Endre søk
Begrens søket
1234567 101 - 150 of 11921
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 101.
    Agnihotri, Mohit Kumar
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Energy efficient topology formation for Bluetooth mesh networks using heterogeneous devices2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Internet of things (IoT) is the latest trend in our living spaces allowing machine to machine (M2M) communications at the extensive scale. To enable massive M2M communication and portable devices to run on limited power supplies for the extended duration of time, low-cost energy efficient wireless technologies are needed. Among the many competing technologies including Wi-Fi, Bluetooth has shown the potential to be one of the strong candidates to act as the connectivity solution for the IoT especially after the introduction of Bluetooth Low Energy (BLE). Nowadays BLE is one of the biggest players in the market of short-range wireless technologies. By 2020, nearly 30 billion BLE devices in the form of mobile phones, tablets, sports utilities, sensors, security systems and health monitors are expected to be shipped. This proliferation of low-cost devices may for the first time actualize the vision of IoT.

    This thesis studies various mesh topology formation techniques that can be used to aid the development of large-scale networks in capillary networks focusing on BLE. In particular, the thesis focuses on how mesh networks can be established over BLE communications especially exploiting the heterogeneous characteristics of the devices. A novel algorithm is proposed called Topology Formation considering Role Suitability (TFRS) to maximize the network lifetime. The algorithm uses a newly introduced metric called role suitability metric (RSM) to assign the best role among master, relay and slave to a device. The RSM metric bases its decision on various device characteristics including, but not limited to, energy, mobility, and computational capability. We use the system-level simulation to evaluate the performance of the proposed algorithm against a reference under homogeneous deployment scenario consisting of heterogeneous devices.

    Results show that the network lifetime can be improved significantly when the topology is formed considering the device characteristics for both master role selection and relay selection. TFRS can achieve moderate improvements ranging from 20% to 40% varying on the deployment characteristics over the reference case.

  • 102.
    Aguilar, Xavier
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), High Performance Computing and Visualization (HPCViz).
    Fuerlinger, Karl
    Laure, Erwin
    KTH, Skolan för datavetenskap och kommunikation (CSC), High Performance Computing and Visualization (HPCViz).
    Automatic On-Line Detection of MPI Application Structure with Event Flow Graphs2015Inngår i: EURO-PAR 2015: PARALLEL PROCESSING, Springer Berlin/Heidelberg, 2015, s. 70-81Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The deployment of larger and larger HPC systems challenges the scalability of both applications and analysis tools. Performance analysis toolsets provide users with means to spot bottlenecks in their applications by either collecting aggregated statistics or generating loss-less time-stamped traces. While obtaining detailed trace information is the best method to examine the behavior of an application in detail, it is infeasible at extreme scales due to the huge volume of data generated. In this context, knowing the application structure, and particularly the nesting of loops in iterative applications is of great importance as it allows, among other things, to reduce the amount of data collected by focusing on important sections of the code. In this paper we demonstrate how the loop nesting structure of an MPI application can be extracted on-line from its event flow graph without the need of any explicit source code instrumentation. We show how this knowledge on the application structure can be used to compute postmortem statistics as well as to reduce the amount of redundant data collected. To that end, we present a usage scenario where this structure information is utilized on-line (while the application runs) to intelligently collect fine-grained data for only a few iterations of an application, considerably reducing the amount of data gathered.

  • 103.
    Aguilar, Xavier
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Schliephake, Michael
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Vahtras, Olav
    KTH, Skolan för bioteknologi (BIO), Teoretisk kemi och biologi. KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Gimenez, Judit
    Barcelona Supercomputing Center, Universitat Politecnica de Catalunya, Barcelona, Spain.
    Laure, Erwin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Scaling Dalton, a molecular electronic structure program2011Inngår i: Seventh International Conference on e-Science, e-Science 2011, 5-8 December 2011, Stockholm, Sweden, IEEE conference proceedings, 2011, s. 256-262Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Dalton is a molecular electronic structure program featuring common methods of computational chemistry that are based on pure quantum mechanics (QM) as well as hybrid quantum mechanics/molecular mechanics (QM/MM). It is specialized and has a leading position in calculation of molecular properties with a large world-wide user community (over 2000 licenses issued). In this paper, we present a characterization and performance optimization of Dalton that increases the scalability and parallel efficiency of the application. We also propose asolution that helps to avoid the master/worker design of Daltonto become a performance bottleneck for larger process numbers and increase the parallel efficiency.

  • 104.
    Aguirre Quiroz, Gerardo Daniel
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Evaluation of the potential benefits of using Licensed Shared Access in the Americas2014Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Internet has become an ubiquitous service and human need. Mobile networks have been struggling with the "Mobile Data Tsunami", an increase in mobile broadband consumption due to faster networks, powerful devices and more traffic-demandingapplications, as well as a higher penetration volume. According to Cisco mobile data traffic is expected to grow to 15.9 exabytes per month by 2018, that is almost eleven times the mobile data traffic of 2013.

    Spectrum is a key factor for network deployments, since it determines the capacity of the network. Nonetheless, spectrum is a limited natural resource, i.e. a finite, non-exhaustible common resource. In order to fulfill the high performance targets of future mobile broadband (MBB) systems, a more efficient use and more effective management of spectrum resources have to be developed.

    Licensed Shared Access is a new complementary spectrum access scheme that allows for the sharing of partially used licensed spectrum from an incumbent (e.g. a government organization), by a limited number of “LSA licensees” (e.g. Mobile Network Operators). The LSA agreement follows pre-defined dynamic or static sharing conditions, that determine where, when and how to use the incumbent’s spectrum.

    The implementation of Licensed Shared Access needs the support of a very good regulatory framework and follow the harmonized spectrum pathway. Spectral harmonization, or the uniform allocation of frequency bands across entire region lowers the technology costs, making it easier for any country to consider its implementation. Once adpoted throughout the regions, economies of scale are achieved.

    Some first steps towards a new framework based on LSA have been given in Europe and North America, however to consider LSA as a real option, a complete analysis considering more markets is needed. It is crucial to consider how other regions around the world can be affected by this new approach in order to see if LSA is a viable option or not.

    The approach taken in this research covers the interrelations between technical, market and regulatory conditions in the Americas in order to present the possible value of LSA. The first part of the study deals with the analysis of the technical aspects of LSA. The following parts deal with under what conditions the evaluation is made. First, the study deals with the market conditions found in the Americas as a whole, to then deal with a more specific study of the market and regulatory conditions of selected countries in the region.

    The research showed how there are several ways LSA can bring positive value to established and emerging actors in the Americas, specially in high traffic areas, and/or indoor environments. However, and despite the advantages of LSA, the timing is not there yet. The region still has plenty of spectrum to be allocated as exclusive spectrum, which is preferred by operators. The low mobile broadband penetration in most of the region is also a factor for the low value of LSA in the time of this study.

  • 105.
    Agüero, Ramón
    et al.
    University of Cantabria, Spain.
    Berg, Miguel
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Choque, Johnny
    University of Cantabria, Spain.
    Hultell, Johan
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Jennen, Ralf
    RWTH Aachen University, Germany.
    Markendahl, Jan
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Muñoz, Luis
    University of Cantabria, Spain.
    Prytz, Mikael
    Ericsson Research.
    Strandberg, Ove
    Nokia, Finland.
    RRM Challenges for Non-Conventional and Low-Cost Networks in Ambient Networks2005Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper presents an overview of the Radio Resource Management (RRM) functionalities needed for Non-Conventional and Low-Cost Networks. These types of networks are characterized by increased cooperation between different types of networks and providers and they are believed to play a fundamental role for future wireless network networking. The paper describes three specific concepts, which latter is used to identify new RRM challenges. In addition, it identifies the relation between the RRM challenges and the Ambient Networks architecture and functionalities, in particular the multiradio resource management functionality.

  • 106.
    Ahlberg, Ernst
    et al.
    Predictive Compound ADME & Safety, Drug Safety & Metabolism, AstraZeneca IMED Biotech Unit, Mölndal, Sweden.
    Winiwarter, Susanne
    Predictive Compound ADME & Safety, Drug Safety & Metabolism, AstraZeneca IMED Biotech Unit, Mölndal, Sweden.
    Boström, Henrik
    Department of Computer and Systems Sciences, Stockholm University, Sweden.
    Linusson, Henrik
    Department of Information Technology, University of Borås, Sweden.
    Löfström, Tuve
    Högskolan i Jönköping, JTH. Forskningsmiljö Datavetenskap och informatik.
    Norinder, Ulf
    Swetox, Karolinska Institutet, Unit of Toxicology Sciences, Sweden.
    Johansson, Ulf
    Högskolan i Jönköping, JTH, Datateknik och informatik.
    Engkvist, Ola
    External Sciences, Discovery Sciences, AstraZeneca IMED Biotech Unit, Mölndal, Sweden.
    Hammar, Oscar
    Quantitative Biology, Discovery Sciences, AstraZeneca IMED Biotech Unit, Mölndal, Sweden.
    Bendtsen, Claus
    Quantitative Biology, Discovery Sciences, AstraZeneca IMED Biotech Unit, Cambridge, UK.
    Carlsson, Lars
    Quantitative Biology, Discovery Sciences, AstraZeneca IMED Biotech Unit, Mölndal, Sweden.
    Using conformal prediction to prioritize compound synthesis in drug discovery2017Inngår i: Proceedings of Machine Learning Research: Volume 60: Conformal and Probabilistic Prediction and Applications, 13-16 June 2017, Stockholm, Sweden / [ed] Alex Gammerman, Vladimir Vovk, Zhiyuan Luo, and Harris Papadopoulos, 2017, s. 174-184Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The choice of how much money and resources to spend to understand certain problems is of high interest in many areas. This work illustrates how computational models can be more tightly coupled with experiments to generate decision data at lower cost without reducing the quality of the decision. Several different strategies are explored to illustrate the trade off between lowering costs and quality in decisions.

    AUC is used as a performance metric and the number of objects that can be learnt from is constrained. Some of the strategies described reach AUC values over 0.9 and outperforms strategies that are more random. The strategies that use conformal predictor p-values show varying results, although some are top performing.

    The application studied is taken from the drug discovery process. In the early stages of this process compounds, that potentially could become marketed drugs, are being routinely tested in experimental assays to understand the distribution and interactions in humans.

  • 107.
    Ahlberg, Michael
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Vlassov, Vladimir
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Yasui, Terumasa
    Advanced Technology Research and Development Center, Mitsubishi Electric Corporation, Amagasaki, Japan.
    Router placement in wireless sensor networks2006Inngår i: 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems, Vols 1 and 2, IEEE , 2006, s. 498-501Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper we propose and evaluate algorithms for placement of routers in a wireless sensor network. There are two major requirements on router placement First, a placement must guarantee connectivity, i.e. every sensor must be able to communicate through routers with a predefined computer-connected gateway node. Second, a placement must provide robust communication in the case of router failures. This is achieved by placing redundant routers that increase the number of possible routes. Both requirements should be met by placing as few routers as possible. The proposed algorithms compute placement in an efficient and reasonably fast way.

  • 108.
    Ahlenius, Camilla
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Tengvall, Tove
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Notisers påverkan på mobilanvändning2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Den bärbara teknikens snabba utveckling och integration i våra liv har gett upphov till en diskussion rörande teknikens negativa konsekvenser. Tidigare forskning har visat på en korrelation mellan en stor mobilanvändning och ett sämre välmående, och inom populärkulturen syns nya fenomen som digital detox och att nedgradera sin smartphone till en telefon med färre funktioner. Trots det verkar trenden tyda på att mobilanvändandet ökar. Genom konstanta aviseringar i form av korta texter innehållande olika budskap och information, s.k. notiser, kallar mobilen ofta på ens uppmärksamhet. Den här studien syftar till att undersöka hur notiserna påverkar mobilanvändningen och om det finns ett samband mellan mängden notiser som når användarna och deras övergripande mobilanvändning. För att besvara frågeställningen genomfördes strukturerade observationer av användares opåverkade mobilanvändning samt hur användningen förändrades när de inte längre nåddes av notiser. Observationerna följdes av enkäter för att ge resultatet ett kvalitativt komplement.

    Resultatet visade att det totala antalet skärmupplåsningar minskade medan tiden tillbringad med mobilen ökade, vilket leder till slutsatsen att då användaren nås av färre notiser blir användningssessionerna färre i antal men längre i varaktighet. Samtidigt verkade kontrollerandet av låsskärmen, d.v.s. att man väcker skärmen utan att låsa upp den, ha blivit mer frekvent. Detta för att se till att man inte missat viktig information, och då särskilt att ha missat att någon har försökt få tag på en. En absolut majoritet av deltagarna upplevde det som besvärande att inte kunna nås av notiser, och det gällde uteslutande notiser från kommunikationsapplikationer. Användarens egen inställning till notiser tycktes inte ha ett samband med hur mobilanvändningen påverkades.

  • 109. Ahlgren, B.
    et al.
    Hidell, Markus
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Network Systems Laboratory (NS Lab).
    Ngai, E. C. -H
    Internet of Things for Smart Cities: Interoperability and Open Data2016Inngår i: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 20, nr 6, s. 52-56, artikkel-id 7781549Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The Internet of Things (IoT) has become a promising technology for addressing societal challenges by connecting smart devices and leveraging Big Data analytics to create smart cities worldwide. As the IoT scales up, it's important to provide interoperability among different devices. Yet current simple standard protocols lack sufficient openness and interoperability. IoT for smart cities needs to guarantee the accessibility of open data and cloud services to allow industries and citizens to develop new services and applications. Here, the authors provide a case study of the GreenIoT platform in Uppsala, Sweden, to demonstrate the idea of interoperability and open data for smart cities.

  • 110.
    Ahlgren, Joel
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Mikkola, Mattias
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Net Voting – Designing an Online Voting System.2011Independent thesis Advanced level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    We are currently in a time where old routines and ways are being converted to more easily accessible, digital ways. You can perform your bank errands and interact with authorities through the Internet. While many of our societies functions already have undergone this transformation, our elections are still very manual. In our report we present what we think are the biggest obstacles to implementing a net voting system in Sweden, how to solve these issues and present a system which we feel would be a good start to designing The Ultimate Net Voting System. We touch upon areas like authenticating voters, protecting their right to anonymous voting in sending and storing votes and ways to protect against attacks against this system. In the end, we present an abstract level of a system design which could begin to fulfill all requirements to make net voting a feasible solution.

  • 111.
    Ahlgren, Joel
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign.
    Mikkola, Mattias
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign.
    Net Voting – Designing an Online Voting System.2011Independent thesis Advanced level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    We are currently in a time where old routines and ways are being converted to more easily accessible, digital ways. You can perform your bank errands and interact with authorities through the Internet. While many of our societies functions already have undergone this transformation, our elections are still very manual. In our report we present what we think are the biggest obstacles to implementing a net voting system in Sweden, how to solve these issues and present a system which we feel would be a good start to designing The Ultimate Net Voting System. We touch upon areas like authenticating voters, protecting their right to anonymous voting in sending and storing votes and ways to protect against attacks against this system. In the end, we present an abstract level of a system design which could begin to fulfill all requirements to make net voting a feasible solution.

  • 112.
    Ahlgren, Lucas
    et al.
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Marin Puentes, Angie Melissa
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Livsmedelshandel i webbutiker: En tillgänglighetsundersökning med WCAG 2.02018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Undersökningen ämnar utreda och utvärdera hur tillgängligheten är i svenska webbutiker för livsmedel. Detta med syftet att upplysa livsmedelsbranschen kring om hur tillgänglighet prioriteras idag, för att på så sätt bidra till att diskussionen kring ämnet blir mer aktiv. Undersökningen innefattade sju svenska livsmedelsbutiker på webben: Ica, Coop, Mat.se, Mathem.se, Willys, Hemköp och City Gross. I varje webbutik utvärderades tillgängligheten på tre webbsidor: startsidan, produktsidan för Arla 1 liter mellanmjölk samt kassan. Utgångspunkten för att utvärdera tillgängligheten på dessa webbsidor var webbstandarden WCAG 2.0, som är den rekommenderade standarden från W3C för att utvärdera tillgänglighet på webben. Undersökningen utfördes med hjälp av utvärderingsverktyg AChecker samt manuella utvärderingar. Resultatet visade att det skiljer mycket mellan olika webbutiker vad gällande tillgängligheten enligt tillgänglighetsstandarden WCAG 2.0. Gemensamt för alla webbutiker var att ingen av dessa uppfyllde den lägsta nivån för WCAG 2.0, nivå A. City Gross bröt mot flest riktlinjer medan Willys bröt mot minst antal riktlinjer i WCAG 2.0. Detta tyder på att tillgängligheten inte prioriteras i dessa webbutiker för livsmedel.

  • 113.
    Ahlgren, Per
    et al.
    KTH, Skolan för teknikvetenskaplig kommunikation och lärande (ECE).
    Colliander, C.
    Sjögårde, Peter
    KTH, Skolan för teknikvetenskaplig kommunikation och lärande (ECE). Department of ALM, Uppsala University, Uppsala, Sweden.
    Exploring the relation between referencing practices and citation impact: A large-scale study based on Web of Science data2018Inngår i: Journal of the Association for Information Science and Technology, ISSN 2330-1635, E-ISSN 2330-1643, Vol. 69, nr 5, s. 728-743Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this large-scale contribution, we deal with the relationship between properties of cited references of Web of Science articles and the field normalized citation rate of these articles. Using nearly 1 million articles, and three classification systems with different levels of granularity, we study the effects of number of cited references, share of references covered by Web of Science, mean age of references and mean citation rate of references on field normalized citation rate. To expose the relationship between the predictor variables and the response variable, we use quantile regression. We found that a higher number of references, a higher share of references to publications within Web of Science and references to more recent publications correlate with citation impact. A correlation was observed even when normalization was done with a finely grained classification system. The predictor variables affected citation impact to a larger extent at higher quantile levels. Regarding the relative importance of the predictor variables, citation impact of the cited references was in general the least important variable. Number of cited references carried most of the importance for both low and medium quantile levels, but this importance was lessened at the highest considered level.

  • 114.
    Ahlin, Lars
    et al.
    Swedish Defence Research Agency (FOI).
    Englund, Eva
    FOI.
    Jönsson, Christian
    FOI.
    Söderquist, Ingrid
    FOI.
    Zander, Jens
    KTH, Tidigare Institutioner, Signaler, sensorer och system.
    Maguire Jr., Gerald Q.
    KTH, Tidigare Institutioner, Teleinformatik.
    Automous Tactical Communications Possibilities and Problems1997Inngår i: MILCOM 97 Proceedings, 1997, s. 393-397Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In the battlefield of the future, more and more information will be available for making decisions on a tactical level, provided that this information can be dispersed rapidly and accurately. As a consequence, advanced tactical decision support that now is limited to advanced platforms (e.g. combat aircrafts) will become available at a much lower level, ranging from different kinds of vehicles, down to the individual soldier by means of ultra-light weight ``wearable'' equipment.

    Establishing reliable wireless communications in such a large group of users with unprecidented bandwidth demands and requirements on survivability constitutes a considerable enginerring challenge. In the paper we will, after a short review of some existing approaches, investigate the specific engineering challenges and the fundamental limitations of such low level, autonomous communication systems. Further we give an example of a system architecture, harmonized with a proposed structure for third generation commercial wireless systems (e.g. UMTS). Our conclusions show that mainly distributed computing complexity, device power consumption and available bandwidth constitute the fundamental problems.

  • 115.
    Ahlin, Lars
    et al.
    Swedish Defence Research Agency (FOI).
    Zander, Jens
    KTH, Tidigare Institutioner                               , Signaler, sensorer och system.
    Automous tactical communication: problems & possibilities1996Konferansepaper (Fagfellevurdert)
    Abstract [en]

    On the battlefield of the future, more and more information will be available for making decisions on a tactical level, provided that this information can be dispersed rapidly and accurately. Sophisticated electronic equipment for communication, information processing and for collection of sensor data are becoming light-weight, small and inexpensive. As a consequence, advanced tactical decision support that now is limited to advanced platforms (e.g. combat aircrafts) will become available at a much lower level, maybe down to the individual soldier. In such a scenario, the number of communicating entities is one or several orders of magnitude larger than in todays tactical systems. Establishing reliable wireless communications in such a large group constitutes a considerable engineering challenge. In this paper we investigate the specific engineering challenges and the fundamental limitations of such low level, autonomous communication systems. Our conclusions are that mainly distributed computing complexity, device power consumption and available bandwidth constitute the fundamental problems.

  • 116.
    Ahlqvist, Oscar
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Åkermark, Wilhelm
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Examining the Implications of Adding Sentiment Analysis when Clustering based on Party Affiliation through Twitter2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Political discussion is very common and a popular statistic for the politically interested are the surveys determining people’s party affiliation. Today they are done manually but it would be beneficial if there was an automated method which could produce the same or similar results. On the social network Twitter there are a lot of users discussing politics, all from political leaders and representatives to just regular people with an interest for the subject. Because of that and also for its convenience when it comes to collecting data, Twitter has been used before in previous work to cluster political users based on what they are discussing. What has not been done before which this thesis contributes is clustering with sentiment analysis. In other terms, trying to cluster people based on what they are discussing but also if their opinion is positive or negative. What was noted in this work was that the part of clustering without sentiment analysis, that had been done in previous studies, was successfully replicated. However adding the sentiment analysis did not give the desired effect and only worsened the results.

  • 117.
    Ahlstrand, Rebecca
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Xu, Annie
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Guidelines to improve teamwork in software projects2015Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    In consulting firms one of the goals is to have the consultants on an assignment with an external client to bring in capital. In some consulting firms, when the consultants are not on an assignment with a client, they work on internal projects until a new assignment arrives. Since most of the team members do not work for more than a few days or weeks on the projects, it leads to a high team member turnover. In projects with such a turnover, problems such as hasty handovers, unclear roles and responsibilities and low-quality documentation may occur.

    The purpose of this thesis was to create guidelines to improve teamwork in teams with a high team member turnover. This thesis was based on a case study of a company specializing in information technology and management consulting. To begin to tackle this problem, a literature review was conducted and the data was collected by conducting interviews. The interviews were performed with team members that had been on a project for the longest and shortest period of time in order to identify problems from different perspectives.

    Based on the interviews and the literature study, guidelines were created to counteract the problems experienced in this type of volatile teams. The guidelines are categorized in four areas: processes, resources, people and long-term perspective. The areas cover the problems experienced and can be ultimately implemented in all teams with high team member turnover to improve teamwork in software projects.

  • 118.
    Ahlström, Marcus
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Medieteknik och interaktionsdesign, MID.
    Broadening the Reading Experience on Mobile Devices using Tilt-based Input: An Explorative Design Study2018Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This thesis is an explorative study aimed at the possibility of integrating tilt-based input to improve the reading experience on smartphones. Previous works from the early 2000s have been skeptical towards tilt-based navigation, deeming it unruly and imprecise. To investigate if today’s technology has unlocked new possibilities; two experimental reading methods were designed, created and tested iteratively on 20, respectively 18 participants. The first method is a reassessment of tilt-based auto-scrolling and the second is a novel approach comparable to tilt-based paging. Data from the reading sessions were collected quantitatively in tandem with qualitative data from post-session interviews. The results indicate good potential and a reading performance similar to the standard navigation method. The importance of accommodating people with different reading behaviours was also discussed.

  • 119.
    Ahltorp, Magnus
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    A Personalizable Reading Aid for Second Language Learners of Japanese.2012Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Magnus Ahltorp

    A Personalizable Reading Aid for Second Language Learners of Japanese

    Second language learners of Japanese today have access to vast amounts of authentic Japanese text, audio and video material. A challenge that the Japanese learner faces though, is that the process of looking up words in a dictionary is prohibitively slow. In this thesis, I describe a personalizable system that helps the user read Japanese text by providing pronunciation information and English explanations at the user's request. I also describe the user-centered development of the system and the results of each iteration of user testing. The resulting system and user testing show that it is feasible to provide an immersive reading experience that both beginners and more advanced language learners can use to take command of a crucial part of their own learning.

  • 120.
    Ahltorp, Magnus
    et al.
    KTH.
    Skeppstedt, M.
    Dalianis, H.
    Kvist, M.
    Using text prediction for facilitating input and improving readability of clinical text2013Inngår i: Studies in Health Technology and Informatics, IOS Press, 2013, nr 1-2, s. 1149-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Text prediction has the potential for facilitating and speeding up the documentation work within health care, making it possible for health personnel to allocate less time to documentation and more time to patient care. It also offers a way to produce clinical text with fewer misspellings and abbreviations, increasing readability. We have explored how text prediction can be used for input of clinical text, and how the specific challenges of text prediction in this domain can be addressed. A text prediction prototype was constructed using data from a medical journal and from medical terminologies. This prototype achieved keystroke savings of 26% when evaluated on texts mimicking authentic clinical text. The results are encouraging, indicating that there are feasible methods for text prediction in the clinical domain.

  • 121.
    Ahmad, Bilal
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    ID-REPLICATION FOR PEER-TO-PEER SYSTEMS2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Replication provides fault-­tolerance in distributed systems. This thesis presents ID-­replication, which is a new replication scheme for structured overlays. We first discuss the shortcomings of existing replication schemes and show how ID-­replication does not suffer from many of these issues. We present a detailed design, algorithmic specification and evaluation of ID-­replication.

    ID-replication is less sensitive to churn which makes it better suited for building consistent services on top of it and for working in asynchronous networks where inaccurate failure detections are a norm. ID­‐replication does not require requests to go through a particular replica before forwarding them to another node for processing and thus does not suffer from the bottleneck. ID-­‐replication provides variable replication degree, which makes it suitable for systems which need to provide extra backup for more critical data. It also makes the system easily handle hotspots/popular and is easier to load balance.

    We evaluate ID­‐replication and provide a comprehensive comparison of ID-­replication with SL-­replication, which is among the most popular replication scheme in use today.

  • 122.
    Ahmad, Mirwary
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Kaur, Birgeet
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Sustainability Aspects in ICT Engineering Thesis Works2016Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    An evaluation of thesis reports performed by students from the degree programme Computer Engineering, TIDAB, that was made by UKÄ, The Swedish Higher Education Authority, showed that there was a lack of consideration of environmental and sustainability aspects in the thesis reports, leading to many students not meeting the criteria in the degree objectives regarding this aspect. The purpose of this bachelor thesis is to improve students’ ability in considering the important aspects of sustainability in their thesis works, by providing them with guidelines which they can follow and implement during their thesis work that will enable them to reach the level ‘Very High Quality’.

    A literature study was performed thoroughly in conjunction with reviewing previous thesis reports and conducting expert interviews as an approach to find a solution to the problem.

    The outcome of the analysis was three methods that was developed, which the students can use as guidelines in their thesis work. A set of guidelines, a table with skill sets and the SEMAT Essence Kernel card for sustainable development was the resulting methods that will help the students to at minimum accomplish the criteria for ‘High Quality’ on the objective "Demonstrate an understanding of technology capabilities and limitations, its role in society and people’s responsibility for its use, including social and economic aspects, environmental and safety aspects" when the methods are followed.

  • 123.
    Ahmad, Rezgar
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Con curdino – Utökning av tvärflöjtens tonförråd till kvartstoner genom perturbation av tonhålens geometri.2011Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    The thesis describes the development and evaluation of a component ('kurdin') that provides flutists the opportunity to play quarter tones on the regular orchestra flute (Böhm flute). The flutist does not need a new instrument or learn a new playing technique.

    Quarter tones were obtained by reducing the diameter of some of the tone holes. The hole diameter is reduced by using the kurdin which is entered inside the flute. The kurdin consists of two parts which can reduce the diameter of two tone holes at the same time. Flutists can thereby extend the available set of scale notes with two quarter tones without changing the position of the kurdin.

    Systematic measurements of the fundamental frequency of four tones (E4, F^#4, A4 and B4) using an artificially blown flute and different versions of the kurdin showed that the pitch of these tones can be lowered a quarter tone (50 cents) with the same reduced hole diameter. The four quarter tones cover almost all scales called Maqamat in oriental music.

  • 124.
    Ahmad, Rezgar
    KTH, Skolan för datavetenskap och kommunikation (CSC), Tal, musik och hörsel, TMH.
    Con curdino – Utökning av tvärflöjtens tonförråd till kvartstoner genom perturbation av tonhålens geometri.2011Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    The thesis describes the development and evaluation of a component ('kurdin') that provides flutists the opportunity to play quarter tones on the regular orchestra flute (Böhm flute). The flutist does not need a new instrument or learn a new playing technique.

    Quarter tones were obtained by reducing the diameter of some of the tone holes. The hole diameter is reduced by using the kurdin which is entered inside the flute. The kurdin consists of two parts which can reduce the diameter of two tone holes at the same time. Flutists can thereby extend the available set of scale notes with two quarter tones without changing the position of the kurdin.

    Systematic measurements of the fundamental frequency of four tones (E4, F^#4, A4 and B4) using an artificially blown flute and different versions of the kurdin showed that the pitch of these tones can be lowered a quarter tone (50 cents) with the same reduced hole diameter. The four quarter tones cover almost all scales called Maqamat in oriental music.

  • 125.
    Ahmady, Tobias
    et al.
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Klein Rosmar, Sander
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Translation of keywords between English and Swedish2014Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    In this project, we have investigated how to perform rule-based machine translation of sets of keywords between two languages. The goal was to translate an input set, which contains one or more keywords in a source language, to a corresponding set of keywords, with the same number of elements, in the target language. However, some words in the source language may have several senses and may be translated to several, or no, words in the target language. If ambiguous translations occur, the best translation of the keyword should be chosen with respect to the context. In traditional machine translation, a word's context is determined by a phrase or sentences where the word occurs. In this project, the set of keywords represents the context.

    By investigating traditional approaches to machine translation (MT), we designed and described models for the specific purpose of keyword- translation. We have proposed a solution, based on direct translation for translating keywords between English and Swedish. In the proposed solu- tion, we also introduced a simple graph-based model for solving ambigu- ous translations. 

  • 126.
    Ahmed, Haroon
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Sund, Gabriel
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Security challenges within Software Defined Networks2014Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. Software-defined networking (SDN) is a relatively new concept that is moving the field towards a more software-based solution to networking. Today when a packet is forwarded through a network of routers, decisions are made at each router as to which router is the next hop destination for the packet. With SDN these decisions are made by a centralized SDN controller that decides upon the best path and instructs the devices along this path as to what action each should perform. Taking SDN to its extreme minimizes the physical network components and increases the number of virtualized components. The reasons behind this trend are several, although the most prominent are simplified processing and network administration, a greater degree of automation, increased flexibility, and shorter provisioning times. This in turn leads to a reduction in operating expenditures and capital expenditures for data center owners, which both drive the further development of this technology.

    Virtualization has been gaining ground in the last decade. However, the initial introduction of virtualization began in the 1970s with server virtualization offering the ability to create several virtual server instances on one physical server. Today we already have taken small steps towards a virtualized network by virtualization of network equipment such as switches, routers, and firewalls. Common to virtualization is that it is in early stages all of the technologies have encountered trust issues and general concerns related to whether software-based solutions are as rugged and reliable as hardwarebased solutions. SDN has also encountered these issues, and discussion of these issues continues among both believers and skeptics. Concerns about trust remain a problem for the growing number of cloud-based services where multitenant deployments may lead to loss of personal integrity and other security risks. As a relatively new technology, SDN is still immature and has a number of vulnerabilities. As with most software-based solutions, the potential for security risks increases. This thesis investigates how denial-of-service (DoS) attacks affect an SDN environment and a singlethreaded controller, described by text and via simulations.

    The results of our investigations concerning trust in a multi-tenancy environment in SDN suggest that standardization and clear service level agreements are necessary to consolidate customers’ confidence. Attracting small groups of customers to participate in user cases in the initial stages of implementation can generate valuable support for a broader implementation of SDN in the underlying infrastructure. With regard to denial-of-service attacks, our conclusion is that hackers can by target the centralized SDN controller, thus negatively affect most of the network infrastructure (because the entire infrastructure directly depends upon a functioning SDN controller). SDN introduces new vulnerabilities, which is natural as SDN is a relatively new technology. Therefore, SDN needs to be thoroughly tested and examined before making a widespread deployment.

  • 127.
    Ahmed, Kachkach
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Analyzing user behavior and sentiment in music streaming services2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    These last years, streaming services (for music, podcasts, TV shows and movies) have been under the spotlight by disrupting traditional media consumption platforms. If the technical implications of streaming huge amounts of data are well researched, much remains to be done to analyze the wealth of data collected by these services and exploit it to its full potential in order to improve them. Using raw data about users’ interactions with the music streaming service Spotify, this thesis focuses on three main concepts: streaming context, user attention and the sequential analysis of user actions. We discuss the importance of each of these aspects and propose different statistical and machine learning techniques to model them. We show how these models can be used to improve streaming services by inferring user sentiment and improving recommender systems, characterizing user sessions, extracting behavioral patterns and providing useful business metrics.

  • 128.
    Ahmed, Laeeq
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Beräkningsvetenskap och beräkningsteknik (CST).
    Scalable Analysis of Large Datasets in Life Sciences2019Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    We are experiencing a deluge of data in all fields of scientific and business research, particularly in the life sciences, due to the development of better instrumentation and the rapid advancements that have occurred in information technology in recent times. There are major challenges when it comes to handling such large amounts of data. These range from the practicalities of managing these large volumes of data, to understanding the meaning and practical implications of the data.

    In this thesis, I present parallel methods to efficiently manage, process, analyse and visualize large sets of data from several life sciences fields at a rapid rate, while building and utilizing various machine learning techniques in a novel way. Most of the work is centred on applying the latest Big Data Analytics frameworks for creating efficient virtual screening strategies while working with large datasets. Virtual screening is a method in cheminformatics used for Drug discovery by searching large libraries of molecule structures. I also present a method for the analysis of large Electroencephalography data in real time. Electroencephalography is one of the main techniques used to measure the brain electrical activity.

    First, I evaluate the suitability of Spark, a parallel framework for large datasets, for performing parallel ligand-based virtual screening. As a case study, I classify molecular library using prebuilt classification models to filter out the active molecules. I also demonstrate a strategy to create cloud-ready pipelines for structure-based virtual screening. The major advantages of this strategy are increased productivity and high throughput. In this work, I show that Spark can be applied to virtual screening, and that it is, in general, an appropriate solution for large-scale parallel pipelining. Moreover, I illustrate how Big Data analytics are valuable in working with life sciences datasets.

    Secondly, I present a method to further reduce the overall time of the structured-based virtual screening strategy using machine learning and a conformal-prediction-based iterative modelling strategy. The idea is to only dock those molecules that have a better than average chance of being an inhibitor when searching for molecules that could potentially be used as drugs. Using machine learning models from this work, I built a web service to predict the target profile of multiple compounds against ready-made models for a list of targets where 3D structures are available. These target predictions can be used to understand off-target effects, for example in the early stages of drug discovery projects.

    Thirdly, I present a method to detect seizures in long term Electroencephalography readings - this method works in real time taking the ongoing readings in as live data streams. The method involves tackling the challenges of real-time decision-making, storing large datasets in memory and updating the prediction model with newly produced data at a rapid rate. The resulting algorithm not only classifies seizures in real time, it also learns the threshold in real time. I also present a new feature "top-k amplitude measure" for classifying which parts of the data correspond to seizures. Furthermore, this feature helps to reduce the amount of data that needs to be processed in the subsequent steps.

  • 129.
    Ahmed, Laeeq
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), High Performance Computing and Visualization (HPCViz).
    Edlund, Åke
    KTH, Skolan för datavetenskap och kommunikation (CSC), High Performance Computing and Visualization (HPCViz).
    Laure, Erwin
    KTH, Skolan för datavetenskap och kommunikation (CSC), High Performance Computing and Visualization (HPCViz).
    Spjuth, O.
    Using iterative MapReduce for parallel virtual screening2013Inngår i: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), IEEE Computer Society, 2013, s. 27-32Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Virtual Screening is a technique in chemo informatics used for Drug discovery by searching large libraries of molecule structures. Virtual Screening often uses SVM, a supervised machine learning technique used for regression and classification analysis. Virtual screening using SVM not only involves huge datasets, but it is also compute expensive with a complexity that can grow at least up to O(n2). SVM based applications most commonly use MPI, which becomes complex and impractical with large datasets. As an alternative to MPI, MapReduce, and its different implementations, have been successfully used on commodity clusters for analysis of data for problems with very large datasets. Due to the large libraries of molecule structures in virtual screening, it becomes a good candidate for MapReduce. In this paper we present a MapReduce implementation of SVM based virtual screening, using Spark, an iterative MapReduce programming model. We show that our implementation has a good scaling behaviour and opens up the possibility of using huge public cloud infrastructures efficiently for virtual screening.

  • 130.
    Ahmed, Laeeq
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Beräkningsvetenskap och beräkningsteknik (CST).
    Edlund, Åke
    KTH, Skolan för datavetenskap och kommunikation (CSC), Beräkningsvetenskap och beräkningsteknik (CST).
    Laure, Erwin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Beräkningsvetenskap och beräkningsteknik (CST).
    Whitmarsh, S.
    Parallel real time seizure detection in large EEG data2016Inngår i: IoTBD 2016 - Proceedings of the International Conference on Internet of Things and Big Data, SciTePress, 2016, s. 214-222Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Electroencephalography (EEG) is one of the main techniques for detecting and diagnosing epileptic seizures. Due to the large size of EEG data in long term clinical monitoring and the complex nature of epileptic seizures, seizure detection is both data-intensive and compute-intensive. Analysing EEG data for detecting seizures in real time has many applications, e.g., in automatic seizure detection or in allowing a timely alarm signal to be presented to the patient. In real time seizure detection, seizures have to be detected with negligible delay, thus requiring lightweight algorithms. MapReduce and its variations have been effectively used for data analysis in large dataset problems on general-purpose machines. In this study, we propose a parallel lightweight algorithm for epileptic seizure detection using Spark Streaming. Our algorithm not only classifies seizures in real time, it also learns an epileptic threshold in real time. We furthermore present "top-k amplitude measure" as a feature for classifying seizures in the EEG, that additionally assists in reducing data size. In a benchmark experiment we show that our algorithm can detect seizures in real time with low latency, while maintaining a good seizure detection rate. In short, our algorithm provides new possibilities in using private cloud infrastructures for real time epileptic seizure detection in EEG data.

  • 131.
    Ahmed, Laeeq
    et al.
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Beräkningsvetenskap och beräkningsteknik (CST).
    Georgiev, Valentin
    Capuccini, Marco
    Toor, Salman
    Schaal, Wesley
    Laure, Erwin
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Beräkningsvetenskap och beräkningsteknik (CST).
    Spjuth, Ola
    Efficient iterative virtual screening with Apache Spark and conformal prediction2018Inngår i: Journal of Cheminformatics, ISSN 1758-2946, E-ISSN 1758-2946, Vol. 10, artikkel-id 8Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Background: Docking and scoring large libraries of ligands against target proteins forms the basis of structure-based virtual screening. The problem is trivially parallelizable, and calculations are generally carried out on computer clusters or on large workstations in a brute force manner, by docking and scoring all available ligands. Contribution: In this study we propose a strategy that is based on iteratively docking a set of ligands to form a training set, training a ligand-based model on this set, and predicting the remainder of the ligands to exclude those predicted as 'low-scoring' ligands. Then, another set of ligands are docked, the model is retrained and the process is repeated until a certain model efficiency level is reached. Thereafter, the remaining ligands are docked or excluded based on this model. We use SVM and conformal prediction to deliver valid prediction intervals for ranking the predicted ligands, and Apache Spark to parallelize both the docking and the modeling. Results: We show on 4 different targets that conformal prediction based virtual screening (CPVS) is able to reduce the number of docked molecules by 62.61% while retaining an accuracy for the top 30 hits of 94% on average and a speedup of 3.7. The implementation is available as open source via GitHub (https://github.com/laeeq80/spark-cpvs) and can be run on high-performance computers as well as on cloud resources.

  • 132.
    Ahmed, Olfet
    et al.
    KTH, Skolan för teknik och hälsa (STH), Data- och elektroteknik.
    Saman, Nawar
    KTH, Skolan för teknik och hälsa (STH), Data- och elektroteknik.
    Utvärdering av nätverkssäkerheten på J Bil AB2013Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Detta examensarbete är en utvärdering av nätverkssäkerheten hos J BiL AB, både på social och teknisk nivå. Företaget är beroende av säkra Internet-anslutningar för att nå externa tjänster och interna servrar lokaliserade på olika geografiska platser. Företaget har ingen IT-ansvarig som aktivt underhåller och övervakar nätverket, utan konsulterar ett externt dataföretag. Syftet med examensarbetet är att utvärdera säkerheten, upptäcka brister, ge förbättringsförslag och till viss del implementera lösningar. För att undersöka säkerheten har observationer och intervjuer med personalen gjorts och ett flertal attacker mot nätverket har utförts. Utifrån den data som samlats in kunde slutsatsen dras att företaget har brister vad gäller IT-säkerheten. Framförallt den sociala säkerheten visade sig ha stora luckor vilket till stor del beror på att de anställda varken har blivit utbildade eller fått någon information om hur de ska hantera lösenord, datorer och IT-frågor i allmänt. Förbättringsförslag har getts och viss implementation har genomförts för att eliminera bristerna. De anställda har även med hjälp av en IT-policy och föreläsning blivit utbildade i hur de ska agera och tänka kring IT-relaterade säkerhetsfrågor.

  • 133.
    Ahmed, Rakiv
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Aule, Jonas
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    An Evaluation of the Framework Libgdx when Developing a Game Prototype for Android Devices.2011Independent thesis Advanced level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    An evaluation of the framework Libgdx

    when developing a game prototype for Android devices

    By: Rakiv Ahmed & Jonas Aule

    ABSTRACT

    This paper is about evaluation of the framework Libgdx, regarding 2D game development for the Android platform. Other frameworks are also investigated briefly. The game under development is an original game called Magnificent Marbles and is multi-modal as other games for smartphones. The Background section talks about the Android platform and its related tools along with game examples, also frameworks are introduced here. The main focus of this paper will be on the Implementation section and the actual usage of Libgdx. Methods and results for different development versions of the game will be displayed.

    The Discussion section concludes that Libgdx is a good framework due to its desktop support. Libgdx may not suitable for smaller game projects or when wanting to get started quickly without too much knowledge in other areas, such as OpenGL. Another issue is that one should not solely rely on Libgdx desktop support, but knowledge in other areas is required as well to utilize Libgdx to the fullest. The Appendix section includes different documents for more information about Magnificent Marbles.

  • 134.
    Ahmed, Tanvir Saif
    et al.
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Markovic, Bratislav
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Distribuerade datalagringssystem för tjänsteleverantörer: Undersökning av olika användningsfall för distribuerade datalagringssystem2016Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Detta examensarbete handlar om undersökning av tre olika användningsfall inom datalagring; Cold Storage, High Performance Storage och Virtual Machine Storage. Rapporten har som syfte att ge en översikt över kommersiella distribuerade filsystem samt en djupare undersökning av distribuerade filsystem som bygger på öppen källkod och därmed hitta en optimal lösning för dessa användnings-fall. I undersökningen ingick att analysera och jämföra tidigare arbeten där jämförelser mellan pre-standamätningar, dataskydd och kostnader utfördes samt lyfta upp diverse funktionaliteter (snapshotting, multi-tenancy, datadeduplicering, datareplikering) som moderna distribuerade filsy-stem kännetecknas av. Både kommersiella och öppna distribuerade filsystem undersöktes. Även en kostnadsuppskattning för kommersiella och öppna distribuerade filsystem gjordes för att ta reda på lönsamheten för dessa två typer av distribuerat filsystem.Efter att jämförelse och analys av olika tidigare arbeten utfördes, visade sig att det öppna distribue-rade filsystemet Ceph lämpade sig bra som en lösning utifrån kraven som sattes som mål för High Performance Storage och Virtual Machine Storage. Kostnadsuppskattningen visade att det var mer lönsamt att implementera ett öppet distribuerat filsystem. Denna undersökning kan användas som en vägledning vid val mellan olika distribuerade filsystem.

  • 135.
    Ahmed, War
    et al.
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Bahador, Mehrdad
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    The accuracy of the LSTM model for predicting the S&P 500 index and the difference between prediction and backtesting2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    In this paper the question of the accuracy of the LSTM algorithm for predicting stock prices is being researched. The LSTM algorithm is a form of deep learning algorithm. The algorithm takes in a set of data as inputs and finds a pattern to dissolve an output. Our results point to that using backtesting as the sole method to verify the accuracy of a model can fallible. For the future, researchers should take a fresh approach by using real-time testing. We completed this by letting the algorithm make predictions on future data. For the accuracy of the model we reached the conclusion that having more parameters improves accuracy.

  • 136. Ahmed, Zara
    et al.
    Benque, David
    Berezin, Sergey
    Dahl, Anna Caroline E.
    KTH, Skolan för teknik och hälsa (STH), Centra, Centrum för teknik i medicin och hälsa, CTMH.
    Fisher, Jasmin
    Hall, Benjamin A.
    Ishtiaq, Samin
    Nanavati, Jay
    Piterman, Nir
    Riechert, Maik
    Skoblov, Nikita
    Bringing LTL Model Checking to Biologists2017Inngår i: VMCAI 2017: Verification, Model Checking, and Abstract Interpretation / [ed] Bouajjani, A Monniaux, D, Springer, 2017, Vol. 10145, s. 1-13Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The BioModelAnalyzer (BMA) is a web based tool for the development of discrete models of biological systems. Through a graphical user interface, it allows rapid development of complex models of gene and protein interaction networks and stability analysis without requiring users to be proficient computer programmers. Whilst stability is a useful specification for testing many systems, testing temporal specifications in BMA presently requires the user to perform simulations. Here we describe the LTL module, which includes a graphical and natural language interfaces to testing LTL queries. The graphical interface allows for graphical construction of the queries and presents results visually in keeping with the current style of BMA. The Natural language interface complements the graphical interface by allowing a gentler introduction to formal logic and exposing educational resources.

  • 137.
    Ahnlund, Josefin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Datorseende och robotik, CVAP.
    Statistical Analysis of Conductor-Musician Interaction: With a Focus on Musical Expression2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The kind of interaction occurring between a conductor and musicians while performing a musical piece together is an unique instance of human non-verbal communication. This Musical Production Process (MPP) thus provides an interesting area of research, both from a communication perspective and by its own right. The long term goal of this project is to model the MPP with machine learning methods, for which large amounts of data are required. Since the amount of data available to this master thesis stems from a single recording session (collected at KTH May 2014) a direct modeling of the MPP is unfeasible. As such the thesis can instead be considered as a pilot project which examines pre-requisites for modeling of the MPP. The main aim of the thesis is to investigate how musical expression can be captured in the modeling of the MPP. Two experiments, as well as a theoretical investigation of the MPP, are performed to this end. The first experiment consists of a HMM classification of sound represented by expressive tone parameters extracted by the CUEX algorithm, and labeled by four emotions. This experiment complements the previous classification of conducting gesture in GP-LVM representation performed by Kelly Karipidou on the same data set. The result of the classification implicitly proves that expression has been transferred from conductor to musicians. As the first experiment considers expression over the musical piece as a whole, the second experiment investigates the transfer of expression from conductor to musician on a local level. To this end local representations of the sound and conducting gesture are extracted, the separability of the four emotions are calculated for both representations by use of the Bhattacharyya distance and the results are compared in search for correlation. Some indications of correlation between the representations of sound and gesture are found. The conclusion is nevertheless that the utilized representations of conducting gesture do not capture musical expression to a sufficient extent.

  • 138.
    Ahrsjö, Carl
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Real-time event based visualization of multivariate abstract datasets: Implementing and evaluating a dashboard visualization prototype2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    As datasets in general grow in size and complexity over time while the human cognitive ability to interpret said datasets essentially stays the same, it becomes important to enable intuitive visualization methods for analysis. Based on previous research in the field of information visualization and visual analytics, a dashboard visualization prototype handling real-time event based traffic was implemented and evaluated. The real-time data is collected by a script and sent to a self-implemented web server that opens up a websocket connection with the dashboard client where the data is then visualized. Said data consisted of transactions and related metadata of an ecommerce retail site applied to a real customer scenario.

    The dashboard was developed using an agile method, continuously involving the thesis supervisor in the design and functionality process. The final design also depended on the results of an interview with a representative from one of the two target groups. The two target groups consisted of 5 novice and 5 expert users to the field of information visualization and visual analytics. The intuitiveness of the dashboard visualization prototype was evaluated by conducting two user studies, one for each target group, where the test subjects were asked to interact with the dashboard visualization, answer some questions and lastly solving a predefined set of tasks. The time spent solving said tasks, the amount of serious misinterpretations and the number of wrong answers was recorded and evaluated.

    The results from the user study showed that the use of colors, icons, level on animation, the choice of visualization method and level of interaction were the most important aspects for carrying out an efficient analytical process according to the test subjects. The test subjects desired to zoom in on each component, to filter the contents of the dashboard and to get additional information about the components on-demand. The most important result produced from developing the dashboard was how to handle the scalability of the application. It is highly important that the websocket connection remain stable when scaling out to handle more concurrent HTTP requests. The research also conclude that the dashboard should handle visualization methods that are intuitive for all users, that the real-time data needs to be put into relation to historical data if one wishes to carry out a valid analytical process and that real-time data can be used to discover trends and patterns in an early-as-possible stage. Lastly, the research provides a set of guidelines for scalability, modularity, intuitiveness and relations between datasets. 

  • 139.
    Ahrsjö, Carl
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Roshult, Tommy
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Vad påverkar medieteknikstudenternas kursval?2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    With many different elective courses to choose between, a lot of students  experience anxiety over deciding which courses to study next semester. The  choice of a specific course can have a big impact on the students future studies  and/or employment. Therefore the anxiety is justified. At the same time the  number of students applying for a course often vary from year to year. This  creates issues for the responsible teachers because of the ever-changing  resource requirements.

    There are several different theories on decision making, addressing the  different time related states as well as the different habitual styles. With  help of theories on these styles and time states, which were investigated with  two surveys and a focus group, and statistical data mining from a database  consisting of former course decision data we have studied how the students  reason when it comes to selecting courses and which aspects that influence their  choice. This gave us a better insight and understanding of the students’ situation and what the varying of applicants to different courses may depend  on.

    The results of this study show that the students at media technology often  have issues choosing between the elective courses. Many students experience that  the available information on the corresponding course homepages is brief and  therefore they call for a clarification of the course information. Because of  this, the majority of the students in the lower grades often rely on the advice  that the students in the higher grades provide. The database analysis shows that  the grades in the mathematics courses have an effect on which track (and its  corresponding elective courses) a student will choose.

  • 140.
    Ahsan, Ayesha
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Consumer ratings-reviews and its impact on consumer purchasing behavior2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Storytelling is one of the most creative, powerful and effective tools of modern marketing strategies and communication. Due to the expansion of social media, storytelling has become a popular marketing and sales tool that may affect consumer behavior. This research has been conducted from a storytelling perspective with the purpose of finding the correlation between consumer reviews and consumer purchasing behavior. This study focuses on consumer stories which are reflected in terms of product reviews and ratings. Where the correlation between these reviews and ratings and their effects on overall product sales are investigated. The study answers the question, “If reviews & rating have a correlation with consumer purchasing behavior in digital marketing, and if so then how this correlation could be defined?”

    The data collection and tests have been conducted in a practical environment. The German online stores have been used as the main mode of data collection. Depending on the nature of the data, the quantitative analysis approach has been adopted. By conducting real-time sales data tests, this study fills the gap in previous consumer research studies. The in-depth analysis of results show the correlation between consumer reviews and product sales. The results have revealed that consumer reviews may influence overall product sales and help a consumer in purchasing decision.

  • 141.
    Ahsan, Mohammed Sabbir
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Experimental Setup of High Harmonic Generation Based Angle Resolved Photoemission Spectroscopy (HHG-ARPES) And Test Measurement on Tungsten (W) [110] Surface2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
  • 142.
    Ahsant, Mehran
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    On-demand Restricted Delegation: A Framework for Dynamic, Context-Aware, Least-Privilege Delegation in Grids2009Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    In grids, delegation is a key facility that can be used to authenticate and authorize requests on behalf of disconnected users. In current grid systems,delegation is either performed dynamically, in an unrestricted manner, or by a secure but static method. Unfortunately, the former compromises security and the latter cannot satisfy the requirements of dynamic grid application execution. Therefore, development of a delegation framework that enables a restricted and flexible delegation mechanism becomes increasingly urgent as grids are adopted by new communities and grow in size. The main barriers in development of such a mechanism are the requirements for dynamic execution of grid applications, which make it difficult to anticipate required access rights for completing tasks in advance.

    Another significant architectural requirement in grids is federated security and trust. A considerable barrier to achieving this is cross-organizational authentication and identification. Organizations participating in Virtual Organizations (VOs) may use different security infrastructures that implement different protocols for authentication and identification; thus, there exists a need to provide an architectural mechanism for lightweight, rapid and interoperable translation of security credentials from an original format to a format understandable by recipients.

    This thesis contributes the development of a delegation framework that utilizes a mechanism for determining and acquiring only required rights and credentials for completing a task, when they are needed. This is what we call an on-demand delegation framework that realizes a bottom-up delegation model and provides a just-in-time acquisition of rights for restricted and dynamic delegation.

    In this thesis, we further contribute the development of a credential mapping mechanism using off-the-shelf standards and technologies. This mechanism provides support for an on-the-fly exchange of different types of security credentials used by the security mechanisms of existing grids.

  • 143.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Basney, Jim
    Workflows in Dynamic and Restricted Delegation2009Inngår i: 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), New York: IEEE , 2009, s. 17-24Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Delegation is a key facility in dynamic, distributed and collaborative environments like e rids and enables an effective use of a wide range of dynamic applications. Traditional delegation frameworks approach a top-down model of delegation for delegating rights from a superior to a subordinate in advance before a delegate starts off a delegated task. However, a top-down model of delegation cannot meet all the requirements of dynamic execution of distributed applications, as in such environments. required access rights for completing a task cannot easily be anticipated in advance. Delegating fewer rights than required for completing a task may cause the task execution to fail while delegating more rights than needed may threaten abuse by malicious parties. It is therefore reasonable and more robust to utilize a mechanism that allows determining and acquiring only required rights and credentials for completing a task, when they are needed. This is what we call an on-demand delegation framework, which realizes a bottom-up delegation model and provides a just-in-time acquisition of rights for a restricted and dynamic delegation. In this paper we elaborate the concept of bottom-up delegation and describe how an on-demand delegation framework can leverage workflows to meet the requirements of the least privileges principle. We also discuss the vital need for dynamic and adaptive scientific workflows to support an on-demand delegation framework. We present three different models or bottom-up delegation, which cover a wide range or usage scenarios in Grids and dynamic collaborative environments. Using a standard RBAC authorization model and a graph-based workflow model (DAG), we define and analyze a formal model of our proposed bottom-up delegation approach.

  • 144.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Basney, Jim
    Johnsson, Lennart
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Dynamic, Context-Aware, Least-Privilege Grid Delegation2007Inngår i: 8th IEEE/ACM International Conference on Grid Computing, New York: IEEE , 2007, s. 209-216Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. In dynamic environments like Grids, on one hand, delegating a restricted set of rights reduces exposure to attack but also limits the flexibility and dynamism of the application; on the other hand, delegating all rights provides maximum flexibility but increases exposure. This issue has not yet been adequately addressed by current Grid security mechanisms and is becoming a very challenging and crucial issue for future Grid development. Therefore, providing an effective delegation mechanism which meets the requirements of the least privilege principle is becoming an essential need. Furthermore, we are witnessing a phenomenal increase in the automation of organizational tasks and decision making, as well as the computerization of information related services, requiring automated delegation mechanisms. In order to meet these requirements we introduce an Active Delegation Framework which extends our previous work on on-demand delegation, making it context-aware. The framework provides a just-in-time, restricted and dynamic delegation mechanism for Grids. In this paper we describe the development of this framework and its implementation and integration with the Globus Toolkit.

  • 145.
    Ahsant, Mehran
    et al.
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Mulmo, Olle
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Basney, Jim
    University of Illinois.
    Grid Delegation Protocol2004Inngår i: Workshop on Grid Security Practice and Experience, 2004, s. 81-91Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We propose a delegation protocol based on the WS-Trust specification, which is applicablefor a wide range of Grid applications. The protocol is independent of underlying securitymechanisms and is therefore applicable to all security mechanisms of common use in Gridenvironments, such as X.509 proxy certificates, Kerberos based delegation, and SAML assertions.We emphasize that this is work in progress. In this paper, we document our thoughtsand current strategy, and we solicit comments and feedback on our approach.

  • 146.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Mulmo, Olle
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Johnsson, Lennart
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Basney, Jim
    Lee, Adam J.
    Toward An On-demand Restricted Delegation Mechanism for Grids2006Inngår i: 2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, New York: IEEE , 2006, s. 152-159Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Grids are intended to enable cross-organizationalinteractions which makes Grid security a challenging and nontrivialissue. In Grids, delegation is a key facility that canbe used to authenticate and authorize requests on behalf ofdisconnected users. In current Grid systems there is a tradeoffbetween flexibility and security in the context of delegation.Applications must choose between limited or full delegation: onone hand, delegating a restricted set of rights reduces exposure toattack but also limits the flexibility/dynamism of the application;on the other hand, delegating all rights provides maximumflexibility but increases exposure. In this paper, we propose anon-demand restricted delegation mechanism, aimed at addressingthe shortcomings of current delegation mechanisms by providingrestricted delegation in a flexible fashion as needed for Grid applications.This mechanism provides an ontology-based solutionfor tackling one the most challenging issues in security systems,which is the principle of least privileges. It utilizes a callbackmechanism, which allows on-demand provisioning of delegatedcredentials in addition to observing, screening, and auditingdelegated rights at runtime. This mechanism provides supportfor generating delegation credentials with a very limited andwell-defined range of capabilities or policies, where a delegatoris able to grant a delegatee a set of restricted and limited rights,implicitly or explicitly.

  • 147.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Mulmo, Olle
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Nefedova, V.
    Ananthakrishnan, R.
    Liming, L.
    Madduri, R.
    Pearlman, L.
    Siebenlist, F.
    Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service2006Inngår i: Journal of Grid Computing, ISSN 1572-9814, Vol. 4, nr 2, s. 135-144Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Registration Service (PURSE), a set of tools for automating user registration, credential creation, and credential management tasks. PURSE provides the system developer with a set of customizable components, suitable for integration with portals, that can be used to address the full lifecycle of Grid credential management. We describe the PURSE design and its use in portals for two systems, the Earth System Grid data access system and the Swegrid computational Grid. In both cases, the user is entirely freed from the need to create or manage public key credentials, thus simplifying the Grid experience and reducing opportunities for error. We argue that this capturing of common use cases in a reusable ‘solution’ can be a model for how Grid ease-of-use can be addressed in other domains as well.

  • 148.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Surridge, Mike
    Leonard, Thomas
    Krishna, Ananth
    Mulmo, Olle
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Dynamic Trust Federation in Grids2006Inngår i: Trust Management, Proceedings / [ed] Stolen, K; Winsborough, WH; Martinelli, F; Massacci, F, 2006, Vol. 3986, s. 3-18Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Grids are becoming economically viable and productive tools. They provide a way of utilizing a vast array of linked resources such as computing systems, databases and services online within Virtual Organizations (VO). However, today's Grid architectures are not capable of supporting dynamic, agile federation across multiple administrative domains and the main barrier, which hinders dynamic federation over short time scales is security. Federating security and trust is one of the most significant architectural issues in Grids. Existing relevant standards and specifications can be used to federate security services, but do not directly address the dynamic extension of business trust relationships into the digital domain. In this paper we describe an experiment which highlights those challenging architectural issues and forms the basis of an approach that combines a dynamic trust federation and a dynamic authorization mechanism for addressing dynamic security trust federation in Grids. The experiment made with the prototype described in this paper is used in the NextGRID(1) project to define the requirements of next generation Grid architectures adapted to business application needs.

  • 149.
    Ahsant, Mehran
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Talavera González, Esteban
    KTH, Skolan för datavetenskap och kommunikation (CSC), Centra, Parallelldatorcentrum, PDC.
    Basney, Jim
    Security Credential Mapping in Grids2009Inngår i: 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), New York: IEEE , 2009, s. 481-486Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Federating security and trust is one of the most significant architectural requirements in grids. In this regard, one challenging issue is the cross-organizational authentication and identification. Organizations participated in Virtual Organizations (VOs) may use different security infrastructures that implement different authentication and identification protocols. Thus, arises an architectural need to provide a mechanism for a lightweight, rapid and interoperable translation of security credentials from an original format to a format understandable by recipients. In this paper, we describe the development and the implementation of an architecture for credential mapping in grids using off-the-shelf technologies and standard specifications. Our open-source implementation of this architecture provides support for an on-the-fly exchange for different types of security credentials used by diverse grid security infrastructures'.

  • 150.
    Aid, Graham
    KTH, Skolan för industriell teknik och management (ITM), Industriell ekologi.
    Industrial Ecology Methods within Engagement Processes for Industrial Resource Management2013Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The global use of resources such as materials, energy, and water has surpassed sustainable levels by many accounts.  The research presented here was explicitly normative in its aim to improve the understanding of, and make sustainable change toward highly systemic issues of resource management.  The core methods chosen to work toward this aim were bottom up action research procedures (including stakeholder engagement processes) and industrial ecology analysis tools.  These methods were employed and tested in pragmatic combination through two of the author’s case study projects. The first case study, performed between 2009 and 2012, employed a multi-stakeholder process aimed at improving the cycling of construction and demolition waste in the Stockholm region.  The second case study produced a strategic tool (Looplocal) built for facilitating more efficient regional industrial resource networks. While the highly participative aim of the cases required a larger contribution of resources than that of more closed studies, it is arguable that the efficacy of approaching the project aims is improved through their employment. 

1234567 101 - 150 of 11921
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf