Change search
Refine search result
12 51 - 70 of 70
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Nauman, Anders
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Söndergaard, Simon
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Riktlinjer för implementering av ISO 177992010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.

    As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.

    The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field. Very few small companies manage to apply the standard since it too large and complex.

    The main goal with this thesis is to create a simplified version of ISO 17799 and to make it understandable by non experts. The thesis also gives focus on Conect AB through suggesting a template in which shall be adjusted for their customers to use and inform them of threats that may be of interest.

    This thesis is based on the following questions:

    • How can we make the standard less difficult to understand?
    • Does the material cover the necessary needs of network security?
    • How often shall the material be updated to be up to date in the future?

    As a result, this thesis displays the ISO 17799 in the form of a suggested template and it presents explanations and consequences if a company/organisation does not have a particular function or a physical implementation.

    The method in which the template had been created was through the reading of the ISO 17799 standard for insight on what is included and the explanations in which certain parts are vital. Even if a standard should have proper information possible as well as contain the latest information, the project group processed other sources and explanations in order to get higher credibility and to see if there were new technology and facts about the subject.

  • 52.
    Nezirevic, Esmeralda
    Jönköping University, School of Engineering.
    Brandväggar för hemmakontor2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security.

    Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005.

    Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page.

    It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.

  • 53.
    Nilsson, Paul
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Lasson, Daniel
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    ITIL inom Conect AB2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Conect AB wants to know how they can use ITIL in their organization. Right now their company is in an expansive phase and needs a more structured way to work. They have been thinking of improving their way of work for several years but haven’t had the time to do so. Now they have realized they need to work more efficiently to able to grow further. ITIL is a collection of best practices. ITIL’s purpose is to help IT organizations to get more organized to de able to benefit the business in a better way. ITIL is developed by OGC (Office Goverment of Commerce) in England. With the help

    ITIL you can structure your work better and there by increase the efficiency of the IT process. ITIL is divided I several processes and each one of them have their own purpose. That makes everyone’s duties clear. The central parts of ITIL are Service Support and Service Delivery that gives an overview of how to work in an

    IT organization. The information about ITIL that has been acquired through previous courses at School of Engineering in Jönköping. Some books about ITIL were used to furthermore gather information. The information about how Conect AB work has been put together through several interviews with the supervisor at the company. A survey was sent to several of their customers, which of three of them replied.

    This provided a good idea about how Conect AB works today. At the moment the company doesn’t have a helpdesk system to handle incoming

    incidents. This is considered as the weakest part for the moment. A helpdesk system could improve the efficiency of their work a lot. To handle the incoming incidents in a correct way Conect AB will need to build a helpdesk, instead of letting the customers call the technicians directly. If they choose to implement the advices given to improve them, they will probably be able to expand even more. The time saved by the improvements can be used more efficient. This will allow the costumer relations to increase.

  • 54.
    Olsson, Fredrik
    Jönköping University, School of Engineering.
    Användbarhet på Macromedia flash-baserade webbplatser2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report portrays an introduction to the sequence of work developers have to go through to produce user-friendly websites in Macromedia Flash. The paper’s goal is to understand the importance of user-focused thinking in the develop-process and help to improve the usability of Macromedia Flash content in general.

    Despite many critics say Macromedia Flash content doesn’t have good usability this paper shows that it’s highly possible to make flash pages usable for the visitor with technical solutions in Macromedia Flashs programming language actionscript.

    This report also includes a web based template with all the technical solutions applied to it so developers can follow every step of the build up.

  • 55.
    Oskarsson, Carl
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Hedman, Jonathan
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Analys och implementation av EPIServer2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report describes how we, with support from SYSteam Datakonsult AB Värnamo

    builds a dynamic website for a fictional company. The purpose of this work is to tie

    together our studies with the businesses in the region, and expand our knowledge.

    Together with Peter Bäckrud from SYSteam we worked out the goals to achieve this

    purpose. The goals are to create a polished intranet to a company with the webpage

    publishing tool EPIserver

    This report begins with describing the goals and visions that were set up. Then follows a

    thorough theoretical background that describes the areas we have touched, to give the

    reader an idea about the work. The report then moves into the creation phase that talks

    about the problem that occurred during development.

    The creation phase is split up into two parts where the first part gives a good description

    about how we designed a usability friendly website that would fulfill the goals we had set

    up. The other part talks about programming and the implementation of the different

    features on the website.

    Finally there’s an evaluation of the website from a usability perspective to give us an idea

    of how good we made the design. We also evaluate EPIserver to give our views on the

    software which none of us has worked with before.

  • 56.
    Palesi, Maurizio
    et al.
    DIIT, University of Catania, Italy.
    Holsmark, Rickard
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Wang, X.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Kumar, Shashi
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Yang, M.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Jiang, Y.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Catania, V.
    DIIT, University of Catania, Italy.
    A Novel Mechanism to Guarantee In-Order Packet Delivery with Adaptive Routing Algorithms in Networks on Chip2010In:  13th Euromicro Conference On Digital System Design Architectures, Methods and Tools, 2010Conference paper (Refereed)
    Abstract [en]

    Although adaptive routing algorithms promise higher communication performance, as compared to deterministic routing algorithms, they suffer from the out-of-order packet delivery problem. In the context of Network on Chip, the area and computational overhead of ordering packets at the destination is high and may reverse any gain achieved through the use of adaptivity of the routing algorithm. In this paper, we describe a novel scheme for ensuring in-order packet delivery while retaining the performance advantages of adaptive routing. The hardware architecture of a router that supports the proposed scheme is described. Although the basic idea in our proposal is topology independent we evaluate and compare the performance of our scheme with both deterministic as well as adaptive routing algorithms for 2D mesh NoC. As compared to the XY routing algorithm, our technique significantly reduces the packet delay and improves the saturation point. The impact on router area and power dissipation is also discussed. Although the power consumption of routers increase, the energy consumption per flit increases less than 2% on average, since the higher performance allows for draining more traffic during a certain time window.

  • 57. Palesi, Maurizio
    et al.
    Kumar, Shashi
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering. Jönköping University, School of Engineering, JTH. Research area Robust Embedded Systems.
    Catania, V.
    Bandwidth-Aware Routing Algorithms for Networks-on-Chip Platforms2009In: I E T Computers and Digital Techniques, ISSN 1751-8601, Vol. 3, no 5, p. 413-429Article in journal (Refereed)
    Abstract [en]

    General purpose routing algorithms for a network-on-chip (NoC) platform may not be able to provide sufficient performance for some communication intensive applications. This may be because of low adaptivity offered by a general purpose routing algorithm resulting in some links getting highly congested. In this study the authors demonstrate that it is possible to design highly efficient application-specific routing algorithms which distribute traffic more uniformly by using information regarding applications communication behaviour (communication topology and communication bandwidth). The authors use off-line analysis to estimate expected load on various links in the network. The result of this analysis is used along with the available routing adaptivity in each router to distribute less traffic to links and paths which are expected to be congested. The methodology for application-specific routing algorithms is extended to incorporate these features to design highly adaptive deadlock-free routing algorithms which also distribute traffic more uniformly and reduce network congestion. The authors discuss architectural implications and analyse area and power overheads of the proposed approach on the design of a table-based NoC router.

  • 58.
    Pettersson, Joakim
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Programvarustöd för hot-, risk- och sårbarhetsanalys2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report describes a final thesis done during the spring of 2008 as part of the bachelor degree in computer engineering degree at the School of Engineering in Jönköping.

    The client is working in the consulting business and is involved in, amongst others, work regarding information security. Within this field they perform so called Threat, Risk and Vulnerability assessments. Today these assessments are done by a predefined method, but many details are controlled by the person documenting the project. A wish was made that the implementation was standardized, it should also ease the task of estimating the need for time and money. The solution for this seems to be a software tool. This software should handle the data from the assessments and generate foundations for reports.

    The question formulation that has been used is:

    • What are the possibilities to, with software, improve the workflow for handling the information from the assessments?

    • What are suitable techniques to handle this?

    To plan the software focus was put on the assessment and the types of input to them. These inputs were identified through descriptions in literature and informal interviews with analytics. The handling of the information remained unspecified as to not steer the design of the application in a direction that was formed after accustomed patterns, instead an objective solution was sought after.

    The resulting software fulfills all requirements that were specified at the beginning of the project, and it shows that the possibilities to improve the workflow are great. It is possible even with very small means to make it easier for the person doing the documentation. The report resulting from the assessments then become more standardized and make it easier to verify its validity.

  • 59.
    Rangell, Marcus
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Utveckling av webbapplikation i ASP.net med Ajax-teknik2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
  • 60.
    Renbi, Abdelghani
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Power and Energy Efficiency Evaluation for HW and SW Implementation of nxn Matrix Multiplication on Altera FPGAs2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In addition to the performance, low power design became an important issue in the design process of mobile embedded systems. Mobile electronics with rich features most often involve complex computation and intensive processing, which result in short battery lifetime and particularly when low power design is not taken in consideration. In addition to mobile computers, thermal design is also calling for low power techniques to avoid components overheat especially with VLSI technology. Low power design has traced a new era. In this thesis we examined several techniques to achieve low power design for FPGAs, ASICs and Processors where ASICs were more flexible to exploit the HW oriented techniques for low power consumption. We surveyed several power estimation methodologies where all of them were prone to at least one disadvantage. We also compared and analyzed the power and energy consumption in three different designs, which perform matrix multiplication within Altera platform and using state-of-the-art FPGA device. We concluded that NIOS II\e is not an energy efficient alternative to multiply nxn matrices compared to HW matrix multipliers on FPGAs and configware is an enormous potential to reduce the energy consumption costs.

  • 61.
    Rikard, Jurstrand
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Johan, Gustafsson
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    UTVECKLING AV ETT ANVÄNDARVÄNLIGT OCH SÄKERT INFORMATIONSSYSTEM2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis has been performed at the system development company Verendus System AB, together with the home care company Basic Care Unit (BCU).

    The thesis has consisted of developing a web based informationsystem for BCU in which they can administrate their business. At the time of writing this thesis, BCU was using a windows-application to administrate their activities, which was both costly aswell as resulting in an unnecessary burden. The aim the thesis has thus been to create a platform-independent information system that simplifies and streamlines BCUs work by being user-friendly aswell as imposing some simplifying features.

    The students has been developing the system by the help of a work method they themselves developed. The method consisted of working in several iterations that each had several milestones. The method resulted in the students knowing easily when each iteration was finished or not.

    The thesis resulted in a working platform independent prototype. The prototype was developed in the PHP-framework CodeIgniter together with HTML5 and CSS3.

    Examples of functions included is being able to administrate BCU’s patients and employees, aswell as being able to plan the employees workdays with one click.

  • 62.
    Sandkuhl, Kurt
    et al.
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics. University of Rostock, Rostock, Germany.
    Seigerroth, Ulf
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics.
    Method engineering in information systems analysis and design: a balanced scorecard approach for method improvement2019In: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 18, no 3, p. 1833-1857Article in journal (Refereed)
    Abstract [en]

    Modeling methods have been proven to provide beneficial instrumental support for different modeling tasks during information system analysis and design. However, methods are a complex phenomenon that include constructs such as procedural guidelines, concepts to focus on, visual representations and cooperation principles. In general, method development is an expensive task that usually involves many stakeholders and results in various method iterations. Since methods and method development are complex in nature, there is a need for a well-structured and resource-efficient approach for method improvement. This paper aims to contribute to the field of method improvement by proposing a balanced scorecard-based approach and by reporting on experiences from developing and using it in the context of a method for information demand analysis. The main contributions of the paper are as follows: (1) It provides a description of the process for developing a scorecard for method improvement; (2) it shows how the scorecard as such can be used as a tool for improving a specific method; and (3) it discusses experiences from applying the scorecard in industrial settings.

  • 63.
    Sandqvist, Mattias
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Johansson, Robert
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Implementation av Network Admission Control2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.

    The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.

    An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.

    These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.

  • 64.
    Sanell, Jonas
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Svenningsson, Tommy
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Webbshop för Tyger & Ting2006Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report describes how we made a dynamic website combined with statical

    web pages and a web shop for the Swedish company Tyger & Ting.

    The employer Tyger & Ting wish to run a working web shop on their site but

    they want to keep their old system of updating pages with their old application

    from Intellyweb1, which creates statical HTML pages.

    The goal of this exam paper has been to learn to create a functional web shop

    with user friendly layout and appealing design and also to take orders and

    fulfill wishes from a real employer.

    The report is describing how Intellyweb’s application and its statical web pages

    has been implemented on a dynamic web page. The report does also describe

    how this site has been build and how the problems with the coding have been

    solved. The coding has been made with HTML, PHP and MySQL. CSS has

    also been used. The report will describe how management and storage of data

    in databases has been handled.

    Apart from the demands the employer has given us, a complete revamp of

    Tyger & Ting’s design has been made and the result of the exam paper is now a

    complete and working web site with additional web shop that supports static

    web pages. The website contains 20 dynamic and static pages coded in about

    1900 rows of PHP and HTML. A database with five tables of varying size has

    been made to contain pictures and information about products, users and

    orders.

    As soon as all the products has been put into the database the web shop will be

    found here: http://www.tygeroting.com

  • 65.
    Svensson, Håkan
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Carlsson, Carl
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    SafeTool: Implementering av RFID-teknologi i maskiner för byggbranschen2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Every year more than 6000 thefts, to a value of 1.5 billion SEK, are reported

    within the Swedish building trade. Plus all the indirect costs of having the

    construction site standing still.

    SafeTool is a newly started company that will try to prevent this problem with

    a modern technology solution.

    The key to SafeTool’s solution is RFID – Radio Frequency Identification – and

    the solution looks like this;

    All tools are stored in a container on the construction site. Every tool is

    equipped with a RFID-tag that uniquely identifies the tool. With antennas in the

    container it is possible to detect when a tool is leaving the container and when

    it comes back. Every worker must wear a RFID-tag so it will be possible to see

    who was taking the tool out of the container. The container has no external

    locks on it, but the RFID-tag works as a key. An antenna on the roof of the

    container identifies the worker and automatically unlocks the door.

    All the tool and personnel traffic through the door of the container are reported

    to a central server via GPRS. The server stores all info in a database. The

    administration of the system will be done through a website.

    This paper will show how we made this solution work in practice. How we

    created and programmed the client and server and the protocol that makes them

    understand each other.

  • 66.
    Svensson, Niklas
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Gripestam Nord, Erik
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Vem är rädd för bannern där?: En studie om banners klickfrekvens2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This paper is about advertising on the Internet using banners. Together with Embryo Webbyrå we have tested a lot of different ways of advertising on the online newspaper of Göteborgs-Posten, gp.se. Two of the web bureau’s existing clients, Resia and Recip, were chosen for the ads and the whole campaign lasted a period of four weeks.

    By comparing our banners with the consideration of format, color, placement and content we wanted to find an answer to how the most optimal banner would look.

    Our test result shows that visitors rather do not want to click on a banner, although we think that we have seen some interest and curiousness from visitors in the banners content. Even when the visitor does not click on a banner, the message might be put in mind for a future purchase or act.

  • 67.
    Tarasov, Vladimir
    et al.
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics, JTH, Jönköping AI Lab (JAIL).
    Tan, He
    Jönköping University, School of Engineering, JTH, Computer Science and Informatics, JTH, Jönköping AI Lab (JAIL).
    Jarfors, Anders E.W.
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Seifeddine, Salem
    Jönköping University, School of Engineering, JTH, Materials and Manufacturing.
    Fuzzy logic-based modelling of yield strength of as-cast A356 alloy2019In: Neural computing & applications (Print), ISSN 0941-0643, E-ISSN 1433-3058Article in journal (Refereed)
    Abstract [en]

    Uncertain and imprecise data are inherent to many domains, e.g. casting lightweight components. Fuzzy logic offers a way to handle such data, which makes it possible to create predictive models even with small and imprecise data sets. Modelling of cast components under fatigue load leads to understanding of material behaviour on component level. Such understanding is important for the design for minimum warranty risk and maximum weight reduction of lightweight cast components. This paper contributes with a fuzzy logic-based approach to model fatigue-related mechanical properties of as-cast components, which has not been fully addressed by the current research. Two fuzzy logic models are constructed to map yield strength to the chemical composition and the rate of solidification of castings for two A356 alloys. Artificial neural networks are created for the same data sets and then compared to the fuzzy logic approach. The comparison shows that although the neural networks yield similar prediction accuracy, they are less suitable for the domain because they are opaque models. The prediction errors exhibited by the fuzzy logic models are 3.53% for the model and 3.19% for the second, which is the same error level as reported in related work. An examination of prediction errors indicated that these are affected by parameters of the membership functions of the fuzzy logic model.

  • 68.
    Walid, Rohaimi
    Jönköping University, School of Engineering.
    Software Evolution in the context of .Net Framework2007Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    This paper discusses the process of software evolution and especially software migration in the context of .NET Technologies. Actually most of the companies that uses legacy systems implemented with procedural languages as C, Visual Basic and so on, meet some problems when new requirement specifications have to be integrated.

    One possibility to deal with this situation is to choose a good migration strategy from these legacy systems towards new Object Oriented design.

    There are some migration processes that enable the fulfilment of this task but most of the time theses processes cannot be applied directly without any modification.

    This report presents a migration strategy and migration process applied for a real case of an application in a company. The New Object Oriented design of the application and the result are discussed in the following sections of this document.

  • 69.
    Wester, Erik
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Henricsson, Christopher
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Utveckling av användargränssnitt för mobil resesökningsapplikation2008Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report aims to answer how to design a user interface for a mobile application minimizing the amount of key presses, specifically text input. In this context, mobile application means a program designed to run on a mobile phone with a numerical keyboard. The application we’re designing is a travel search function for local bus traffic. For out test purposes we used the bus stops in Jönköping County.

    We developed a design concept based on a menu system consisting of alphabetic groups for inputting names of towns and bus stops. From this we developed a prototype in Java Micro Edition which could later be evaluated after a small user test.

    The prototype was tested on three people using a method developed at the software company Apple. The results revealed one significant flaw, which, fortunately, is easy to correct. The remaining problems were not considered to be any insurmountable hurdles for users to overcome. Response from the test subjects was positive in that they not only experienced fewer key presses, but also a simpler usage of the application.

  • 70.
    Youssefi, Masoud
    et al.
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Andersson, Patrik
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    Hemsida för ett musikbolag: Website for a music company2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    The purpose of this report is to answer the question:

    How do you create a media player that can stream music for a website?

    We started the work by searching the web and reading books about the subject

    and found several technologies to use to stream media files over the internet.

    We decided upon using the http protocol and created the media player itself in

    Macromedia Flash.

    The website is mostly developed with PHP, JavaScript and CSS templates and

    the websites design was created with Macromedia Dreamweaver and Adobe

    Photoshop. We also created an administrative system for the media player with

    PHP programming.

    The website contains a simple guestbook; the guestbook makes use of a

    database created with MySQL.

    Our work resulted in a webpage with a fully functional media player that

    streams audio files together with a corresponding administrative system for it.

12 51 - 70 of 70
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf