Change search
Refine search result
12 51 - 97 of 97
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Kasselstrand, Olof
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Att Införa IPv6 i ett IPv4-nätverk2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.

    The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted. This case study will investigate an IPv6 deployment scenario for Junet AB.

    A theoretical background has been written that describes some steps an Internet service provider has to go through to deploy IPv6. The case study was conducted after the theoretical background was written. The result of this report shows that a deployment of IPv6 in an IPv4 network is technically achievable. All the main components to maintain and use IPv6 in a commercial network exist.

    The case study indicates that it is possible to deploy IPv6 in Junet AB´s network. IPv4 and IPv6 could be used in their network without any major effort. IPv6 have been around for many years now but have not had that break through many early adopters have hoped for. A lack of documentation and experience is an obstacle for a deployment of IPv6.One thing that remains now is to prove that there is a need for IPv6, but that is out of scope for this thesis.

    Download full text (pdf)
    FULLTEXT01
  • 52.
    Khademhosseinieh, Banafsheh
    et al.
    Jönköping University, School of Engineering, JTH. Research area Information Engineering.
    Khan, Muhammad Tahir
    Jönköping University, School of Engineering, JTH. Research area Information Engineering.
    Tools and Organisational Measures to Improve Information Flow2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this age, too much information is provided to the users. So that they face information overload problem and spend more time in finding the right information according to their needs. The information available to the right person on the right time can make significant difference in the work tasks and business processes in an organisation.

    This thesis work is on improving information flow within an organisation for a person having a certain role. The concentration of the work is on finding the factors (Qualifiers) which affect the information needs of the user and the actions which should be carried out to fulfil them, as well as suitable IT tools. All these have been presented as Final Result Table. This table shows the information needs, their qualifiers, and suggested actions that can be taken tocarry out a specific need. Besides, we found that there are some General Actions. These kinds of actions are not related to any specific need. Rather, while working to fulfil any of the needs, they can be taken for enhancing the work quality and speed. Further, these actions were classified into two groups: Information System Classification and Organisational Measures.

    Download full text (pdf)
    FULLTEXT01
  • 53.
    Kind, Gisela
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Svennberg, Louise
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    En jämförelse mellan PHP och C# i .Net2009Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this report we compare the two programming languages PHP and C# in .Net. They are both used to create dynamic websites and on the web there's a debate going on about which of these languages you're recommended to use. With this report we want to make ourselves a more scientific base of which of these languages that is the most used language and which languages that are the most suitable for creating dynamic websites. We have two purposes with this report:

    1. To compare the usage of the programming languages C# in .Net and PHP at web agencies, advertising agencies and combinded agencies in Sweden today.

    2. To get a better insight in the languages partly theoretical and partly through making a practical comparison of how you program in those languages.

    We have chosen to use four methods to reach our purposes; interviews, survey, lite-rature study and practical work. To among else find out which of PHP and C# in .Net that are the most common language, at web agencies, advertising agencies and combined agencies in Sweden today, we created a survey which we sent out to 100 companies in five counties. The interviews were done before the survey was designed since they were the foundation for the questions in the survey. All theoretical background is built on our literature study but we also got a little help from our literature study during our practical work. During our practical work we created two similar websites, one in each language to practically to be able to compare how the both codes are written and to make ourselves an opinion about how it feels to program in the both languages.

    From the survey we found out that PHP is the most common language at the different types of agencies that we studied. We also found out that the companies who answered the survey believes that PHP still will be the most common language in Sweden in year 2015 of the two studied languages PHP and C# in .Net.

    The survey also showed that good qualities in PHP are among others the simplicity, open source and platform independent. Worse qualities in PHP are that it lacks in troubleshooting, has low performance and too many versions.

    We think that PHP overall is the easier language to program in, in comparison with C# in .Net since the way you write the code in PHP feels more understandable and logical. Many of the advantages and disadvantages we experienced consists with the agencies opinions regarding PHP, but also with the opinions regarding C# in .Net since it's fast, compiled and a well structured language. Worse qualities in C# in .Net we experienced are that it's own by Microsoft, less spread and has complicated code.

    The conclusions of this study is that PHP is the most used programming language at the web agencies, advertising agencies and the combined agencies that this study included, that the both programming languages differ from eachother more than we predicted both theoretical and programmatically and PHP is better suited for less com-plicated programming while C# in .Net is more suited for advanced programming.

    Download full text (pdf)
    FULLTEXT01
  • 54.
    Kitanoski, Saso
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Zügner, Hannes
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    VERKSTADSSYSTEM SOM SILVERLIGHT-APPLIKATION2009Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [sv]

    Detta examensarbete är utfört i samarbete med System Andersson AB. Uppgiften var att undersöka huruvida det nuvarande verkstadssystemet, som i dagsläget är en Windowsapplikationen, skulle fungera som en webbapplikation. Webbapplikationen skulle bestå av ett antal begränsade funktioner som var instämpling/utstämpling, fungera som helskärm utan ramar från webbläsare, skapa rapporter samt fungera med pekskärm.Resultatet blev en väl fungerande webbapplikation där alla funktioner fungerar med undantag för skapandet av rapporter vilket inte stödes av utvecklingsverktyget.Rapporten ger den teoretiska bakgrunden och beskriver utvecklingen av webbapplikationen med bl.a. val av olika utvecklingsverktyg. Rapporten beskriver också hur webbapplikationen testats.

    Download full text (pdf)
    FULLTEXT01
  • 55.
    Kristiansson, Jonas
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Pettersson, Johan
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Förbättra Internetsystem genom implementation av AJAX-teknik2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Today, many businesses and persons prefer to use web applications in their daily

    work. Until now, most of the websites are being constructed using an old traditional

    model. The model implies that whenever someone clicks on a link to get new

    information, a request is being sent to an information server. The server prepares, and

    returns the new requested information. For the client to take part of the new

    information, the client has to reload the whole page with all its content. By using

    AJAX-techniques the information flow will be more similar to an ordinary local

    application program. That is, only the information that needs to be updated is sent

    back to the client browser.

    The purpose of this essay was to investigate whether AJAX-techniques can improve

    Internet systems, both in user-friendliness and in a development point of view. This

    was performed studying two typical cases of web applications. By comparing the two

    applications, before and after implementation of AJAX, we could see improvements

    with AJAX in all of our investigated aspects. The user can work more efficient in

    applications where AJAX is implemented. For example, the application can give more

    direct feedback on the user’s actions by working with a much higher level of active

    communication. A whole new world of possibilities opens for the developer to

    construct applications that were not possible before. The new continuous

    communication between server and client creates higher demands on the developer

    than before. Since communication occur in the background, error handling is harder to

    troubleshoot. In our opinion the advantages of AJAX by far outnumbers the

    drawbacks. In the future, more and more developers will use AJAX which will lead to

    better solutions of debugging. This is a challenge to the Internet Community, a

    challenge that we believe will be met.

    Download full text (pdf)
    FULLTEXT01
  • 56.
    Kurtulus, Filiz
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Holstensson, Alexandra
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    DK:s kommunikation, informations- och dokumenthantering med hjälp av Microsofts produkter2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [sv]

    Idag leds företag av tre hörnstenar: kommunikation, informations- och dokumenthantering. Dessa begrepp hör ihop och förutspår framtiden för företaget. Detta är även ämnet som denna rapport berör. Rapporten beskriver 10 poängs examensarbete, som utförts som en del i vår utbildning.

    Kommunikation är alltså en mänsklig handling, något som vi gör och information är det vi utbyter genom att kommunicera med varandra. Information är något som finns överallt idag och berör oss alla på olika sätt och vis. Den har olika påverkan på oss alla och vi tolkar det olika.

    Genom dokumenthantering kan man effektivisera processer, rutiner och arbetsflöden, samtidigt som man ökar omfattningen och effektiviteten för företagsinformationen.

    En undersökning är en form av primär data där man samlar ihop data från antingen en hel grupp eller en del av en grupp. Det finns en del olika sätt att utföra en undersökning, via till exempel telefon eller elektronisk. Vi valde att skicka ut en undersökning elektronisk som vår målgrupp fick fylla i.

    Undersökningen, även kallad effektivitetstest, är kvalitativ vilket syftar till att svaren skall ha en djupare dimension än bara siffror.

    Efter att ha fått klart för oss över de problem som fanns har vi även tittat på olika funktioner som kan lösa dessa problem. De flesta av funktionerna fanns i SharePoint (Server och Services). Som stöd kan man även använda funktioner i OneNote och InfoPath.

    Download full text (pdf)
    FULLTEXT01
  • 57.
    Larsson, Fredrik
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Ben-Zur, Michael
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Trådlösa nätverk - Analys av förutsättningar och förslag på utformning2009Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report describes and analyzes the requirements for a wireless network installation. The subject wireless network is both extensive and complex, and results of that many in the branch are missing the accurate qualifications. There is an abundance of different components, encryptions and procedures. This report has developed in cooperation with SYSteam Network Center (SNC), who wants to investigate the requirements and opportunities a common wireless network might provide. The common wireless network shall fulfill the need of security, scalability and to be centrally administrated. SNC wants knowledge about the different needs, that the internal SYSteam company in Huskvarna have about a common wireless network. And thereby be able to summarize a mutual image of how a wireless network should be designed. As a part of this, people from different companies at SYSteam where interviewed. SNC would like to offer the SYSteam companies situated in Huskvarna a common wireless network, which pays attention to everyone’s interests. The interviews gave the following notice that there were problem in the network solution used today:

    • Today’s network structure restrains the cooperation between internal companies.
    • The missing of a flexible guest access gives a bad impression to external guests.
    • Today guests and staff are bound to a limited amount of switchports.
    • Connected guests get access to parts of SYSteam internal clientnetwork. The guests should only get access to what they absolutely require.

    To be able to handle and process the problems a three-steep analyze have been made, primary to understand the requirement of the organization, to clearly define the problems and what opportunities a wireless network may have. From these three steps, proper literature have been studied in purpose to provide SNC with a comprehensive analyze about the technique, business considerations and what value a wireless network provides. The result focuses about what uprising challenge a wireless network may originate and the problems it could contain. In the conclusion, guide principles how a wireless network should be designed adjusted for SNC is formed. SNC is today facing a big challenge in order to offer a wireless network which shall meet the requirements of user-friendly and secured demands. The work shows, if consideration is taken to available challenges and survey existing problems, it’s possible to design a scalable, secured network which also provides user-friendly management. An example a common wireless network can offer SYSteam in Huskvarna can be one of the following:

    • Cooperation improvements between companies, clients become even more mobile.
    • Meetings become more efficient.
    • Offer a better environment for project teams, due to increased mobility.
    • Offer an ordinary guest access.
    • The internal communication will facilitate and improve between companies.
    Download full text (pdf)
    FULLTEXT01
  • 58.
    Larsson, Jonatan
    et al.
    Jönköping University.
    Åkermark, Ludwig
    Jönköping University.
    The Value Of Implementing API-First As A Methodology When Developing Apis2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Application Programming Interface (API) development is growing in popularity and because of that, it is more important than ever to develop high-quality APIs. There is often a rush to build APIs and therefore their design can suffer consequently. This may have a negative impact on the companies and consequently a poor user experience. Different “first” methodologies decide the approach when it comes to developing APIs. The purpose of this study is to investigate what API-first methodology has for value when developing APIs. This is done by developing two APIs where one is using the API-first approach while the other makes use of Code-first. This thesis is using a qualitative method of semi-structured interviews to collect data, with the focus to highlight the differences between the APIs developed. Specifically, the differences in test efficiency, user experience, and API correctness.  The conclusion from the study points out that by using API-first the user experience gets a higher quality in terms of documentation, test efficiency, and accuracy in the business requirements. Also, it provides a suggestion for when and why a company should use it. The findings suggest that when the project is big and complex, then API-first is a good option to consider. The continuous dialog between developer and client is why it is such an approving method to use. The hope is that the findings of this thesis are an indicator that API-first is a significant method to use and that more companies consider it when developing APIs.  

    Download full text (pdf)
    fulltext
  • 59.
    Leo, Adam
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Carleklev, Johan
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Counting and detecting people with radars.: The comparison of three radars in relation to their people counting ability.2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    People counting and human detection systems have during the last decade been developed using many different sensors; from video cameras to radars. While video cameras function much like the human eyes and yield data relatable to humans, it might be prone to privacy regulations. Therefore, sensors not affected by these privacy regulations have been used to develop people counting systems. In this thesis, radar sensors are examined in their people counting ability. The radars in question are: InnoSent iSYS5005, RFbeam K-LD7, and Acconeer XM112. An investigation of the three different radars as well as different geometries is carried out in order to find the most suitable radar and the optimal positioning for people counting. This thesis follows the principle of Design Science Research, where a controlled experiment was conducted in order to answer the research questions. We look at accuracy and precision together with other variables to determine which radar and what geometry is the most promising. In the end, we find that the iSYS5005 has the most promising result. However, the results were not as promising as one could have hoped, showing an overall poor performance. We argue that this is because the radar regularly loses track of objects, lowering the overall accuracy and precision. Which in turn lowers the overall performance of the sensors. Therefore, we mean that this shows the importance of post processing algorithms to interpret the data. We propose a tardiness probability algorithm which we believe could fix many of the issues the unprocessed data has. 

    Download full text (pdf)
    fulltext
  • 60.
    Lind, Daniel
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Wahlström, Tim
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Modulär programmering i Android Java2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

         The purpose of this work has been to ensure the transition from concept and requirements to code, where Extreme Programming (XP) was selected as the method for development. The advantages of modular programming and the means of communication between modules have been examined. The work has been performed in a limited part of an Android application, where modular programming has been a core part for the code structure and the implementation contained managing threads and background processes with the Android tool Asynctask. The result shows that the methods have worked well enough to ensure the transition between the requirements and code and several advantages of modular programming has been identified. The discussion addresses the choice of method and possible alternatives to AsyncTask for managing threads and background processes.

     

  • 61.
    Lindh, Lennart
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering. Jönköping University, School of Engineering, JTH. Research area Robust Embedded Systems.
    FPGAworld CONFERENCE2009 SEPTEMBER2009Conference proceedings (editor) (Other academic)
    Abstract [en]

    The FPGAworld Conference addresses aspects of digital and hardware/software system engineering on FPGA technology. It is a discussion and network forum for students, researchers and engineers working on industrial and research projects, state-of-the-art investigations, development and applications. The book contains some presentations; for more information see (www.fpgaworld.com/conference).

    Download full text (pdf)
    FULLTEXT01
  • 62.
    Lindh, Lennart
    et al.
    Jönköping University, School of Engineering, JTH. Research area Robust Embedded Systems. Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Klevin, Tommy
    HW/SW Embedded System Designwith FPGA Technology, 20092009 (ed. 3)Book (Other academic)
    Abstract [en]

    The motivation for reading this book is the increase of implementations of FPGA (Field Programmable Application Gate Arrays) devices in embedded products. The aim of the book is to prepare you for real embedded FPGA system projects by walking step by step through an entire design of an embedded system together with adequate theory.

    The FPGA technology has a huge impact on the development process, and also on how we conduct science and engineering. One of the limitations today is the insufficient knowledge of how to fully exploit the FPGA technology. The design space for FPGA devices is large and fascinating with efficiencies that vary by orders of magnitude. Further, the limitations of our technology are changing, so the "right answers" of the past will almost certainly become outdated. A good engineer and researcher must know the fundamental tradeoffs to be able to re-evaluate solutions as the underlying technology changes, like FPGA technology. We will certainly see a change in the development process and research topics in the near future in the area of embedded systems.

    Many questions arise, such as: how and where do we draw the boundary between hardware and software?  How do we organize a component design paradigm with enormous power of parallel processing? What is most important to optimize when the price is close to zero for one gate?

    The book concentrates on technologies, tools and reusable components for FPGA. Those three key objects are then analyzed and later used in an engineering way to guide you through theory and practical CASE studies.

    FPGA technology is relatively new and very important in many applications, in terms of development cost, performance, power consumption etc. The well-known friend to FPGA technology is “Moore’s law”, which still predicts that the number of gates will increase and the cost decrease.

    Tools are important for optimizing the development process; archiving short development time, cost optimal solutions, minimizing the risks of bugs etc.

    Reusable components have the purpose to decrease the risks, shorten development time etc.

    Download (pdf)
    SUMMARY01
  • 63.
    Lindvall, Josefin
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Sturesson, Adam
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    A comparison of latency for MongoDB and PostgreSQL with a focus on analysis of source code2021Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    The purpose of this paper is to clarify the differences in latency between PostgreSQL and MongoDB as a consequence of their differences in software architecture. This has been achieved through benchmarking of Insert, Read and Update operations with the tool “Yahoo! Cloud Serving Benchmark”, and through source code analysis of both database management systems (DBMSs). The overall structure of the architecture has been researched with Big O notation as a tool to examine the complexity of the source code. The result from the benchmarking show that the latency for Insert and Update operations were lower for MongoDB, while the latency for Read was lower for PostgreSQL. The results from the source code analysis show that both DBMSs have a complexity of O(n), but that there are multiple differences in their software architecture affecting latency. The most important difference was the length of the parsing process which was larger for PostgreSQL. The conclusion is that there are significant differences in latency and source code and that room exists for further research in the field. The biggest limitation of the experiment consist of factors such as background processes which affected latency and could not be eliminated, resulting in a low validity.

    Download full text (pdf)
    fulltext
  • 64.
    Linusson, Henrik
    et al.
    Department of Information Technology, University of Borås, Sweden.
    Johansson, Ulf
    Jönköping University, School of Engineering, JTH, Department of Computing, Jönköping AI Lab (JAIL).
    Boström, Henrik
    School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Sweden.
    Efficient conformal predictor ensembles2020In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 397, p. 266-278Article in journal (Refereed)
    Abstract [en]

    In this paper, we study a generalization of a recently developed strategy for generating conformal predictor ensembles: out-of-bag calibration. The ensemble strategy is evaluated, both theoretically and empirically, against a commonly used alternative ensemble strategy, bootstrap conformal prediction, as well as common non-ensemble strategies. A thorough analysis is provided of out-of-bag calibration, with respect to theoretical validity, empirical validity (error rate), efficiency (prediction region size) and p-value stability (the degree of variance observed over multiple predictions for the same object). Empirical results show that out-of-bag calibration displays favorable characteristics with regard to these criteria, and we propose that out-of-bag calibration be adopted as a standard method for constructing conformal predictor ensembles.

  • 65.
    Lundell, Johan
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Sjögren, Gustav
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Användarcentrerad utveckling av mobilt IT-stöd2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This exam paper has been a collaboration between the writers and SYSteam Utvecklingspartner in Huskvarna. The assignment was about finding a need for a mobile application, making a requirement specification document with design documents and parallel to this constructing a prototype. The assignment is summarized in the following questions:

    • How can companies in the forest industry benefit from mobile information technology?

    • How can a user centered perspective be used in the process of making the requirement specification document and the design documents?

    • How do guidelines for usability apply to a mobile application?

    Three visits to companies in the forest industry were made to find a need for mobile information technology solutions. After a small analysis of the different companies’ problems and conditions the decision was to use Tenhults Impregneringsverk AB in the case study.

    We used the FA/SIM method in our job of finding the organization needs for change and the principles of User Centered Design in the work of constructing a prototype.

    The result of our work is a requirement specification with design documents and a prototype. The final prototype is an application deployed on to a PDA with a barcode scanner.

    Our conclusion is that the purpose of mobile information technology often is about making the torrent of information more effective by reducing the duplication of work and securing the quality of the information.

    Using a user centered perspective in the development work has in general terms worked out pretty well for us. Requirements and demands of the application have become clearer to us after each iteration, and in the end the customer and the developer organization where on the same terms.

    We have been able to apply the guidelines of usability on MobSaw (is the name of the application prototype that was made during the exam work). The principles are universal; the biggest difference is about input and screen size because the hardware’s capacity is limited. The advantages of the smaller frameworks for mobile devices is that the focus on usability increases.

    Download full text (pdf)
    FULLTEXT01
  • 66.
    Löfling, Louise
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Versionshantering för databaser2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Moment Marketing is a small Company working with web development. Version control is an important part of their work and they already use a few programs to handle this. These programs cannot handle different database versions. In this project supplements will be created so that previously installed programs can be used for handling version control of databases. Before the programming begins a study of the programs Subversion, TortoiseSVN, Trac and MySQL will be made.

    Download full text (pdf)
    FULLTEXT01
  • 67.
    Molund, Dennis
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Procurement competence and its effect on software development projects: From the perspective of software supplier professionals within the private sector2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Organizations that do not possess the knowledge or resources to develop IT internally must procure software development projects from external parties. The organization making the procurement is in this thesis referred to as the software customer organization (SCO) and the external party is referred to as the software vendor organization (SVO). 

    The success of procuring products or services depends on the procurement competence of SCO professionals (Stek & Schiele, 2021). Procurement competence are the individual-level foundations of organisational purchasing and supply management performance (Bals et al., 2019). This thesis aims to investigate what challenges occur within software development projects where SCO professionals have poor procurement competence and build an understanding of how SVO professionals can mitigate or overcome these challenges. 

    Through semi-structured interviews with project managers from a SVO, six challenges were identified: Fuzzy requirements, Unrealistic expectations, Understanding of the problem, Unaware of the software development process, Inadequate software setting-to-work process, and Poor communication.  Most challenges can be mitigated through a carefully conducted feasibility study beginning by asking questions about the SCO’s previous experiences with software development projects, what competencies they currently have and how they usually work with software development projects. Asking these questions makes it possible to assess the level of the SCO professional’s procurement competence. After assessing, the following actions can be taken: Conducting a workshop on how the SVO’s software development process works, bringing in external requirement experts if needed, and setting up clear communication paths.

    Download full text (pdf)
    fulltext
  • 68.
    Movaffaghi, Hamid
    et al.
    Division of Material and Computational Mechanics, Department of Applied Mechanics, Chalmers University of Technology, Sweden.
    Friberg, Olof
    Division of Material and Computational Mechanics, Department of Applied Mechanics, Chalmers University of Technology, Sweden.
    Optimal placement of dampers in structures using genetic algorithm2006In: Engineering computations, ISSN 0264-4401, E-ISSN 1758-7077, Vol. 23, no 6, p. 597-606Article in journal (Refereed)
    Abstract [en]

    Purpose - The objective is to study the optimal damper placement of a given number of passive viscoelastic dampers, when the structure (nuclear plant) is subjected to motions from earthquake, in order to reduce the acceleration responses at a particular location, for example, a vibration-sensitive room (nuclear reactor).

    Design/methodology/approach - The IDESIGN software including genetic algorithms for the optimisation task has been interfaced with a finite element program, ABAQUS, to create a structural optimisation tool. The tool has been tested on a 3D building structure.

    Findings - Optimisation results for different constraints on number of dampers shows that eight optimally located dampers results in an overall maximum reduction of 59 per cent of the cost function for the uncontrolled structure. It is also found that six optimally placed dampers are more effective than the fully damped case with 12 dampers.

    Research limitations/implications - More powerful computers are needed in order to reduce the computational time for many engineering models. Especially parallel processing would make more efficient use of the genetic algorithm. It is also necessary to perform stochastic finite element analysis to investigate the impact on the cost function due to different earthquakes. Practical implications - The study of vibration reduction by an optimal number and location of viscoelastic dampers indicate that structures subjected to dynamic forces can be designed both safely and economically.

    Originality/value - The tool developed is quite general and is believed to be applicable to many types of structural optimisation analyses.

  • 69.
    MUBEEN, SAAD
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    EVALUATION OF SOURCE ROUTING FOR MESH TOPOLOGY NETWORK ON CHIP PLATFORMS2009Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Network on Chip is a scalable and flexible communication infrastructure for the design of core based System on Chip. Communication performance of a NoC depends heavily on the routing algorithm. Deterministic and adaptive distributed routing algorithms have been advocated in all the current NoC architectural proposals. In this thesis we make a case for the use of source routing for NoCs, especially for regular topologies like mesh. The advantages of source routing include in-order packet delivery; faster and simpler router design; and possibility of mixing non-minimal paths in a mainly minimal routing. We propose a method to compute paths for various communications in such a way that traffic congestion is avoided while ensuring deadlock free routing. We also propose an efficient scheme to encode the paths.

    We developed a tool in Matlab that computes paths for source routing for both general and application specific communications. Depending upon the type of traffic, this tool computes paths for source routing by selecting best routing algorithm out of many routing algorithms. The tool uses a constructive path improvement algorithm to compute paths that give more uniform link load distribution. It also generates different types of traffics. We also developed a simulator capable of simulating source routing for mesh topology NoC. The experiments and simulations which we performed were successful and the results show that the advantages of source routing especially lower packet latency more than compensate its disadvantages. The results also demonstrate that source routing can be a good routing candidate for practical core based SoCs design using network on chip communication infrastructure.

    Download full text (pdf)
    FULLTEXT01
  • 70.
    Mulahusic, Amira
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Kulturella skillnader mellan hemsidor och deras inverkan på internationell marknadsföring2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [sv]

    Kubera Production som har sitt kontor i Skellefteå är en strategisk kommunikationsbyrå som interesserar sig för hur kulturella skillnader mellan hemsidor kan analyseras och dokumenteras. Inledningsvis presenteras de två frågorna som ligger bakom den här rapporten. De är:

    Hur påverkar kulturella skillnader utvecklingen av nya hemsidor runt om i världen?

    Hur kan man eventuellt se och dokumentera de kulturella skillnaderna?

    Målet är att skapa en broschyr med klara riktlinjer som företaget kan ha använding av vid etablering utomlands. Vad som inte ingår i det här arbetet är grundliga undersökningar av ett land och dess kultur.

    I teoridelen kan läsaren ta del i hur hemsidor framställs, vilka program som kan användas men också om internationell marknadsföring och vad som är viktigt vid utlandsetablering av ett företag. Redan i teoridelen kan man få en uppfattning om vilka saker som är viktiga att tänka på vid marknadsföring och hur de kan påverka konsumenternas syn på firman.

    De empiriska studierna baserades på en enkätsundersökning. Enkäten framställdes i Word och består av nio frågor som mailades till människor som använder sig av internet dagligen. Fem länder har valts ut genom att titta på statistiken över internetanvändningen i världen. Länderna som valdes ut är: USA, Sverige, Kina, Korea och England. Tre internationella företags hemsidor, alla verksamma i dessa

    fem länder analyserades. Dessa företag är Microsoft, McDonald´s och Coca-Cola. Språket, färgen, bilder och typsnitten på hemsidorna jämfördes. Broschyren som är skapad i Indesign presenteras.

    Resultaten redovisar analysen av hemsidorna och enkätsundersökningen vilket visar att språket, symboler och grafiken är de viktigaste faktorerna vid en eventuell ändring av en hemsida vid marknadsföringen utomlands. Olika möjligheter för dokumentation av de kulturella olikheterna presenteras. Slutsatsen reflekterar mina egna tankar och ger idéer på forsatt forskning.

    Download full text (pdf)
    FULLTEXT01
  • 71.
    Nauman, Anders
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Söndergaard, Simon
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Riktlinjer för implementering av ISO 177992010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.

    As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.

    The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field. Very few small companies manage to apply the standard since it too large and complex.

    The main goal with this thesis is to create a simplified version of ISO 17799 and to make it understandable by non experts. The thesis also gives focus on Conect AB through suggesting a template in which shall be adjusted for their customers to use and inform them of threats that may be of interest.

    This thesis is based on the following questions:

    • How can we make the standard less difficult to understand?
    • Does the material cover the necessary needs of network security?
    • How often shall the material be updated to be up to date in the future?

    As a result, this thesis displays the ISO 17799 in the form of a suggested template and it presents explanations and consequences if a company/organisation does not have a particular function or a physical implementation.

    The method in which the template had been created was through the reading of the ISO 17799 standard for insight on what is included and the explanations in which certain parts are vital. Even if a standard should have proper information possible as well as contain the latest information, the project group processed other sources and explanations in order to get higher credibility and to see if there were new technology and facts about the subject.

    Download full text (pdf)
    FULLTEXT01
  • 72.
    Nezirevic, Esmeralda
    Jönköping University, School of Engineering.
    Brandväggar för hemmakontor2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security.

    Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005.

    Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page.

    It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.

    Download full text (pdf)
    FULLTEXT01
  • 73.
    Nilsson, Paul
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Lasson, Daniel
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    ITIL inom Conect AB2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Conect AB wants to know how they can use ITIL in their organization. Right now their company is in an expansive phase and needs a more structured way to work. They have been thinking of improving their way of work for several years but haven’t had the time to do so. Now they have realized they need to work more efficiently to able to grow further. ITIL is a collection of best practices. ITIL’s purpose is to help IT organizations to get more organized to de able to benefit the business in a better way. ITIL is developed by OGC (Office Goverment of Commerce) in England. With the help

    ITIL you can structure your work better and there by increase the efficiency of the IT process. ITIL is divided I several processes and each one of them have their own purpose. That makes everyone’s duties clear. The central parts of ITIL are Service Support and Service Delivery that gives an overview of how to work in an

    IT organization. The information about ITIL that has been acquired through previous courses at School of Engineering in Jönköping. Some books about ITIL were used to furthermore gather information. The information about how Conect AB work has been put together through several interviews with the supervisor at the company. A survey was sent to several of their customers, which of three of them replied.

    This provided a good idea about how Conect AB works today. At the moment the company doesn’t have a helpdesk system to handle incoming

    incidents. This is considered as the weakest part for the moment. A helpdesk system could improve the efficiency of their work a lot. To handle the incoming incidents in a correct way Conect AB will need to build a helpdesk, instead of letting the customers call the technicians directly. If they choose to implement the advices given to improve them, they will probably be able to expand even more. The time saved by the improvements can be used more efficient. This will allow the costumer relations to increase.

    Download full text (pdf)
    FULLTEXT01
  • 74.
    Olsson, Fredrik
    Jönköping University, School of Engineering.
    Användbarhet på Macromedia flash-baserade webbplatser2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report portrays an introduction to the sequence of work developers have to go through to produce user-friendly websites in Macromedia Flash. The paper’s goal is to understand the importance of user-focused thinking in the develop-process and help to improve the usability of Macromedia Flash content in general.

    Despite many critics say Macromedia Flash content doesn’t have good usability this paper shows that it’s highly possible to make flash pages usable for the visitor with technical solutions in Macromedia Flashs programming language actionscript.

    This report also includes a web based template with all the technical solutions applied to it so developers can follow every step of the build up.

    Download full text (pdf)
    FULLTEXT01
  • 75.
    Oskarsson, Carl
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Hedman, Jonathan
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Analys och implementation av EPIServer2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report describes how we, with support from SYSteam Datakonsult AB Värnamo

    builds a dynamic website for a fictional company. The purpose of this work is to tie

    together our studies with the businesses in the region, and expand our knowledge.

    Together with Peter Bäckrud from SYSteam we worked out the goals to achieve this

    purpose. The goals are to create a polished intranet to a company with the webpage

    publishing tool EPIserver

    This report begins with describing the goals and visions that were set up. Then follows a

    thorough theoretical background that describes the areas we have touched, to give the

    reader an idea about the work. The report then moves into the creation phase that talks

    about the problem that occurred during development.

    The creation phase is split up into two parts where the first part gives a good description

    about how we designed a usability friendly website that would fulfill the goals we had set

    up. The other part talks about programming and the implementation of the different

    features on the website.

    Finally there’s an evaluation of the website from a usability perspective to give us an idea

    of how good we made the design. We also evaluate EPIserver to give our views on the

    software which none of us has worked with before.

    Download full text (pdf)
    FULLTEXT01
  • 76.
    Palesi, Maurizio
    et al.
    DIIT, University of Catania, Italy.
    Holsmark, Rickard
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Wang, X.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Kumar, Shashi
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Yang, M.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Jiang, Y.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Catania, V.
    DIIT, University of Catania, Italy.
    A Novel Mechanism to Guarantee In-Order Packet Delivery with Adaptive Routing Algorithms in Networks on Chip2010In:  13th Euromicro Conference On Digital System Design Architectures, Methods and Tools, 2010Conference paper (Refereed)
    Abstract [en]

    Although adaptive routing algorithms promise higher communication performance, as compared to deterministic routing algorithms, they suffer from the out-of-order packet delivery problem. In the context of Network on Chip, the area and computational overhead of ordering packets at the destination is high and may reverse any gain achieved through the use of adaptivity of the routing algorithm. In this paper, we describe a novel scheme for ensuring in-order packet delivery while retaining the performance advantages of adaptive routing. The hardware architecture of a router that supports the proposed scheme is described. Although the basic idea in our proposal is topology independent we evaluate and compare the performance of our scheme with both deterministic as well as adaptive routing algorithms for 2D mesh NoC. As compared to the XY routing algorithm, our technique significantly reduces the packet delay and improves the saturation point. The impact on router area and power dissipation is also discussed. Although the power consumption of routers increase, the energy consumption per flit increases less than 2% on average, since the higher performance allows for draining more traffic during a certain time window.

  • 77. Palesi, Maurizio
    et al.
    Kumar, Shashi
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering. Jönköping University, School of Engineering, JTH. Research area Robust Embedded Systems.
    Catania, V.
    Bandwidth-Aware Routing Algorithms for Networks-on-Chip Platforms2009In: I E T Computers and Digital Techniques, ISSN 1751-8601, Vol. 3, no 5, p. 413-429Article in journal (Refereed)
    Abstract [en]

    General purpose routing algorithms for a network-on-chip (NoC) platform may not be able to provide sufficient performance for some communication intensive applications. This may be because of low adaptivity offered by a general purpose routing algorithm resulting in some links getting highly congested. In this study the authors demonstrate that it is possible to design highly efficient application-specific routing algorithms which distribute traffic more uniformly by using information regarding applications communication behaviour (communication topology and communication bandwidth). The authors use off-line analysis to estimate expected load on various links in the network. The result of this analysis is used along with the available routing adaptivity in each router to distribute less traffic to links and paths which are expected to be congested. The methodology for application-specific routing algorithms is extended to incorporate these features to design highly adaptive deadlock-free routing algorithms which also distribute traffic more uniformly and reduce network congestion. The authors discuss architectural implications and analyse area and power overheads of the proposed approach on the design of a table-based NoC router.

  • 78. Pelmas, Daniel
    et al.
    Lejon, Lasse
    Scrum Team Adoption of DevOps: Exploring the interfaces and the challenges2023Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Scrum is a widely used methodology for software development that is born of the Agile movement. In recent years DevOps has been increasing in popularity within the software industry. The purpose of this thesis is to firstly, explore the technical and social challenges a Scrum team may face when adopting DevOps. Secondly, to explore what collaboration mechanisms that can facilitate a closer cooperation between development and operations.

    A multiple case study was conducted using semi-structured interviews as the data collection method. The interviews were transcribed and analyzed using thematic analysis.

    Three technical challenges and one social challenge emerged from the analysis. Additionally, four mechanisms were identified during the analysis as ways to achieve a closer collaboration between the development and operations teams.

    The result discussion showed that challenges of adopting DevOps when using Scrum are comparable to the findings of previous research where the scope of methodology is not limited to Scrum. Furthermore, the identified collaboration mechanisms can be used by organizations to enhance collaboration between development and operations but should not be seen as strict guidelines.

    Download full text (pdf)
    fulltext
  • 79.
    Persson, Emil
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Gabriel, Brickman Hildingsson
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Utvärdering av olika språkmodeller för identifiering av information i svenska texter2021Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    The purpose of the study was to investigate how different types of Natural Language Processing (NLP) models can be fine-tuned for use within Named Entity Recognition (NER) and how these models work differently. The aim of this was to identify which type of model works best when it comes to entity extraction. To test the models, they were fine-tuned using PyTorch and Huggingface Transformers libraries. Here, it was also investigated which other techniques are not based on machine learning that can be used to solve the problem of entity extraction. The results of these tests showed that the KB/BERT-base-swedish-cased model worked best. Also, there are other techniques that can be used to solve the problem of entity extraction but that it is machine learning that is the most effective. KB/BERT-base-swedish-cased was shown to be the best model but it also proved that it may be due to the purpose that you need to use the model within. The study limitations have been that there was no large data set that could be used for training and that there was a lack of time to produce a new dataset. 

  • 80.
    Pettersson, Joakim
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Programvarustöd för hot-, risk- och sårbarhetsanalys2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report describes a final thesis done during the spring of 2008 as part of the bachelor degree in computer engineering degree at the School of Engineering in Jönköping.

    The client is working in the consulting business and is involved in, amongst others, work regarding information security. Within this field they perform so called Threat, Risk and Vulnerability assessments. Today these assessments are done by a predefined method, but many details are controlled by the person documenting the project. A wish was made that the implementation was standardized, it should also ease the task of estimating the need for time and money. The solution for this seems to be a software tool. This software should handle the data from the assessments and generate foundations for reports.

    The question formulation that has been used is:

    • What are the possibilities to, with software, improve the workflow for handling the information from the assessments?

    • What are suitable techniques to handle this?

    To plan the software focus was put on the assessment and the types of input to them. These inputs were identified through descriptions in literature and informal interviews with analytics. The handling of the information remained unspecified as to not steer the design of the application in a direction that was formed after accustomed patterns, instead an objective solution was sought after.

    The resulting software fulfills all requirements that were specified at the beginning of the project, and it shows that the possibilities to improve the workflow are great. It is possible even with very small means to make it easier for the person doing the documentation. The report resulting from the assessments then become more standardized and make it easier to verify its validity.

    Download full text (pdf)
    FULLTEXT01
  • 81.
    Rangell, Marcus
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Utveckling av webbapplikation i ASP.net med Ajax-teknik2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Download full text (pdf)
    FULLTEXT01
  • 82.
    Renbi, Abdelghani
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Power and Energy Efficiency Evaluation for HW and SW Implementation of nxn Matrix Multiplication on Altera FPGAs2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In addition to the performance, low power design became an important issue in the design process of mobile embedded systems. Mobile electronics with rich features most often involve complex computation and intensive processing, which result in short battery lifetime and particularly when low power design is not taken in consideration. In addition to mobile computers, thermal design is also calling for low power techniques to avoid components overheat especially with VLSI technology. Low power design has traced a new era. In this thesis we examined several techniques to achieve low power design for FPGAs, ASICs and Processors where ASICs were more flexible to exploit the HW oriented techniques for low power consumption. We surveyed several power estimation methodologies where all of them were prone to at least one disadvantage. We also compared and analyzed the power and energy consumption in three different designs, which perform matrix multiplication within Altera platform and using state-of-the-art FPGA device. We concluded that NIOS II\e is not an energy efficient alternative to multiply nxn matrices compared to HW matrix multipliers on FPGAs and configware is an enormous potential to reduce the energy consumption costs.

    Download full text (pdf)
    FULLTEXT01
  • 83.
    Rikard, Jurstrand
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Johan, Gustafsson
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    UTVECKLING AV ETT ANVÄNDARVÄNLIGT OCH SÄKERT INFORMATIONSSYSTEM2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis has been performed at the system development company Verendus System AB, together with the home care company Basic Care Unit (BCU).

    The thesis has consisted of developing a web based informationsystem for BCU in which they can administrate their business. At the time of writing this thesis, BCU was using a windows-application to administrate their activities, which was both costly aswell as resulting in an unnecessary burden. The aim the thesis has thus been to create a platform-independent information system that simplifies and streamlines BCUs work by being user-friendly aswell as imposing some simplifying features.

    The students has been developing the system by the help of a work method they themselves developed. The method consisted of working in several iterations that each had several milestones. The method resulted in the students knowing easily when each iteration was finished or not.

    The thesis resulted in a working platform independent prototype. The prototype was developed in the PHP-framework CodeIgniter together with HTML5 and CSS3.

    Examples of functions included is being able to administrate BCU’s patients and employees, aswell as being able to plan the employees workdays with one click.

    Download full text (pdf)
    fulltext
  • 84.
    Sandkuhl, Kurt
    et al.
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics. University of Rostock, Rostock, Germany.
    Seigerroth, Ulf
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    Method engineering in information systems analysis and design: a balanced scorecard approach for method improvement2019In: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 18, no 3, p. 1833-1857Article in journal (Refereed)
    Abstract [en]

    Modeling methods have been proven to provide beneficial instrumental support for different modeling tasks during information system analysis and design. However, methods are a complex phenomenon that include constructs such as procedural guidelines, concepts to focus on, visual representations and cooperation principles. In general, method development is an expensive task that usually involves many stakeholders and results in various method iterations. Since methods and method development are complex in nature, there is a need for a well-structured and resource-efficient approach for method improvement. This paper aims to contribute to the field of method improvement by proposing a balanced scorecard-based approach and by reporting on experiences from developing and using it in the context of a method for information demand analysis. The main contributions of the paper are as follows: (1) It provides a description of the process for developing a scorecard for method improvement; (2) it shows how the scorecard as such can be used as a tool for improving a specific method; and (3) it discusses experiences from applying the scorecard in industrial settings.

  • 85.
    Sandqvist, Mattias
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Johansson, Robert
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Implementation av Network Admission Control2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.

    The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.

    An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.

    These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.

    Download full text (pdf)
    FULLTEXT01
  • 86.
    Sanell, Jonas
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Svenningsson, Tommy
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Webbshop för Tyger & Ting2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report describes how we made a dynamic website combined with statical

    web pages and a web shop for the Swedish company Tyger & Ting.

    The employer Tyger & Ting wish to run a working web shop on their site but

    they want to keep their old system of updating pages with their old application

    from Intellyweb1, which creates statical HTML pages.

    The goal of this exam paper has been to learn to create a functional web shop

    with user friendly layout and appealing design and also to take orders and

    fulfill wishes from a real employer.

    The report is describing how Intellyweb’s application and its statical web pages

    has been implemented on a dynamic web page. The report does also describe

    how this site has been build and how the problems with the coding have been

    solved. The coding has been made with HTML, PHP and MySQL. CSS has

    also been used. The report will describe how management and storage of data

    in databases has been handled.

    Apart from the demands the employer has given us, a complete revamp of

    Tyger & Ting’s design has been made and the result of the exam paper is now a

    complete and working web site with additional web shop that supports static

    web pages. The website contains 20 dynamic and static pages coded in about

    1900 rows of PHP and HTML. A database with five tables of varying size has

    been made to contain pictures and information about products, users and

    orders.

    As soon as all the products has been put into the database the web shop will be

    found here: http://www.tygeroting.com

    Download full text (pdf)
    FULLTEXT01
  • 87.
    Sauma, Robin
    et al.
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    Ziai, Milad
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    Komparativ studie mellan React-Native och Flutter med avseende på utvecklarens produktivitet2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The development of hybrid mobile applications has increased rapidly in the last decade. Considering the diversity in how big companies starts to invest in frameworks that supports hybrid application development (cross-platform framework), the necessity of contemporary studies in this subject increase. Facebook and Google are two well-known companies that have developed React-Native and Flutter, respectively. These cross-platform frameworks are continuously developing, and differences occur in their technologies which makes new studies even more appropriate. The purpose of this study is to investigate which of these two frameworks contribute the most for the developer’s productivity considering the lack of studies in this specific subject. Specifically, a case study has been conducted where the research questions were answered.  

     

    The two research questions were divided into three sub questions, respectively where each question was given criteria to follow in the case study and each framework were assigned points if the associated criterion for each question were met. In the end of the study a mean value was assigned to each framework. The results showed that there are small differences in terms of its contribution for the developer’s productivity.

    Download full text (pdf)
    fulltext
  • 88.
    Svensson, Håkan
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Carlsson, Carl
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    SafeTool: Implementering av RFID-teknologi i maskiner för byggbranschen2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Every year more than 6000 thefts, to a value of 1.5 billion SEK, are reported

    within the Swedish building trade. Plus all the indirect costs of having the

    construction site standing still.

    SafeTool is a newly started company that will try to prevent this problem with

    a modern technology solution.

    The key to SafeTool’s solution is RFID – Radio Frequency Identification – and

    the solution looks like this;

    All tools are stored in a container on the construction site. Every tool is

    equipped with a RFID-tag that uniquely identifies the tool. With antennas in the

    container it is possible to detect when a tool is leaving the container and when

    it comes back. Every worker must wear a RFID-tag so it will be possible to see

    who was taking the tool out of the container. The container has no external

    locks on it, but the RFID-tag works as a key. An antenna on the roof of the

    container identifies the worker and automatically unlocks the door.

    All the tool and personnel traffic through the door of the container are reported

    to a central server via GPRS. The server stores all info in a database. The

    administration of the system will be done through a website.

    This paper will show how we made this solution work in practice. How we

    created and programmed the client and server and the protocol that makes them

    understand each other.

    Download full text (pdf)
    FULLTEXT01
  • 89.
    Svensson, Niklas
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Gripestam Nord, Erik
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Vem är rädd för bannern där?: En studie om banners klickfrekvens2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This paper is about advertising on the Internet using banners. Together with Embryo Webbyrå we have tested a lot of different ways of advertising on the online newspaper of Göteborgs-Posten, gp.se. Two of the web bureau’s existing clients, Resia and Recip, were chosen for the ads and the whole campaign lasted a period of four weeks.

    By comparing our banners with the consideration of format, color, placement and content we wanted to find an answer to how the most optimal banner would look.

    Our test result shows that visitors rather do not want to click on a banner, although we think that we have seen some interest and curiousness from visitors in the banners content. Even when the visitor does not click on a banner, the message might be put in mind for a future purchase or act.

    Download full text (pdf)
    FULLTEXT01
  • 90.
    Tan, He
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computing, Jönköping AI Lab (JAIL).
    Tarasov, Vladimir
    Jönköping University, School of Engineering, JTH, Department of Computing, Jönköping AI Lab (JAIL).
    Fourlakidis, Vasilios
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Diószegi, Attila
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Data-driven modeling of mechanical properties of cast iron using fuzzy logic2020In: Fuzzy Systems and Data Mining VI: Proceedings of FSDM 2020 / [ed] Antonio J. Tallón-Ballesteros, Amsterdam: IOS Press, 2020, p. 656-662Conference paper (Refereed)
    Abstract [en]

    For many industries, an understanding of the fatigue behavior of cast iron is important but this topic is still under extensive research in materials science. This paper offers fuzzy logic as a data-driven approach to address the challenge of predicting casting performance. However, data scarcity is an issue when applying a data-driven approach in this field; the presented study tackled this problem. Four fuzzy logic systems were constructed and compared in the study, two based solely upon experimental data and the others combining the same experimental data with data drawn from relevant literature. The study showed that the latter demonstrated a higher accuracy for the prediction of the ultimate tensile strength for cast iron.

  • 91.
    Tarasov, Vladimir
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computing, Jönköping AI Lab (JAIL).
    Tan, He
    Jönköping University, School of Engineering, JTH, Department of Computing, Jönköping AI Lab (JAIL).
    Jarfors, Anders E.W.
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Seifeddine, Salem
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Fuzzy logic-based modelling of yield strength of as-cast A356 alloy2020In: Neural Computing & Applications, ISSN 0941-0643, E-ISSN 1433-3058, Vol. 32, no 10, p. 5833-5844Article in journal (Refereed)
    Abstract [en]

    Uncertain and imprecise data are inherent to many domains, e.g. casting lightweight components. Fuzzy logic offers a way to handle such data, which makes it possible to create predictive models even with small and imprecise data sets. Modelling of cast components under fatigue load leads to understanding of material behaviour on component level. Such understanding is important for the design for minimum warranty risk and maximum weight reduction of lightweight cast components. This paper contributes with a fuzzy logic-based approach to model fatigue-related mechanical properties of as-cast components, which has not been fully addressed by the current research. Two fuzzy logic models are constructed to map yield strength to the chemical composition and the rate of solidification of castings for two A356 alloys. Artificial neural networks are created for the same data sets and then compared to the fuzzy logic approach. The comparison shows that although the neural networks yield similar prediction accuracy, they are less suitable for the domain because they are opaque models. The prediction errors exhibited by the fuzzy logic models are 3.53% for the model and 3.19% for the second, which is the same error level as reported in related work. An examination of prediction errors indicated that these are affected by parameters of the membership functions of the fuzzy logic model.

  • 92.
    Valjakka, Adina
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Ahlinder, Anton
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    An evaluation of LoRa transmission parameter selection for indoor positioning2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this thesis is to investigate how the LoRa modulation configuration affects precision and accuracy when using LoRa for indoor positioning in non-line-of-sight conditions. The aim is to research if an optimum combination of spreading factor, bandwidth, and code rate factor can be found to result in the best possible positioning accuracy and precision, under certain predefined conditions.

    An experiment was conducted, where quantitative data was collected from an experimental setup. The experiment consisted of two testbeds which also included an analysis between them. Two kinds of test units were used in the experiment. The LoRa 868 MHz transmitter, which represented the unknown position, and the receivers that were used to estimate the position of the transmitter. The experiment gathered the RSSI values between the transmitter and receivers at different configurations and locations. The data collected from the experiment were analyzed using mathematical theory to answer the research question. The most accurate and precise value for each individual transmission parameter was established in the first testbed and used as the base data rates in the second testbed, to evaluate the best performing parameters simultaneously.

    The mean accuracy in testbed 1 varied from 180 cm to 388 cm, and the mean precision ranged between 0.432 dBm to 1.298 dBm. The mean accuracy in testbed 2 varied from 341 cm to 455 cm, and the mean precision ranged between 0.275 dBm to 1.495 dBm. 

    The experimental results indicate no connections between the data rate and precision. No correlation is found between the accuracy and the data rate. The standard deviation and absolute error fluctuate independently of the data rate and the transmitter position.

    In regard to the given results, the authors conclude that no linear relationship is found between the LoRa modulation configuration and the precision and accuracy of a position, in the selected environment. The experimental results show that LoRa could be used for indoor positioning applications where a rough estimation of a position is adequate since the mean accuracy is quite low for almost all tested modulation configurations. There could be applications where other factors, such as the energy consumption or communication range, are of more importance than accuracy. For those applications, LoRa could still be an adequate choice of technology. 

    Download full text (pdf)
    fulltext
  • 93.
    Walid, Rohaimi
    Jönköping University, School of Engineering.
    Software Evolution in the context of .Net Framework2007Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    This paper discusses the process of software evolution and especially software migration in the context of .NET Technologies. Actually most of the companies that uses legacy systems implemented with procedural languages as C, Visual Basic and so on, meet some problems when new requirement specifications have to be integrated.

    One possibility to deal with this situation is to choose a good migration strategy from these legacy systems towards new Object Oriented design.

    There are some migration processes that enable the fulfilment of this task but most of the time theses processes cannot be applied directly without any modification.

    This report presents a migration strategy and migration process applied for a real case of an application in a company. The New Object Oriented design of the application and the result are discussed in the following sections of this document.

    Download full text (pdf)
    FULLTEXT01
  • 94.
    Weinsjö, Åsa
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Optimering av zonindelning för robotgräsklippare med hjälp av olika Exact cellular decomposition metoder2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 95.
    Wester, Erik
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Henricsson, Christopher
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Utveckling av användargränssnitt för mobil resesökningsapplikation2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report aims to answer how to design a user interface for a mobile application minimizing the amount of key presses, specifically text input. In this context, mobile application means a program designed to run on a mobile phone with a numerical keyboard. The application we’re designing is a travel search function for local bus traffic. For out test purposes we used the bus stops in Jönköping County.

    We developed a design concept based on a menu system consisting of alphabetic groups for inputting names of towns and bus stops. From this we developed a prototype in Java Micro Edition which could later be evaluated after a small user test.

    The prototype was tested on three people using a method developed at the software company Apple. The results revealed one significant flaw, which, fortunately, is easy to correct. The remaining problems were not considered to be any insurmountable hurdles for users to overcome. Response from the test subjects was positive in that they not only experienced fewer key presses, but also a simpler usage of the application.

    Download full text (pdf)
    FULLTEXT01
  • 96.
    Youssefi, Masoud
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Andersson, Patrik
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Hemsida för ett musikbolag: Website for a music company2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    The purpose of this report is to answer the question:

    How do you create a media player that can stream music for a website?

    We started the work by searching the web and reading books about the subject

    and found several technologies to use to stream media files over the internet.

    We decided upon using the http protocol and created the media player itself in

    Macromedia Flash.

    The website is mostly developed with PHP, JavaScript and CSS templates and

    the websites design was created with Macromedia Dreamweaver and Adobe

    Photoshop. We also created an administrative system for the media player with

    PHP programming.

    The website contains a simple guestbook; the guestbook makes use of a

    database created with MySQL.

    Our work resulted in a webpage with a fully functional media player that

    streams audio files together with a corresponding administrative system for it.

    Download full text (pdf)
    FULLTEXT01
  • 97.
    Zenk, Viktor
    et al.
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    Malmström, Martin
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    A comparative study of Docker and Vagrant regarding performance on machine level provisioning2020Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Software projects can nowadays have complex infrastructures behind them, in the form of libraries and various other dependencies which need to be installed on the machines they are being developed on. Setting up this infrastructure on a new machine manually can be a tedious process prone to errors. This can be avoided by automating the process using a software provisioning tool, which can automatically transfer infrastructure between machines based on instructions which can be version controlled in similar ways as the source code. Docker and Vagrant are two tools which can achieve this. Docker encapsulates projects into containers, while Vagrant handles automatic setup of virtual machines.

    This study compares Docker and Vagrant regarding their performance for machine level provisioning, both when setting up an infrastructure for the first time on a new machine, as well as when implementing a change in the infrastructure configuration. This was done by provisioning a project using both tools, and performing experiments measuring the time taken for each tool to perform the tasks.

    The results of the experiments were analyzed, and showed that Docker performed significantly better than Vagrant in both tests. However, due to limitations of the study, this cannot be assumed to be true for all use cases and scenarios, and performance is not the only factor to consider when choosing a provisioning tool. According to the data collected in this study, Docker is thereby the recommended tool to choose, but more research is needed to determine whether other test cases yield different results.

    Download full text (pdf)
    fulltext
12 51 - 97 of 97
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf