse off dimensionality in MOO for higher dimensional problems and with the aim to execute supply chain SD-MOO in a computationally cost efficient way, in terms of convergence, solution intensification and accuracy of obtaining the Pareto-optimal front for complex supply chain problems. In order to detect evident and hidden structures, characteristics and properties of the Pareto-optimal solutions, this work utilizes Parallel Coordinates, Clustering and Innovization, which are three different types of tools for post-optimal analysis and facilitators of discovering and retrieving knowledge from the Pareto-optimal set. The developed SD-MOO interface and methodology are then verified and validated through two academic case studies and a real-world industrial application case study. While not all the insights generated in these application studies can be generalized for other supply-chain systems, the analysis results provide strong indications that the methodology and techniques introduced in this thesis are capable to generate knowledge to support academic SCM research and real-world SCM decision making, which to our knowledge cannot be performed by other methods.

  • 180.
    Aslan, David
    University of Skövde, School of Informatics.
    Lagring av Motion Capture Data i NoSQL-databser: Undersökning av CouchDB2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Motion capture data behöver lagra på ett eller annat sätt lagra detta med databas skulle innebära väldigt många fördelar. Den används på många olika sätt och i olika branscher därmed skulle innebära en stor förändring. Det finns två olika kategorier av databaser SQL databaser och NoSQL databaser, dem databaser som kommer testas är relationsbaserade MySQL och dokumentbaserade CouchDB med en prototyp som utvecklas för att utföra dessa tester. Testerna påvisar att CouchDB är bättre databaslösningen vid lagringen av motion capture data. Men ytterligare arbete skulle kunna utföra flera tester som påvisar att läsning av motion capture data från databaserna kan ske i realtid. Mätningar från experimentet bevisar att CouchDB är den snabbare på att lagra Motion Capture data. I framtida arbete skulle arbetet kunna införas i filmbranschen och bli effektivt genom att använda mindre hårddiskutrymme och minska kostnaderna.

  • 181.
    Aspehed, Anne-Marie
    University of Skövde, Department of Computer Science.
    Ger användarnas delaktighet vid förändringsarbete ökad acceptans: vilken påverkan har användbarhet och lättanvändhet2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syftet med detta examensarbete var att undersöka vilka faktorer som påverkat acceptansen hos användare, inom den kommunala verksamheten, vid införande av ett datoriserat system. Med acceptans menas att användarna ska kunna utföra sina arbetsuppgifter på ett bra och lätt sätt. Studien har gjorts utifrån användarnas perspektiv.

    Genom att genomföra en intervjuundersökning på ett flertal kommuner där användarna använder systemet Vabas/Duf, har undersökts hur användarnas upplevda acceptans påverkas av faktorerna delaktighet, användbarhet och lättanvändhet, vid införande av ett datoriserat system. Delaktigheten vid införandet av ett system innefattar även information och utbildning.

    Resultatet från undersökningen visade att delaktigheten ökade användarnas acceptans. Ingen avgörande slutsats kunde däremot dras mellan acceptans och faktorerna användbarhet och lättanvändhet, då resultatet från de båda grupperna inte visade någon märkbar skillnad.

  • 182.
    Asplund, Anton
    University of Skövde, School of Humanities and Informatics.
    WEBBSERVRAR: En jämförelsestudie mellan proprietär och Open source webbservrar2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Nuförtiden är det mycket vanligt att människor och företag använder en hemsida för att synas. Hemsidor kan vara uppbyggda på olika sätt och av olika datorspråk, men de måste i grund och botten köras på en webbserver för att kunna fungera som en webbplats.Det här examenarbete undersöker prestandan för proprietär webbserver och webbserver som är av typen öppen källkod. Webbservrarna prestandatestades på hur väl de klarar av att distribuera olika sorters material som är vanligt förekommande i dagens webbsidor. Resultaten ifrån prestandamätningarna visar att webbservern av typen öppen källkod presterar i regel bättre än de proprietära webbservarna. En litteraturstudie genomfördes även för att se hur funktionaliteten för webbservern av typen öppen källkod kunde utvidgas. Studien visar att det finns någorlunda goda möjligheter att utvidga funktionaliteten. Endast ett fåtal webbservrar och språk testades i detta examensarbete, vilket lämnar plats för ytterligare framtida studier inom ämnet.

  • 183.
    Asplund, Emil
    University of Skövde, Department of Computer Science.
    Integration av affärssystem och e-handelssystem2001Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Denna rapport behandlar ett tämligen outforskat delområde inom elektroniskt handel, nämligen integration av affärssystem och e-handelssystem. Huvudfrågan i denna rapport går ut på att undersöka hur företag har integrerat sitt affärssystem med sitt e-handelssystem. För att besvara huvudfrågan delades den upp i tre delfrågor. Dessa sökte besvara dels på vilken nivå inom Enterprise Application Integration som företagen hade integrerat systemen, dels vilka integrationstekniker företagen använder för att integrera systemen samt dels vilka effekter integrationen medfört för företagen. För att besvara problemställningen utfördes telefonintervjuer med fyra företag. Resultatet av undersökningen var att samtliga företag hade integrerat på Enterprise Application Integrations datanivå, vilket även var den nivå de hade börjat med att integrera. De integrationstekniker som användes varierade. Det var dock inte särskilt vanligt att använda nyare integrationstekniker. Integrationen medförde genomgående positiva effekter för företagen, även om vissa problem kvarstod. Inga större nya problem uppkom dock.

  • 184.
    Asthorsson, Axel
    University of Skövde, School of Humanities and Informatics.
    Simulation meta-modeling of complex industrial production systems using neural networks2006Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Simulations are widely used for analysis and design of complex systems. Real-world complex systems are often too complex to be expressed with tractable mathematical formulations. Therefore simulations are often used instead of mathematical formulations because of their flexibility and ability to model real-world complex systems in some detail. Simulation models can often be complex and slow which lead to the development of simulation meta-models that are simpler and faster models of complex simulation models. Artificial neural networks (ANNs) have been studied for use as simulation meta-models with different results. This final year project further studies the use of ANNs as simulation meta-models by comparing the predictability of five different neural network architectures: feed-forward-, generalized feed-forward-, modular-, radial basis- and Elman artificial neural networks where the underlying simulation is of complex production system. The results where that all architectures gave acceptable results even though it can be said that Elman- and feed-forward ANNs performed the best of the tests conducted here. The difference in accuracy and generalization was considerably small.

  • 185.
    Asthorsson, Kjartan
    University of Skövde, Department of Computer Science.
    Evaluation of view maintenance with complex joins in a data warehouse environment2002Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Data warehouse maintenance and maintenance cost has been well studied in the literature. Integrating data sources, in a data warehouse environment, may often need data cleaning, transformation, or any other function applied to the data in order to integrate it. The impact on view maintenance, when data is integrated with other comparison operators than defined in theta join, has, however, not been closely looked at in previous studies.

    In this study the impact of using a complex join in data warehouse environment is analyzed to measure how different maintenance strategies are affected when data needs to be integrated using other comparison operators than defined in a theta join. The analysis shows that maintenance cost is greatly increased when using complex joins since such joins often lack optimization techniques which are available when using a theta join. The study shows, among other things, that the join aware capability of sources is not of importance when performing complex joins, and incremental view maintenance is better approach than using recomputed view maintenance, when using complex joins. Strategies for maintaining data warehouses when data is integrated using a complex join are therefore different than when a theta join is used, and different maintenance strategies need to be applied.

  • 186.
    Atif, Yacine
    Information Technology College of United Arab Emirates University.
    Building Trust in E-Commerce2002In: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 6, no 1, p. 18-24Article in journal (Refereed)
    Abstract [en]

    A network of Internet-based intermediaries that guarantee delivery and payment in e-commerce could help bolster consumer and merchant confidence.

  • 187. Atif, Yacine
    Conversational learning integration in technology enhanced classrooms2013In: Computers in human behavior, ISSN 0747-5632, E-ISSN 1873-7692, Vol. 29, no 2, p. 416-423Article in journal (Refereed)
    Abstract [en]

    Today’s college students have grown up with technology. These digital natives typically gravitate toward group activities in technology embedded social contexts. However, despite this multidimensional evolution, little has changed in conventional classrooms where they build their education experience. We investigate learning models in a classroom environment which still remains the main driver of education today. We describe a conversational learning model based on group activities which involve multi-party conversations. We implement this model in a technology-enhanced studio-classroom to “visualize” conversations which otherwise would remain abstract to learners. Teachers are empowered with instructional patterns to guide their changing role in this novel classroom environment. Based on standard assessment indicators, we conduct an experimental analysis which results show interesting tradeoffs of learning performance that favor the proposed conversational learning approach compared to those obtained from conventional instruction.

  • 188.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Al-Falahi, Kanna
    College of Information Technology, United Arab Emirates University, Al-Ain, United Arab Emirates.
    Wangchuk, Tshering
    Royal Institute of Management, Thimphu, Bhutan.
    Lindström, Birgitta
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A fuzzy logic approach to influence maximization in social networks2019In: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Article in journal (Refereed)
    Abstract [en]

    Within a community, social relationships are paramount to profile individuals’ conduct. For instance, an individual within a social network might be compelled to embrace a behaviour that his/her companion has recently adopted. Such social attitude is labelled social influence, which assesses the extent by which an individual’s social neighbourhood adopt that individual’s behaviour. We suggest an original approach to influence maximization using a fuzzy-logic based model, which combines influence-weights associated with historical logs of the social network users, and their favourable location in the network. Our approach uses a two-phases process to maximise influence diffusion. First, we harness the complexity of the problem by partitioning the network into significantly-enriched community-structures, which we then use as modules to locate the most influential nodes across the entire network. These key users are determined relatively to a fuzzy-logic based technique that identifies the most influential users, out of which the seed-set candidates to diffuse a behaviour or an innovation are extracted following the allocated budget for the influence campaign. This way to deal with influence propagation in social networks, is different from previous models, which do not compare structural and behavioural attributes among members of the network. The performance results show the validity of the proposed partitioning-approach of a social network into communities, and its contribution to “activate” a higher number of nodes overall. Our experimental study involves both empirical and real contemporary social-networks, whereby a smaller seed set of key users, is shown to scale influence to the high-end compared to some renowned techniques, which employ a larger seed set of key users and yet they influence less nodes in the social network.

  • 189.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Chou, Chien
    Institute of Education, National Chiao Tung University, Taiwan.
    Digital Citizenship: Innovations in Education, Practice, and Pedagogy2018In: Educational Technology & Society, ISSN 1176-3647, E-ISSN 1436-4522, Vol. 21, no 1, p. 3p. 152-154Article in journal (Refereed)
    Abstract [en]

    There are still disparities in technology-access despite economic pressures and widespread promises to overcome them. The induced digital gap defines the degree of digital citizenship for which, unified policies have yet to be drawn at various educational levels to reduce that gap. The quest for a broad participation to develop digital citizenship competencies needs further investigations into innovative educational approaches, pedagogical methods, and routine practices that foster digital literacy, and narrows the digital divide. This special issue accumulates original theoretical and empirical research contributions across contemporary digital citizenship perspectives. The final selection of the papers explores digital citizenship concepts such as ethics, digital literacy and participation, in various contexts to develop opportunities for a wider engagement in social actions. The international perspectives of contributing authors shed lights on digital citizenship prospects across unique contexts among different nations. 

  • 190.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jeusfeld, Manfred A.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Internet of Things Approach to Cloud-Based Smart Car Parking2016In: The 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops / [ed] Elhadi Shakshuki, Elsevier, 2016, Vol. 98, p. 193-198Conference paper (Refereed)
    Abstract [en]

    Concerns for parking are becoming imminent to best support the urban core. These persistent parking problems could be turned into new opportunities, brought by current trends in meeting the globally connected continuum. This paper reveals a work-in- progress to capitalize on private land properties for parking, in order to relieve stress on public agencies, create new sources of revenue, and enlist new entities in the intermediary market. These intermediaries, labelled as Parking Service Providers (or PSPs) play a broker role through advertising parking lots on a shared cloud platform. To streamline these business collaborations and related processes, physical parking lots are augmented with Internet connectivity allowing cloud-provided applications to congregate these lots into a larger inventory. The Internet of Things (IoT) paradigm expands the scope of cloud-based intelligent car parking services in smart cities, with novel applications that better regulate car-parking related traffic. This paper presents a work-in-progress agenda that contributes to new business solutions and state-of-the-art research impacts. We reveal a multi- layered system of PSP-business model through interdisciplinary research blocks where original results are expected to be made at each layer.

  • 191.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lindström, Birgitta
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jeusfeld, Manfred
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten F.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Yuning, Jiang
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Brax, Christoffer
    CombiTech AB, Skövde, Sweden.
    Gustavsson, Per M.
    CombiTech AB, Skövde, Sweden.
    Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection2017Conference paper (Refereed)
    Abstract [en]

    Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

  • 192.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Gamalielsson, Jonas
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lundell, Björn
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Open Source Collaboration Tools and Organisational Learning: On Adopting EtherPad in Small Companies2016In: Proceedings of FLOSSEdu: FLOSS education and computational thinking workshop. Open Source Systems Conference 2016. Gothenburg, Sweden., 2016Conference paper (Refereed)
    Abstract [en]

    Organisations could benefit from the improvements in collaborative learning and increased control gained by the use of open source software. EtherPad enables simultaneous updates on a shared document from remotely located participants. We discuss the adoption life-cycle of this open source tool in the context of a strategic intervention, with a focus on a learning agenda to guide the installation and configuration processes, and to reduce the learning curve involved in the adoption experience.

  • 193.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jiang, Yuning
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jeusfeld, Manfred A.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lindström, Birgitta
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten F.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Brax, Christoffer
    Combitech.
    Haglund, Daniel
    Combitech.
    Lindström, Björn
    Combitech.
    Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

  • 194.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jiang, Yuning
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Lindström, Birgitta
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jeusfeld, Manfred
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Nero, Eva
    Combitech, Sweden.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

  • 195.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Kharrazi, Sogol
    National Road Transport Research Institute, Linköping, Sweden.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Andler, Sten F.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Internet of Things data analytics for parking availability prediction and guidance2020In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915Article in journal (Refereed)
    Abstract [en]

    Cutting-edge sensors and devices are increasingly deployed within urban areas to make-up the fabric of transmission control protocol/internet protocol con- nectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud-based services. Connected vehicles and road-infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic-congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov-chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search pro- cess is triggered to identify the expected arrival-time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart-pole data streams reporting congestion rates across parking area junc- tions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state-transition matrix, showing the transfor- mation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy-expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capa- bilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban-mobility simulation packages, the traffic-congestion-aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot.

    The full text will be freely available from 2021-01-09 00:01
  • 196.
    Atif, Yacine
    et al.
    UAE University, United Arab Emirates.
    Mathew, Sujith
    UAE University, United Arab Emirates.
    Lakas, Abderahmane
    UAE University, United Arab Emirates.
    Building a smart campus to support ubiquitous learning2014In: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 6, no 2, p. 223-238Article in journal (Refereed)
    Abstract [en]

    New technological advances in user mobility and context immersion are enabling novel adaptive and pervasive learning models in ambient environments. These advances allow physical learning spaces with embedded computing capabilities to provide an augmented self-aware learning experience. In this paper, we aim at developing a novel ubiquitous learning model within a pervasive smart campus environment. The goal of our research consists of identifying the steps towards building such an environment and the involved learning processes. We define a model of a smart campus, and advocate learning practices in the light of new paradigms such as context-awareness, ubiquitous learning, pervasive environment, resource virtualization, autonomic computing and adaptive learning. We reveal a comprehensive architecture that defines the various components and their inter-operations in a smart educational environment. The smart campus approach is presented as a composition of ambient learning spaces, which are environments where physical learning resources are augmented with digital and social services. We present a model of these spaces to harness future ubiquitous learning environments. One of the distinguished features of this model is the ability to unleash the instructional value of surrounding physical structures. Another one is the provision of a personalized learning agenda when moving across these ambient learning environments. To achieve these goals, we profile learners and augment physical campus structures to advocate context-aware learning processes. We suggest a social community platform for knowledge sharing which involves peer learners, domain experts as well as campus physical resources. Within this pervasive social scope, learners are continuously immersed in a pedagogically supported experiential learning loop as a persuasive approach to learning. A learning path, which responds to learners’ goals and qualifications, autonomously guides learners in achieving their objectives in the proposed smart campus. We evaluated our ubiquitous learning approach to assert the performance of these building blocks in the proposed smart campus model. The results show interesting tradeoffs and promising insights.

  • 197.
    Atif, Yacine
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Stylianos, Sergis
    University of Piraeus, Athens, Greece.
    Demetrios, Sampson
    Curtin University, Perth, Australia.
    Mathiason, Gunnar
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A Cyberphysical Learning Approach for Digital Smart Citizenship Competence Development2017In: WWW '17: Proceedings of the 26th International Conference on World Wide Web Companion, ACM Digital Library, 2017, p. 397-405Conference paper (Refereed)
    Abstract [en]

    Smart Cities have emerged as a global concept that argues for the effective exploitation of digital technologies to drive sustainable innovation and well-being for citizens. Despite the large investments being placed on Smart City infrastructure, however, there is still very scarce attention on the new learning approaches that will be needed for cultivating Digital Smart Citizenship competences, namely the competences which will be needed by the citizens and workforce of such cities for exploiting the digital technologies in creative and innovative ways for driving financial and societal sustainability. In this context, this paper introduces cyberphysical learning as an overarching model of cultivating Digital Smart Citizenship competences by exploiting the potential of Internet of Things technologies and social media, in order to create authentic blended and augmented learning experiences.

  • 198.
    Atif, Yacine
    et al.
    UAE University, United Arab Emirates.
    Zhang, Liren
    UAE University, Univted Arab Emirates.
    Network Resource Management in Support of QoS in Ubiquitous Learning2014In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 41, p. 148-156Article in journal (Refereed)
    Abstract [en]

    Ubiquitous learning involves a large-scale service network organized as a social infrastructure. These environments weave together context service dissemination, learner profiling as well as autonomic control of the induced network traffic. The objective of the research presented in this paper is to derive a Quality of Service aware model of ubiquitous learning services based on typical learning schemes. These pedagogical patterns are designed to match various learning situations in terms of learning context, learner profile and network infrastructure. They particularly represent classes of services in ubiquitous learning environments to prioritize traffic so that less important traffic does not consume network bandwidth and slow down or halt the delivery of more important traffic. We analyze formally and empirically the network traffic requirements of a proposed learning service quality controller to support providers of learning services allocating resources in a pervasive learning environment.

  • 199.
    Auer, Jens
    University of Skövde, School of Humanities and Informatics.
    Metaheuristic Multiple Sequence Alignment Optimisation2004Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    The ability to tackle NP-hard problems has been greatly extended by the introduction of Metaheuristics (see Blum & Roli (2003)) for a summary of most Metaheuristics, general problem-independent optimisation algorithms extending the hill-climbing local search approach to escape local minima. One of these algorithms is Iterated Local Search (ILS) (Lourenco et al., 2002; Stützle, 1999a, p. 25ff), a recent easy to implement but powerful algorithm with results comparable or superior to other state-of-the-art methods for many combinatorial optimisation problems, among them the Traveling Salesman (TSP) and Quadratic Assignment Problem (QAP). ILS iteratively samples local minima by modifying the current local minimum and restarting

    a local search porcedure on this modified solution. This thesis will show how ILS can be implemented for MSA. After that, ILS will be evaluated and compared to other MSA algorithms by BAliBASE (Thomson et al., 1999), a set of manually refined alignments used in most recent publications of algorithms and in at least two MSA algorithm surveys. The runtime-behaviour will be evaluated using runtime-distributions.

    The quality of alignments produced by ILS is at least as good as the best algorithms available and significantly superiour to previously published Metaheuristics for MSA, Tabu Search and Genetic Algorithm (SAGA). On the average, ILS performed best in five out of eight test cases, second for one test set and third for the remaining two. A drawback of all iterative methods for MSA is the long runtime needed to produce good alignments. ILS needs considerably less runtime than Tabu Search and SAGA, but can not compete with progressive or consistency based methods, e. g. ClustalW or T-COFFEE.

  • 200.
    Augustsson, Christian
    et al.
    University of Skövde, School of Informatics.
    Egeberg Jacobson, Pontus
    University of Skövde, School of Informatics.
    Scherqvist, Erik
    University of Skövde, School of Informatics.
    Evaluating Machine Learning Intrusion Detection System classifiers: Using a transparent experiment approach2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    There have been many studies performing experiments that showcase the potential of machine learning solutions for intrusion detection, but their experimental approaches are non-transparent and vague, making it difficult to replicate their trained methods and results. In this thesis we exemplify a healthier experimental methodology.

    A survey was performed to investigate evaluation metrics. Three experiments implementing and benchmarking machine learning classifiers, using different optimization techniques, were performed to set up a frame of reference for future work, as well as signify the importance of using descriptive metrics and disclosing implementation.

    We found a set of metrics that more accurately describes the models, and we found guidelines that we would like future researchers to fulfill in order to make their work more comprehensible. For future work we would like to see more discussion regarding metrics, and a new dataset that is more generalizable.

1234567 151 - 200 of 2834
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf