Endre søk
Begrens søket
12 51 - 70 of 70
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 51.
    Nauman, Anders
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Söndergaard, Simon
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Riktlinjer för implementering av ISO 177992010Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.

    As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.

    The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field. Very few small companies manage to apply the standard since it too large and complex.

    The main goal with this thesis is to create a simplified version of ISO 17799 and to make it understandable by non experts. The thesis also gives focus on Conect AB through suggesting a template in which shall be adjusted for their customers to use and inform them of threats that may be of interest.

    This thesis is based on the following questions:

    • How can we make the standard less difficult to understand?
    • Does the material cover the necessary needs of network security?
    • How often shall the material be updated to be up to date in the future?

    As a result, this thesis displays the ISO 17799 in the form of a suggested template and it presents explanations and consequences if a company/organisation does not have a particular function or a physical implementation.

    The method in which the template had been created was through the reading of the ISO 17799 standard for insight on what is included and the explanations in which certain parts are vital. Even if a standard should have proper information possible as well as contain the latest information, the project group processed other sources and explanations in order to get higher credibility and to see if there were new technology and facts about the subject.

  • 52.
    Nezirevic, Esmeralda
    Högskolan i Jönköping, Tekniska Högskolan.
    Brandväggar för hemmakontor2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security.

    Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005.

    Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page.

    It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.

  • 53.
    Nilsson, Paul
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Lasson, Daniel
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    ITIL inom Conect AB2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Conect AB wants to know how they can use ITIL in their organization. Right now their company is in an expansive phase and needs a more structured way to work. They have been thinking of improving their way of work for several years but haven’t had the time to do so. Now they have realized they need to work more efficiently to able to grow further. ITIL is a collection of best practices. ITIL’s purpose is to help IT organizations to get more organized to de able to benefit the business in a better way. ITIL is developed by OGC (Office Goverment of Commerce) in England. With the help

    ITIL you can structure your work better and there by increase the efficiency of the IT process. ITIL is divided I several processes and each one of them have their own purpose. That makes everyone’s duties clear. The central parts of ITIL are Service Support and Service Delivery that gives an overview of how to work in an

    IT organization. The information about ITIL that has been acquired through previous courses at School of Engineering in Jönköping. Some books about ITIL were used to furthermore gather information. The information about how Conect AB work has been put together through several interviews with the supervisor at the company. A survey was sent to several of their customers, which of three of them replied.

    This provided a good idea about how Conect AB works today. At the moment the company doesn’t have a helpdesk system to handle incoming

    incidents. This is considered as the weakest part for the moment. A helpdesk system could improve the efficiency of their work a lot. To handle the incoming incidents in a correct way Conect AB will need to build a helpdesk, instead of letting the customers call the technicians directly. If they choose to implement the advices given to improve them, they will probably be able to expand even more. The time saved by the improvements can be used more efficient. This will allow the costumer relations to increase.

  • 54.
    Olsson, Fredrik
    Högskolan i Jönköping, Tekniska Högskolan.
    Användbarhet på Macromedia flash-baserade webbplatser2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Detta examensarbete behandlar den rad av arbete som utvecklare måste gå igenom för att producera användbarhetsanpassade flash-baserade webbplatser. Rapportens mål är att få utvecklare att förstå vikten av att alltid tänka på besökaren i utvecklingsprocessen och på så sätt hjälpa till att förbättra flash-baserat innehåll generellt.

    Trots att många kritiker anser att flash-baserade webbplatser inte är bra ur användbarhetssyfte visar denna rapport att det är högst möjligt att skapa användbarhetsanpassade flash-sidor för besökarna med hjälp av Macromedia Flashs eget programmeringsspråk actionscript.

    Denna rapport innefattar också en webbaserad mall med alla de tekniska lösningarna som nämns i texten för att utvecklare enkelt skall kunna följa varje steg i utvecklingsprocessen.

  • 55.
    Oskarsson, Carl
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Hedman, Jonathan
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Analys och implementation av EPIServer2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report describes how we, with support from SYSteam Datakonsult AB Värnamo

    builds a dynamic website for a fictional company. The purpose of this work is to tie

    together our studies with the businesses in the region, and expand our knowledge.

    Together with Peter Bäckrud from SYSteam we worked out the goals to achieve this

    purpose. The goals are to create a polished intranet to a company with the webpage

    publishing tool EPIserver

    This report begins with describing the goals and visions that were set up. Then follows a

    thorough theoretical background that describes the areas we have touched, to give the

    reader an idea about the work. The report then moves into the creation phase that talks

    about the problem that occurred during development.

    The creation phase is split up into two parts where the first part gives a good description

    about how we designed a usability friendly website that would fulfill the goals we had set

    up. The other part talks about programming and the implementation of the different

    features on the website.

    Finally there’s an evaluation of the website from a usability perspective to give us an idea

    of how good we made the design. We also evaluate EPIserver to give our views on the

    software which none of us has worked with before.

  • 56.
    Palesi, Maurizio
    et al.
    DIIT, University of Catania, Italy.
    Holsmark, Rickard
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Wang, X.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Kumar, Shashi
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Yang, M.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Jiang, Y.
    Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, USA.
    Catania, V.
    DIIT, University of Catania, Italy.
    A Novel Mechanism to Guarantee In-Order Packet Delivery with Adaptive Routing Algorithms in Networks on Chip2010Inngår i:  13th Euromicro Conference On Digital System Design Architectures, Methods and Tools, 2010Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Although adaptive routing algorithms promise higher communication performance, as compared to deterministic routing algorithms, they suffer from the out-of-order packet delivery problem. In the context of Network on Chip, the area and computational overhead of ordering packets at the destination is high and may reverse any gain achieved through the use of adaptivity of the routing algorithm. In this paper, we describe a novel scheme for ensuring in-order packet delivery while retaining the performance advantages of adaptive routing. The hardware architecture of a router that supports the proposed scheme is described. Although the basic idea in our proposal is topology independent we evaluate and compare the performance of our scheme with both deterministic as well as adaptive routing algorithms for 2D mesh NoC. As compared to the XY routing algorithm, our technique significantly reduces the packet delay and improves the saturation point. The impact on router area and power dissipation is also discussed. Although the power consumption of routers increase, the energy consumption per flit increases less than 2% on average, since the higher performance allows for draining more traffic during a certain time window.

  • 57. Palesi, Maurizio
    et al.
    Kumar, Shashi
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsområde Robusta inbyggda system.
    Catania, V.
    Bandwidth-Aware Routing Algorithms for Networks-on-Chip Platforms2009Inngår i: I E T Computers and Digital Techniques, ISSN 1751-8601, Vol. 3, nr 5, s. 413-429Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    General purpose routing algorithms for a network-on-chip (NoC) platform may not be able to provide sufficient performance for some communication intensive applications. This may be because of low adaptivity offered by a general purpose routing algorithm resulting in some links getting highly congested. In this study the authors demonstrate that it is possible to design highly efficient application-specific routing algorithms which distribute traffic more uniformly by using information regarding applications communication behaviour (communication topology and communication bandwidth). The authors use off-line analysis to estimate expected load on various links in the network. The result of this analysis is used along with the available routing adaptivity in each router to distribute less traffic to links and paths which are expected to be congested. The methodology for application-specific routing algorithms is extended to incorporate these features to design highly adaptive deadlock-free routing algorithms which also distribute traffic more uniformly and reduce network congestion. The authors discuss architectural implications and analyse area and power overheads of the proposed approach on the design of a table-based NoC router.

  • 58.
    Pettersson, Joakim
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Programvarustöd för hot-, risk- och sårbarhetsanalys2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report describes a final thesis done during the spring of 2008 as part of the bachelor degree in computer engineering degree at the School of Engineering in Jönköping.

    The client is working in the consulting business and is involved in, amongst others, work regarding information security. Within this field they perform so called Threat, Risk and Vulnerability assessments. Today these assessments are done by a predefined method, but many details are controlled by the person documenting the project. A wish was made that the implementation was standardized, it should also ease the task of estimating the need for time and money. The solution for this seems to be a software tool. This software should handle the data from the assessments and generate foundations for reports.

    The question formulation that has been used is:

    • What are the possibilities to, with software, improve the workflow for handling the information from the assessments?

    • What are suitable techniques to handle this?

    To plan the software focus was put on the assessment and the types of input to them. These inputs were identified through descriptions in literature and informal interviews with analytics. The handling of the information remained unspecified as to not steer the design of the application in a direction that was formed after accustomed patterns, instead an objective solution was sought after.

    The resulting software fulfills all requirements that were specified at the beginning of the project, and it shows that the possibilities to improve the workflow are great. It is possible even with very small means to make it easier for the person doing the documentation. The report resulting from the assessments then become more standardized and make it easier to verify its validity.

  • 59.
    Rangell, Marcus
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Utveckling av webbapplikation i ASP.net med Ajax-teknik2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 60.
    Renbi, Abdelghani
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Power and Energy Efficiency Evaluation for HW and SW Implementation of nxn Matrix Multiplication on Altera FPGAs2009Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In addition to the performance, low power design became an important issue in the design process of mobile embedded systems. Mobile electronics with rich features most often involve complex computation and intensive processing, which result in short battery lifetime and particularly when low power design is not taken in consideration. In addition to mobile computers, thermal design is also calling for low power techniques to avoid components overheat especially with VLSI technology. Low power design has traced a new era. In this thesis we examined several techniques to achieve low power design for FPGAs, ASICs and Processors where ASICs were more flexible to exploit the HW oriented techniques for low power consumption. We surveyed several power estimation methodologies where all of them were prone to at least one disadvantage. We also compared and analyzed the power and energy consumption in three different designs, which perform matrix multiplication within Altera platform and using state-of-the-art FPGA device. We concluded that NIOS II\e is not an energy efficient alternative to multiply nxn matrices compared to HW matrix multipliers on FPGAs and configware is an enormous potential to reduce the energy consumption costs.

  • 61.
    Rikard, Jurstrand
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Johan, Gustafsson
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    UTVECKLING AV ETT ANVÄNDARVÄNLIGT OCH SÄKERT INFORMATIONSSYSTEM2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This thesis has been performed at the system development company Verendus System AB, together with the home care company Basic Care Unit (BCU).

    The thesis has consisted of developing a web based informationsystem for BCU in which they can administrate their business. At the time of writing this thesis, BCU was using a windows-application to administrate their activities, which was both costly aswell as resulting in an unnecessary burden. The aim the thesis has thus been to create a platform-independent information system that simplifies and streamlines BCUs work by being user-friendly aswell as imposing some simplifying features.

    The students has been developing the system by the help of a work method they themselves developed. The method consisted of working in several iterations that each had several milestones. The method resulted in the students knowing easily when each iteration was finished or not.

    The thesis resulted in a working platform independent prototype. The prototype was developed in the PHP-framework CodeIgniter together with HTML5 and CSS3.

    Examples of functions included is being able to administrate BCU’s patients and employees, aswell as being able to plan the employees workdays with one click.

  • 62.
    Sandkuhl, Kurt
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik. University of Rostock, Rostock, Germany.
    Seigerroth, Ulf
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik.
    Method engineering in information systems analysis and design: a balanced scorecard approach for method improvement2019Inngår i: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 18, nr 3, s. 1833-1857Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Modeling methods have been proven to provide beneficial instrumental support for different modeling tasks during information system analysis and design. However, methods are a complex phenomenon that include constructs such as procedural guidelines, concepts to focus on, visual representations and cooperation principles. In general, method development is an expensive task that usually involves many stakeholders and results in various method iterations. Since methods and method development are complex in nature, there is a need for a well-structured and resource-efficient approach for method improvement. This paper aims to contribute to the field of method improvement by proposing a balanced scorecard-based approach and by reporting on experiences from developing and using it in the context of a method for information demand analysis. The main contributions of the paper are as follows: (1) It provides a description of the process for developing a scorecard for method improvement; (2) it shows how the scorecard as such can be used as a tool for improving a specific method; and (3) it discusses experiences from applying the scorecard in industrial settings.

  • 63.
    Sandqvist, Mattias
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Johansson, Robert
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Implementation av Network Admission Control2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.

    The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.

    An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.

    These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.

  • 64.
    Sanell, Jonas
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Svenningsson, Tommy
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Webbshop för Tyger & Ting2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report describes how we made a dynamic website combined with statical

    web pages and a web shop for the Swedish company Tyger & Ting.

    The employer Tyger & Ting wish to run a working web shop on their site but

    they want to keep their old system of updating pages with their old application

    from Intellyweb1, which creates statical HTML pages.

    The goal of this exam paper has been to learn to create a functional web shop

    with user friendly layout and appealing design and also to take orders and

    fulfill wishes from a real employer.

    The report is describing how Intellyweb’s application and its statical web pages

    has been implemented on a dynamic web page. The report does also describe

    how this site has been build and how the problems with the coding have been

    solved. The coding has been made with HTML, PHP and MySQL. CSS has

    also been used. The report will describe how management and storage of data

    in databases has been handled.

    Apart from the demands the employer has given us, a complete revamp of

    Tyger & Ting’s design has been made and the result of the exam paper is now a

    complete and working web site with additional web shop that supports static

    web pages. The website contains 20 dynamic and static pages coded in about

    1900 rows of PHP and HTML. A database with five tables of varying size has

    been made to contain pictures and information about products, users and

    orders.

    As soon as all the products has been put into the database the web shop will be

    found here: http://www.tygeroting.com

  • 65.
    Svensson, Håkan
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Carlsson, Carl
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    SafeTool: Implementering av RFID-teknologi i maskiner för byggbranschen2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Every year more than 6000 thefts, to a value of 1.5 billion SEK, are reported

    within the Swedish building trade. Plus all the indirect costs of having the

    construction site standing still.

    SafeTool is a newly started company that will try to prevent this problem with

    a modern technology solution.

    The key to SafeTool’s solution is RFID – Radio Frequency Identification – and

    the solution looks like this;

    All tools are stored in a container on the construction site. Every tool is

    equipped with a RFID-tag that uniquely identifies the tool. With antennas in the

    container it is possible to detect when a tool is leaving the container and when

    it comes back. Every worker must wear a RFID-tag so it will be possible to see

    who was taking the tool out of the container. The container has no external

    locks on it, but the RFID-tag works as a key. An antenna on the roof of the

    container identifies the worker and automatically unlocks the door.

    All the tool and personnel traffic through the door of the container are reported

    to a central server via GPRS. The server stores all info in a database. The

    administration of the system will be done through a website.

    This paper will show how we made this solution work in practice. How we

    created and programmed the client and server and the protocol that makes them

    understand each other.

  • 66.
    Svensson, Niklas
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Gripestam Nord, Erik
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Vem är rädd för bannern där?: En studie om banners klickfrekvens2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This paper is about advertising on the Internet using banners. Together with Embryo Webbyrå we have tested a lot of different ways of advertising on the online newspaper of Göteborgs-Posten, gp.se. Two of the web bureau’s existing clients, Resia and Recip, were chosen for the ads and the whole campaign lasted a period of four weeks.

    By comparing our banners with the consideration of format, color, placement and content we wanted to find an answer to how the most optimal banner would look.

    Our test result shows that visitors rather do not want to click on a banner, although we think that we have seen some interest and curiousness from visitors in the banners content. Even when the visitor does not click on a banner, the message might be put in mind for a future purchase or act.

  • 67.
    Tarasov, Vladimir
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik, JTH, Jönköping AI Lab (JAIL).
    Tan, He
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Datateknik och informatik, JTH, Jönköping AI Lab (JAIL).
    Jarfors, Anders E.W.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Material och tillverkning.
    Seifeddine, Salem
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Material och tillverkning.
    Fuzzy logic-based modelling of yield strength of as-cast A356 alloy2019Inngår i: Neural computing & applications (Print), ISSN 0941-0643, E-ISSN 1433-3058Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Uncertain and imprecise data are inherent to many domains, e.g. casting lightweight components. Fuzzy logic offers a way to handle such data, which makes it possible to create predictive models even with small and imprecise data sets. Modelling of cast components under fatigue load leads to understanding of material behaviour on component level. Such understanding is important for the design for minimum warranty risk and maximum weight reduction of lightweight cast components. This paper contributes with a fuzzy logic-based approach to model fatigue-related mechanical properties of as-cast components, which has not been fully addressed by the current research. Two fuzzy logic models are constructed to map yield strength to the chemical composition and the rate of solidification of castings for two A356 alloys. Artificial neural networks are created for the same data sets and then compared to the fuzzy logic approach. The comparison shows that although the neural networks yield similar prediction accuracy, they are less suitable for the domain because they are opaque models. The prediction errors exhibited by the fuzzy logic models are 3.53% for the model and 3.19% for the second, which is the same error level as reported in related work. An examination of prediction errors indicated that these are affected by parameters of the membership functions of the fuzzy logic model.

  • 68.
    Walid, Rohaimi
    Högskolan i Jönköping, Tekniska Högskolan.
    Software Evolution in the context of .Net Framework2007Independent thesis Advanced level (degree of Magister), 20 poäng / 30 hpOppgave
    Abstract [en]

    This paper discusses the process of software evolution and especially software migration in the context of .NET Technologies. Actually most of the companies that uses legacy systems implemented with procedural languages as C, Visual Basic and so on, meet some problems when new requirement specifications have to be integrated.

    One possibility to deal with this situation is to choose a good migration strategy from these legacy systems towards new Object Oriented design.

    There are some migration processes that enable the fulfilment of this task but most of the time theses processes cannot be applied directly without any modification.

    This report presents a migration strategy and migration process applied for a real case of an application in a company. The New Object Oriented design of the application and the result are discussed in the following sections of this document.

  • 69.
    Wester, Erik
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Henricsson, Christopher
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Utveckling av användargränssnitt för mobil resesökningsapplikation2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Den här rapporten ämnar besvara frågan om hur man bör utforma ett användargränssnitt för en mobil applikation så att antalet knapptryckningar, speciellt textinmatning, på den mobila enheten minimeras. Med mobil applikation menas i detta fall ett program avsett att köras på en mobiltelefon med en numerisk knappuppsättning. Applikationen i fråga är en resesökningsfunktion ämnad för lokal busstrafik; för testsyften används hållplatser inom Jönköpings län.

    Ett designkoncept utformades baserat på ett menysystem bestående av alfabetsgrupper för inmatning av namn på orter och hållplatser. Utifrån detta utvecklades en prototyp i Java Micro Edition som sedan kunde utvärderas och modifieras efter ett mindre användartest.

    Prototypen testades på tre personer efter en metodik som utformats på mjukvaruföretaget Apple. Resultatet visade en allvarlig brist, som lyckligtvis är enkel att korrigera. Resterande problem ansågs ej utgöra några större hinder för framtida användare. Responsen från testpersonerna var positiv då de inte bara upplevde färre knapptryckningar utan också ett enklare användande jämfört med traditionell textinmatning.

  • 70.
    Youssefi, Masoud
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Andersson, Patrik
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Hemsida för ett musikbolag: Website for a music company2007Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    The purpose of this report is to answer the question:

    How do you create a media player that can stream music for a website?

    We started the work by searching the web and reading books about the subject

    and found several technologies to use to stream media files over the internet.

    We decided upon using the http protocol and created the media player itself in

    Macromedia Flash.

    The website is mostly developed with PHP, JavaScript and CSS templates and

    the websites design was created with Macromedia Dreamweaver and Adobe

    Photoshop. We also created an administrative system for the media player with

    PHP programming.

    The website contains a simple guestbook; the guestbook makes use of a

    database created with MySQL.

    Our work resulted in a webpage with a fully functional media player that

    streams audio files together with a corresponding administrative system for it.

12 51 - 70 of 70
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf