181 |
Using Artificial Intelligence to Verify Authorship of Anonymous Social Media PostsLagerholm, Filip January 2017 (has links)
The widespread use of social media, along with the possibilities to conceal one’s identity in the fibrillation of ubiquitous technology, combined with crime and terrorism becoming digitized, has increased the need of possibilities to find out who hides behind an anonymous alias. This report deals with authorship verification of posts written on Twitter, with the purpose of investigating whether it is possible to develop an auxiliary tool that can be used in crime investigation activities. The main research question in this report is whether a set of tweets written by an anonymous user can be matched to another set of tweets written by a known user, and, based on their linguistic styles, if it is possible to calculate a probability of whether the authors are the same. The report also examines the question of how linguistic styles can be extracted for use in an artificially intelligent classification, and how much data is needed to get adequate results. The subject matter is interesting as the work described in this report concerns a potential future scenario where digital crimes are difficult to investigate with traditional network-based tracking techniques. The approach to the problem is to evaluate traditional methods of feature extraction in natural language processing, and by classifying the features using a type of recurrent neural network called Long Short-Term Memory. While the best result in an experiment that was carried out achieved an accuracy of 93.32%, the overall results showed that the choice of representation, and amount of data used, is crucial. This thesis complements the existing knowledge as very short texts, in the form of social media posts, are in focus.
|
182 |
En undersökning av dagens trådlösa nätverk i skolmiljöÅkerlind, Klas January 2017 (has links)
I dagens samhälle är molntjänster något som blir alltmer populärt. Företag flyttar sina tjänster till molnet för att ha större tillgång till material och för att lättare hantera tillväxt. Samtidigt som molntjänster kan avlasta lokala tjänster på ett nätverk, så kan det även innebära en ökad internetanvändning. Det finns många faktorer att avväga vid en övergång till molntjänster såsom funktionalitet, kostnader, säkerhet med mera. Vårt arbete försöker beskriva vilka möjliga konsekvenser den ökade internetanvändningen kan få i ett nätverk. I vår studie undersöker vi en grundskola i Söderhamns kommun som ska börja använda molntjänster till hösten 2017. För att få en bättre uppfattning av vilka problem som kan uppstå i och med denna uppgradering, så studerar vi både nätverkets infrastruktur på skolan samt molntjänsternas tänkta användningsområde. Mängden nätverkstrafik som genereras på skolan mäts och jämförs med en annan skola som redan använder sig av molntjänster, och belastningen på trådlösa accesspunkter i skolan ses över. I detta fall kommer vi fram till att mängden användare som ansluter sig till internet via trådlösa accesspunkter i skolan överstiger rekommenderat antal samtidiga användare på vissa platser. Det finns även risk att trafikmängden ökar i nätverket, baserat på mätningar och statistik, beroende på den omfattning elever i mellanstadiet och nedåt använder internet och digitala läromedel.
|
183 |
Taktila hjälpmedel för hörselskadade inom musiken / Vibrotactile aid for the hearing impaired whitin musicPettersson, Sebastian, Palfi, Kristoffer January 2017 (has links)
No description available.
|
184 |
The Design and Implementation of a Subscription-Based E-shop That Is Easily Navigated and Visually Appealing to Its Users / Design och implementation av en prenumerationsbaserad e-shop som är lättnavigerad och visuellt tilltalande för dess användareErkén, Amanda, Cederblad, Cecilia, Saller, Christophe, Wahlström, Daniel, Odlinder Haubo, Erik, Lewenhaupt, Hugo, Hellström, Jesper, Wallin, Johan, Andreasson, Oscar January 2017 (has links)
The report presents a study of the design and implementation of a web application with the purpose of being easy to navigate and understand as well as inducing a positive attitude in its users. A pilot study and marketing plan acted as the foundation for the implementation of the application. The evaluation consisted of a Thinking aloud usability test as well as a user attitude test. An analysis of the results indicated a web application which fulfilled the demands that the research group affirmed and it was ultimately concluded that factors such as visual feedback, clarity in the purchasing process and fixed navbar were essential to achieve the aforementioned purpose. Lastly, it was also summarized that the research done was not extensive enough to be able to draw general conclusions regarding inducing positive attitudes.
|
185 |
Comparison of hardware firewalls in a network environmentElnerud, Albin January 2017 (has links)
Today’s market offers a wide range of available firewalls, there are many manufacturers andeach of them has at least several series of possible solutions. As organisations and companiesseek to protect their assets against current and new hostile threats, the demands for networksecurity increases and drives the development of firewalls forward. With new firewalltechnologies emerging from a wide variety of firewall vendors, choosing the right firewall canbe both costly and time consuming. Requirements for a concrete network are needed to becorrelated with security functionalities, i.e., metrics for firewalls. Incorrect requirementsformulation or their incorrect mapping to metrics can lead to a financial loss or a firewallfailure in providing desired security functionalities. In this thesis, firewalls from three differentmanufacturers are investigated. Firewalls are compared and evaluated by using requirementsderived for Eskilstuna municipals network. To identify solutions fulfilling the requirements,metrics related to the requirements are identified. Two different placements for firewalldeployment are considered separately, as they have different requirements. The firewallcomparison consists of two steps. The first step of the comparison is done by evaluatingfirewalls from each manufacturer separately. After the best suited firewall from eachmanufacturer has been identified, the second step in the comparison is performed. The steptwo consists of comparing the best solution from each manufacturer between each other. Theoutcome of the comparison is a firewall solution that fulfills all requirements and can beconsidered as optimal choice for the investigated network environment.
|
186 |
Design and evaluation of a system that coordinate clients to use the same server / Design och utvärdering av ett system som koordinerar klienter att använda samma server.Gustavsson, Per, Gavefalk, Erica January 2017 (has links)
This thesis present a system which examine when clients should select a new server to maximize the number of packets received with the fewest number of server selections. The ratio between the number of packets received and the number of server selections should therefore be as high as possible. To help minimize the number of server selections, the system should be adaptive if the conditions would change. We construct a server selection mechanism which guarantees agreement between clients when called upon by the system. Furthermore, four policies have been created for when the mechanism is to be called. The purpose of this is to find out when and how it is best to switch server and how they can adapt to varying connection failure rates between server and clients. We evaluate the system by running simulations concluding that the policy we call on demand is best, which calls the server selection mechanism when clients have no connection to the server. This policy is the best if the aim is to send as many packets as possible and that the server selection mechanism is called few times with adaption to varying connection failure rates. This would enable the system to provide information even if the conditions will change to the better or to the worse.
|
187 |
Using NLP and context for improved search result in specialized search enginesMartin, Carlstedt January 2017 (has links)
No description available.
|
188 |
Data Mining of Trouble Tickets for Automatic Action RecommendationLöfgren, Jonathan January 2017 (has links)
This work investigates the possibility of applying machine learning and data mining to the problem of finding solutions to software and hardware problems arising in telecommunication systems. Trouble ticket data is analyzed using traditional data mining techniques and more complex machine learning models, including neural networks, to find out which types of models are suitable for the task. Results show that there are relevant correlations in the data which enables the root cause to predicted with up to 90% accuracy in the case of the most common root cause, and up to 70% when classifying between up to 20 root causes. These predictive models could be used to assist the engineers by giving them probably suggestions for the root cause, and potentially save time in the troubleshooting process. Relatively simple data mining and linear models performed best which shows that this could be implemented in practice given that these methods are fast, robust, memory efficient and easy to implement. Neural networks were also investigated but gave no significant improvement in the results, athough there are indications that they could outperform linear models if more training data was available. A large fraction of the collected data could not be used for analysis because of missing values and other inconsistencies, which highlights the importance of defining standards for the data collection process. This would lead to higher quality data, and allow the trained models to be more general and perform well in multiple locations.
|
189 |
Implementation av begreppskartor med zoom och panorering för webb och surfplattor med hjälp av MeteorBrolund, Filip January 2017 (has links)
Forskargruppen Educational Technology Group med forskare från Linköpings och Lunds universitet jobbar på ett lärospel i historia för mellanstadiet. En av aktiviteterna i spelet är att skapa begreppskartor och denna aktivitet är i behov av en uppgradering för att kunna utmana eleverna på en svårare nivå. En högre nivå ska nås genom att eleverna får jobba med fler än en begreppskarta åt gången och varje begreppskarta ska få zoom- och panorerings-funktionalitet. Den här rapporten går igenom några olika sätt för att implementera zoom och panorering och avslutas med att implementera och utvärdera en lösning i flera iterationer. D3 visar sig vara ett JavaScriptbibliotek som har allt för att implementera begreppskartor med zoom och panorering, dessutom krävs inga Meteor-specifika funktionaliteter. Resultatet av denna studie går även att använda sig av för att implementera zoom och panorering till andra delar av sin applikation än begreppskartor. Vid testning med D3 visade webbläsarna Chrome, Firefox och Edge olika resulat vid touch-interaktioner. Chrome gav fullt stöd för alla touch-interaktionen. Firefox krävde dubbeltryck eller att man höll ner fingret en stund för att aktivera dragning av begrepp eller panorering. Vid vertikala dragningar för panorering kunde zoom aktiveras istället för panorering. I webbläsaren Edge fungerade inga touch-interaktioner. Scroll mellan begreppskartor och zoom och panorering i begreppskartorna blev en för avancerad interaktion för den tänkta användargruppen, elever på mellanstadiet. Att kunna visa en helhetsbild av alla begreppskartor tillsammans ansågs viktigare än att ha zoom och panorering. En bra kompromiss mellan helhetsbild och interaktions-yta blev att visa alla utom en begreppskarta som miniatyrer. Detta kunde implementeras med hjälp av javascriptbiblioteket interact.js och div-element.
|
190 |
Indoor Positioning System using Bluetooth Beacon TechnologyTorstensson, David January 2017 (has links)
No description available.
|
Page generated in 0.0518 seconds