his.sePublications
Change search
Refine search result
676869707172 3451 - 3500 of 3585
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 3451.
    Wilhelmsson, Martin
    University of Skövde, School of Humanities and Informatics.
    A Personalized Achievement System for Educational Games: Targeting the achievement goals of the student2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis is an interdisciplinary project based on motivation research in educational games and research on psychological achievement goals. The purpose was to present a model for a gaming achievement system that adapts to suit the player. The player profile is constructed using an achievement goal questionnaire based on educational achievement goals from previous research. To test the model appropriately, a game prototype was developed.

    The results derived from the thesis project and the included study is based mainly on qualitative data from game sessions as well as questionnaires. The results indicates that the model works as intended, but that individual choice of gaming achievements can be more useful for some people. The results also show that the model is a viable for implementation in future projects and a suitable alternative for low-budget educational games. The model still needs further evaluation to ensure its efficacy, but shows great promise.

  • 3452.
    Wilhelmsson, Martin
    University of Skövde, School of Humanities and Informatics.
    Rollen av achievements i spelupplevelsen och spelandet2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    I denna studie, som bygger på tidigare arbete på achievements och belöningssystem, utreds effekten av achievementsystem på spelupplevelsen och spelandet i ett tredjepersons actionspel. Dessutom har achievements i tredjepersons actionspel undersökts för att ta reda på vilka typer av achievements som passar bäst in i genren. För att undersöka detta har andra achievementsystem analyserats och fyra kategorier av achievements klassificerats. För undersökningen har en bana skapats i ett tredjepersons actionspel, samt ett för genren representativt achievementsystem som sedan implementerats.

    Studien har visat att achievementsystem ökar spelares utforskningstendens och speltid. Samtidigt har utforskningsbaserade achievements visat sig vara de mest populära i spelet, och handlingsbaserade de minst populära. Överlag ansåg testdeltagarna att achievements ska vara svåra att uppnå för att ha betydelse för spelaren. Achievements som fenomen är fortfarande ungt och mer utförliga studier på ämnet hade kunnat hjälpa spelutvecklare att förstå den relation olika typer av spelare har till achievements.

  • 3453.
    Wilhelmsson, Ulf
    et al.
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Virtual Systems Research Centre.
    Wallén, Jacob
    Sweden.
    A Combined Model for the Structuring of Computer Game Audio2011In: Game Sound Technology and Player Interaction: Concepts and Developments / [ed] Mark Grimshaw, IGI Global, 2011, p. 98-132Chapter in book (Refereed)
    Abstract [en]

    This chapter presents a model for the structuring of computer game audio building on the IEZA-framework (Huiberts & van Tol, 2008), Murch’s (1998) conceptual model for the production of film sound, and the affordance theory put forth by Gibson (1977/1986). This model makes it possible to plan the audio layering of computer games in terms of the relationship between encoded and embodied sounds, cognitive load, the functionality of the sounds in computer games, the relative loudness between sounds, and the dominant frequency range of all the different sounds. The chapter uses the combined model to provide exemplifying analyses of three computer games—F.E.A.R., Warcraft III, and Legend of Zelda—. Furthermore, the chapter shows how a sound designer can use the suggested model as a production toolset to structure computer game audio from a game design document.

  • 3454.
    William - Olsson, Robert
    University of Skövde, School of Humanities and Informatics.
    FÄRRE LJUD, FLER BILDER: Hur perceptionen av den upplevda mängden ljud kan påverkas av bild2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Det här är en studie i om bilder i dataspel kan förändra uppfattningen om antalet ljudsekvenser som spelas upp. Faktorerna som har ändrats i varje test är förhållandena mellan antalet ljudsekvenser och antalet bildobjekt som presenteras. Flera olika ljud skapades till undersökningen, som skiljde sig i karaktär i syfte av att ge mer nyanserade resultat. 20 personer gjorde test där de fick lyssna på ljud med och utan koppling till bilder. De blev sedan tillfrågade hur många ljudkällor de kunde höra. Resultaten visade att en majoritet upplevde att antalet ljudskevenser ökade i mängd när de visades en bild med ett större antal bildobjekt, så länge de antalen var över Murchs ”2½-gräns”. Undersökningen kan i framtiden utökas på olika sätt för att ge tydligare resultat.

  • 3455.
    William-Olsson, Robert
    University of Skövde, School of Humanities and Informatics.
    SOUND IDENTIFICATION TRAINING APPLICATION: An evaluatory study of two training applications for training identification of complex sounds to raise awareness of noise2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis studied the effects of ear training on motivation and the ability to identify sounds under a layer of pink noise, using two versions of a training application. The first version was a serious game that utilized common game design features with the aim of increasing the player’s motivation to keep playing. The second version, called the basic training application was used as a base-line and modeled after the training method used by Shafiro (2008) in his experiment #2. 14 participants (divided into two groups of 7) were tested on their ability to identify sounds and how motivated they felt to continue training. Results pointed to the basic training application being better at increasing the participants’ sound identification ability, and the serious game being better at retaining the participants’ motivation to keep playing. Future studies should aim to combine features from both versions of the training application.

  • 3456.
    Willén, Rasmus
    University of Skövde, School of Informatics.
    Effektiv trafiksimulering: En jämförelse mellan A* och Internet Routing vid trafiksimulering2016Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Trafiksimulering är vanligt förekommande i stadsbyggarspel, som t.ex. SimCity (2013), och innebär att bilar färdas mot ett bestämt mål, istället för endast visuellt presenterat utifrån statistik, som i tidigare stadsbyggarspel. Problemet med denna simulering är att antalet bilar ökar i takt med att staden växer, vilket innebär att simuleringen måste vara optimalt effektiv för att kunna köras i realtid.

    För att bilarna ska hitta till målet genomförs vanligtvis en genomsökning av vägnätet med en algoritm som heter A*, som lägger upp en väg till målet.Detta kan vara tidskrävande att simulera i realtid med många bilar. Detta arbete tar fram en ny metod som liknar hur data navigeras på Internet, kallat routing. Denna metod benämns Internet Routing.

    Metoden testades mot A* algoritmen och sedan jämfördes deras simuleringseffektivitet (FPS). Resultaten visade att det blev nästan samma FPS för båda. Slutsatsen är att den är likvärdig men mer komplex att implementera.

  • 3457.
    Winbladh, Anders
    University of Skövde, Department of Computer Science.
    Prototyping för effektiv kravutvinning1998Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Vid utveckling av datoriserade informationssystem är kvaliteten och därmed kostnaden på slutprodukten i hög grad beroende av hur väl man har lyckats att realisera kundens krav och önskemål på det tänkta systemet. För att kunna realisera kundens krav måste först de krav som kunden har på systemet komma till kännedom för utvecklaren. Kunden är inte heller alltid förmögen att ställa samtliga krav då han eller hon inte vet vad som är möjligt att kräva av systemet. Som stöd för utvinningen av kundkrav finns ett antal olika metoder och ansatser. Samtliga av dessa metoder har dock brister och begränsande egenskaper som påverkar deras effektivitet för att utvinna samtliga kundkrav för ett tänkt informationssystem.

    Den metod som kritiskt analyseras i denna studie är prototyping. Närmare bestämt throw-away prototyping. Prototyping är en kravutvinningsmetod som utnyttjar prototyper av det tänkta systemet som grund för kravutvinningen. Detta förfarande främjar dialogen mellan användare och utvecklare då man har något konkret att tala omkring samt att användarna får en förståelse vilka krav som är möjliga att ställa på systemet. Dock har metoden vissa egenskaper som begränsar dess lämplighet vid utveckling av vissa informationssystem.

    Jag har utifrån en litteraturstudie behandlat frågeställningarna; vilka begränsande egenskaper har prototyping och när uppkommer dessa egenskaper, hur påverkar typen av informationssystem, som skall utvecklas, lämpligheten för prototyping samt vilka faser i systemutvecklingsarbetet påverkas tillföljd av dessa begränsningar? Jag har dessutom gjort en bedömning när det kan vara lämpligt att använda sig utav prototyping i avseende på totalkostnaden för ett projekt. Det är inte en jämförande studie mellan olika metoder utan en studie som enbart behandlar prototyping.

  • 3458.
    Windridge, David
    et al.
    Department of Computer Science, Middlesex University, UK / Centre for Vision, Speech and Signal Processing, University of Surrey, UK.
    Svensson, Henrik
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Univ Skovde, Interact Lab, Skovde, Sweden..
    Thill, Serge
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Donders Institute for Brain, Cognition, and Behaviour, Radboud University, Netherlands.
    On the utility of dreaming: A general model for how learning in artificial agents can benefit from data hallucination2020In: Adaptive Behavior, ISSN 1059-7123, E-ISSN 1741-2633, article id UNSP 1059712319896489Article in journal (Refereed)
    Abstract [en]

    We consider the benefits of dream mechanisms - that is, the ability to simulate new experiences based on past ones - in a machine learning context. Specifically, we are interested in learning for artificial agents that act in the world, and operationalize "dreaming" as a mechanism by which such an agent can use its own model of the learning environment to generate new hypotheses and training data. We first show that it is not necessarily a given that such a data-hallucination process is useful, since it can easily lead to a training set dominated by spurious imagined data until an ill-defined convergence point is reached. We then analyse a notably successful implementation of a machine learning-based dreaming mechanism by Ha and Schmidhuber (Ha, D., & Schmidhuber, J. (2018). World models. arXiv e-prints, arXiv:1803.10122). On that basis, we then develop a general framework by which an agent can generate simulated data to learn from in a manner that is beneficial to the agent. This, we argue, then forms a general method for an operationalized dream-like mechanism. We finish by demonstrating the general conditions under which such mechanisms can be useful in machine learning, wherein the implicit simulator inference and extrapolation involved in dreaming act without reinforcing inference error even when inference is incomplete.

  • 3459.
    Windridge, David
    et al.
    Middlesex University, London, UK / University of Surrey, Guildford, UK.
    Thill, Serge
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. University of Plymouth, UK.
    Representational fluidity in embodied (artificial) cognition2018In: Biosystems (Amsterdam. Print), ISSN 0303-2647, E-ISSN 1872-8324, Vol. 172, p. 9-17Article in journal (Refereed)
    Abstract [en]

    Theories of embodied cognition agree that the body plays some role in human cognition, but disagree on the precise nature of this role. While it is (together with the environment) fundamentally engrained in the so-called 4E (or multi-E) cognition stance, there also exists interpretations wherein the body is merely an input/output interface for cognitive processes that are entirely computational.

    In the present paper, we show that even if one takes such a strong computationalist position, the role of the body must be more than an interface to the world. To achieve human cognition, the computational mechanisms of a cognitive agent must be capable not only of appropriate reasoning over a given set of symbolic representations; they must in addition be capable of updating the representational framework itself (leading to the titular representational fluidity). We demonstrate this by considering the necessary properties that an artificial agent with these abilities need to possess.

    The core of the argument is that these updates must be falsifiable in the Popperian sense while simultaneously directing representational shifts in a direction that benefits the agent. We show that this is achieved by the progressive, bottom-up symbolic abstraction of low-level sensorimotor connections followed by top-down instantiation of testable perception-action hypotheses.

    We then discuss the fundamental limits of this representational updating capacity, concluding that only fully embodied learners exhibiting such a priori perception-action linkages are able to sufficiently ground spontaneously-generated symbolic representations and exhibit the full range of human cognitive capabilities. The present paper therefore has consequences both for the theoretical understanding of human cognition, and for the design of autonomous artificial agents.

  • 3460.
    Winge, Monica
    et al.
    Karolinska Institutet, Department of Learning, Informatics, Management and Ethics.
    Johansson, Lars-åke
    Alkit Communications.
    Lindh-Waterworth, Eva
    Umeå University Department of Informatics.
    Nyström, Monica
    Karolinska Institutet, Department of Learning, Informatics, Management and Ethics.
    Wangler, Benkt
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    A New Care Concept: Making Collaborative Home Care Work2007In: Proceedings of the 6th International Conference on Perspectives in Business Information Research: BIR'2007 / [ed] Jyrki Nummenmaa, Eva Söderström, Tampere: Tampere University , 2007, p. 158-169Conference paper (Refereed)
    Abstract [en]

    In this paper we discuss the fact that more and more patients are treated in their homes by a set of organizations, sometimes with different ownership, we explore how this poses new and heavy demands on health care and home service staff to communicate and to collaborate. We investigate the need for improved communication and collaboration on different managerial and operational levels. In particular we point to the need for managers in different organizations to agree on ways of communicating and collaborating between the operational level and the importance of this during procurement of home care services. As a result the paper suggests a number of methodological measures, strategies and IT solutions, to support organizational development, coordination and collaboration.

  • 3461.
    Winkler, Michael
    University of Skövde, School of Humanities and Informatics.
    Measuring Performance of IT departments in Swedish municipalities2010Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Every modern organization relies on information systems and has a need formeasuring the performance of those systems and the IT department. It is furthermorewanted to be able to compare oneself to others. Municipalities struggle with theabsence of an instrument designed for their specific needs and circumstances becausemost instruments are designed for profit organizations, focus heavily on technical andeconomical criteria and do not involve criteria that are easy to compare. In this projectthe success factor analysis, a performance measurement instrument, is selected,modified and finally applied in two Swedish municipalities to investigate thesignificance of this instrument and its ability to identify significant factors of success.With interpreting the data gathered using on-line surveys, similarities and comparablecriteria as well as eight significant factors could be identified that are genericthroughout all surveys done.

  • 3462.
    Winterfledt, Claes
    University of Skövde, Department of Computer Science.
    Metoder och strategier för utveckling av Webb-baserade informationssystem1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Det uppkommer ideligen innovativa tekniker för att utveckla möjligheterna att erhålla större förtjänst utifrån sitt agerande för företag och organisationer. En av teknikerna är webb-baserade informationssystem. Syftet med detta projekt är att undersöka huruvida traditionella systemutvecklingsmetoder stödjer utvecklingen av webb-baserade informationssystem och om dessa metoder används i arbetet med att utveckla webb-baserade informationssystem.

    För att erhålla en bättre överblick av problemet och för att kunna definiera en problemställning inleddes undersökningen med att studera tillgänglig litteratur. Problemställningen besvarades genom svar som inhämtades från ett antal intervjuer, vilka genomfördes med företag som arbetar med utveckling av webb-baserade informationssystem, samt den information som erhölls från litteraturstudien.

    Arbetet har förts på en strategisk nivå där de tekniska lösningarna inte har diskuterats i detalj, dock finns det vissa tekniska beskrivningar för att göra rapporten tydligare. Ett resultat som undersökningen givit är att traditionella systemutvecklingsmetoder används, men då förädlade i nya former för att tillse utvecklingen av webb-baserade informationssystem. Ytterligare ett resultat gav ett tydligt anspråk av ett iterativt arbetssätt vid utveckling av webb-baserade informationssystem.

  • 3463.
    Winterman, Veronica
    University of Skövde, School of Humanities and Informatics.
    Vad är avgörande för metodval vid utvärdering av informationssystem?: En jämförelse mellan teori och ett praktiskt fall2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Det är viktigt att ett företags informationssystem utför och uppfyller det företaget önskar. För att säkerställa detta krävs utvärdering av informationssystem. Problemet för företag är då att avgöra vilken utvärderingsmetod som är mest lämplig att använda för just den aktuella utvärderingssituationen.

    Denna studie syftar till att undersöka vilka faktorer som beaktas när val av utvärderingsmetod skall göras. För att besvara rapportens problemfomulering genomfördes en litteraturstudie där en lista med faktorer togs fram som ansågs viktiga att beakta vid metodval. Det genomfördes även en fallstudie för att utifrån ett verkligt fall kunna jämföra teori mot hur metodval för informationssystemsutvärdering ser ut i praktiken. Med det resultat som erhållits i rapporten är förhoppningen att valet av utvärderingsmetod skall underlättas för företag.

    Resultatet blev en lista med faktorer som företag kan följa vid metodval. Denna lista visade sig vid tidpunkten för undersökningen inte tillämpas i praktiken men ansågs kunna vara ett bra hjälpmedel för företag att använda.

  • 3464.
    Wistrand, Henrik
    University of Skövde, School of Humanities and Informatics.
    Vad har svenska företag för syn på sovande data och hur hanterar svenska företag sovande data med avseende på identifiering och lagring?2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Alltför många organisationer har datalager innehållande stora mängder sovande data, det vill säga data som sällan eller aldrig används. Sovande data påverkar en organisations datalager negativt eftersom den försämrar datalagrets prestanda, kostar pengar i onödan och påverkar datalagrets infrastruktur negativt. Enligt Inmon, Glassey och Welch (1997) är det en mycket svår och komplex process att rensa ut sovande data ur sitt datalager. Administratören måste ha kunskap om vilka datatabeller i datalagret som används och vilka rader utav data som används för att kunna ta bort data från datalagret. Enligt Inmon m.fl. (1997) är det nödvändigt att använda någon form av metod för att kunna identifiera vilken data i datalagret som kan klassas som sovande data. Syftet med arbetet är att undersöka hur svenska företag hanterar sovande data för att ta reda på vilka metoder de använder för att identifiera sovande data och vad de gör med den datan som blir klassad som sovande data.

  • 3465.
    Wobst, Heike J.
    et al.
    AstraZeneca, Tufts Laboratory for Basic and Translational Neuroscience, Tufts University, Boston, United States.
    Delsing, Louise
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University, Boston, MA, United States of America / AstraZeneca, Discovery Science, Innovative Medicines and Early Development Biotech Unit, Mölndal, Sweden.
    Brandon, Nicholas J.
    AstraZeneca, Tufts Laboratory for Basic and Translational Neuroscience, Tufts University, Boston, United States / AstraZeneca, Neuroscience, Innovative Medicines and Early Development, Waltham, United States.
    Moss, Stephen J.
    AstraZeneca, Tufts Laboratory for Basic and Translational Neuroscience, Tufts University, Boston, United States / Department of Neuroscience, Tufts University, School of Medicine, Boston, MA, United States.
    Truncation of the TAR DNA-binding protein 43 is not a prerequisite for cytoplasmic relocalization, and is suppressed by caspase inhibition and by introduction of the A90V sequence variant2017In: PLoS ONE, ISSN 1932-6203, E-ISSN 1932-6203, Vol. 12, no 5, article id e0177181Article in journal (Refereed)
    Abstract [en]

    The RNA-binding and -processing protein TAR DNA-binding protein 43 (TDP-43) is heavily linked to the underlying causes and pathology of neurodegenerative diseases such as amyotrophic lateral sclerosis and frontotemporal lobar degeneration. In these diseases, TDP-43 is mislocalized, hyperphosphorylated, ubiquitinated, aggregated and cleaved. The importance of TDP-43 cleavage in the disease pathogenesis is still poorly understood. Here we detail the use of D-sorbitol as an exogenous stressor that causes TDP-43 cleavage in HeLa cells, resulting in a 35 kDa truncated product that accumulates in the cytoplasm within one hour of treatment. We confirm that the formation of this 35 kDa cleavage product is mediated by the activation of caspases. Inhibition of caspases blocks the cleavage of TDP-43, but does not prevent the accumulation of full-length protein in the cytoplasm. Using D-sorbitol as a stressor and caspase activator, we also demonstrate that the A90V variant of TDP-43, which lies adjacent to the caspase cleavage site within the nuclear localization sequence of TDP-43, confers partial resistance against caspase-mediated generation of the 35 kDa cleavage product.

  • 3466.
    Wobst, Heike J.
    et al.
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University School of Medicine, Boston, United States.
    Wesolowski, Steven S.
    IMED Biotech Unit, AstraZeneca Neuroscience IMED, AstraZeneca, Cambridge, United States.
    Chadchankar, Jayashree
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University School of Medicine, Boston, United States.
    Delsing, Louise
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Department of Neuroscience, Tufts University School of Medicine, Boston, MA, USA / IMED Biotech Unit, AstraZeneca Discovery Science, Mölndal, Sweden.
    Jacobsen, Steven
    IMED Biotech Unit, AstraZeneca Neuroscience IMED, AstraZeneca, Cambridge, United States.
    Mukherjee, Jayanta
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University School of Medicine, Boston, United States.
    Deeb, Tarek Z.
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University School of Medicine, Boston, United States.
    Dunlop, John
    IMED Biotech Unit, AstraZeneca Neuroscience IMED, AstraZeneca, Cambridge, United States.
    Brandon, Nicholas J.
    IMED Biotech Unit, AstraZeneca Neuroscience IMED, AstraZeneca, Cambridge, United States.
    Moss, Stephen J.
    AstraZeneca-Tufts Laboratory for Basic and Translational Neuroscience, Tufts University School of Medicine, Boston, United States / Department of Neuroscience, Tufts University School of Medicine, Boston, United States.
    Cytoplasmic Relocalization of TAR DNA-Binding Protein 43 Is Not Sufficient to Reproduce Cellular Pathologies Associated with ALS In vitro2017In: Frontiers in Molecular Neuroscience, ISSN 1662-5099, Vol. 10, article id 46Article in journal (Refereed)
    Abstract [en]

    Mutations in the gene TARDBP, which encodes TAR DNA-binding protein 43 (TDP-43), are a rare cause of familial forms of amyotrophic lateral sclerosis (ALS) and frontotemporal dementia (FTD). While the majority of mutations are found in the C-terminal glycine-rich domain, an alanine to valine amino acid change at position 90 (A90V) in the bipartite nuclear localization signal (NLS) of TDP-43 has been described. This sequence variant has previously been shown to cause cytoplasmic mislocalization of TDP-43 and decrease protein solubility, leading to the formation of insoluble aggregates. Since the A90V mutation has been described both in patients as well as healthy controls, its pathogenic potential in ALS and FTD remains unclear. Here we compare properties of overexpressed A90V to the highly pathogenic M337V mutation. Though both mutations drive mislocalization of the protein to the cytoplasm to the same extent, M337V produces more significant damage in terms of protein solubility, levels of pathogenic phosphorylation, and formation of C-terminal truncated protein species. Furthermore, the M337V, but not the A90V mutant, leads to a downregulation of histone deacetylase 6 and Ras GTPase-activating protein-binding protein. We conclude that in the absence of another genetic or environmental 'hit' the A90V variant is not sufficient to cause the deleterious phenotypes associated with ALS and FTD, despite prominent cytoplasmic protein relocalization of TDP-43.

  • 3467.
    Wold, Sissel
    University of Skövde, Department of Computer Science.
    En kartläggning av personalens sociala scheman angående underhållshandboken på Volvo PV Skövde1999Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syftet med undersökningen är att studera personalens sociala scheman angående en underhållshandbok som finns på intranet på Volvo östra. Problemet är att underhållshandboken inte används i någon stor utsträckning. Syftet är att med hjälp av en kartläggning av personalens roll- och händelsescheman angående användningen av handboken, kunna hitta bakomliggande problem till varför inte handboken används. Underhållshandboken finns dels på intranet och dels i pärmar. I enkätundersökningen deltog 23 försökspersoner som arbetar vid underhållssektionens alla avdelningar.

    Resultatet visar att de som någon gång använt underhållshandboken använder handboken främst vid situationer när de blir tillsagda att använda den. Av de som inte använt underhållshandboken någon antyder att detta kan vara problemet till det låga användandet. Andra möjliga problem kan var att det upplevs som omständigt att ta sig till de rätta sidorna och att använda intranet upplevs som ‘fult’. Ett förslag på fortsatt arbete är att införa en utbildning angående underhållshandboken och intranet och förankra intranet som arbetsredskap

  • 3468.
    Wrege, Marcus
    University of Skövde, Department of Computer Science.
    Utvärdering av hur moderna databasprodukter möter kraven på tredje generationens databaser2000Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Databaser är vanligt förekommande i vardagen på företag och organisationer. De mer objektorinterade krav som idag ställs på vad en databas bör klara av att hantera, har med ökad datakapacitet gjort att mer komplexa dataobjekt måste kunna hanteras i databasen.

    1990 skrevs ett manifest av den tidens ledande databasforskare om vad de ansåg att den tredje generationens databaser borde ha för funktionalitet. I detta arbete undersöks det huruvida dagens moderna relationsdatabasprodukter klarar av att hantera de krav som ställdes i manifestet på vad den tredje generationens databaser borde klara av.

    Arbetet utgår ifrån manifestets krav och utförs med hjälp av en kombination av metoderna litteraturstudie och implementation. Fokus har lagts på att hitta en lösning i litteraturen för att om möjligt visa med kodexempel hur det kan se ut i en praktisk lösning.

  • 3469.
    Wróbel, Borys
    et al.
    Systems Modeling Laboratory, IO PAN, Sopot, Poland / Evolutionary Systems Laboratory, Uniwersytet im. Adama Mickiewicza, Poznan, Poland / Institut für Neuroinformatik, Universität & ETH Zürich, Switzerland.
    Joachimczak, Michal
    Systems Modeling Laboratory, IO PAN, Sopot, Poland.
    Montebelli, Alberto
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    Lowe, Robert
    University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre.
    The Search for Beauty: Evolution of Minimal Cognition in an Animat Controlled by a Gene Regulatory Network and Powered by a Metabolic System2012In: From Animals to Animats 12: 12th International Conference on Simulation of Adaptive Behavior, SAB 2012, Odense, Denmark, August 27-30, 2012 / [ed] Tom Ziemke, Christian Balkenius, John Hallam, Berlin, Heidelberg: Springer Berlin/Heidelberg, 2012, p. 198-208Conference paper (Refereed)
    Abstract [en]

    We have created a model of a hybrid system in which a gene regulatory network (GRN) controls the search for resources (fuel / food and water) necessary to allow an artificial metabolic system (simulated microbial fuel cell) to produce energy. We explore the behaviour of simple animats in a two-dimensional simulated environment requiring minimal cognition. In our system control evolves in a biologically-realistic manner under tight energy constraints. We use a model of GRN in which there is no limit on the size of the network, and the concentration of regulatory substances (transcriptional factors, TFs) change in a continuous fashion. Externally driven concentrations  of selected TFs provid the sensory information to the animat, while the concentration of selected internally produced TFs is interpreted as the signal for actuators. We use a genetic algorithm to obtain diverse evolved strategies in ecologically grounded animats with motivational autonomy, even though they lack a dedicated motivational circuit. There are three motivations (or drives) in the system: thirst, hunger, and reproduction. The animats need to search for food and water, but also to perform work. Because the value of such work is arbitrary (in the eye of the beholder), but affects the chances of reproduction, we suggest that the term beauty is more appropriate, and we name the task the Search for Beauty. The results obtained provide a step towards realizing a biologically realistic system with respect to: the way the control is exercised, the way it evolves, and the way the metabolism provides energy.

  • 3470.
    Wåhlgren, Yvonne
    University of Skövde, Department of Computer Science.
    Hur beräknas den ekonomiska avkastningen för en datalagerinvestering?2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syfte med detta arbete är att undersöka huruvida avkastningsberäkning för en datalagerinvestering bör göras, hur det kan göras och om det görs. Vidare avses att undersöka om generella kalkylmetoder kan användas av företag, oavsett storlek, som avser att starta datalagerinvesteringsprojekt. Datalagerteknologin har ännu en hög utvecklingstakt och detta medför ofta höga utvecklingskostnader i samband med investeringar inom datalager.

    Undersökningen baseras på en kombinerad dokumentstudie och enkätundersökning. Dokumentstudien belyser den problematik vilken förknippas med problemområdet. Enkätundersökningen fokuseras mot olika större organisationer såsom banker, post och dagligvaruhandeln, vilka idag använder sig av datalager. De tillfrågas om huruvida avkastningsberäkning görs i deras organisation och, i så fall, hur den utförs.

    Analysen och resultatet tyder på att problemområdet inte har en enkel lösning och att någon typ av avkastningsberäkning bör användas. Svårigheterna ligger i att värdera de potentiella fördelar som ett datalager kan generera.

  • 3471.
    Wångsell, Johan
    University of Skövde, School of Humanities and Informatics.
    Användning av genetiska algoritmer för framtagning och utvärdering av byggordningar i RTS-spel2013Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Detta arbete undersöker användningen av evolutionära algoritmer för framtagning och utvärdering av byggordningar i RTS-spel. Syftet var att undersöka om just evolutionära tekniker kan uppnå lika bra resultat som skriptade byggordningar då evolutionära tekniker oftast är billigare att utveckla.För att undersöka denna problemställning utvecklades en applikation med en experimentmiljö och en Artificiell Intelligens (AI) med evolutionär algoritm. Denna applikation och AI användes sedan för utvärdering av framtagna byggordningar.Resultatet antyder att evolutionära tekniker kan uppnå lika bra kvalitet som de skriptade byggordningarna.Något som krävs i detta arbete är fördefinierade skript för byggordningar för att köra evolutionen men något som skulle vara intressant att kolla på är coevolution. Med coevolution hade det varit möjligt evolvera fram byggordningar utan dessa färdiga skript genom att köra evolutionen mot individer i samma population.

  • 3472.
    Wånsander, Victoria
    University of Skövde, School of Informatics.
    Värdeprofilens resa: Visualiseringsteknik som stöd för servicedesigners att identifiera potentiellt användarvärde2016Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    To identify what users value, is the key to business for creating competitive advantages. Despite this, designers in the field of service design using several visualization techniques for support when visualizing different aspects of a service. But none of the visualization techniques support the servicedesigner to identify what the user values. The study is based on a exploratory methodology which triangulates, a questionnaire and interview with a summary of the most important "ingredients" that should be included in visualization technology wich supports servicedesigners to identify potential user value before a service is created.

    The results of the study are presented in the form of the visualization technique "Value Profile Journey" that aimes to support servicedesigners and companies to whom want to achieve competitive advantage by identifying potential user value through service design. By answering the question the study can face the problems related to the lack of visual aid that supports the company's need to gather knowledge about the type of service that can create user without having to source that from an existing service. The result of this study is meant to be used by servicedesigners to identify activities in the users life in which companies, through their resources, can create services that support users needs and thereby create more value for the users.

  • 3473.
    Xu, Xun
    et al.
    Univ Auckland, Dept Mech Engn, Sch Engn, Auckland 1142, New Zealand.
    Wang, Lihui
    University of Skövde, The Virtual Systems Research Centre. University of Skövde, School of Technology and Society.
    Newman, Stephen T.
    Univ Bath, Dept Mech Engn, Bath BA2 7AY, Avon, England.
    Computer-aided process planning: A critical review of recent developments and future trends2011In: International journal of computer integrated manufacturing (Print), ISSN 0951-192X, E-ISSN 1362-3052, Vol. 24, no 1, p. 1-31Article, review/survey (Refereed)
    Abstract [en]

    For the past three decades, computer-aided process planning (CAPP) has attracted a large amount of research interest. A huge volume of literature has been published on this subject. Today, CAPP research faces new challenges owing to the dynamic markets and business globalisation. Thus, there is an urgent need to ascertain the current status and identify future trends of CAPP. Covering articles published on the subjects of CAPP in the past 10 years or so, this article aims to provide an up-to-date review of the CAPP research works, a critical analysis of journals that publish CAPP research works, and an understanding of the future direction in the field. First, general information is provided on CAPP. The past reviews are summarised. Discussions about the recent CAPP research are presented in a number of categories, i.e. feature-based technologies, knowledge-based systems, artificial neural networks, genetic algorithms, fuzzy set theory and fuzzy logic, Petri nets, agent-based technology, Internet-based technology, STEP-compliant CAPP and other emerging technologies. Research on some specific aspects of CAPP is also provided. Discussions and analysis of the methods are then presented based on the data gathered from the Elsevier’s Scopus abstract and citation database. The concepts of ‘Subject Strength’ of a journal and ‘technology impact factor’ are introduced and used for discussions based on the publication data. The former is used to gauge the level of focus of a journal on a particular research subject/domain, whereas the latter is used to assess the level of impact of a particular technology, in terms of citation counts. Finally, a discussion on the future development is presented.

  • 3474.
    Yan, Bao-Yong
    et al.
    Hebei Medical University, Shijiazhuang.
    Wang, Da-Wei
    Hebei Medical University, Shijiazhuang.
    Zhu, Zhen-Long
    Hebei Medical University, Shijiazhuang.
    Yang, Yan-Hong
    Hebei Medical University, Shijiazhuang.
    Wang, Ming-Wei
    Hebei Medical University, Shijiazhuang.
    Cui, Dong-Sheng
    Hebei Medical University, Shijiazhuang.
    Zhang, Hong
    University of Skövde, The Systems Biology Research Centre. University of Skövde, School of Life Sciences.
    Sun, Xiao-Feng
    University of Linköping.
    Overexpression of MAC30 in the Cytoplasm of Oral Squamous Cell Carcinoma Predicts Nodal Metastasis and Poor Differentiation2010In: Chemotherapy, ISSN 0009-3157, E-ISSN 1421-9794, Vol. 56, no 6, p. 424-428Article in journal (Refereed)
    Abstract [en]

    Background: Expression of the meningioma-associated protein (MAC30) was increased in several types of tumors, including esophageal, gastric and colon tumors, compared to normal tissue. MAC30 expression levels gradually increased from normal colorectal mucosa to primary colorectal cancer and colorectal cancer spreading to the lymph nodes. MAC30 expression was related to survival in patients with colorectal cancer. However, there is no study on MAC30 in oral squamous cell carcinoma (OSCC). Methods: Therefore, MAC30 expression in OSCC was investigated and possible associations of MAC30 expression with clinicopathological variables in OSCC have been analyzed. MAC30 expression was immunohistochemically examined in 20 normal oral mucosa and 43 OSCC specimens. Results: Expression levels of MAC30 in the cytoplasm markedly increased from normal oral epithelial cells to primary OSCC. Strong cytoplasmic staining was significantly higher in primary OSCC compared to normal oral mucosa samples (51 vs. 20%, p = 0.019). Furthermore, MAC30 expression levels in primary tumors of patients with lymph node metastasis exceeded levels in those without metastasis (65 vs. 35%, p = 0.048), and MAC30 expression in poorly differentiated tumors was higher than in well-differentiated ones (90 vs. 39%, p = 0.005). Conclusion: Overexpression of MAC30 in the cytoplasm of OSCC may predict nodal metastasis and poor differentiation.

  • 3475.
    Yang, L.
    et al.
    Linköping University.
    Olsson, B.
    Linköping University.
    Pfeifer, D.
    Linköping University.
    Jönsson, J.-I.
    Linköping University.
    Zhou, Z.-G.
    Sichuan University.
    Jiang, X.
    Sichuan University.
    Fredriksson, B.-A.
    Linköping University.
    Zhang, Hong
    University of Skövde, School of Life Sciences. University of Skövde, The Systems Biology Research Centre.
    Sun, X.-F.
    Linköping University.
    Knockdown of peroxisome proliferator-activated receptor-β induces less differentiation and enhances cell-fibronectinadhesion of colon cancer cells2010In: Oncogene, ISSN 0950-9232, E-ISSN 1476-5594, Vol. 29, no 4, p. 516-526Article in journal (Refereed)
    Abstract [en]

    The role of peroxisome proliferator-activated receptor-/ (PPAR-/) in the pathogenesis of colon cancer remains highly controversial. This study specifically silenced the PPAR- expression in three colon cancer cell lines with different metastatic potentials. Although PPAR-knockdown resulted in more malignant morphological changes, bigger colony sizes and lower carcinoembryonic antigen (CEA) secretion, and enhanced the cell-fibronectin adhesion, cell invasion and migration were unaffected. These effects were stronger in poorly metastatic cell lines compared with highly metastatic ones. Simultaneously, PPAR-knockdown decreased the mRNAs encoding adipocyte differentiation-related protein and liver fatty acid binding protein, and increased the mRNA of ILK, whereas the mRNAs encoding integrin-1 and angiopoietin-like 4 were unchanged. Using immunohistochemistry, we determined that the intensity of PPAR- expression was stronger in rectal cancers with better differentiation than in those with poor differentiation, and was stronger in early-stage tumors than in advanced ones. Together, these findings consistently indicate that PPAR- may facilitate differentiation and inhibit the cell-fibronectin adhesion of colon cancer, having a role as an inhibitor in the carcinogenesis and progression of colorectal cancer. Interestingly PPAR- seems to have a more important role in poorly metastatic cells than in highly metastatic ones.

  • 3476.
    Yano, Edgar Toshiro
    et al.
    ITA Instituto Tecnológico de Aeronáutica, Brazil.
    de Abreu, Welton
    ITA Instituto Tecnológico de Aeronáutica, Brazil.
    Gustavsson, Per M.
    Combitech, Sweden / Swedish National Defence College / George Mason University, USA.
    Åhlfeldt, Rose-Mharie
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    A framework to support the development of Cyber Resiliency with Situational Awareness Capability2015In: 20th ICCRTS Proceedings: C2, Cyber, and Trust, International Command and Control Institute , 2015Conference paper (Refereed)
    Abstract [en]

    Cybersecurity success is essentially the result of an effective risk management process. However, this process is being challenged by the inherent complexity of systems, developed with vulnerable components and protocols, and the crescent sophistication of attackers, now backed by well-resourced criminal organizations and nations. With this scenario of uncertainties and high volume of events, it is essential the ability of cyber resiliency. Cyber resiliency is the ability of a system, organization, mission, or business process to anticipate, withstand, recover from, and adapt capabilities in the face of adversary conditions, stresses, or attacks on the cyber resources it needs to function. In the present work, it is presented a framework for cyber resiliency where a segmentation strategy and the Intrusion Kill Chain (IKC) attack model, developed by Lockheed-Martin, are central elements. Segmentation allows the construction of a layered defense, where the highest-priority assets are in the inner layers and the attackers are forced to surpass several layers to reach them. The IKC attack model is a model of seven phases that the attackers must perform to achieve their goals. Each segment is supposed to be designed with the best efforts to prevent, detect and contain an IKC. According to the Situational Awareness (SA) model of Endsley, the Level of Perception is achieved through sensors connected to the controls of prevention, detection and containment of IKC in different segments. The Level of Understanding is obtained by identifying the segments impacted by the attackers, and the Level of Projection by the identification of the next segments to be attacked and defense actions required to contain this advance. The use of the framework leads to the development of a structured set of defense mechanisms, and supports the development of SA capability to allow defenders to make correct decisions in order to maintain the mission even under a heavy attack

  • 3477.
    Yasheen, Sharifa
    University of Skövde, School of Informatics.
    Evaluation of Markov Models in Location Based Social Networks in Terms of Prediction Accuracy2016Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Location Based Social Networks has attracted millions of mobile internet users. On their smart phones people can share their locations using social network services.

    The main purpose of check-ins is to provide other users’ information about places they visit. Location Based Social Network with thousands of check-ins allows users to learn social behavior through spatial-temporal effect, which provides different services such as place recommendation and traffic prediction. Through this information, we can have an idea about important locations in the city and human mobility. The main purpose of this thesis is to evaluate Markov Models in Location Based Social Networks in terms of prediction accuracy.

    Location Based Social Network features and basic information’s will be analyzed before modeling of human mobility. Afterwards with the use of three methods human mobility will be modeled. In all the models the check-ins are analyzed based on prior category. After estimation the user’s possible next check-in category, and according to the user’s check-ins in the following category, it predicts the next possible check-in location. Finally a comparison will be made considering the models prediction accuracy. 

  • 3478.
    Ye, Xiaozhen
    et al.
    School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China.
    Backlund, Per
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ding, Jianguo
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Ning, Huansheng
    School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China.
    Fidelity in Simulation-based Serious Games2019In: IEEE Transactions on Learning Technologies, ISSN 1939-1382, E-ISSN 1939-1382Article in journal (Refereed)
    Abstract [en]

    The extensive use of Simulation-based Serious Games (SSGs) has made a revolution in educational techniques. As a potentially significant feature for SSG design and evaluation, the term fidelity (the similarity between an SSG and its real reference) emerges and attracts increasing attention. The study of fidelity not only benefits the design, development, and analysis of an SSG with the consideration of improving the learning effect but also contributes to the investment reduction of an SSG. However, the term fidelity is used inconsistently in current literature. The introduction of new technologies (e.g. virtual reality) and the blend of multiform SSGs also facilitate the extension of fidelity with new connotations. All lead to confusing concepts and vague measure metrics. Besides, the relationship between fidelity and learning effect is still uncertain. A new vision and a comprehensive conceptual framework of fidelity for more general applications are in need. In this paper, further exploration and discussion of these issues in relation to fidelity of SSGs are presented through a systematic review. A general conceptual framework considering both aspects of the SSG system itself and the learners is developed and applied to analyze fidelity in SSGs. Based on that, a discussion on fidelity related issues of SSG design and development is presented.

  • 3479.
    Yewale, Priti Prabhakar
    et al.
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Lokhande, Kiran Bharat
    Bioinformatics Research Laboratory, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Sridhar, Aishwarya
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Vaishnav, Monika
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Khan, Faisal Ahmad
    The Life Science Centre-Biology, School of Science and Technology, Örebro University, Sweden.
    Mandal, Abul
    University of Skövde, School of Bioscience. University of Skövde, The Systems Biology Research Centre.
    Swamy, Kakumani Venkateswara
    Bioinformatics Research Laboratory, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Jass, Jana
    The Life Science Centre-Biology, School of Science and Technology, Örebro University, Sweden.
    Nawani, Neelu
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, India.
    Molecular profiling of multidrug-resistant river water isolates: insights into resistance mechanism and potential inhibitors2019In: Environmental science and pollution research international, ISSN 0944-1344, E-ISSN 1614-7499Article in journal (Refereed)
    Abstract [en]

    Polluted waters are an important reservoir for antibiotic resistance genes and multidrug-resistant bacteria. This report describes the microbial community, antibiotic resistance genes, and the genetic profile of extended spectrum β-lactamase strains isolated from rivers at, Pune, India. ESBL-producing bacteria isolated from diverse river water catchments running through Pune City were characterized for their antibiotic resistance. The microbial community and types of genes which confer antibiotic resistance were identified followed by the isolation of antibiotic-resistant bacteria on selective media and their genome analysis. Four representative isolates were sequenced using next generation sequencing for genomic analysis. They were identified as Pseudomonas aeruginosa, Escherichia coli, and two isolates were Enterobacter cloacae. The genes associated with the multidrug efflux pumps, such as tolC, macA, macB, adeL, and rosB, were detected in the isolates. As MacAB-TolC is an ABC type efflux pump responsible for conferring resistance in bacteria to several antibiotics, potential efflux pump inhibitors were identified by molecular docking. The homology model of their MacB protein with that from Escherichia coli K12 demonstrated structural changes in different motifs of MacB. Molecular docking of reported efflux pump inhibitors revealed the highest binding affinity of compound MC207-110 against MacB. It also details the potential efflux pump inhibitors that can serve as possible drug targets in drug development and discovery. 

  • 3480.
    Yewale, Priti Prabhakar
    et al.
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Maharashtra, Pune, India.
    Rahman, Aminur
    University of Skövde, School of Bioscience. University of Skövde, The Systems Biology Research Centre.
    Nahar, Noor
    University of Skövde, School of Bioscience. University of Skövde, The Systems Biology Research Centre.
    Saha, Anandakumar
    Department of Zoology, University of Rajshahi, Rajshahi, Bangladesh.
    Jass, Jana
    The Life Science Center, The School of Science and Technology, Örebro University, Örebro, Sweden.
    Mandal, Abul
    University of Skövde, School of Bioscience. University of Skövde, The Systems Biology Research Centre.
    Nawani, Neelu N.
    Microbial Diversity Research Centre, Dr. D. Y. Patil Biotechnology and Bioinformatics Institute, Dr. D. Y. Patil Vidyapeeth, Pune, Maharashtra, India.
    Sources of Metal Pollution, Global Status, and Conventional Bioremediation Practices2017In: Handbook of Metal–Microbe Interactions and Bioremediation / [ed] Surajit Das, Hirak Ranjan Dash, Boca Raton, FL: CRC Press, 2017, p. 25-40Chapter in book (Refereed)
    Abstract [en]

    Pollution control has become a priority task for global regulatory authorities. The framing of regulations, guidelines, and implementation of pollution awareness and control programs has begun at a massive scale. Heavy metals that are one of the most challenging pollutants that affect humans, animals, plants, and the ecosystem health. The sources of different metals and their toxicities are described. Current approaches in bioremediation are addressed along with the challenges posed by them. Furthermore, recent developments in biotechnology that offer novel ways to recover metals from contaminated sites are discussed.

  • 3481.
    Yildirimman, Reha
    et al.
    Max Planck Inst Mol Genet, Dept Vertebrate Genom, D-14195 Berlin, Germany .
    Brolén, Gabriella
    Cellartis AB, SE-41346 Gothenburg, Sweden .
    Vilardell, Mireia
    Max Planck Inst Mol Genet, Dept Vertebrate Genom, D-14195 Berlin, Germany .
    Eriksson, Gustav
    Cellartis AB, SE-41346 Gothenburg, Sweden .
    Synnergren, Jane
    University of Skövde, School of Life Sciences.
    Gmuender, Hans
    Genedata AG, CH-4053 Basel, Switzerland .
    Kamburov, Atanas
    Max Planck Inst Mol Genet, Dept Vertebrate Genom, D-14195 Berlin, Germany .
    Ingelman-Sundberg, Magnus
    Karolinska Inst, Dept Physiol & Pharmacol, Pharmacogenet Sect, S-17177 Stockholm, Sweden .
    Castell, Jose
    Univ Valencia, Fac Med, Dept Biochem & Mol Biol, E-46009 Valencia, Spain / Univ Hosp La Fe Valencia, Unit Expt Hepatol, E-46009 Valencia, Spain .
    Lahoz, Agustin
    Univ Hosp La Fe Valencia, Unit Expt Hepatol, E-46009 Valencia, Spain .
    Kleinjans, Jos
    Maastricht Univ, Dept Toxicogen, NL-6229 ER Maastricht, Netherlands.
    van Delft, Joost
    Maastricht Univ, Dept Toxicogen, NL-6229 ER Maastricht, Netherlands.
    Bjorquist, Petter
    Cellartis AB, SE-41346 Gothenburg, Sweden .
    Herwig, Ralf
    Max Planck Inst Mol Genet, Dept Vertebrate Genom, D-14195 Berlin, Germany .
    Human Embryonic Stem Cell Derived Hepatocyte-Like Cells as a Tool for In Vitro Hazard Assessment of Chemical Carcinogenicity2011In: Toxicological Sciences, ISSN 1096-6080, E-ISSN 1096-0929, Vol. 124, no 2, p. 278-290Article in journal (Refereed)
    Abstract [en]

    Hepatocyte-like cells derived from the differentiation of human embryonic stem cells (hES-Hep) have potential to provide a human relevant in vitro test system in which to evaluate the carcinogenic hazard of chemicals. In this study, we have investigated this potential using a panel of 15 chemicals classified as noncarcinogens, genotoxic carcinogens, and nongenotoxic carcinogens and measured whole-genome transcriptome responses with gene expression microarrays. We applied an ANOVA model that identified 592 genes highly discriminative for the panel of chemicals. Supervised classification with these genes achieved a cross-validation accuracy of > 95%. Moreover, the expression of the response genes in hES-Hep was strongly correlated with that in human primary hepatocytes cultured in vitro. In order to infer mechanistic information on the consequences of chemical exposure in hES-Hep, we developed a computational method that measures the responses of biochemical pathways to the panel of treatments and showed that these responses were discriminative for the three toxicity classes and linked to carcinogenesis through p53, mitogen-activated protein kinases, and apoptosis pathway modules. It could further be shown that the discrimination of toxicity classes was improved when analyzing the microarray data at the pathway level. In summary, our results demonstrate, for the first time, the potential of human embryonic stem cell--derived hepatic cells as an in vitro model for hazard assessment of chemical carcinogenesis, although it should be noted that more compounds are needed to test the robustness of the assay.

  • 3482.
    Yngve, Simon
    University of Skövde, School of Humanities and Informatics.
    Evolutionär algoritm för schemaläggning av kontinuerligt skiftarbete: Schemaläggning med ergonomiska riktlinjer2010Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Många organisationer har ett behov av bemanning hela dygnet alla dagar i veckan. Personal vid sådana organisationer organiseras i arbetslag som enligt ett arbetsschema löser av varandra under dygnets gång. Beroende på hur dessa arbetsscheman utformas kan de få en negativ inverkan på personalens hälsa. Den här rapporten handlar om utvecklandet av en algoritm som genererar arbetsscheman med ergonomiska riktlinjer, det vill säga arbetsscheman som utformats på ett sådant sätt att negativa effekter på personalens hälsa undviks. Algoritmen som utvecklas baseras på optimeringsalgoritmen Squeaky Wheel Optimization. Resultatet av arbetet visar att arbetsscheman som genererats av algoritmen är av sådan hög kvalité att de skulle kunna appliceras praktiskt hos en organisation som har ett bemanningsbehov hela dygnet alla dagar i veckan. Tack vare algoritmens generella karaktär kan algoritmen användas som ett verktyg för schemagenerering hos en stor mängd företag.

  • 3483.
    Younan, Karam
    University of Skövde, School of Informatics.
    Smarttelefonsäkerhet: En studie kring studenters användning av inbyggda säkerhetsfunktioner i smarta telefoner2016Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Smartphones combine telephony services with data services in a single device. In 2007, Apple released a new generation of phones run by iOS operating system, called iPhones. Android phones were developed by Google and were released the following year. Smartphones use has increased a lot and they have become one of the most common devices that are being used in most of companies nowadays. The concept BYOD stands for Bring Your Own Device, means that employees may use their own smartphones at work. This makes using the built-in security features in smartphones particularly important, not only to protect employees’ private information but also to protect their corporate information. Early research has shown that threats and attacks have also increased on smartphones. Hackers have focused their attacks on smartphones more than before. And have created mobile-based viruses, malware and spyware that target vulnerable smartphones. Smartphone users nowadays do not have much control of their smartphones security according to previous researches. However, smartphones manufacturers constantly add new built-in security features with each new version of operating system to protect them from various threats. Smartphone manufacturers may use the acquired final data to improve their products’ security and increase the use of mobile built-in security features.

    The current study researches students’ interaction and use of the built-in security features available in smartphones run by both Android and iOS operating systems. The study does not divide students into smaller groups; it rather focuses on all students as one group. Although this study was conducted in the University of Skovde in Sweden, its conclusion can be applied to a bigger population regardless of location. Today's students are tomorrow’s employees and managers who will have the responsibility to protect their companies’ proprietary and sensitive information. Therefore, it is critical that they understand and implement all up-to-date procedures to protect their smartphones and their companies.

    A quantitative study is conducted through a survey in order to reach as many participants as possible. Lime Survey tool is utilized to create surveys and to gather data. Statistics and diagrams are also used to demonstrate results to readers. A total of 201 participants completed the entire study, 134 participants answered the Android survey and 67 answered the iOS survey.

    The current survey results have shown, through a model that converts participants’ answers into a flow chart, that the use of the built-in security features varies among participating students. The use of these built-in security features was low in general. More than half of all participants do not use certain functions at all. The general low use of the built-in security features can be attributed to many reasons. This survey showed that the main reason of that was the lack of participants’ knowledge of these built-in security features. Several solutions exist for this lack of knowledge of participants, but they do not fall within the scope of this study therefore not discussed herein.

  • 3484. Young, S
    et al.
    Ejdebäck, Mikael
    Göteborgs universitet.
    Sigfridsson, K
    Samuelson, A
    Hansson, Örjan
    Spectroscopic and kinetic characterization of site-specific mutants of plastocyanin1995In: Photosynthesis: From Light To Biosphere, Vol. 2 / [ed] Mathis, P., Dordrecht: Kluwer Academic Publishers, 1995, p. 669-672Conference paper (Other academic)
  • 3485.
    Zander, Sebastian
    University of Skövde, School of Informatics.
    Händelsehantering i komponentbaserade spelmotorer: Utvärdering av två tekniker2015Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Spelmotorer är en viktig del av utveckling av spel. Spel är i grunden händelsebaserade och tillåter spelentiteter att reagera på omvärlden. Syftet med det här arbetet är att utvärdera två metoder för händelsehantering i en komponentbaserad spelmotor och hur dessa påverkar tidsprestandan: en baserad på polymorfism med virtuella funktioner och en baserad på reflektion. Systemet för händelsehantering implementeras i en simpel simulering av en spelmotor och uppdateringstiden för vardera metod mäts utifrån olika variabler som påverkar dess prestanda. Systemen utvärderas i olika typer av spelmiljöer med olika mängd entiteter, olika mängd händelser per uppdatering etc. Händelsehantering baserat på reflektion visar på bättre prestanda i de flesta fall, vilket troligen beror på att funktioner för händelser endast behöver anropas på komponenter som använder händelsen.

  • 3486.
    Zandén, Camilla
    University of Skövde, Department of Computer Science.
    Just-In-Time: mänskliga och organisatoriska faktorer1997Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Produktionsstyrningen på företagen runt om i världen är i ständig förändring. Ett begrepp som ofta används för japanska logistiska idéer är Just-In-Time (JIT). Vad som egentligen innefattas i JIT beror på vilken författare man läser. För det mesta belyses de produktionstekniska delarna av JIT.

    En del av Just-In-Time som mer sällan tas upp i litteraturen är faktorer som ibland anses som grundläggande för att JIT ska fungera framgångsrikt på företagen. Många av dessa faktorer är något mjukare aspekter av Just-In-Time. Det är om dessa mjukare faktorer mitt arbete handlar.

    Jag ska i mitt examensarbete undersöka om ett antal faktorer som tillämpas på japanska företag även tillämpas på företag i Sverige. De olika faktorer mitt arbete kretsar kring är i korthet följande:

    - Jobbrotation

    - Gemensamt beslutsfattande

    - Självstyrande grupper

    - Teamwork och grupptillhörighet

    - Möjlighet till långsiktig personalpolitik

    - Omfattande utbildning

    - Gemensamt språk inom företaget

    - Aktiv förslagsverksamhet

    - Synbarhet för alla

    - Lönesystem

    Undersökningen går ut på att få reda på om dessa faktorer är något som tillämpas på företag i Sverige. Jag vill även undersöka i vilken utsträckning de olika faktorerna tillämpas.

    Jag har valt att använda mig av en enkätundersökning för att få reda på om de olika faktorerna tillämpas i Sverige. De företag som var aktuella för att passa in på min problemställning var tillverkande företag i Skaraborg med mellan 100 och 500 anställda. Jag ringde och talade med den produktionsansvarige på företagen och berättade om mitt examensarbete innan jag skickade ut enkäterna.

    Utifrån enkätsvaren kunde jag dra slutsatserna att samtliga faktorer tillämpas på företag i Sverige. Jag kunde även dra slutsatsen att det inte är ovanligt att faktorerna tillämpas. Det fanns ingen faktor som verkade helt främmande för företagen. Jag ansåg mig även kunna säga vilken faktor som tillämpas mest och vilken som tillämpas minst. Den faktor som verkar vara vanligast är ‘Möjlighet till långsiktig personalpolitik’ och den faktor som verkar vara ovanligast är ‘Gemensamt beslutsfattande’.

    Förslag till fortsatt forskning anser jag kunna vara att undersöka ytterligare mjuka faktorer, eventuellt med inriktning på attityder, trender och vilken kunskap som finns på svenska företag om dessa eller andra faktorer.

  • 3487.
    Zaxmy, Hanna
    University of Skövde, Department of Computer Science.
    The 2G method applied in a post-usage evaluation application2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    There exist several methods, which can be used for evaluation of commercially available CASE-tools. Each method has its own focus and is based on specific underlying assumptions. There have been attempts to standardise evaluation of CASE-tools; however available methods differs much from each other.

    One such method, named the 2G method has been proposed, which for each application, will establish a specific evaluation framework. This framework is tailored to the organisation at a specific point in time (since an organisation will change over time). The method consists of two phases which are iterated a sufficient number of times before a stable evaluation framework will be the result. The 2G method has been successfully applied on several applications in different organisations, though only for evaluation of CASE-tools before adoption. In this dissertation we report on an application of the 2G method, which aims to evaluate a CASE-tool from a company context which has already adopted a CASE-tool. As part of this method application the 2G method has also been transferred to the organisation.

    An additional issue this dissertation addresses is what kind of support a general Qualitative Research Tool will offer a method user when using the tool in a 2G method application. Likewise the goal includes to establish is what is poorly or unsupported in such tool in a 2G application.

    This dissertation will show that the 2G method is applicable also in a scenario where a CASE-tool has already been adopted, and therefore demonstrate that the method also is useful in evaluation studies performed after a CASE-tool has been adopted in an organisation. From the experiences of the application points will be made concerning what kind of support one would like to have in a qualitative research tool to simplify the work during the 2G applications.

  • 3488.
    Zdilar, Mihael
    University of Skövde, Department of Computer Science.
    Analys av en metod för att extrahera generella regler från multipla nät1998Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Rapporten som följer är en analys av en metod som genererar regler från neurala nätverk. Metoden heter VI-Analysis (Validity Interval Analysis) och är framtagen av Sebastian B. Thrun [Thrun]. VI-Analysis arbetar på det sättet att det neurala nätverket ses som en svart låda där endast de inputvärden och outputvärden som finns i nätverket används som underlag när regler ska genereras. Dessa inputvärden och outputvärden kommer sedan att få tillåtna intervall av VI-Analysis. De regler som tas fram av VI-Analysis är av typen if-then, dvs if (inputvärdet är inom ett tillåtet intervall) then (outputvärdet kommer att hamna inom ett tillåtet intervall). Om däremot det neurala nätverket har två eller fler lager kommer VI-Analysis att med största sannolikhet beräkna ett för stort intervall för outputvärdet. Detta kommer att granskas och det kommer att visas att VI-Analysis inte tar med alla de beroenden som finns mellan nätverkets vikter i sin beräkning. Om ett nätverk består av två eller fler lager och vikterna i nätverket är av olika tecken (+/-) kommer VI-Analysis att misslyckas att generera det exakta intervallet för ut-noden i nätverket. En metod för att minska detta fel kommer därför att presenteras.

  • 3489.
    Zeneli, Egzona
    University of Skövde, School of Informatics.
    Hur påverkas du av dina kollegor?: En kvalitativ studie om socialt inflytande vid accepterande av ny teknologi2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Problematiska delen som organisationer har är att veta hur man på bästa sätt ska implementera nya teknologier.

    Teknologiacceptans blev en känd term av den mest applicerade teoretiska modellen inom informationssystem Technology acceptance model – TAM. Teknologiacceptans innebär det positiva beslutet att använda sig av en teknologi och inom denna studie kommer fokus ligga på socialt inflytande inom teknologiacceptans. Socialt inflytande innebär mellanmänsklig övervägande faktor vid beslut, vilket tar hänsyn till att beslutet att acceptera ny teknologi görs oftast tillsammans i grupp eller hur individens beslut gör så att de passar in i gruppen eller hur beslutet påverkar andra personer.

    En undersökning gjordes för att undersöka följande frågeställning:

    • Hur påverkar socialt inflytande teknologiacceptansen för obligatoriska system?

    Frågan har undersökt genom en enkät som användes för att få en överblick i problemområdet vilket sedan blev grunden för intervjufrågorna. Totalt deltog 12 stycken personer inom enkäten och 4 stycken inom intervjun.

    Sammanfattningen av resultatet bildades rekommendationer som organisationer kan tänka på innan de påbörjar införandet av ny teknologi inom organisationen.

  • 3490.
    Zetterlund, Marie
    University of Skövde, Department of Computer Science.
    Infology: a study to identify possible elements of infology in some system development methodologies1999Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The purpose of this work is to identify possible elements of infology in some systems development methodologies. To reach the aim two objectives were identified: to gain an understanding of the concept of infology and secondly to study different kinds of methodologies and analyse them to find out possible elements of infology. In order to reach the aim of this work a literature study was performed. Four methodologies were chosen for the analysis and the selection represented a wide range of different methodologies. They were: Soft Systems Methodology (SSM), Effective Technical and Human Implementation of Computer based Systems (ETHICS), Structured Systems Analysis and Design Method (SSADM) and Yourdon Systems Method (YSM). The infological approach has been characterised and the fundamental characteristic of infology is the distinction between data and information. A consequence from this distinction is that the users of the intended information system should participate in the developing process in order to understand the complex and dynamic relations in an organisation and information system. The results of this work have shown that the soft methodologies (SSM and ETHICS) have a high degree of infology and the more hard methodologies (SSADM and YSM) have a low degree of infology.

  • 3491.
    Zetterlund, Marie
    University of Skövde, Department of Computer Science.
    Intranät: en belysning av eventuella problem och åtgärder1998Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    I detta arbete har jag valt att intervjua representanter från 5 större företag som är ledande inom sitt verksamhetsområde. Syftet med denna rapport är att belysa intranätansvarigas syn på de problem och risker som kan uppkomma med intranät som elektronisk informationsmedium. De risker och problem som jag har tittat på är om det finns en risk för en användare att missa relevant information, få tillgång till för mycket information samt utsättas för för mycket information i ett intranät. Information har samlats in via intervjuer och litteraturstudier.

    Undersökningens slutsatser handlar i stort om de åtgärder som ett företag kan vidta för att förhindra att eventuella risker och problem skall uppkomma. Den viktigaste åtgärden är utbildning av den vanliga användaren. Rapporten avslutas med en diskussion kring ämnet samt några eget komponerade riktlinjer för införande av ett intranät i en verksamhet.

  • 3492.
    Zetterman, Karin
    University of Skövde, Department of Computer Science.
    Användarprofiler: kan de bidra till kvalitet i beslutsfattande?2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Antalet intranät växer ständigt, samtidigt som allt fler människor känner att de inte kan ta till sig all den information som de erhåller. Intranäten innehåller en mängd användbar information som alla anställda kan ta del av. För att kunna använda intranätet effektivt krävs det att användarna sorterar bland all den information som finns på intranätet. Med hjälp av användarprofiler kan detta ske på ett enkelt sätt. Syftet med detta arbete var att behandla frågan om användarprofiler kan bidra till att bättre beslut tas genom att information overload reduceras. För att besvara arbetets frågeställning har telefonintervjuer med sju respondenter genomförts. Litteraturen som studerats inom detta arbete visar på att information overload kan leda till en mängd konsekvenser så väl för de anställda som företaget som helhet. Resultatet av telefonintervjuerna visar att användarprofiler används ute på företag samt att flera av respondenterna anser att dessa kan bidra till kvalitet i beslutfattandet genom reducering av information overload.

  • 3493.
    Zhang, Hong
    et al.
    University of Skövde, School of Life Sciences. University of Skövde, The Systems Biology Research Centre.
    Widegren, Emma
    Linkoping Univ, Dept Oncol, Inst Clin & Expt Med, Linkoping, Sweden .
    Wang, Da-Wei
    Hebei Med Univ, Hosp 3, Dept Stomatol, Shijiazhuang, Peoples R China.
    Sun, Xiao-Feng
    Linkoping Univ, Dept Oncol, Inst Clin & Expt Med, Linkoping, Sweden .
    SPARCL1: a potential molecule associated with tumor diagnosis, progression and prognosis of colorectal cancer2011In: Tumor Biology, ISSN 1010-4283, E-ISSN 1423-0380, Vol. 32, no 6, p. 1225-1231Article in journal (Refereed)
    Abstract [en]

    We investigated whether SPARCL1 played an essential role in tumor initiation, formation and progression of colorectal carcinomas. In this study, we examined expression of SPARCL1 protein in the normal colorectal mucosa, adjacent normal mucosa and primary and lymph node metastases from colorectal cancer patients. In matched patients, we found that SPARCL1 was negative in the distant normal colorectal mucosa, weakly expressed in the adjacent normal mucosa, strongly expressed in primary colorectal adenocarcinomas and slightly expressed in their lymph node metastases. A similar pattern was observed in the SPARCL1 expression from our series of non-matched colorectal cancer patients. The strongest expression and highest frequency of the SPARCL1 protein were found in the primary cancers. Interestingly, in the primary tumors, the frequency of SPARCL1 expression was significantly increased from the Dukes' A to Dukes' B tumors and then decreased gradually from the Dukes' B to C and D tumors. There was no difference in the intensity of SPARCL1 expression between the central areas and invasion margins of the primary tumors. Moreover, the SPARCL1 protein was more strongly expressed in the highly differentiated tumors than the lower differentiated ones. The patients with positive expression of SPARCL1 in their tumors had worse prognosis than the patients with SPARCL1-negative ones, even after the analyses by Multivariate and Interaction method. Expression of SPARCL1 protein might be a valuable biomarker for early diagnosis in colorectal cancers and further predicting patients' prognosis.

  • 3494.
    Zhang, Zhi-Yong
    et al.
    Linkoping Univ, Inst Clin & Expt Med, Dept Oncol, S-58185 Linkoping, Sweden / Tangshan Gongren Hosp, Dept Pathol, Tangshan, Peoples R China / Hebei Med Univ, Hosp 1, Lab Ctr, Shijiazhuang, Peoples R China.
    Zhang, Hong
    University of Skövde, School of Life Sciences. University of Skövde, The Systems Biology Research Centre.
    Adell, Gunnar
    Karolinska Univ Hosp, Dept Oncol, Stockholm, Sweden.
    Sun, Xiao-Feng
    Linkoping Univ, Inst Clin & Expt Med, Dept Oncol, S-58185 Linkoping, Sweden.
    Endosialin expression in relation to clinicopathological and biological variables in rectal cancers with a Swedish clinical trial of preoperative radiotherapy2011In: BMC Cancer, ISSN 1471-2407, E-ISSN 1471-2407, Vol. 11, p. Artikelnr 89-Article in journal (Refereed)
    Abstract [en]

    Background: The importance of changes in tumour-associated stroma for tumour initiation and progression has been established. Endosialin is expressed in fibroblasts and pericytes of blood vessels in several types of tumours, and is involved in the progression of colorectal cancer. In order to see whether endosialin was related to radiotherapy (RT) response, and clinicopathological and biological variables, we investigated endosialin expression in rectal cancers from the patients who participated in a Swedish clinical trial of preoperative RT. Methods: Endosialin was immunohistochemically examined in normal mucosa, including distant (n = 72) and adjacent (n = 112) normal mucosa, and primary tumours (n = 135). Seventy-three of 135 patients received surgery alone and 62 received additional preoperative RT. Results: Endosialin expression in the stroma increased from normal mucosa to tumour (p < 0.0001) both in RT and non-RT group. In the RT group, endosialin expression in the stroma was positively associated with expression of cyclooxygenase-2 (Cox-2) (p = 0.03), p73 (p = 0.01) and phosphates of regenerating liver (PRL) (p = 0.002). Endosialin expression in the tumour cells of both in the RT group (p = 0.01) and the non-RT group (p = 0.06) was observed more often in tumours with an infiltrative growth pattern than in tumours with an expansive growth pattern. In the RT group, endosialin expression in tumour cells was positively related to PRL expression (p = 0.02), whereas in the non-RT group, endosialin expression in tumour cells was positively related to p73 expression (p = 0.01). Conclusions: Endosialin expression may be involved in the progression of rectal cancers, and was related to Cox-2, p73 and PRL expression. However, a direct relationship between endosialin expression and RT responses in patients was not found.

  • 3495.
    Zhao, Zeng-Ren
    et al.
    Department of General Surgery, The First Hospital of Hebei Medical University, Shijiazhuang, P.R. China.
    Zhang, Zhi-Yong
    Department of Oncology, Institute of Biomedicine and Surgery, Linköping University, Linköping, Sweden / Department of Pathology, Tangshan Gongren Hospital, Tangshan, P.R. China.
    Zhang, Hong
    Department of Dermatology, Institute of Biomedicine and Surgery, Linköping University, Linköping, Sweden.
    Jiang, Li
    Department of Pathology, Tangshan Gongren Hospital, Tangshan, P.R. China.
    Wang, Ming-Wei
    Laboratory Centre, The First Hospital of Hebei Medical University, Shijiazhuang, P.R. China.
    Sun, Xiao-Feng
    Department of Oncology, Institute of Biomedicine and Surgery, Linköping University, Linköping, Sweden.
    Overexpression of Id-1 protein is a marker in colorectal cancer progression2008In: Oncology Reports, ISSN 1021-335X, E-ISSN 1791-2431, Vol. 19, no 2, p. 419-424Article in journal (Refereed)
    Abstract [en]

    Abstract: The inhibitor of differentiation/DNA binding 1 (Id-1), a negative regulator of basic helix-loop-helix transcription factors, plays an important role in the regulation of cell proliferation and differentiation. We examined the Id-1 expression by immunohistochemistry in 9 adenomas, 79 primary colorectal adenocarcinomas matched with 40 adjacent normal mucosa specimens and its relationship with clinicopathological factors. The Id-1 expression was increased in the carcinoma compared to the adjacent normal mucosa either in the unmatched and matched samples or to the adenoma. There was no significant difference in the Id-1 expression between normal mucosa and adenoma. The Id-1 expression of carcinoma was increased from Dukes' stages A to B, to C and to D. The cases with lymph node metastasis had a higher rate of a stronger Id-1 expression than those without lymph node metastasis. In conclusion, Id-1 overexpression plays an important role in colorectal cancer progression.

  • 3496.
    Zhen, Rong
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre. Merchant Marine College, Shanghai Maritime University, Shanghai, China.
    Riveiro, Maria
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Jin, Yongxing
    Merchant Marine College, Shanghai Maritime University, Shanghai, China.
    A novel analytic framework of real-time multi-vessel collision risk assessment for maritime traffic surveillance2017In: Ocean Engineering, ISSN 0029-8018, E-ISSN 1873-5258, Vol. 145, p. 492-501Article in journal (Refereed)
    Abstract [en]

    Multi-vessel collision risk assessment for maritime traffic surveillance is a key technique to ensure the safety and security of maritime traffic and transportation. This paper proposes a framework of real-time multi-vessel collision assessment that combines a spatial clustering process (DBSCAN) for detecting clusters of encounter vessels and a multi-vessel collision risk index model for encounter vessels within each cluster from the large amounts of monitored vessels in a surveyed sea area. First, the vessels monitored are clustered using DBSCAN to obtain the clusters of encounter vessels, filtering out the relatively safe vessels. Then, the dynamic motion relation between encounter vessels within each cluster is modeled to obtain DCPA and TCPA. The semantic and mathematical relationship of vessel collision risk index for each cluster of encounter vessels with DCPA and TCAP is constructed using a negative exponential function. To illustrate the effectiveness of the framework proposed, an experimental case study has been carried out within the west coastal waters of Sweden. The results show that our framework is effective and efficient at detecting and ranking collision risk indexes between encounter vessels within each duster, which allows an automatic risk prioritization of encounter vessels for further investigation by operators. Hence, this framework can improve the safety and security of vessel traffic transportation and reduce the loss of lives and property.

  • 3497.
    Zhou, Jiayang
    University of Skövde, School of Informatics.
    Guiding operators' attention with the help of a visual aid system2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the cutting age of industrial 4.0, automation has developed rapidly in all aspects. The emergence of the modern industrial control room has provided a new horizon to the large operation. However, the problem facing the operators is too many screens that they need to monitor at the same time which could result in fatal mistakes such as missing important alerts or failing to act on important information. With that being said, this thesis explores the possibilities of developing a visual aid system to help guide operators’ attention. With the knowledge gained from a literature review and previous efforts from ABB, a visual aid system has been developed with implementations such as unreadable screen and blinking cue guiding the operators’ attention. An experiment to evaluate the solution has also been designed and conducted with 29 participants. Both quantitative data and qualitative data have been collected and analyzed. The results suggest a strong benefit in using such a visual aid to help guide operators’ attention.

  • 3498.
    Zhou, Jiayang
    University of Skövde, School of Informatics.
    The reference functions of digital hospice care apps from a Serious Game theory perspective2018Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    The thesis identifies a multiplicity of existing challenges and dilemmas in the hospice care field, such as the increasing demands, limited access, difficulties caused from people with life-limiting conditions living at home and other concerns. The thesis proposes a way of combining the advantages of Serious Games and mobile apps to possibly solve some challenges, namely, a digital app designed for patients from a Serious Game perspective, which could be a complement of current hospice care services and assist in remote hospice care. The analysis of existing resources exposes a lack of hospice care apps containing game elements and designed for patients. The thesis therefore formulates two criteria and conducts a review of apps in health & fitness category in the Swedish App Store. Criterion 1 is for identifying the apps and functions that meet the needs of patients with non-small-cell lung cancer (NSCLC). Criterion 2 is for making sure the functions selected containing game elements. The thesis identifies and lists 85 eligible functions and provides brief summaries and analyses. These outcomes can be considered as Reference functions for improving existing hospice care apps and inspiring future researchers and designers.

  • 3499.
    Zichner, Thomas
    University of Skövde, School of Humanities and Informatics.
    Building graph models of oncogenesis by using microRNA expression data2008Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    MicroRNAs (miRNAs) are a class of small non-coding RNAs that control gene expression by targeting mRNAs and triggering either translation repression or RNA degradation. Several groups pointed out that miRNAs play a major role in several diseases, including cancer. This is assumed since the expression level of several miRNAs differs between normal and cancerous cells. Further, it has been shown that miRNAs are involved in cell proliferation and cell death.

    Because of this role it is suspected that miRNAs could serve as biomarkers to improve tumor classification, therapy selection, or prediction of survival. In this context, it is questioned, among other things, whether miRNA deregulations in cancer cells occur according to some pattern or in a rather random order. With this work we contribute to answering this question by adapting two approaches (Beerenwinkel et al. (J Comput Biol, 2005) and Höglund et al. (Gene Chromosome Canc, 2001)), developed to derive graph models of oncogenesis for chromosomal imbalances, to miRNA expression data and applying them to a breast cancer data set. Further, we evaluated the results by comparing them to results derived from randomly altered versions of the used data set.

    We could show that miRNA deregulations most likely follow a rough temporal order, i.e. some deregulations occur early and some occur late in cancer progression. Thus, it seems to be possible that the expression level of some miRNAs can be used as indicator for the stage of a tumor. Further, our results suggest that the over expression of mir-21 as well as mir-102 are initial events in breast cancer oncogenesis.

    Additionally, we identified a set of miRNAs showing a cluster-like behavior, i.e. their deregulations often occur together in a tumor, but other deregulations are less frequently present. These miRNAs are let-7d, mir-10b, mir-125a, mir-125b, mir-145, mir-206, and mir-210.

    Further, we could confirm the strong relationship between the expression of mir-125a and mir-125b.

  • 3500.
    Ziemke, Tom
    University of Skövde, Department of Computer Science.
    Adaptive behavior in autonomous agents1998In: Presence - Teleoperators and Virtual Environments, ISSN 1054-7460, E-ISSN 1531-3263, Vol. 7, no 6, p. 564-587Article, review/survey (Refereed)
    Abstract [en]

    This paper provides an overview of the bottom-up approach to artificial intelligence (AI), commonly referred to as behavior-oriented AI. The behavior-oriented approach, with its focus on the interaction between autonomous agents and their environments, is introduced by contrasting it with the traditional approach of knowledge-based AI. Different notions of autonomy are discussed, and key problems of generating adaptive and complex behavior are identified. A number of techniques for the generation of behavior are introduced and evaluated regarding their potential for realizing different aspects of autonomy as well as adaptivity and complexity of behavior. It is concluded that, in order to realize truly autonomous and intelligent agents, the behavior-oriented approach will have to focus even more on lifelike qualities in both agents and environments.

676869707172 3451 - 3500 of 3585
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf