• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 502
  • 310
  • 1
  • Tagged with
  • 813
  • 813
  • 813
  • 813
  • 813
  • 172
  • 170
  • 59
  • 51
  • 48
  • 42
  • 41
  • 36
  • 36
  • 33
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
461

Catching the Wave of Digitalization : Digital innovation at a local newspaper

Westbergh, Mårten, Gustafsson, Daniel January 2010 (has links)
<p>Several industries have been affected by digitalization over the last decade. Currently the world of printed media is experiencing numerous turbulent changes. Printed newspapers are increasing their presence online and starting to compete in digital channels. This makes for an interesting area of research. With this study we hope to create a greater understanding for how the newspaper industry is affected by digital technology. The theoretical framework of this study is based upon Christensen’s (2005) concept of disruptive technology as well as Yoo & Lyytinen et al. (2010) theories on digitalization and digital innovation. We conducted a case study at the local newspaper Alpha News. Five semi- structured interviews were performed with different employees with various distinct roles; all of them important to obtain an insight into the changes occurring at Alpha News. In our study we are able to identify several aspects of changes due to digitalization within Alpha News. The printed newspaper, for instance, faces a steady decline in subscription rates due to the readers increased reliance on digital alternatives for local news. Other shown effects of the digitalized business where also revealed. The pace of change, the use of technological aids, as well as the reader-relationship, all act as examples of these shown effects.</p>
462

Android vs iPhone : En jämförande studie i applikationsutveckling

Lust-Hed, Freddie, Hedin, Viktor January 2010 (has links)
<p>Datormobiler (<em>smartphones) </em>har blivit ett populärt fenomen bland mobilanvändare. Det har dykt upp ett flertal stora aktörer på marknaden och i takt med att fler <em>smartphones</em> har utvecklats har också intresset för applikationsutveckling blivit större. En av dessa aktörer är Apple som idag har en betydande marknadsandel efter lanseringen av iPhone. Dock har Google tillsammans med <em>Open Handset Alliance</em> blivit en betydande konkurrent med deras mobila plattform Android.</p><p>Syftet med denna uppsats är att göra en jämförande studie av applikationsutveckling för dessa plattformar. I detta ingår att undersöka plattformarnas programmeringsspråk med tillhörande aspekter, utvecklingsmiljöer, krav på utvecklaren och de ekonomiska aspekter som hör till utveckling och publicering. Denna studie genomförde vi genom att undersöka tillgänglig och aktuell litteratur och försäljningsstatistik. Vi använde även egna erfarenheter i applikations-utveckling på plattformen Android.</p><p>Vår undersökning visar att utveckling för iPhone är endast möjligt via företagets egna produkter. Detta är inte fallet med Android då det är mer valfritt vilken plattform man vill utveckla på. Båda programmeringsspråken är objektorienterade men har några märkbara skillnader. Båda plattformarna erbjuder en pedagogisk och lätthanterlig utvecklingsmiljö där man som utvecklare snabbt kan se resultat. Det är gratis att införskaffa nödvändiga programvaror och som utvecklare får man behålla större delen av intäkterna om man väljer att publicera sin applikation med ett pris i någon av applikationsbutikerna.</p><p>Vår slutsats är att plattformarna har fler likheter än olikheter när det gäller applikations-utveckling. En av skillnaderna är att utveckling på iPhone innebär att lära sig ett programmeringsspråk som används nästan exklusivt på Apples produkter och eventuellt betala en årlig avgift. I Androids fall används ett välspritt programmeringsspråk och enda kostnaden är en relativt liten engångssumma för publicering. I sin helhet kan man tolka skillnaden som att utveckling för iPhone innebär en stängd tillvaro, men fri från skadlig kod medan utveckling för Android är mer öppen som får till följd att den är mer osäker.</p>
463

Visual Compositional-Relational Programming

Zetterström, Andreas January 2010 (has links)
<p>In an ever faster changing environment, software developers not only need agile methods, but also agile programming paradigms and tools. A paradigm shift towards declarative programming has begun; a clear indication of this is Microsoft's substantial investment in functional programming. Moreover, several attempts have been made to enable visual programming. We believe that software development is ready for a new paradigm which goes beyond any existing declarative paradigm: visual compositional-relational programming. Compositional-relational programming (CRP) is a purely declarative paradigm -- making it suitable for a visual representation. All procedural aspects -- including the increasingly important issue of parallelization -- are removed from the programmer's consideration and handled in the underlying implementation. The foundation for CRP is a theory of higher-order combinatory logic programming developed by Hamfelt and Nilsson in the 1990's. This thesis proposes a model for visualizing compositional-relational programming. We show that the diagrams are isomorphic with the programs represented in textual form. Furthermore, we show that the model can be used to automatically generate code from diagrams, thus paving the way for a visual integrated development environment for CRP, where programming is performed by combining visual objects in a drag-and-drop fashion. At present, we implement CRP using Prolog. However, in future we foresee an implementation directly on one of the major object-oriented frameworks, e.g. the .NET platform, with the aim to finally launch relational programming into large-scale systems development.</p>
464

Arbetssimulator med Wii Remote : En guide till utveckling av en simulator

Gomez Ortega, Daniel, Djerf, Henrik January 2010 (has links)
<p>Detta är ett uppsats på D-nivå. I en tidigare kurs, inom vårat program Data- och Systemvetenskap, kom vi på en idé om hur man kan förbättra/komplettera utbildningen av nyanställda som befinner sig i en stressig arbetsplats på företag där det är ett ständigt behov av återanställning av personal. Vi utvecklade detta koncept och kom med idén till en simulator som kan utbilda personal samt minska stress hos nyanställda. Idén mognade till en Serious Game simulator baserad på en Wii-kontrollerad PC-baserad simulator med Bluetooth-stöd.Syftet med denna uppsats är att skapa en guide om grunderna i en simulator som utnyttjar Wii-kontroller som externa inmatningsenheter. I denna guide kommer vi att täcka hur Nintendos Wii-kontroll fungerar, hur man kan skapa enkla 3D-modeller i Blender och även hur detta kan implementeras i Microsoft XNA. Med denna guide som bas kommer vi också att visa hur vi utvecklat en prototyp med hjälp av ett designkoncept som utvecklats av våra kollegor Christopher Saarinen & Evin Antoniadis forskning. Detta examensarbete har resulterat i både en guide och en fungerande prototyp som implementerar de grundläggande delarna av våra kollegors designkoncept.</p> / <p>This is a thesis on D-level. In a previous course, at our program Computer Science, we came up with an idea of how to improve/complement training for new employees who are situated in a stressful workplace at companies who are in a constant need of rehiring. We developed this concept and came up with an idea for a simulator that could train staff as well as relieve stress and tension for new employees. The idea matured and became a Serious Game simulator based on a dual-wield Wii-controlled PC-based simulator with Bluetooth support. The aim of this thesis is to create a developer’s guide on the basis of a simulator with the use of Wii remotes as external input devices. In this guide we will cover how the Nintendo Wii Remote works, how to create simple 3D-models in Blender and also how this can be implemented in Microsoft XNA. With this guide as a base we will also show how we developed a prototype using a design concept developed through the research of our coworkers Christopher Saarinen & Evin Antoniadis. This thesis has resulted in both a guide and a working prototype that implement the basic elements of our coworkers’ design concept.</p> / Detta är ett projekt i två delar en teoretisk och en teknisk, den teoretiska är separat från denna och är skriven av Christopher Saarinen och Evin Antoniadis. / Simulerad interaktiv arbetsmiljö
465

External Data Incorporation into Data Warehouses

Strand, Mattias January 2005 (has links)
Most organizations are exposed to increasing competition and must be able to orient themselves in their environment. Therefore, they need comprehensive systems that are able to present a holistic view of the organization and its business. A data warehouse (DW) may support such tasks, due to its abilities to integrate and aggregate data from organizationally internal, as well as external sources and present the data in formats that support strategic and tactical decision-makers. Traditionally, DW development projects have focused on data originating from internal systems, whereas the benefits of data acquired external to the organization, i.e. external data, have been neglected. However, as it has become increasingly important to keep track of the competitive forces influencing an organization, external data is gaining more attention. Still, organizations are experiencing problems when incorporating external data and these hinder the organizations from exploiting the potential of external data and prevent them to achieving return on their investments. In addition, current literature fails to assist organizations in avoiding or solving common problems. Therefore, in order to support organizations in their external data incorporation initiatives, a set of guidelines have been developed and contextualized. The guidelines are also complemented with a state of practice description, as a means of taking one step towards a cohesive body of knowledge regarding external data incorporation into DWs. The development of the guidelines, as well as the establishment of a state of practice description, was based upon the material from two literature reviews and four interview studies. The interview studies were conducted with the most important stakeholders when incorporating external data, i.e. the user organizations (2 studies), the DW consultants, and the suppliers of the external data. Additionally, in order to further ground the guidelines, interviews with a second set of DW consultants were conducted.
466

A Systemic Approach Framework for Operational Risk : – SAFOR –

Kessler, Anna-Maria January 2007 (has links)
This thesis attempts to describe the essential systems features of a complex real-world domain of operational risk (OR) in banking, by employing general systems theory (GST) as the guiding method. An implementational framework (SAFOR) is presented for operational risk management (ORM), the target of which is to manage and mitigate the risk-around-loss causes. Since reasoning about OR is often scenario based, the framework also includes methods for decision making in addition to Value at Risk (VaR) and Conditional Value at Risk (CVaR). Other computational models that yield prediction intervals are discussed as well. Because the banking industry is one of the most mature sectors when it comes to OR, and contains the most data points, the discussion in this thesis evolves around such institutions. The present state-of-the-art in OR management for banking is surveyed using a systemic-holistic approach and the model framework is presented against this discussion. Tools and concepts from systems theory and systems thinking are employed for assessing systems properties and gaining insights into the interaction of various components. This brings about a number of advantages. This is not in disagreement with current suggestions such as those of the Basle Committee (Basel II), which is doing an excellent job in proving the state-of-the-art in best practice for banking institutions. Rather, this thesis offers a complementary perspective, looking at essentially the same problems but in a broader context and with a differing view. OR data has been hard to come by in banking. Confidentiality and difficulties in quantifying OR as well as the short time data has been gathered in a consistent way are some of the reasons for this. Therefore, no case study has been done. Instead, we have chosen to look into a published bank application of an advanced OR model. The application shows that the technique holds as validation of the SAFOR modules.
467

Analysis and Optimisation of Distributed Embedded Systems with Heterogeneous Scheduling Policies

Pop, Traian January 2007 (has links)
The growing amount and diversity of functions to be implemented by the current and future embedded applications (like, for example, in automotive electronics) have shown that, in many cases, time-triggered and event-triggered functions have to coexist on the computing nodes and to interact over the communication infrastructure. When time-triggered and event-triggered activities have to share the same processing node, a natural way for the execution support can be provided through a hierarchical scheduler. Similarly, when such heterogeneous applications are mapped over a distributed architecture, the communication infrastructure should allow for message exchange in both time-triggered and event-triggered manner in order to ensure a straightforward interconnection of heterogeneous components. This thesis studies aspects related to the analysis and design optimisation for safety-critical hard real-time applications running on hierarchically scheduled distributed embedded systems. It first provides the basis for the timing analysis of the activities in such a system, by carefully taking into consideration all the interferences that appear at run-time between the processes executed according to different scheduling policies. Moreover, due to the distributed nature of the architecture, message delays are also taken into consideration during the timing analysis. Once the schedulability analysis has been provided, the entire system can be optimised by adjusting its configuration parameters. In our work, the entire optimisation process is directed by the results from the timing analysis, with the goal that in the end the timing constraints of the application are satisfied. The analysis and design methodology proposed in the first part of the thesis is applied next on the particular category of distributed systems that use FlexRay as a communication protocol. We start by providing a schedulability analysis for messages transmitted over a FlexRay bus, and then by proposing a bus access optimisation algorithm that aims at improving the timing properties of the entire system. For all the problems that we investigated, we have carried out extensive experiments in order to measure the efficiency of the proposed solutions. The results have confirmed both the importance of the addressed aspects during system-level design, and the applicability of our techniques for analysing and optimising the studied systems.
468

Design for Recordkeeping: Areas of Improvement

Borglund, Erik A.M. January 2008 (has links)
This thesis is about problems related to design of information systems in which records are born and managed. The proactive approach has been derived from new archival theories suited for electronic recordkeeping, and implies that electronic records must, at the time of creation fulfil their current and future requirements. Information systems where records are born and managed should, based upon a proactive approach, meet recordkeeping requirements. This thesis is based upon a four-year research effort and consists of seven research articles that present the results of the research. The objective is to contribute to knowledge of design recommendations for information systems, in which records are born and managed. The main result of this thesis is identification of five areas that can affect and improve the design of information systems in which records are born and managed. First: A set of empirically and theoretical grounded characteristics of records are presented. Those characteristics have to be complemented with organization-defined characteristics. Second: this research has contributed a conceptualization of use of records and users of records. The notion of known use/user, and unknown use/user has been introduced. Design becomes difficult because requirements of unknown users are difficult to conceptualize. Third: The Recordkeeping Quality Assessment model (RQAM) is presented. The model implies a holistic quality approach to recordkeeping, and intends to be used as a basis for quality assessment, and as a reference model in design situations to achieve high recordkeeping quality. Fourth: Two dominant different views on records are presented. Private organizations appraise records principally upon business values, and public organisations base their appraisal criteria upon accountability and legislative values. The two views on records should be brought into one view and form a risk management-like appraisal. Fifth: Proactivity is a way of thinking and should be applied on several levels in the recordkeeping environment: to the electronic record, to the information system where the electronic record is born and managed, to the organization, and to the user. / Denna avhandling handlar om hur informationssystem skall designas, i vilka arkivinformation skapas och hanteras över tid. Modern arkivteori förordar en proaktiv ansats vid hantering av elektronisk arkivinformation. Proaktiviteten innebär att arkivinformationen senast vid sin tillkomst måste uppfylla arkivvetenskapliga krav. Det medför att design av informationssystem, i vilka arkivinformation skapas och hanteras måste uppfylla arkivvetenskapliga krav och följa en proaktiv ansats. Denna avhandling är ett resultat av fyra års forskning och består av sju vetenskapliga artiklar, vilka utgör avhandlingens resultat. Syftet med avhandlingen har att bidra med ny kunskap till hur informationssystem, i vilka arkivinformation skapas och hanteras över tid, skall designas. Avhandlingens huvudsakliga resultat är fem områden som alla kan påverka och förbättra design av sådana informationssystem. 1. Ett antal karaktäriska egenskaper hos arkivinformation har identifierats utifrån både teori och empiri. Dessa har visats sig behöva kompletteras med organisationsspecifika karaktäristiska egenskaper. 2. Begreppen användare av arkivinformation och användning av arkivinformation har konceptualiserats. Begreppet känd och okänd användare/användning av arkivinformation har introducerats. Design för okända användare är en svår utmaning, bland annat då krav från okända användare är svåra att fånga. 3. En kvalitetsmodell (RQAM) är presenterad som anger att kvalitet kring hantering av arkivinformation måste ske med en holistisk ansats. Modellen skall kunna användas som en hjälp vid kvalitetsmätning, men även som en referensmodell vid design av informationssystem. 4. Två dominerade värderingsperspektiv har identifierats avseende arkivinformation. Privata organisationer värderar arkivinformation mestadels utifrån ett verksamhetsvärde, medan offentliga organisationer värderar arkivinformationen mestadels baserat på legala krav och ansvarsspårbarhet. 5. Den proaktiva ansatsen skall ses som ett strategiskt angreppssätt på hantering av elektronisk arkivinformation. Den skall användas i flera nivåer av hantering av arkivinformation, på arkivinformationsnivå, informationssystemsnivå, organisationsnivå och på användarnivå.
469

Access Barriers - from a user´s point of view

Nilsson, Olof January 2005 (has links)
Abstract The aim of this thesis is to suggest a model to assist in the ability to judge access by private persons to Information Technology, IT, and to Public Information Sys-tems, PIS. It has its starting point in the Swedish Government´s endeavour to turn Sweden into the first information society for all. When the available statistics con-cerning the access to a PC and the Internet in Swedish homes are studied it is easy to think that this vision may soon be realised. Of course, access to the technical equipment is a fundamental condition in order to be able to use the Public Informa-tion Systems, but unfortunately, is not the only one. A number of studies have shown that it is not possible to equate possession and use. A number of access models or frameworks designed to judge whether or not a person has access to the ICTs do exist. However, it is my opinion that there is a de-ficiency in these models; they do not start out from the individual user´s prerequi-sites, but rather judge the external conditions available for possible access. Assisted by four empirical studies, interviews and questionnaires, a number of ac-cess barriers experienced by the users have been identified. The studies show that in addition to the technological hindrances, a series of more elusive ones also exist originating from prevailing norms and values in the environment the user lives in. The barriers are categorised into five groups; to have, to be able, to will, to may and to dare. Together these notions form the User Centred Access Model, UCAM, which is suggested for use in charting and communicating the necessary considera-tions that must be taken into account in the development of Public Information Sys-tems. KeywordsLanguage / PI - Publika Informationssystem
470

Traffic Analysis, Modeling and Their Applications in Energy-Constrained Wireless Sensor Networks : On Network Optimization and Anomaly Detection

Wang, Qinghua January 2010 (has links)
Wireless sensor network (WSN) has emerged as a promising technology thanks to the recent advances in electronics, networking, and information processing. A wide range of WSN applications have been proposed such as habitat monitoring, environmental observations and forecasting systems, health monitoring, etc. In these applications, many low power and inexpensive sensor nodes are deployed in a vast space to cooperate as a network. Although WSN is a promising technology, there is still a great deal of additional research required before it finally becomes a mature technology. This dissertation concentrates on three factors which are holding back the development of WSNs. Firstly, there is a lack of traffic analysis &amp; modeling for WSNs. Secondly, network optimization for WSNs needs more investigation. Thirdly, the development of anomaly detection techniques for WSNs remains a seldomly touched area. In the field of traffic analysis &amp; modeling for WSNs, this dissertation presents several ways of modeling different aspects relating to WSN traffic, including the modeling of sequence relations among arriving packets, the modeling of a data traffic arrival process for an event-driven WSN, and the modeling of a traffic load distribution for a symmetric dense WSN. These research results enrich the current understanding regarding the traffic dynamics within WSNs, and provide a basis for further work on network optimization and anomaly detection for WSNs. In the field of network optimization for WSNs, this dissertation presents network optimization models from which network performance bounds can be derived. This dissertation also investigates network performances constrained by the energy resources available in an indentified bottleneck zone. For a symmetric dense WSN, an optimal energy allocation scheme is proposed to minimize the energy waste due to the uneven energy drain among sensor nodes. By modeling the interrelationships among communication traffic, energy consumption and WSN performances, these presented results have efficiently integrated the knowledge on WSN traffic dynamics into the field of network optimization for WSNs. Finally, in the field of anomaly detection for WSNs, this dissertation uses two examples to demonstrate the feasibility and the ease of detecting sensor network anomalies through the analysis of network traffic. The presented results will serve as an inspiration for the research community to develop more secure and more fault-tolerant WSNs. / STC

Page generated in 0.0941 seconds