du.sePublications
Change search
Refine search result
12 1 - 50 of 51
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Andersdotter, Emma
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Säkerhet i molntjänster: Starka autentiseringsmetoder, federeringslösningar & säkerhetshot mot autentisering i moln2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    "Moln" är ett känt ord använt för att beskriva molntjänster. Begreppet moln uppstod för längesen, och användes bland annat på 70-talet för att representera delar som ingen riktigt förstod sig på. Det är inte bara ordet moln som fortfarande orsakar förvirring, utan även dess flertaliga beskrivningar. Dessa gör det svårt att få grepp om vad molntjänster egentligen innebär. Kraven för molntjänster är flera, men man talar oftast om bred tillgänglighet, konsolidering av resurser, snabb elasticitet och mätbara, självbetjäningstjänster. Implementering av säkerhet är viktig för molntjänster för att kunna skydda dem från säkerhetshot. En vanlig men också viktig säkerhetskontroll är autentisering. Autentisering tillsammans med federationslösningar möjliggör för integration mellan molntjänster som vill dela autentisering.

    Rapporten är strukturerad i olika sektioner, innehållande bakgrund till problem, syften som leder fram till frågeställningar och vald metodik. Den teoretiska biten består av en litteraturstudie om bland annat; säkerhetshot mot autentisering i molnet; skydd mot dessa; autentiseringsmetoder passande för molnet; federationslösningar. I analysen jämför rapporten skillnader och likheter mellan resultat från litteraturstudien och från flera intervjuer. I slutsatsen presenteras svar på frågeställningar och resultat från analysdelen. Integration mellan molntjänsters autentiseringslösning kan lösas av federerade identiteter, som även medför fördelarna användarvänlighet och enklare administration. Att alla identiteter samlas på en och samma plats kan dock bli ett attraktivt mål för attacker. Säkerhetshot mot molntjänster existerar i all högsta grad, dock skiljer de sig inte mycket mot traditionella tjänster. Slutsatsen påvisar att kausalitet fortfarande råder för säkerhet i molntjänster, men att förtroende har blivit ytterligare en förklaringsvariabel.

  • 2.
    Berg, Leonhard
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Montelius, Olle
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Barnsäkring av Smartphones2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this work, the ability to create a prototype for a throughout secure and childproof system for Android is shown. This is done by combining already available products combined with some own code. Internet traffic is being pushed through a VPN tunnel to an already existing LAN in the own home. This mitigates the risks of eavesdropping attacks and other threats, and by using DNS Filtering, unwanted web pages can be blocked beforehand.

    The mobile unit can be used for calls (and with further development SMS) but incoming calls from unknown numbers, and SMS, will be blocked. With the addition of Applocker, a sort of locking mechanism for software access, the use of unwanted application will be restricted. By adding a custom App-Launcer, this restriction can be even more firm.

    The complete solution brings a system where the Smartphone preferably can be handled by a child and where chosen functions can be used in their regular manner but where, predetermined, functions has been eliminated from the unit – or is only accessible by the administrator. What is needed for this prototype, besides of a Smartphone, is a working LAN in the home, and an always-on computer that acts like a server, preferably a Raspberry Pi.

  • 3.
    Bergstrand, Daniel
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Analys av kvarvarande spår från USB-lagringsenheter2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To perform a computer forensic investigation can sometimes be compared to putting a puzzle together, especially if the person doing the investigation was not present at the initial stages were the IT devices was seized. To get an idea of the usage of a computer solely from the information on the hard drive can be a difficult and time consuming task. Situations that can be considered particularly complicated arise when devices have been overlooked at the raid, in other words when pieces of the puzzle are missing.During the examination of a hard drive there is often traces of removable media previously connected to the computer. These kinds of traces can be of interest during the computer forensic investigation. One aspect can be to put different devices in relation to each other, to link a digital trace to a physical action. Another possible conclusion can be that some items of relevance was missed during the raid and there for not seized.This thesis describes the goals that are relevant to strive for when conducting a computer forensic investigation. Multiple aspects was reviewed to make the result usable to a computer forensic examiner working in law enforcement.The work done was basically based on an experiment where a removable USB thumb drive was connected to a computer. The computer was subsequently examined for changes and the files identified were analysed with digital tools built for these purposes. All results were reviewed with secondary digital tools or validated with manual validation techniques.The traces from the analysis provided a method. The method is supposed to be of use when a computer forensic examiner working in law enforcement is conducting searches for removable USB storage devices that was previously connected to a computer. Finally the method was reviewed and conclusions regarding advantages and disadvantages were drawn.

  • 4.
    Carling, Kenneth
    et al.
    Dalarna University, School of Technology and Business Studies, Statistics.
    Meng, Xiangli
    Dalarna University, School of Technology and Business Studies, Statistics.
    On statistical bounds of heuristic solutions to location problems2014Report (Other academic)
    Abstract [en]

    Solutions to combinatorial optimization problems, such as problems of locating facilities, frequently rely on heuristics to minimize the objective function. The optimum is sought iteratively and a criterion is needed to decide when the procedure (almost) attains it. Pre-setting the number of iterations dominates in OR applications, which implies that the quality of the solution cannot be ascertained. A small, almost dormant, branch of the literature suggests using statistical principles to estimate the minimum and its bounds as a tool to decide upon stopping and evaluating the quality of the solution. In this paper we examine the functioning of statistical bounds obtained from four different estimators by using simulated annealing on p-median test problems taken from Beasley’s OR-library. We find the Weibull estimator and the 2nd order Jackknife estimator preferable and the requirement of sample size to be about 10 being much less than the current recommendation. However, reliable statistical bounds are found to depend critically on a sample of heuristic solutions of high quality and we give a simple statistic useful for checking the quality. We end the paper with an illustration on using statistical bounds in a problem of locating some 70 distribution centers of the Swedish Post in one Swedish region. 

  • 5.
    Claesson, Christoffer
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Penetrationstest mot Webbapplikation2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Penetrationstest har blivit en populär metod för organisationer att se datasäkerheten ur en angripares ögon och ofta inkluderas både system och personal av ett penetrationstest.Rapporten går igenom attackerna SQL Injection, Cross-site Scripting (XSS) och Cross-site Request Forgery (CSRF) som är specifikt för webbapplikationer och även förslag på hur man kan motverka dessa. Syftet med studien är att kontrollera om företagets webbapplikation läcker information, eller om en användare kan komma förbi autentisering eller uppgradera sina rättigheter i webbapplikationen. Vidare beskrivs även vilka verktyg som används för att inhämta information för fortsatta analyser. Diskussionen kan användas som underlag för att skapa en säkrare webbapplikation. Rapporten avslutas med en indikering om att företaget har god säkerhet, fast även ytterligare underlag för framtida undersökningar. En exekutiv sammanställning av arbetet, se Bilaga 1.

  • 6.
    Dalberg, Daniel
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Client-side security for anonymous data collection from handsets2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The widespread use of smartphones today, and the hardware available in these smartphones should make it possible to use these devices as a foundation for digital guides at, for example, tourist attractions with a historical connection. This report examines whether it is possible to create an Android application for smartphones that functions as a digital guide. Furthermore an attempt to delete sensitive data, in this case location data from the volatile memory on a smartphone running Android, is done. It turns out that a smartphone can be used as a foundation for a digital guide as long as the area that is to be covered by the guide is located in an area that is covered by the mobile networks and that it is possible to communicate with the GPS system. Deleting all the sensitive data from the volatile memory however, is more or less impossible.

  • 7.
    Du, Xiaofeng
    et al.
    British Telecommun PLC, London, England..
    Song, William Wei
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Quality improvement framework for business oriented geo-spatial data2015In: Web Information Systems Engineering - WISE 2014 workshops, Berlin: Springer Berlin/Heidelberg, 2015, Vol. 9051, p. 239-249Conference paper (Refereed)
    Abstract [en]

    In the past few years, Geo-spatial data quality has received increasing attention and concerns. As more and more business decisions are made based on data analytic result from geo-spatial related data, low quality data means wrong or inappropriate decisions, which could have substantial effects on a business's future. In this paper, we propose a framework that can systematically ensure and improve geo-spatial data quality throughout the whole life cycle of data.

  • 8.
    Fridolfsson, Thomas
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Forensisk undersökning av Amazon Kindle2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This work have been done in cooperation with the Swedish Armed Forces (Försvarsmakten) and presents what possibilities there are for forensic investigations of the e-book reader Amazon Kindle. In its literature study it is described how previous research in the field is very limited. The work is therefore aiming to answer what data of forensic interest a Kindle can contain and how it can be extracted, where this information is stored and if this differs between different models and firmware versions, as well as if it's enough to investigate only the part of the memory that is available for the user or if further privileges to reach the whole memory area needs to be obtained.

    To do this, three different models of Kindles is filled with information. After that data images are taken off them, first on only the user partition and then on the whole memory area after a privilege escalation have been performed. Gathered data is analyzed and the result is presented.

    The result shows that information of forensic interest such as notes, visited web sites and documents can be found and there is therefore a value in performing forensic investigations on Amazon Kindles. There is a difference between what information that can be found and where it's stored on the different units. The units have four partitions of which only one is accessible without privilege escalation. Because of this there is an advantage of obtaining images of the whole memory area.

    In addition to the above a method for bypassing the device code of a unit and thereby getting complete access to it even though it is locked is presented.

  • 9.
    Han, Mengjie
    et al.
    Dalarna University, School of Technology and Business Studies, Statistics.
    Håkansson, Johan
    Dalarna University, School of Technology and Business Studies, Human Geography.
    Rebreyend, Pascal
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    How does the use of different road networks effect the optimal location of facilities in rural areas?2012Report (Other academic)
    Abstract [en]

    The p-median problem is often used to locate P service facilities in a geographically distributed population. Important for the performance of such a model is the distance measure.

    Distance measure can vary if the accuracy of the road network varies. The rst aim in this study is to analyze how the optimal location solutions vary, using the p-median model, when the road network is alternated. It is hard to nd an exact optimal solution for p-median problems. Therefore, in this study two heuristic solutions are applied, simulating annealing and a classic heuristic. The secondary aim is to compare the optimal location solutions using dierent algorithms for large p-median problem. The investigation is conducted by the means of a case study in a rural region with an asymmetrically distributed population, Dalecarlia.

    The study shows that the use of more accurate road networks gives better solutions for optimal location, regardless what algorithm that is used and regardless how many service facilities that is optimized for. It is also shown that the simulated annealing algorithm not just is much faster than the classic heuristic used here, but also in most cases gives better location solutions.

  • 10.
    Hellsten, Maria
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Utvärdering av forensiska verktyg och teknikerför handhållna enheter2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In recent years, the market for mobile devices has increased and technological developments haveadvanced in a rapid pace. More and more communication is done through mobile and handhelddevices. Therefore, even the seizures increase by these devices, because there is often very valuableforensic information stored on them. The purpose of this work is based on a method combining aqualitative and a quantitative study examining forensic tools and techniques for handheld devices.The paper analyzed forensics description of chip-off technology and its implementation, as well asCellebrites different extraction methods are tested to see what information that is possible to extractwith each method.To seek answers, literature studies, own investigations and semi-structured interviews have beenconducted. The report is divided into different sections, where the current operating systemsAndroid and iOS, Cellebrites tools and chip-off technique are described, own investigations made,the interviews carried out and the results thereof. The results show that the type of information thatis possible to obtain, differs depending on the extraction method. Chip-off technology allows a fullphysical extraction on handheld devices that can be locked and broken, but requires some training,experience and specialized equipment.

  • 11.
    Hägg, Andreas
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Säker hantering av mobila enheter i organisationers IT-miljö2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Marknaden för mobila enheter och mobilitet har haft en kraftig utveckling de

    senaste åren och den tekniska utvecklingen har gått snabbt fram. Grunden till en

    ökad mobilitet inom förtaget ligger i att den ofta förväntas ge positiva effekter i

    ökad affärsnytta och produktivitet hos de anställda. Det är ändå viktigt att komma

    ihåg att det även finns risker med en ökad mobilitet. Risker som organisationer bör

    ta hänsyn till. Tester gjorda i detta arbete visar att det finns mycket information

    lagrad på mobila enheter. Delar av denna information kan även vara mycket

    känslig information.

    Smartphones och andra mobila enheters karakteristiska egenskaper, främst att de

    är små och bärbara, gör att de är extra sårbara för ett flertal risker och hot. De

    största hotet mot säkerheten i samband med mobila enheter anses vara risken för

    dataförlust. Denna förlust sker ofta i samband med att mobila enheter avvecklas,

    stjäls eller tappas bort. Ett annat stort hot är att information stjäls av eller sprids på

    grund av att skadlig programkod (malware) finns på enheten.

    För att komma till rätta med dessa risker och hot så behöver man titta på hur

    organisationen ska hantera situationen. Det finns på marknaden säkerhetslösningar

    för att hantera många delar av säkerhetsproblematiken. Mobile Device

    Management (MDM) är en funktionalitet som handlar om att skapa kontroll på

    tillgångar och information samt möjliggöra en säkrare användning av mobila

    enheter. Ett benchmarktest och jämförelseanalys av ett urval av marknadsledande

    MDM verktyg visar på att det finns ett gott stöd för flera säkerhetshöjande

    funktioner.

    AirWatch, MobileIron och XenMobile är tre olika MDM verktyg som alla ger ett

    bra stöd för standardiserade säkerhetshöjande funktioner för mobila enheter. Att

    göra ett bra val av verktyg kräver dock ett förarbete. Detta är nödvändigt för att

    skapa rätta förutsättningar för ett val som stödjer organisationens behov, krav och

    strategier.

  • 12.
    Höglund, Rikard
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Anonymitet på Internet: Tor och steganografi i nätverkstrafik2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 13.
    Ilar, Pontus
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Server-Side Security for Anonymous Data Collection from Handset2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digital guides are something that starts to appear more and more these days. Several digital

    guides have already been tried with mixed results. One version was developed for

    “världsarvet Falun” where a PDA was inserted into a box with speakers and a GPS and short

    videos gives information about certain locations in Falun. Another guide was developed for

    the IPhone in which static maps were displayed with information rendered by a server. This

    thesis tries to develop a server side solution for an application designed to give users a tour of

    selected so called areas of interest (aoi). The server only provides coordinates and information

    about aois and the specific points within. The solution uses a server with a database to store

    and provide information about these areas. The first prototype for the solution uses https to

    communicate with the application and SQL PDO queries to communicate with the database.

    Future work with this solution could be to upgrade the server to facilitate a larger scalability

    for the solution.

  • 14.
    Li, Yujiao
    et al.
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Fleyeh, Hasan
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Twitter Sentiment Analysis of New IKEA Stores Using Machine Learning2018In: 2018 International Conference on Computer and Applications, ICCA 2018, 2018, p. 4-11, article id 8460277Conference paper (Refereed)
    Abstract [en]

    This paper studied public emotion and opinion concerning the opening of new IKEA stores, specifically, how much attention are attracted, how much positive and negative emotion are aroused, what IKEA-related topics are talked due to this event. Emotion is difficult to measure in retail due to data availability and limited quantitative tools. Twitter texts, written by the public to express their opinion concerning this event, are used as a suitable data source to implement sentiment analysis. Around IKEA opening days, local people post IKEA related tweets to express their emotion and opinions on that. Such “IKEA” contained tweets are collected for opinion mining in this work. To compute sentiment polarity of tweets, lexiconbased approach is used for English tweets, and machine learning methods for Swedish tweets. The conclusion is new IKEA store are paid much attention indicated by significant increasing tweets frequency, most of them are positive emotions, and four studied cities have different topics and interests related IKEA. This paper extends knowledge of consumption emotion studies of prepurchase, provide empirical analysis of IKEA entry effect on emotion. Moreover, it develops a Swedish sentiment prediction model, elastic net method, to compute Swedish tweets’ sentiment polarity which has been rarely conducted.  

  • 15.
    Lindstrand, Martin
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Laws, Logs and Forensic Traceability: Case Study: Windows server applications (firewall, webserver, exchange server)2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The thesis has investigated the problem of information logging and storage from a forensic standpoint; and the study has been carried out towards a company which cannot be named for confidential reasons. what information should be logged and what has to be logged according to the Swedish law, and for how long time should the logs be saved. The problem here is to find out what in general should be saved into a log file so it can be applied to as many systems as possible. The thesis has also investigated when to do a forensic investigation and what to log in Microsoft server environment (webserver, firewall and exchange server).

    I intend to solve the problem by describing what needs to be saved in general and find out if there is a law that demands information to be logged. I intend to find out what needs to be saved from a forensic point of view. I am going to find out what should be logged on Microsoft server applications: webserver, firewall and exchange server.

    The method used to solve the problem was with practical study and literature study. Practical study where made on a Microsoft server 2012 on webserver, firewall and exchange server where I looked at the log files and what information that were saved to them.

    The report finds out what should be saved in a log file from a forensic point of view and what needs to be saved according to Swedish law. The report finds how long time the log files have to be saved. The report finds when to do a forensic investigation and what to investigate.

  • 16.
    Malek, Wasim
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Big Data Analysis in Social Networks: Extracting Food Preferences of Vegans from Twitter2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Market research is often conducted through conventional methods such as surveys, focus

    groups and interviews. But the drawbacks of these methods are that they can be costly and timeconsuming.

    This study develops a new method, based on a combination of standard techniques

    like sentiment analysis and normalisation, to conduct market research in a manner that is free

    and quick. The method can be used in many application-areas, but this study focuses mainly on

    the veganism market to identify vegan food preferences in the form of a profile.

    Several food words are identified, along with their distribution between positive and negative

    sentiments in the profile. Surprisingly, non-vegan foods such as cheese, cake, milk, pizza and

    chicken dominate the profile, indicating that there is a significant market for vegan-suitable

    alternatives for such foods. Meanwhile, vegan-suitable foods such as coconut, potato,

    blueberries, kale and tofu also make strong appearances in the profile.

    Validation is performed by using the method on Volkswagen vehicle data to identify positive

    and negative sentiment across five car models. Some results were found to be consistent with

    sales figures and expert reviews, while others were inconsistent. The reliability of the method

    is therefore questionable, so the results should be used with caution.

  • 17.
    Memedi, Mevludin
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Sadikov, Aleksander
    Faculty of Information Science, Artificial Intelligence Laboratory, University of Ljubljana, Ljubljana, Slovenia.
    Groznik, Vida
    Faculty of Information Science, Artificial Intelligence Laboratory, University of Ljubljana, Ljubljana, Slovenia.
    Žabkar, Jure
    Faculty of Information Science, Artificial Intelligence Laboratory, University of Ljubljana, Ljubljana, Slovenia.
    Možina, Martin
    Faculty of Information Science, Artificial Intelligence Laboratory, University of Ljubljana, Ljubljana, Slovenia.
    Bergquist, Filip
    Sahlgrenska Academy, Department of Pharmacology, University of Gothenburg, Gothenburg, Sweden.
    Johansson, Anders
    Neurology, Clinical Neuroscience, Karolinska Institutet, Stockholm, Sweden.
    Haubenberger, Dietrich
    NINDS Intramural Research Program, Clinical Trials Unit, National Institutes of Health, Bethesda, MD, USA.
    Nyholm, Dag
    Neurology, Neuroscience, Uppsala University, Uppsala, Sweden.
    Automatic spiral analysis for objective assessment of motor symptoms in Parkinson's disease2015In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 15, no 9, p. 23727-23744Article in journal (Refereed)
    Abstract [en]

    A challenge for the clinical management of advanced Parkinson’s disease (PD) patients is the emergence of fluctuations in motor performance, which represents a significant source of disability during activities of daily living of the patients. There is a lack of objective measurement of treatment effects for in-clinic and at-home use that can provide an overview of the treatment response. The objective of this paper was to develop a method for objective quantification of advanced PD motor symptoms related to off episodes and peak dose dyskinesia, using spiral data gathered by a touch screen telemetry device. More specifically, the aim was to objectively characterize motor symptoms (bradykinesia and dyskinesia), to help in automating the process of visual interpretation of movement anomalies in spirals as rated by movement disorder specialists. Digitized upper limb movement data of 65 advanced PD patients and 10 healthy (HE) subjects were recorded as they performed spiral drawing tasks on a touch screen device in their home environment settings. Several spatiotemporal features were extracted from the time series and used as inputs to machine learning methods. The methods were validated against ratings on animated spirals scored by four movement disorder specialists who visually assessed a set of kinematic features and the motor symptom. The ability of the method to discriminate between PD patients and HE subjects and the test-retest reliability of the computed scores were also evaluated. Computed scores correlated well with mean visual ratings of individual kinematic features. The best performing classifier (Multilayer Perceptron) classified the motor symptom (bradykinesia or dyskinesia) with an accuracy of 84% and area under the receiver operating characteristics curve of 0.86 in relation to visual classifications of the raters. In addition, the method provided high discriminating power when distinguishing between PD patients and HE subjects as well as had good test-retest reliability. This study demonstrated the potential of using digital spiral analysis for objective quantification of PD-specific and/or treatment-induced motor symptoms.

  • 18.
    Memedi, Mevludin
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering. Örebro universitet.
    Thomas, Ilias
    Dalarna University, School of Technology and Business Studies, Statistics.
    Nyholm, Dag
    Uppsala University Hospital.
    Westin, Jerker
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Senek, Marina
    Uppsala University Hospital.
    Medvedev, Alexander
    Uppsala University.
    Askmark, Håkan
    Uppsala University.
    Aquilonius, Sten-Magnus
    Uppsala University.
    Bergquist, Filip
    University of Gothenburg.
    Constantinescu, Radu
    Ohlsson, Fredrik
    Acreo AB.
    Spira, Jack
    Sensidose AB.
    Lycke, Sara
    Cenvigo AB.
    Ericsson, Anders
    Acreo AB.
    Construction of a levodopa-response index from wearable sensorsfor quantifying Parkinson’s disease motor functions: Preliminary results2016Conference paper (Other academic)
  • 19.
    Meng, Xiangli
    et al.
    Dalarna University, School of Technology and Business Studies, Statistics.
    Carling, Kenneth
    Dalarna University, School of Technology and Business Studies, Statistics.
    How to decide upon stopping a heuristic algorithm in facility-location problems?2014In: Web Information Systems Engineering – WISE 2013 Workshops: WISE 2013 International Workshops BigWebData, MBC, PCS, STeH, QUAT, SCEH, and STSC 2013, Nanjing, China, October 13-15, 2013, Revised Selected Papers / [ed] Zhisheng Huang, Chengfei Liu, Jing He, Guangyan Huang, Berlin: Springer Berlin/Heidelberg, 2014, Vol. 8182, p. 280-283Conference paper (Refereed)
    Abstract [en]

    Solutions to combinatorial optimization, such as p-median problems of locating facilities, frequently rely on heuristics to minimize the objective function. The minimum is sought iteratively and a criterion is needed to decide when the procedure (almost) attains it. However, pre-setting the number of iterations dominates in OR applications, which implies that the quality of the solution cannot be ascertained. In this paper we compare the methods proposed previous literate of estimating minimum, and propose some thought of it.

  • 20.
    Millet, Patric
    et al.
    Mittuniversitetet, Institutionen för samhällsvetenskap.
    Sandberg, Karl W
    Dalarna University, School of Technology and Business Studies, Occupational science. Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Impact of locus of control how owner-manager's perceive network usage and value in a small industrial park in rural Sweden2005In: Uddevalla symposium 2005 innovations and entrepreneurship in functional regions: papers presented at the 8 Uddevalla Symposium and the 8 McGill International Entrepreneurship Conference,15-17 September, Uddevalla, Sweden, Trollhättan: University West , 2005, p. 559-575Conference paper (Refereed)
  • 21.
    Nyberg, Mattias
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Changing to a Biometric Access System: and Its Effect on the Work Environment2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 22.
    Nyberg, Roger G.
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering. School of Engineering and the Built Environment, Edinburgh Napier University, EH10 5DT Edinburgh, UK.
    Gupta, Narendra K.
    School of Engineering and the Built Environment, Edinburgh Napier University, EH10 5DT Edinburgh, UK.
    Yella, Siril
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Dougherty, Mark
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Monitoring vegetation on railway embankments: supporting maintenance decisions2013In: Proceedings of the 2013 International Conference on Ecology and Transportation, 2013, p. 1-18Conference paper (Refereed)
    Abstract [en]

    The national railway administrations in Scandinavia, Germany, and Austria mainly resort to manual inspections to control vegetation growth along railway embankments. Manually inspecting railways is slow and time consuming. A more worrying aspect concerns the fact that human observers are often unable to estimate the true cover of vegetation on railway embankments. Further human observers often tend to disagree with each other when more than one observer is engaged for inspection. Lack of proper techniques to identify the true cover of vegetation even result in the excess usage of herbicides; seriously harming the environment and threating the ecology. Hence work in this study has investigated aspects relevant to human variationand agreement to be able to report better inspection routines. This was studied by mainly carrying out two separate yet relevant investigations.First, thirteen observers were separately asked to estimate the vegetation cover in nine imagesacquired (in nadir view) over the railway tracks. All such estimates were compared relatively and an analysis of variance resulted in a significant difference on the observers’ cover estimates (p<0.05). Bearing in difference between the observers, a second follow-up field-study on the railway tracks was initiated and properly investigated. Two railway segments (strata) representingdifferent levels of vegetationwere carefully selected. Five sample plots (each covering an area of one-by-one meter) were randomizedfrom each stratumalong the rails from the aforementioned segments and ten images were acquired in nadir view. Further three observers (with knowledge in the railway maintenance domain) were separately asked to estimate the plant cover by visually examining theplots. Again an analysis of variance resulted in a significant difference on the observers’ cover estimates (p<0.05) confirming the result from the first investigation.The differences in observations are compared against a computer vision algorithm which detects the "true" cover of vegetation in a given image. The true cover is defined as the amount of greenish pixels in each image as detected by the computer vision algorithm. Results achieved through comparison strongly indicate that inconsistency is prevalent among the estimates reported by the observers. Hence, an automated approach reporting the use of computer vision is suggested, thus transferring the manual inspections into objective monitored inspections

  • 23.
    Olsson, Jonas
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Android file browsing: Comparing file explorer features andforensic artefacts2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The goal of this work was to determine what kind of traces of user activity is left by the most popular filemanagers available on Android. This was determined by investigating their functionality, deciding onappropriate data and actions to test them and then go through them one app at a time, saving the state of filescreated by the app in-between different actions.Investigating the files that were generated by apps showed that there is a wide variety of traces depending onwhich app it was and what features it had. Some apps focus on device information while others are moreaimed at the files themselves, some even cataloguing all of the files, their sizes and location on the device.Many of them save thumbnails of pictures the user has viewed, which are kept even when that picture itselfis deleted.Not all information used in the app features was able to be gathered since the exact location they are storedwas not determined before the end of the work. However the information that was gathered was enough tostate that there is potential value in including this kind of application during a forensics investigation.

  • 24.
    Pettersson, Kim
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Android Messaging Investigator: Forensic text analysis tool for SMS, Kik and Hangouts conversations2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With increasing usage of smartphones and text messaging through SMS and instant messaging applications, comes an increased need to be able to effectively analyze textual content in a forensic manner. Many of the common forensic applications relies on simple key word searching and regular expressions to find potential evidence in smartphones.

    In this report a forensic analysis application for Android SMS, Kik and Hangouts conversations named Android Messaging Investigator (AMINV) is proposed.

    The application aims to make the forensic analysis more effective by providing the forensic investigator with sentiment analysis technology. A message written with a negative mood might contain threats or harassments that may be of interest during a forensic investigation.

    Visualization is offered to make it possible for the forensic investigator to gain an extensive visual overview over conversation and sentiment data. Common forensic software features as being able to create forensic cases, search and filter data, save evidence, validate input data through hash-sums and generating forensic reports are also provided.

    The report covers the whole software implementation process. The final results are the developed forensic application, performance measurements of the sentiment analysis tool, a general performance analysis and an extensive stress-test.

  • 25.
    Prochazka, Jiri
    et al.
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Zerin, Sonia
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Modeling Hospital Readmissions in Dalarna County, Sweden2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Unplanned hospital readmissions increase health and medical care costs and indicate lower the lower quality of the healthcare services. Hence, predicting patients at risk to be readmitted is of interest. Using administrative data of patients being treated in the medical centers and hospitals in the Dalarna County, Sweden, during 2008 – 2016 two risk prediction models of hospital readmission are built. The first model relies on the logistic regression (LR) approach, predicts correctly 2,648 out of 3,392 observed readmission in the test dataset, reaching a c-statistics of 0.69. The second model is built using random forests (RF) algorithm; correctly predicts 2,183 readmission (out of 3,366) and 13,198 non-readmission events (out of 18,982). The discriminating ability of the best performing RF model (c-statistic 0.60) is comparable to that of the logistic model. Although the discriminating ability of both LR and RF risk prediction models is relatively modest, still these models are capable to identify patients running high risk of hospital readmission. These patients can then be targeted with specific interventions, in order to prevent the readmission, improve patients’ quality of life and reduce health and medical care costs.

  • 26.
    Rebreyend, Pascal
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Lemarchand, Laurent
    Euler, Reinhardt
    A computational comparison of different algorithms for very large p-median problems2015In: Evolutionary Computation in Combinatorial Optimization: 15th European Conference, EvoCOP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings / [ed] Gabriela Ochoa, Francisco Chicano, Springer, 2015, Vol. 9026, p. 13-24Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose a new method for solving large scale p-median problem instances based on real data. We compare different approaches in terms of runtime, memory footprint and quality of solutions obtained. In order to test the different methods on real data, we introduce a new benchmark for the p-median problem based on real Swedish data. Because of the size of the problem addressed, up to 1938 candidate nodes, a number of algorithms, both exact and heuristic, are considered. We also propose an improved hybrid version of a genetic algorithm called impGA. Experiments show that impGA behaves as well as other methods for the standard set of medium-size problems taken from Beasley’s benchmark, but produces comparatively good results in terms of quality, runtime and memory footprint on our specific benchmark based on real Swedish data.

  • 27.
    Sandberg, Karl W
    Dalarna University, School of Technology and Business Studies, Occupational science. Mittuniversitetet, Institutionen för informationsteknologi och medier.
    An exploratory study of women micro enterprises owners' perceptions of economic policy in rural local district: gender-related differences2003In: Journal of Small Business and Enterprise Development, ISSN 1462-6004, E-ISSN 1758-7840, Vol. 10, no 4, p. 408-417Article in journal (Refereed)
    Abstract [en]

    This article assesses gender-related differences in rural enterprises and examines implications for development of economic policy and services in a rural district of Sweden. The article focuses on female owned micro enterprises. A quantitative and qualitative survey of 32 micro enterprise owners was carried out. Focus was on owner attitudes toward local governmental policies and programmes. There were not strong differences between genders for items using multiple-choice responses. Where qualitative, written responses were solicited there were some differences in perceptions and attitudes. The female respondents tended to write more and respond in ways that suggest that they tend to reflect more upon the future and new possibilites. Differences in style of operation were evident; others have reported this. Written responses from female participants described in greater detail and more clearly the ongoing need for governmental support of networking activities and other programmes that promote cooperation and resource pooling (regardless of gender).

  • 28.
    Sandberg, Karl W
    Dalarna University, School of Technology and Business Studies, Occupational science. Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Informatics as applied to rehabilitation2005Conference paper (Other academic)
  • 29.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Andersson, Håkan
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Usability evaluation of an interactive service on mobile phone2011In: Ergonomics for all: Celebrating PPCOE's 20 Years of Excellence / [ed] Lin, Dyi-Yih Michael, Leiden: CRC Press, 2011, p. 67-72Conference paper (Refereed)
    Abstract [en]

    Social networking services have become increasingly widespread and, together with GPS equipped with mobile phones give citizens the opportunity to create new innovative types of social networks. The service is evolving, technology-centric to positioning using GPS and Google Maps Web service should also identify existing services interfaces are analysed, and be associated with basic functions of social networks to create a new innovative service. The purpose of this work is to illustrate the usercentred interaction design for mobile phones. Research design includes user requirement analysis, prototype development and usability evaluation. The results from usability evaluation in a simulated PC-based environment, support the user tasks in an efficient manner, one can work efficiently and feels that the system is sufficiently adapted to users' needs.

  • 30.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Gard, Gunvor
    Luleå tekniska universitet.
    Innovation och e-innovation inom vård och rehabilitering?2012In: E-hälsa: Innovationer, metoder, interventioner och perspektiv / [ed] Gard, Gunvor; Melander Wikman, Anita, Lund: Studentlitteratur , 2012, p. 255-266Chapter in book (Other academic)
    Abstract [sv]

    E-hälsa – innovationer, metoder, interventioner och perspektiv tar upp definitioner och modeller för e-hälsa, metoder och processer att utveckla e-hälsa samt beskrivningar av olika projekt inom området. Boken visar på hur informations- och kommunikationsteknik kan användas inom olika områden, t.ex. hälsopromotion inom arbetslivet, telerehabilitering och verksamhetsutveckling inom logopedi samt som delaktighetsverktyg för äldre och för människor med funktionshinder.

  • 31.
    Sandberg, Karl W
    et al.
    Dalarna University, School of Technology and Business Studies, Occupational science. Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Gardelli, Åsa
    Stubbs, Jonathan
    The use of Information and Communication Technology (ICT) in the rehabilitation of individuals with severe functional impairments in a municipal care service system2005In: Work: A journal of Prevention, Assesment and rehabilitation, ISSN 1051-9815, E-ISSN 1875-9270, Vol. 24, no 3, p. 229-238Article in journal (Refereed)
    Abstract [en]

    This article explores the development of a scheme to use Information and Communication Technology (ICT) in the training of individuals with severe functional impairments. Computers were used as an integral part of a rehabilitation programme for training, and the authors found that the resource was a useful addition to other treatment methods. This article describes the development and subsequent setting up of computers for training and how the study progressed. The study used a somewhat unique bottom up approach that first trained care-giving staff in computer skills. The caregivers in turn worked with and trained some of those they served. This learning strategy drew upon the concept of learning, empowerment and the motivation of all involved in a system and process. The study found that by using ICT all involved felt a greater sense of empowerment and improvement in the quality of life. That caregivers were involved at all stages was valuable in that they felt an ownership of the process and that they also benefited from being involved because they also learned new skills.

  • 32.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Sundberg, Håkan
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Citizen friendly rural mGovernment services2007In: Work With Computing System - WWCS 2007, Stockholm: abstracts WWCS 2007 : computing systems for human benefits from the 8th International Conference on Work With Computing Systems : May 21st-24th 2007, Stockholm Sweden, Stockholm: KTH Royal Institute of Technology , 2007, p. 209-Chapter in book (Other academic)
    Abstract [en]

    This paper will describe methods of assessing a process' mobility need from a better understanding of mobility and a way of implementing a citizen and public servant perspective when defining citizen friendly rural Mobile Government (mGovernment). The expected results presented a part of an eTen-project; CIDRE. Objective is to supply electronic public services and solutions to overcome the "digital divide" and to strengthen the European Community. Advances in mGovernment oriented services are taking place and ICT usage becomes an integral part of many people�s lives and the available services become more varied.

  • 33.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Sundberg, Håkan
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    E-Government: An Improvement in Service?2004Conference paper (Refereed)
    Abstract [en]

    Managers and other key staff involved in the development of Swedish e-government services were interviewed about their perceptions of changes caused by the shift from more traditional forms of government service delivery. Almost all were satisfied with the progress of the transition. It was felt that a shift to systems that are electronically based will result in economies and greater organizational efficiency. When questioned about potential problems, most felt they were manageable. However, they did not describe strategies indicating that problems were being addressed and managed. Focus was on getting functioning systems in place and then resolving with problems as identified. Evident was that issues such as being able to effectively evaluate progress/success, creating systems accessible by all potential users, information security, understanding costs and planning for rapid technology change were being minimized or ignored. Apparent is that until the issues are adequately addressed final cost is unknown, e-government systems will not by accessible by some citizens because they lack the skills and/or resources needed to take advantage of services offered, and the extent of change is unclear. Recommended is to better define real and potential problems and then to include solutions in e-government planning, design and implementation processes.

  • 34.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Yan, Pan
    MTO-kompetens, Sundsvall, Sweden.
    Evaluation user interface of VDU in a process control room2011In: Ergonomics for all: Celebrating PPCOE's 20 Years of Excellence / [ed] Lin, Dyi-Yih Michael, Leiden: CRC Press, 2011, p. 73-77Conference paper (Refereed)
    Abstract [en]

    Varied types of Visual Display Unit (VDU) are used in modern process control rooms. The main purpose of present study is to identify and find solutions to usability problems of VDU user interface in process control room. The usability evaluation methods were heuristic evaluation, usability test, and SUMI questionnaire. Fifteen operators participated in the study. The main result from the usability test were that the time to solve the task depends on the number of false clicks and commands, and participants experienced that user interface doesn't support in an efficient manner, too many and difficult steps must be performed. To improve the user interface of VDU we have created number of guidelines; for example; create groups of the fields, buttons, text, place the buttons in functionally way, enable the user to open multiple windows, drag and drop is a dynamic operation.

  • 35.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Öhman, Gerth
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Inventions and Innovations to Develop Small Businesses in Rural Areas2010Conference paper (Refereed)
  • 36.
    Sandberg, Karl W
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Öhman, Gerth
    Mittuniversitetet, Institutionen för naturvetenskap, teknik och matematik.
    The Science of Innovation Processes and Success Factors2010In: The entrepreneurship - innovation - marketing interface : 3rd symposium, Cottbus / [ed] Baier, Daniel, Künzelsau: Swiridoff , 2010Conference paper (Refereed)
  • 37.
    Sundberg, Håkan
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Problems in public e-service development2006Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis focuses on the general problem of integration and co-operation between business and IT organisations, and on the specific problem of co-ordinating the development process across stovepiped departments that do not collaborate cross-functionally. The purpose is to increase knowledge and understanding about public organisations’ difficulties in meeting their customers’ and the organisation’s needs for electronic services. The thesis also presents a model showing the relationships between factors of importance for understanding public organisations’ difficulties in implementing cross-functional or inter-departmental electronic services. The research is based on case studies of public and private organisations, and results show that public organisations attempting e-government will face large problems if they are unable to solve their internal stovepipe problems. On the other hand, they cannot expect the stovepipe problems to be solved without increasing customer orientation. Many private organisations have increased their speed in e-services, customer orientation and organisational changes, and have faced economic pressure early, while the public organisations are impeded by the role of law, complex goal structures, lack of collaboration and culture. But at the same time the public organisations are following a similar path to that of the private, and areas have been found where there are little differences (e.g. development processes and purchaser-contractor relationships). Furthermore, the thesis has identified a large potential in the use of enterprise architecture for improving co-operation between business and IT organisations and in the purchaser-contractor relations. An architecture is an important prerequisite for dealing with the growing complexity in describing an enterprise and its business, information, applications and technology.

  • 38.
    Sundberg, Håkan P
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Sandberg, Karl W
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Managing Stovepiped Organisations - A Comparison of Public and Private Organisations2006In: International Journal of Public Information Systems, ISSN 1653-4360, Vol. 2, no 1, p. 39-54Article in journal (Refereed)
    Abstract [en]

    Stovepiped systems and difficulties associated with managing cross-functional boundaries are problems that are hindering the successful implementation of customercentred systems and processes within public organisations. The present study covers public organisations, and discusses and analyses the results in relation to those from a previous study in the banking sector. While problems with stovepiped systems and departments have, in general, been solved in the banking sector, the results from the interviewed public organisations confirm that the stovepipe problem is still evident and that cross-functional collaboration, processes, customer focus and integration of services and channels all require additional improvement or development. The present study concludes that the goals with the highest priority for leaders in public organisations are not those associated with customer relations and that the political level rates higher than the customers’ demands. The public organisations are following a similar path to that of the private sector, but there are differences in both the time-frame and ability to implement changes due to weaker incentives for customer related work, and additionally, a larger organisational inertia of both culture and collaboration to overcome. Similarities are found in IT organisations and projects, and in the views regarding business organisations and the necessity for an enterprise architecture.

  • 39.
    Sundberg, Håkan P
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Sandberg, Karl W
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Towards e-government: a survey of problems in organisational processes2006In: Business Process Management Journal, ISSN 1463-7154, E-ISSN 1758-4116, Vol. 12, no 2, p. 149-161Article in journal (Refereed)
    Abstract [en]

    Purpose ? The purpose of this paper is to look at process initiatives in the Swedish social insurance administration, focusing on the problems of crossing functional boundaries, co-ordinating processes over inter-organisational boundaries and the issue of whether to aim for radical or incremental change. Design/methodology/approach ? The survey involved data collection including a study of internal documents and 16 individual personal interviews. Findings ? The organisation experiences collaboration problems when cross-functional work and processes collide with the traditional and hierarchical command and control structures. These are not easily dismantled, meaning intensive work to change the culture and break functional mind-sets. Furthermore the administration struggles with and can benefit from co-ordination of processes over the inter-organisational boundaries. Changes in the customer front-line affect the rest of the organisation and its processes. The study has shown that both functional units and support processes deep inside the organisation, like the systems development process, are affected, and that deficiencies in the underlying structure and organisation are revealed. The process efforts so far are scattered, but it may be more important for organisations to deploy process change, as a continuous strategic initiative, rather than embarking on huge radical redesign programmes. Originality/value ? Little information regarding processes and the public sector exists, and problems likely to be encountered by other public organisations are pointed out. The survey also puts light on support processes ? not only business processes ? required for e-government.

  • 40.
    Sundberg, Håkan
    et al.
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Sandberg, Karl W
    Mittuniversitetet, Institutionen för informationsteknologi och medier.
    Critical Success Factors from a Social Insurance Project in Sweden2004Conference paper (Refereed)
    Abstract [en]

    After 30 years holding the same course, a new pension scheme and IT system was introduced in Sweden. It is described as one of Sweden�s largest IT projects with approx. 1 800 000 lines of code produced by the IT department of the Swedish social insurance administration. The administration uses a purchaser-contractor model for systems development where the IT department supervises the development and management of the IT facilities used by the national social insurance system. The project has been evaluated several times pointing out critical success factors for future large-scale projects. This study examines the critical success factors in relation to the purchaser-contractor model and the administration�s e-government efforts. Many factors refer to the roles in the purchaser-contractor model suggesting comprehensive views from all dimensions and communication and collaboration between the parts in the model. Another important factor is the project management. This suggests joint projects over the purchaser-contractor boundaries, uniting of overall leadership, overall planning, an operative project management, strong focus on goals and continuous follow-up. Other factors refer to the development process and it�s contents, suggesting a clarifying �baseline� after initial capturing of requirements not allowing more than regulated changes after the baseline. Special organisational structures are suggested for handling changes in requirements, for planning deliverables and for installation. Lastly, priority and support from top management was considered important. Furthermore the administration is on a path towards e-government, changing the organisation and processes in the customer front-line. A general process for management of the case workflow has been introduced, where the workflow is being managed in a general and similar way. A case management system has been developed that supports the general process. Web services for e-government will be ... (shortened)

  • 41.
    Szreder, Agnieszka
    et al.
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Reimertz, Sara
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Utveckling av en Android applikation för upplysning om tillsatser i livsmedelsprodukter.2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Additives in food is a hot topic where its needs are questioned. One people says that they can induce illnesses, while others feel that they save our lives [1]. By that means that some additives are necessary to prevent growth of dangerous bacteria, like the ones which can cause botulinum poisoning. Despite of that fact, it is believed that a consumer have the right to be aware of the additives impact on their health, good and bad. This was a foundation of the created application where the user has the possibility to get that information. For the information to be simple and fast to take part of, a barcode reader is used to scan the product and get relevant details direct on mobiles screen. It was even considered that there could be a need of information about allergens in food. Due to that, an extra function has been developed where the user can choose to be warned about certain allergens. A warning is shown each time some of the chosen allergens is found in the food.

  • 42.
    Thelander, Pierre
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Multifaktorautentisering mot Office 365 inom små till medelstora företag: En studie av autentiseringsmetoder2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today we live in a digitalized society, where the daily IT- operations often are stored in different environments. CloudPro AB is a company whose using Office 365 and wants to find out what authorization methods that is being offered and which one is the safest and most user-friendly. The study will focus on the problem Security Fatigue, the study of how users feel reluctant towards handling computer safety. The purpose is to look at the authorization methods for Office 365 and highlight both weaknesses and strengths. It will also test how user-friendly the different authorization methods are. To answer this, two different methods have been used. One literal study and one practical. The result presents both the weaknesses and strengths which comes along with these methods and a demonstration shows the different methods linked to certain scenarios. The results show that the authorization method "push notification" is the method that fill most of the companies’ desires concerning safety and how user friendly it is.

  • 43.
    Thomas, Ilias
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Automating levodopa dosing schedules for Parkinson’s disease2019Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Parkinson’s disease (PD) is the second most common neurodegenerative disease. Levodopa is mainly used to manage the motor symptoms of PD. However, disease progression and long-term use of levodopa cause reduced medication efficacy and side effects. When that happens, precise individualized dosing schedules are required.

    This doctoral thesis in the field of Micro-data analysis introduces an end-to-end solution for the automation of the pharmacological management of PD with levodopa, and offers some insight on levodopa pharmacodynamics. For that purpose, an algorithm that derives objective ratings for the patients’ motor function through wearable sensors is introduced, a method to construct individual patient profiles is developed, and two dosing algorithms for oral and intestinal administration of levodopa are presented. Data from five different sources were used to develop the methods and evaluate the performance of the proposed algorithms.

    The dose automation algorithms can work both with clinical and objective ratings (through wearable devices), and their application was evaluated against dosing adjustments from movement disorders experts. Both dosing algorithms showed promise and their dosing suggestions were similar to those of the clinicians.

    The objective ratings algorithm had good test-retest reliability and its application during a clinical study was successful. Furthermore, the method of fitting individual patient models was robust and worked well with the objective ratings algorithm. Finally, a study was carried out that showed that about half the patients on levodopa treatment show reduced response during the afternoon hours, pointing to the need for more precise modelling of levodopa pharmacodynamics.

  • 44.
    Thomas, Ilias
    Dalarna University, School of Technology and Business Studies, Microdata Analysis.
    Optimizing levodopa dosing routines for Parkinson’s disease2017Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis in the field of microdata analysis aims to introduce dose optimizing algorithms for the pharmacological management of Parkinson’s disease (PD). PD is a neurodegenerative disease that mostly affects the motor functions of the patients and it is characterized as a movement disorder. The core symptoms of PD are: bradykinesia, postural instability, rigidity, and tremor. There is no cure for PD and the use of levodopa to manage the core symptoms is considered the gold standard. However, long term use of levodopa causes reduced medication efficacy, and side effects, such as dyskinesia, which can also be attributed to overmedication. When that happens precise individualized dosing schedules are required. The goal of this thesis is to examine if algorithmic methods can be used to find dosing schedules that treat PD symptoms and minimize manifestation of side effects. Data from three different sources were used for that purpose: data from a clinical study in Uppsala University hospital in 2015, patient admission chart data from Uppsala University hospital during 2011-2015, and data from a clinical study in Gothenburg University during 2016-2017. The data were used to develop the methods and evaluate the performance of the proposed algorithms.The first algorithm that was developed was a sensor-based method that derives objective measurements (ratings) of PD motor states. The construction of the sensor index was based on subjective ratings of patients’ motor functions made by three movement disorder experts. This sensor-based method was used when deriving algorithmic dosing schedules. Afterwards, a method that uses medication information and ratings of the patients’ motor states to fit individual patient models was developed. This method uses mathematical optimization to individualize specific parameters of dose-effects models for levodopa intake, through minimizing the distance between motor state ratings and dose-effect curves. Finally, two different dose optimization algorithms were developed and evaluated, that had as input the individual patient models. The first algorithm was specific to continuous infusion of levodopa treatment, where the patient’s state was set to a specific target value and the algorithm made dosing adjustments to keep that patients motor functions on that state. The second algorithm concerned oral administration of microtables of levodopa. The ambition with this algorithm was that the suggested doses would find the right balance between treating the core symptoms of PD and, at the same time, minimizing the side effects of long term levodopa use, mainly dyskinesia. Motor state ratings for this study were obtained through the sensor index. Both algorithms followed a principle of deriving a morning dose and a maintenance dose for the patients, with maintenance dose being an infusion rate for the first algorithm, and oral administration doses at specific time points for the second algorithm.The results showed that the sensor-based index had good test-retest reliability, sensitivity to levodopa treatment, and ability to make predictions in unseen parts of the dataset. The dosing algorithm for continuous infusion of levodopa had a good ability to suggest an optimal infusion rating for the patients, but consistently suggested lower morning dose than what the treating personnel prescribed. The dosing algorithm for oral administration of levodopa showed great agreement with the treating personnel’s prescriptions, both in terms of morning and maintenance dose. Moreover, when evaluating the oral medication algorithm, it was clear that the sensor index ratings could be used for building patient specific models.

  • 45.
    Wallin, Patric
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Laws, Logs and Forensic Traceability: Case Study: Amazon Web Services & Cloud Watch2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis presents research around various aspects concerning log files. Forensic traceability within log files and how the Swedish law regulates saving them. It is mainly a literature study focusing on what information is to be saved within log files, but also when is a forensic investigation worth doing. Log files today is very important as it is the main source to get evidence of events and incidents. Within a log file there can be a lot of information fields, but are all of the information sent to a log file relevant? Most of the time it’s not. the most important fields are IP, Time, what did happen and why did it happen. Of course all of this cannot always be within one single log file, it needs to be correlated with IDS/IPS and other IT security Software and/or Hardware. A practical part of this work is the research around Cloud history/models/services, and how a company can get secure and reliable log files. Amazon Web Services is used for the practical part with its EC2, S3, Cloud Watch and Cloud Trail services.

  • 46.
    Wilhelmsson, Tobias
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Undersökning av GDPR och NIS samt dess betydelse för enkla hemsidor2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I detta arbetet har det genomförts två undersökningar. Den ena undersökningen handlar om GDPR och den andra om NIS. Dessa två regelverk är skapade av EU för att säkra upp när det gäller cyberattacker och att styrka individers möjlighet att hantera sina personuppgifter. Det har även skapats en enkel hemsida i arbetet. Denna hemsidan är ett experiment för att ta reda på vad någon som äger eller tillhandahåller en enkel hemsida bör tänka på när det kommer till GDPR och NIS. Hemsidan i sig är tänkt att ge möjlighet för människor att träffa andra med samma intresse eller träffa de som befinner sig i liknande livssituationer. GDPR är en förnyelse av Sveriges tidigare lag PUL. GDPR är en förordning från EU vilket innebär att den måste följas mer noggrant än PUL. PUL var ett direktiv från EU. Ett direktiv väger inte lika tungt som en förordning. GDPR ger EU:s medlemsländers medborgare starkare rättigheter till deras personuppgifter. Det innebär att de har rätt att veta vad och varför personuppgifter hanteras. De har även rätt till radering vilket innebär att en organisation måste radera personuppgifter om de inte längre har någon anledning att fortsätta behandla dem. Det kan handla om rättslig påverkan eller en intresseavvägning om en personuppgift får behandlas vidare eller inte. NIS är som sagt skapat av EU, detta är ett direktiv som beskrivit lite tidigare i detta stycke vad det innebär. Här har EU:S medlemsländer lite friare händer. Det finns mål som skall uppfyllas men medlemsländerna får själva bestämma hur målen skall uppnås. NIS handlar om cybersäkerheten inom EU. Det gäller att stärka den lägstanivå som finns. Jobba med att vara bättre förberedd om en incident skulle inträffa och på så sätt ge ett bättre grundskydd mot cyberattacker. Vad gäller en enkel hemsida så har GDPR en del att säga till om. Om man sparar data i en databas så skall de som personuppgifterna tillhör veta om det och samtycka till det. Det skall även kunna gå att få fram informationen som är sparad om personerna och även radering av personuppgifter om så önskas. En registrerad skall kunna få information om personuppgifter som sparas hos en personuppgiftsbehandlare utan att betala för det. När det gäller NIS och enkla hemsidor så är det i regel inget som rör den som tillhandahåller hemsidan eller hemsidans ägare. Det krävs i så fall att det är större företag med stor omsättning och som har huvudkontor i Sverige.

  • 47.
    Wretlind, Kristoffer
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Separation av resurser i molntjänstarkitekturer: Separation of Resources in Cloud Architectures2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Molnet är ett evolutionärt koncept som erbjuder en konkurrenskraft – och kostnadskontroll för företag

    genom att integrera olika och existerande teknik. Molnet avser både applikationer som levereras som

    tjänst över Internet, och hårdvara – och mjukvara som tillhandahålls i dessa tjänster. För att kunna dra

    nytta av pris – och prestationsfördelar som molnet erbjuder innebär det att resurser är konsoliderade

    mellan flera kunder i samma infrastruktur. Det är med hänsyn till en konsoliderad miljö som isolering

    av kunders resurser är särskilt viktigt att beakta. Syftet med min studie är att identifiera de risker

    gällande separation av resurser som medföljer en molnbaserad infrastruktur, och lyfta fram olika

    mekanismer för att säkert tillgodogöra behovet, samt att belysa homomorfisk kryptering som en

    separationsmekanism. I uppsatsens litteraturstudie presenterar jag de väsentliga risker som gäller

    separation av resurser från andra kunder och från leverantören, och vanligt förekommande logiska

    separationsmekanismer och deras funktioner som riskåtgärder för de presenterade riskerna. Läran om

    kryptografi sammanfattas i syftemål att presentera homomorfisk kryptering och dess anknytning till

    resursseparation. Litteraturstudier och intervjuer med såväl kunder som leverantörer av molntjänster

    har berett mig ett underlag för att kunna utvärdera de presenterade mekanismerna. Studiens resultat

    visade att stark isolering från andra kunder kan uppnås, men att det är problematiskt att fullständigt

    separera resurser från leverantören. Resultatet har dessutom visat att krypteringsalgoritmer som är

    homomorfiska kan vara säkra men brister i dess ineffektivitet att praktiskt kunna tillämpas.

  • 48.
    Zakrisson, Emma
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    En granskning av personuppgifters flöde genom Falu kommuns gymnasiala Vuxenutbildning i enlighet med General Data Protection Regulation, GDPR2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    On May 25, 2018, the EU's new data protection regulation will come into force throughout the EU. The English name of this regulation is the Data Protection Regulation which is shortened GDPR. The purpose of the new data protection regulation is to ensure people's right to protection of their personal data, which will strengthen personal integrity in an increasingly digitized world. This will be done by establishing rules for the free flow of personal data within the EU. The Data Protection Regulation will place high demands on organizations that have to undergo major change efforts to comply with the regulatory requirements.

    One of the aims of this study has been to investigate whether the operation of the adult education within the municipality of Falun is sustainable in view of the requirements of the new data protection regulation. With this as a starting point, a review of the handling of personal data has been identified. One of the study's issues has been to identify critical points in the adult education activities where personal data incidents could occur. In the study, mixed techniques have been used to gather the necessary information in relation to the questions. Literature studies have been conducted in the field of data protection regulation and information security in general. In addition, gathering of empirical data has been done through oral and written interviews with selected key persons in the organization. Based on this information, a mapping and analysis has been made, which has resulted in an evaluation of the organizations processes in which personal data are handled. With that as a starting point, the questions have been as critical points have been identified and recommended working methods have been presented.

    The study's results show that the municipality of Falun has begun adaptation work to meet the requirements of the new data protection regulation. However, the work has started so late that you still have a lot of work left to implement in the organization. The Data Protection Regulation was adopted on April 27, 2016, which means that in practice they have had at least two years to prepare. For Falun municipality to meet the new requirements of the Data Protection Regulation, key factors are the management's commitment and understanding, as well as the implementation of custom education for all staff in the organization. The study also shows that the adaptation to the new data protection regulation is a continuous work, which should be achieved systematically over time.

    In the environmental surveillance of other municipalities, many have begun their work with an adaptation to the new data protection regulation. These are, like the municipality of Falun, far from fully prepared for the data protection regulation to enter into force on May 25, 2018.

  • 49.
    Zhang, Sheng
    et al.
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China.;Dalarna Univ, Business Intelligence & Informat, Borlange, Sweden..
    Liu, Xiaodong
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China..
    Bao, Xiaoling
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China..
    Song, William Wei
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Multilayer and multi-agent data fusion in WSN2015In: Web Information Systems Engineering – WISE 2014 Workshops: 15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers / [ed] Boualem Benatallah, Azer Bestavros, Barbara Catania, Armin Haller, Yannis Manolopoulos, Athena Vakali, Yanchun Zhang, 2015, Vol. 9051, p. 211-225Conference paper (Refereed)
    Abstract [en]

    In the wireless sensor networks, the hardware limitations of sensor nodes cause high transmission failure rate. We usually increase the density of nodes to improve the quality of information transmission. However, it is difficult for the limited energy supply, storage, and communication bandwidth to transfer large amount of redundant sensory data. So we use data fusion technology to remove the redundant data as much as possible before the data transmission. Data fusion becomes a research hotspot in recent years. In this paper we propose a multilayer and multi-agent data fusion mode, and analyze the proposed mode performance in three aspects: hops, energy consumption and network delay. The simulation experiments show that, if reasonably suitable parameters, such as the network scale, the number and size of agents, the data processing cost, are selected, the mobile agent mode is much better than the client/server mode.

  • 50.
    Zhao, Xiaoyun
    et al.
    Dalarna University, School of Technology and Business Studies, Statistics.
    Rebreyend, Pascal
    Dalarna University, School of Technology and Business Studies, Computer Engineering.
    Håkansson, Johan
    Dalarna University, School of Technology and Business Studies, Information Systems. Dalarna University, School of Technology and Business Studies, Human Geography.
    How does the complexity of a road network affect optimal facility locations?2015Report (Other academic)
    Abstract [en]

    The road network is a necessary component in transportation. It facilitiesspatial movements of people and goods, and it also influences the optimal locations of facilities that usually serve as destinations of the movements. To fulfill the transportation needs and to adapt to the facility development, the road network is often organized hierarchically and asymmetrically with various road levels and spatial structures. The complexity of the road network increases along with the increase of road levels and spatial structures. However, location models locate facilities on a given road network, usually the most complex one, and the influence from the complexity of road network in finding optimal locations is not well-studied. This paper aims to investigate how the complexity of a road network affects the optimal facility locations by applying the widely-applied p-median model. The main result indicates that an increase in road network complexity, up to a certain level, can obviously improve the solution, and the complexity beyond that level does not always lead to better solutions. Furthermore, the result is not sensitive to the choice of algorithms. In a specific case study, a detailed sensitivity analysis of algorithm and facility number further provides insight into computation complexity and location problems from intra-urban to inter-urban.

12 1 - 50 of 51
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf