• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1048
  • 464
  • 1
  • 1
  • Tagged with
  • 1514
  • 1514
  • 1514
  • 1514
  • 1513
  • 1513
  • 1513
  • 1513
  • 1513
  • 1513
  • 195
  • 130
  • 97
  • 84
  • 83
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Spelarbeteende : Och hur det påverkas av erfarenhet från andra genrer / Player behaviour : And how it’s affected by prior experience of other genres

Engholm, Lukas January 2021 (has links)
Undersökningen använder sig av observation med observatören som deltagare som insamlingsmetod. Det innebär att testpersonerna är medvetna om studiens syfte och att de blir observerade. Datan användes sedan för att göra en konventionell innehållsanalys för att ta reda på hur spelares erfarenhet av RPG och FPS spel påverkar spelbeteendet i en rouge-like. Observationerna görs i en artefaktversion av spelet Die, Recompile som är utvecklat som ett studieprojekt på Högskolan i Skövde. Undersökningens kunde inte hitta någon större skillnad på spelbeteendena hos de olika testgrupperna. Den mest betydande skillnaden var i hur FPS kategorin uppvisade en större förmåga att byta strategi. Framtida arbete bör fokusera på att täcka de brister denna undersökning har. Det innefattar att ha en större urvalsgrupp och minimera risken att observatörens egna förutfattade meningar påverkar resultatet samt att eventuellt utveckla en testningsmetod för utvecklandet av artefakten. / <p>Det finns övrigt digitalt material (t.ex. film-, bild- eller ljudfiler) eller modeller/artefakter tillhörande examensarbetet som ska skickas till arkivet.</p>
102

Co-creators of scope of action : an exploration of the dynamic relationship between people, IT, and work in a nursing context

Köhler, Veronica January 2006 (has links)
Information Technology (IT) is today widespread in our work places, in our spare time and in our society overall. Implementations of IT in organizations come with high expectations on effectiveness, revenue, smoother work processes and so on. However, this simplified view on IT ignores the fact that it is the IT usage rather than the IT artifact per se that in the end decides the effect of an implementation of IT. Although the IT artifact certainly has been designed to support certain tasks and processes, the success or failure of the Information System (IS) in the end depends on the individuals' actions, which ultimately depend on their perceptions and interpretations of the IS. Thus, when technology is being implemented and becomes an IS in use, it becomes a part of work, and as such more of a social system than a technological one. The actual result of a design process does not solely consist of things or artifacts, but above all changed action patterns for the users. From this follows that we must consider design of artifacts as something more than merely the constructing of actual objects with functions and properties that are easily measured. Rather, a large part of all design activities has to do with design of conceivable social milieus, not artifacts. Thus, design may be defined as the suggesting and establishing of scope of action. The concept scope of action aims at describing the fact that the design of, and consequently the implementation of, a specific IT artifact always aims at creating a certain scope of action; some actions are made easier, others are made more difficult or even impossible. This scope of action has to some extent been deliberately designed, but these changes may on the other hand also be undesired and not predicted in advance. The complexity of this phenomenon is great and hard to grasp in advance. However, this does not mean that we can allow ourselves to ignore exploring this phenomenon more deeply. On the contrary, with a usage perspective on IS success or failure, scope of action becomes very important. Although the term scope of action may seem a rather intuitive concept, we need more concrete knowledge about its character in order to be able to understand IT usage, both when designing a new IT artifact and when studying or evaluating IT. Thus, our intuitive understanding of the concept needs to be complemented with theory on the ‘constituents’ and effects of this phenomenon. For this purpose, in this thesis nurses’ use of the Electronic Patient record (EPR) is being explored in order to gain an empirically derived understanding of the character of scope of action. The research findings highlight the emergent character of scope of action. It is obvious that an individual’s scope of action is not being created on one occasion, and above all not only by the IT artifact. Various co- creators such as the IT artifact, the usage and the social context create and re-create scope of action. Also, how the individual interprets and understands the IT artifact in IT usage will influence her scope of action. This since sensemaking and learning processes on both a personal and organizational level take place that are co-creators of the individual’s scope of action, at the same time as the individual’s knowledge and previous sensemaking and learning influences her use of the IT artifact. Thus, reasoning, thinking, learning, and the IT artifact co-evolve over time in adaptation and appropriation processes. This means that IT as a mediational means constitutes an important co-creator of scope of action. From this also follows that work integrated learning is an important co- creator of scope of action when using IT in a work setting, at the same time as work integrated learning is being influenced by the individual’s scope of action. Finally, in order to understand how scope of action emerges in use, merely focusing on structures is insufficient. Scope of action emerges as a product of interplay between complex processes involving artifacts, usage and context. This means that the user’s scope of action is co-created by both static structures as well as dynamic processes relating to the IT artifact, the organization, and the work practice. Thus, the IT artifact, and subsequently scope of action, must be must be understood in relation to the multi-aspectual context of which it is a part instead of merely in relation to the properties of the IT artifact per se / <p>Godkänd; 2006; 20060928 (evan)</p>
103

Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

Stawe, Karl Martin January 2021 (has links)
For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. By personal integrity, the author refers to article 3 of the EU Charter of Fundamental Rights. The scientific community has agreed that mobile networks before 5G are susceptible to IMSI-catchers. However, 5G has significantly hardened its protection against IMSI-catchers. Therefore, to cover all the current mobile networks (e.g., 5G, 4G, 3G, and 2G). This study aims to examine: (1) what IMSI-catcher attack the Swedish Police can perform in 5G and (2) what privacy risks the Swedish Police use of IMSI-catchers can cause a natural person who communicates within current mobile networks. More specifically, the objective is to identify privacy risks and concerns likely to occur due to the Swedish Police surveillance tactics with IMSI-catchers in a democratic society such as Sweden. By a democratic society, the author refers to a state governed by political freedoms and legal equality. To that end, a systematic literature review and studying traditional caselaw materials (e.g., existing laws, previous cases, and authoritative materials) are employed to identify IMSI-catcher attacks in 5G and illustrate their privacy risks. Despite 5G's improvements of the paging procedure and the 5G-Authentication and Key Agreement" (AKA) Authentication protocol, the results showed that the protection against IMSI-catchers in 5G has not improved to any noticeable degree compared to older (e.g., 4G, 3G, 2G) mobile networks. Furthermore, regarding privacy risks, the results strongly suggest that surveillance by a government representative without impartial oversight puts individuals' intellectual privacy (e.g., our ability to read, learn and debate freely) at risk. Consequently, a government's intrusion on a natural person's private affairs can likely shake the core foundation of a democratic society and change citizens' behaviors, such as hesitation to participate in political gatherings due to fear of reprimand consequences. Moreover, the results suggest that the Swedish Police use of IMSI-catchers could, based on the current national surveillance statutes, lead to unlawful use per the European Convention on Human Rights, an international human rights treaty.
104

Aktiehandel prediktion med transformermodel : En jämförelsestudie om hur transformermodell presterar emot CNN, LSTM och TransformerCNN hybrid-modell / Stock trading prediction with transformer model : A comparative study of how transformer model performs against CNN, LSTM and TransformerCNN hybrid model

Lorén, Marcus January 2021 (has links)
Detta arbete har syftet att träna och testa en transformermodell på börsdata. Transformermodeller används överallt och har haft stora framgångar inom språkbehandling, datorsyn och självkörande bilar (Carion m.fl., 2020; Dickson 2021, 3 juli; Brown m.fl., 2020). Ett område där transformer inte har blivit publikt applicerad på är börsdata, specifikt minutpriset som uppkommer under dagen. För att resultatet som transformermodellen producerar ska ha någon innebörd så måste det kunna jämföras emot något. De modelleringstekniker som har haft stor framgång inom tidserieprediktioner är CNN och LSTM nätverk. Dessa två modelleringstekniker samt en hybridmodell som kombinerar en transformermodell med en CNN modell valdes i analysen. I detta arbete får dessa modellerna träna på data ifrån 2004 till 2019 och har uppgift att förespå om priset i X antal minuter i framtiden är högre eller lägre än det nuvarande. Alla modeller får träna &amp; testas på samma data för att objektivt kunna mäta vilken modell som har högst noggrannhet. För att utvärdera flera modeller och se hur de kan påverka noggrannheten så används experimentell metod, den variabeln som ska observeras är hur många rätt och fel modellen gör. Svaret på hypotesen som detta arbete är grundat på är att transformermodellenpresterade med lägst noggrannhet men när den kombinerades med en CNN modell så ökade noggrannheten. Andra slutsatser och insikter som kunde lyftas fram av detta arbete är att dagar med låg och mycket hög volatilitet gjorde att modellerna presterade dåligt, det är möjligt att minska de fundamentala faktorerna genom att inte inkludera prisskillnaderna som kan uppstå vid stängning och öppning av börsen.
105

Training LSTM RNN models for network flow data classification for attack intention recognition systems

Antoine, James Chilila January 2020 (has links)
The classification of network attack data, and prediction of the next likely set of network traffic flows is of particular interest to the cyber security domain, as it forms the basis for the timely response to cyber attacks as they progress. This work presents an overview of the main Attack Intention Recognition (AIR) approaches and techniques proposed over the last few years and proceeds to propose a system for classifying and distinguishing different types of network attacks using LSTM-RNN models. A set of LSTM-RNN models for detecting and distinguishing brute force, denial of service, ping scan, port scan, normal and suspicious network flow data, were trained for application to a real-time AIR algorithm using the CIDDS-001 dataset. The selected models are good enough to be applied to the overall AIR algorithm. The Brute Force model gave 86% accuracy, DOS 71% accuracy, Ping Scan 93% accuracy, Port Scan 71% accuracy. The performance of the selected models are comparable to those models oultined in the literature review and in a few cases seem to perform better. This work highlights that single layer LSTM-RNNs with no more than 150 hidden units are able to accurately classify flows given only the first 5% ofan attack. As the accuracy in this regard is greater than 70%, the selected models are good enough to be applied to the overall AIR algorithm. The report finally discusses suggestions for future work on developing the algorithm.
106

Towards an information classification model for Swedish municipalities: : A Case study

Bergquist, Jan-Halvard, Tinet, Samantha January 2020 (has links)
No description available.
107

The fragmented smart home : A comprehensive analysis of available interoperable solutions to connect wireless smart home communications / Det splittrade smart hemmet : En omfattande analys av tillgängliga interoperabla lösningar för att ansluta trådlös smarthems kommunikation

Masreliez, Ludwig January 2021 (has links)
The current smart home communication can be viewed as protocol stacks interlocked by their proprietary capsule solutions, locking the consumer into a single market of devices, without integration from other manufacturers. This research heads out to discover frameworks to adapt the heterogenous proprietary communicative offerings within the smart home, to a shared communicative interoperable and centralized controlled home, to enable the end-user to adapt the most efficient device for each scenario without having to consider which wireless communicative protocol or having to install more proprietary solutions to adapt additional technologies, thus neglecting centralized control. The research is accomplished by conducting a structured literature review followed by an analysis through thematic coding which provided a broad spectrum of findings regarding different interoperable solutions within several layers of communicative interoperability, within IoT and the smart home. The research results cover frameworks and protocols towards accomplishing wireless interoperability discovered during the structured literature review process, these frameworks and protocols are presented in their respective characteristics, taking communication, interoperability, and smart home adaptation into consideration during analysis. The finalized results present solutions toward an interoperable wireless smart home with good adaptability, along with the main findings a clear redlining can be drawn towards interoperability within IoT, and it is Software Defined Networking (SDN), which revolves around software-based networking. The most applicable interoperable solutions according to the concluding results will provide experienced end-users, consumers, and researchers with a several layered mapping towards how applicable the corresponding solution is towards integrating wireless smart home communication in their smart home scenario. / Den nuvarande smarthemskommunikationen kan ses som stackar av protokoll sammankopplade av deras egen proprietär kapsellösning, vilket låser konsumenten till en enda marknad av lösningar, utan integration från andra tillverkare. Denna forskning ger sig ut för att upptäcka ramar för att anpassa de heterogena proprietär kommunikativa erbjudandena inom det smarta hemmet, till ett delat kommunikativt interoperabelt och centraliserat hem, så att användaren kan anpassa den mest effektiva enheten för varje scenario utan att behöva överväga vilket trådlöst kommunikationsprotokoll som fungerar eller att behöva installera mer heterogena lösningar för att anpassa ytterligare tekniker och därmed utesluta centraliserad kontroll. Forskningen genomfördes genom att utföra en strukturerad litteraturstudie följt av en analys genom tematisk kodning, vilket gav ett brett spektrum av resultat angående olika interoperabla lösningar inom flera kommunikativa lager av interoperabilitet presenteras i denna studie, inom både IoT och det smarta hemmet. Resultatet som presenteras täcker lösningar och protokoll inom kommunikation för att åstadkomma trådlös interoperabilitet i flera lager när det gäller både det kommunikativa och interoperabilitetsfunktioner, de presenteras i sina respektive egenskaper och tar hänsyn till både kommunikation och interoperabilitet när de kategoriseras i motsvarande tabeller, det avslutande resultaten inom analysen presenterar lösningar mot ett interoperabelt smarthem med hög anpassningsförmåga för just smarthemsmiljö. Utöver huvudresultatet, kan en tydlig röd-tråd mot interoperabilitet i det smarta hemmet och IoT dras, och det är Software Defined Networking (SDN), vilket involverar mjukvarubaserad nätverkskommunikation. De mest tillämpliga lösningarna inom interoperabel kommunikation som sammanfattas i slutskedet ger erfarna användare, konsumenter och forskare en kartläggning i flertal lager mot hur tillämplig motsvarande lösning är mot ett interagerat trådlös baserat smarthem i respektive scenario.
108

Nätmobbningsdilemmat: en studie om hur nätmobbning kan hämmas med design på sociala plattformar

Fredriksson, Hampus, Chamoun, Daniel January 2021 (has links)
Nätmobbning är ett stort samhällsproblem som är svårt att eliminera. Vi har dedikerat studien till att ta reda på hur nätmobbning kan hämmas med hjälp av design av kommentarsfunktionen. Till skillnad från mobbning som sker på fysiska platser tar nätmobbning plats när som helst på dygnet. Sociala medier har lockat till miljontals användare vilket har förändrat människors beteenden, detta har fört med sig konsekvenser som nätmobbning, där ungdomar är de mest utsatta. Nätmobbning kan få förödande effekter på individers mentala hälsa och kan leda till bl.a. depression, ångest, sämre självförtroende och kan i vissa fall leda till självmord. Därför är det viktigt att hitta lösningar till detta samhällsproblem. Dagligen delar ett stort antal sociala plattformsanvändare aggressiva kommentarer. Med trakasserier och språk som kan uppfattas negativt kan informationen upplevas hatiskt, stötande och potentiellt skadlig. Genom en litteraturstudie identifierades fyra designprinciper; Designa för självbestämmande, Designa för empati, Designa för reflektion och Designa för helheten. Dessa designprinciper är framtagna för att hämma nätmobbning på sociala plattformar. Litteraturstudien identifierade även hur tidigare funktioner och tillvägagångssätt används för att förebygga nätmobbning. För att möjliggöra studien användes en kvalitativ designforskningsansats. Vid framtagandet av sex designförslag användes designprinciperna, tidigare funktioner och tillvägagångssätt som inspiration. Detta skapade möjligheten att utvärdera hur design kan hämma nätmobbning på sociala plattformar. Studien visar på att designen behöver konstrueras så att designen ger användarna utrymme för (a) reflektion över användarens handlingar, (b) emotionell koppling och (c) beteendeförändring. Med detta kan design skapas för att potentiellt hämma nätmobbning på social plattformar. / Cyberbullying is a major societal problem that is difficult to eliminate. We have dedicated the study to finding out how cyberbullying can be inhibited using the design of the comment function. Unlike bullying that takes place in physical places, cyberbullying takes place at any time of the day. Social media has attracted millions of users, which has changed people's behavior. This has brought consequences such as cyberbullying, where young people are the most vulnerable. Cyberbullying can have devastating effects on individuals' mental health and can lead to e.g. depression, anxiety, low self-esteem and can in some cases lead to suicide. Therefore, it is important to find solutions to this societal problem. On a daily basis, a large number of social platform users share aggressive comments. With harassment and language that can be seen negatively, the information can be perceived as hateful, offensive and potentially harmful. Through a literature study, four design principles were identified; Design for self-determination, Design for empathy, Design for reflection and Design for the whole. These design principles are developed to inhibit cyberbullying on social platforms. The literature study also identified how previous functions and means are used to prevent cyberbullying. To enable the study, a qualitative design research approach was used. In the development of six design proposals, the design principles, previous functions and approaches were used as inspiration. This created the opportunity to evaluate how design can inhibit cyberbullying on social platforms. The study shows that the design needs to be constructed so that the design gives users space for (a) reflection on the user's actions, (b) emotional connection and (b) behavior change. With this, designs can be created to potentially inhibit cyberbullying on social platforms.
109

Built-in software quality in Agile development

Saleh, Mehdi January 2020 (has links)
Abstract Waterfall and Agile are the two most popular software development methodologies. Waterfall as the traditional one, is a progressive method. The progress flows in one direction, and upon the completion of previous process. Agile is another software development methodology with more iterative approach and possible change of requirements; with incremental delivery. Agile introduces freedom to requirement change and iterative delivery. However, such a liberty should not disrate software quality. Especially in automotive industry that deals with human safety and security. In such an iterative environment, there is a higher risk to compromise on quality checks before each delivery, due to short intense lead times. There will not be enough time for intensive quality assurance activities after each iteration. The solution to downsize the intensive quality check after each iteration, is to improve development quality during the development and building quality into development processes. This is what we refer as “Built-in quality”; the quality that is built during software artefacts development on a continuous basis. This study conducted at Volvo Cars during Agile transformation time and the main objective was to connect and emphasize the importance of built-in quality in agile software development. In this study we look at existing challenges that decrease quality of software artifacts during the development. Thus, by prevailing those challenges we can improve the software quality during iteration delivery. Such an improvement decreases the amount of intensive quality check after each iteration. Additionally, we look at guidelines and tools that used by different development teams to improve software artifacts’ quality. We also investigate how quality assurance engineer can support builtin quality during agile transformation.
110

Erfarenhetens betydelse för den kreativa processen inom filmskapande

Pettersson, Magnus, Lundberg, Isak January 2020 (has links)
The purpose of this study is to increase the understanding of how experience affects the creative process in filmmaking and subsequently the result of the production. This has been done by observing workshops where participants made a movie, followed by qualitative interviews for further understanding of their creative process. To evaluate the movies a quantiative survey was sent to a potential audience. The conclusion was that experience affects the creative process through control and self-confidence by the actions that are made. We've also done the conclusion that experience have a big impact on continuity regarding visual storytelling.

Page generated in 0.1301 seconds