Change search
Refine search result
1234567 1 - 50 of 3012
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbas, Mhd Yazan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ferzali, Ali
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    A mobile Application development in the Android Studio platform for leave applications2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Nowadays, there is a mobile application for almost every need, for instance, training, games, and news applications. Almost all the companies have also their own mobile applications that facilitate the daily communication between their employees and supervisors. In this thesis, the development process of an Android application for the company Askås is created, where the employees can for example send a Flex application or sick leave application, see their registered personal information and edit them. The final result of the project is almost what Askås asked for, An Android application that facilitates their employees’ daily needs. The development process, the results, and the encountered problems are also represented in a more detailed manner in the thesis. 

  • 2.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Jibran, Muhammad Ali
    Jeju Natl Univ, Dept Comp Engn, Jeju 63243, South Korea..
    Afaq, Muhammad
    Sarhad Univ Sci & Informat Technol, Pakistan..
    Song, Wang-Cheol
    Jeju Natl Univ, South Korea..
    An adaptive approach to vehicle trajectory prediction using multimodel Kalman filter2020In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, article id e3734Article in journal (Refereed)
    Abstract [en]

    With the aim to improve road safety services in critical situations, vehicle trajectory and future location prediction are important tasks. An infinite set of possible future trajectories can exit depending on the current state of vehicle motion. In this paper, we present a multimodel-based Extended Kalman Filter (EKF), which is able to predict a set of possible scenarios for vehicle future location. Five different EKF models are proposed in which the current state of a vehicle exists, particularly, a vehicle at intersection or on a curve path. EKF with Interacting Multiple Model framework is explored combinedly for mathematical model creation and probability calculation for that model to be selected for prediction. Three different parameters are considered to create a state vector matrix, which includes vehicle position, velocity, and distance of the vehicle from the intersection. Future location of a vehicle is then used by the software-defined networking controller to further enhance the safety and packet delivery services by the process of flow rule installation intelligently to that specific area only. This way of flow rule installation keeps the controller away from irrelevant areas to install rules, hence, reduces the network overhead exponentially. Proposed models are created and tested in MATLAB with real-time global positioning system logs from Jeju, South Korea.

  • 3.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Muhammad, Afaq
    Sarhad Univ Sci & Informat Technol, Dept Comp Sci & IT, Peshawar, Pakistan.
    Song, Wang-Cheol
    Jeju Natl Univ, Dept Comp Engn, Jeju, South Korea.
    Road-Aware Estimation Model for Path Duration in Internet of Vehicles (IoV)2019In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 109, no 2, p. 715-738Article in journal (Refereed)
    Abstract [en]

    In Internet of Vehicles (IoV), numerous routing metrics have been used to assess the performance of routing protocols such as, packet delivery ratio, throughput, end-to-end delay and path duration. Path duration is an influential design parameter, among these routing metrics, that determines the performance of vehicular networks. For instance, in highly dynamic scenarios, it can be used to predict link life time in on-demand routing protocols. In this paper, we propose an infrastructure-assisted hybrid road-aware routing protocol which is capable of enhanced vehicle-to-vehicle and vehicle-to-infrastructure communication. A remarkable aspect of the proposed protocol is that it establishes a link between path duration and fundamental design parameters like vehicular velocity, density, hop count and transmission range. Although, a lot of research has been previously performed, a well defined analytical model for IoV is not available in the literature. Precisely, a relation between path duration and vehicular velocity has not been validated in the previous studies. Experimental results show that the increased packet delivery ratio with reduced end-to-end delay can be achieved by the prediction of path duration. Proposed model for path duration is validated by getting experimental results from network simulator 3 (NS3) and analytical results from MATLAB. In addition, SUMO simulator was used to generate real time traffic on the roads of Gangnam district, South Korea.

    Download full text (pdf)
    fulltext
  • 4.
    Abdollahi, Kamran
    et al.
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Shams Shafigh, Alireza
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Improving Performance of On Demand Multicast Routing by deleting lost join query packet2010In: Proceedings of The Sixth Advanced International Conference on Telecommunications - AICT 2010, IEEE conference proceedings, 2010, p. 316-322Conference paper (Refereed)
    Abstract [en]

    A Mobile ad hoc network is a collection of wireless nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. The network topology dynamically changes frequently in an unpredictable manner since nodes are free to move. Support for multicasting is essential in such environment as it is considered to be an efficient way to deliver information from source nodes to many client nodes. A problem with multicast routing algorithms is their efficiency as their forwarding structure determines the overall network resource consumption makes them significantly less efficient than unicast routing algorithms. In this research, we improve the performance of the popular ODMRP multicast routing protocol by restricting the domain of join query packets, which have been lost. This is achieved by augmenting the join query packets with minimum extra information (one field), which denotes the number of the visited node from previous forwarding group. Simulation results show, that our mechanisms significantly reduce the control traffic and thus the overall latency and power consumption in the network.

  • 5.
    Aboueata, N.
    et al.
    Qatar University, Doha, Qatar.
    Alrasbi, S.
    Qatar University, Doha, Qatar.
    Erbad, A.
    Qatar University, Doha, Qatar.
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Bhamare, Deval
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Supervised machine learning techniques for efficient network intrusion detection2019In: Proceedings - International Conference on Computer Communications and Networks, ICCCN, IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) are being widely deployed and utilized by end users, including many private as well as public organizations. Despite its wide-spread acceptance, security is still the biggest threat in cloud computing environments. Users of cloud services are under constant fear of data loss, security breaches, information theft and availability issues. Recently, learning-based methods for security applications are gaining popularity in the literature with the advents in machine learning (ML) techniques. In this work, we explore applicability of two well-known machine learning approaches, which are, Artificial Neural Networks (ANN) and Support Vector Machines (SVM), to detect intrusions or anomalous behavior in the cloud environment. We have developed ML models using ANN and SVM techniques and have compared their performances. We have used UNSW-NB-15 dataset to train and test the models. In addition, we have performed feature engineering and parameter tuning to find out optimal set of features with maximum accuracy to reduce the training time and complexity of the ML models. We observe that with proper features set, SVM and ANN techniques have been able to achieve anomaly detection accuracy of 91% and 92% respectively, which is higher compared against that of the one achieved in the literature, with reduced number of features needed to train the models.

  • 6.
    Abrahamsson, Henrik
    et al.
    RISE SICS.
    Abdesslem, Fehmi Ben
    RISE SICS.
    Ahlgren, Bengt
    RISE SICS.
    Björkman, Mats
    Mälardalen University.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Marsh, Ian
    RISE SICS.
    Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications2018Conference paper (Refereed)
  • 7.
    Abrahamsson, Henrik
    et al.
    RISE SICS, Stockholm, Sweden.
    Ben Abdesslem, Fehmi
    RISE SICS, Stockholm, Sweden.
    Ahlgren, Bengt
    RISE SICS, Stockholm, Sweden.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Marsh, Ian
    RISE SICS, Stockholm, Sweden.
    Bjorkman, Mats
    Mälardalens högskola.
    Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance2018In: 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA), IEEE, 2018Conference paper (Refereed)
    Abstract [en]

    Connected vehicles can make roads traffic safer and more efficient, but require the mobile networks to handle time-critical applications. Using the MONROE mobile broadband measurement testbed we conduct a multi-access measurement study on buses. The objective is to understand what network performance connected vehicles can expect in today's mobile networks, in terms of transaction times and availability. The goal is also to understand to what extent access to several operators in parallel can improve communication performance. In our measurement experiments we repeatedly transfer warning messages from moving buses to a stationary server. We triplicate the messages and always perform three transactions in parallel over three different cellular operators. This creates a dataset with which we can compare the operators in an objective way and with which we can study the potential for multi-access. In this paper we use the triple-access dataset to evaluate single-access selection strategies, where one operator is chosen for each transaction. We show that if we have access to three operators and for each transaction choose the operator with best access technology and best signal quality then we can significantly improve availability and transaction times compared to the individual operators. The median transaction time improves with 6% compared to the best single operator and with 61% compared to the worst single operator. The 90-percentile transaction time improves with 23% compared to the best single operator and with 65% compared to the worst single operator.

  • 8. Abu Bakar, Sakhinah
    et al.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Characterization of essential proteins in proteins interaction networks2013In: Journal of Quality Measurement and Analysis, ISSN 1823-5670, Vol. 9, no 2, p. 11-26Article in journal (Refereed)
  • 9.
    Adams, Paul C.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Geography, Media and Communication (from 2013). University of Texas at Austin, USA.
    Geographies of media and communication II: Arcs of communication2018In: Progress in Human Geography, ISSN 0309-1325, E-ISSN 1477-0288, Vol. 42, no 4, p. 590-599Article in journal (Refereed)
    Abstract [en]

    Some of the most perceptive contributions to the geographic study of media and communication have been in areas of landscapes studies and geohumanities. To bring landscape and geohumanities insights together more explicitly with communication and media, this progress report draws on George Revill’s concept of an ‘arc of sound’, expanding the concept’s scope to an arc of communication – a dynamic trajectory connecting one vantage point to another through various translations and shifts. It is a mix of integration and translation that forms its own space, place and time, integrating elements of embodied performance, multiple sensory modalities, temporality, absence and excess. Arcs of communication often depend on collaboration and can produce transformations of identity. The concept of the arc of communication enables discovery of numerous threads connecting landscape studies to geohumanities while deepening geographical understandings of media and communication.

  • 10. Adams, Robin
    et al.
    Fischer, Sally
    Pears, Arnold
    Börstler, Jürgen
    Boustedt, Jonas
    Dalenius, Peter
    Eken, Gunilla
    Heyer, Tim
    Jacobsson, Andreas
    Lindberg, Vanja
    Molin, Bemgt
    Moström, Jan-Erik
    Wiggberg, Mattias
    What is the Word for "Engineering" in Swedisch: Swedish Students Conceptions of their Discipline2007Report (Refereed)
  • 11.
    Adamsson, Tim
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Kravrekommendation: En undersökning för kravrekommendationer för Nya Intranätets forum på Karlstad Universitet2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    Adamsson Tim, Kravrekommendationer
  • 12.
    Adolfsson, David
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Channel Estimation Optimization in 5G New Radio using Convolutional Neural Networks2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Channel estimation is the process of understanding and analyzing the wireless communication channel's properties. It helps optimize data transmission by providing essential information for adjusting encoding and decoding parameters. This thesis explores using a Convolutional Neural Network~(CNN) for channel estimation in the 5G Link Level Simulator, 5G-LLS, developed by Tietoevry. The objectives were to create a Python framework for channel estimation experimentation and to evaluate CNN's performance compared to the conventional algorithms Least Squares~(LS), Minimum Mean Square Error~(MMSE) and Linear Minimum Mean Square Error~(LMMSE). Two distinct channel model scenarios were investigated in this study.

    The results from the study suggest that CNN outperforms LMMSE, LS, and MMSE regarding Mean Squared Error~(MSE) for both channel models, with LMMSE at second place. It managed to lower to the MSE by 85\% compared to the LMMSE for the correlated channel and 78\% for the flat fading channel. In terms of the overall system-level performance, as measured by Bit-Error Rate (BER), the CNN only managed to outperform LS and MMSE. The CNN and the LMMSE yielded similar results. This was due to that the LMMSE's MSE was still good enough to demodulate the symbols for the QPSK modulation scheme correctly. 

    The insights in this thesis work enables Tietoevry to implement more machine learning algorithms and further develop channel estimation in 5G telecommunications and wireless communication networks through experiments in 5G-LLS. Given that the CNN did not increase the performance of the communication system, future studies should test a broader range of channel models and consider more complex modulation schemes. Also, studying other and more advanced machine learning techniques than CNN is an avenue for future research.

    Download full text (pdf)
    ChannelEstimationIn5GNR-davidadolfsson
    Download full text (pdf)
    Arkivfil
  • 13.
    Afifi, Haitham
    et al.
    Hasso Platter Institute, Germany.
    Ramaswamy, Arunselvan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karl, Holger
    Hasso Platter Institute, Germany.
    Reinforcement learning for autonomous vehicle movements in wireless multimedia applications2023In: Pervasive and Mobile Computing, ISSN 1574-1192, E-ISSN 1873-1589, Vol. 92, article id 101799Article in journal (Refereed)
    Abstract [en]

    We develop a Deep Reinforcement Learning (DeepRL)-based, multi-agent algorithm to efficiently control autonomous vehicles that are typically used within the context of Wireless Sensor Networks (WSNs), in order to boost application performance. As an application example, we consider wireless acoustic sensor networks where a group of speakers move inside a room. In a traditional setup, microphones cannot move autonomously and are, e.g., located at fixed positions. We claim that autonomously moving microphones improve the application performance. To control these movements, we compare simple greedy heuristics against a DeepRL solution and show that the latter achieves best application performance. As the range of audio applications is broad and each has its own (subjective) per-formance metric, we replace those application metrics by two immediately observable ones: First, quality of information (QoI), which is used to measure the quality of sensed data (e.g., audio signal strength). Second, quality of service (QoS), which is used to measure the network's performance when forwarding data (e.g., delay). In this context, we propose two multi-agent solutions (where one agent controls one microphone) and show that they perform similarly to a single-agent solution (where one agent controls all microphones and has a global knowledge). Moreover, we show via simulations and theoretical analysis how other parameters such as the number of microphones and their speed impacts performance.

  • 14.
    Afzal, Samira
    et al.
    Alpen-Adria-Universität Klagenfurt, Austria.
    Ferlin-Reiter, SimoneKarlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Red Hat Ab.Hoßfeld, TobiasUniversity of Würzburg, Germany.Schatz, RaimundAustrian Institute of Technology, Austria.Timmerer, ChristianAlpen-Adria-Universität Klagenfurt, Austria.
    GMSys '23: Proceedings of the First International Workshop on Green Multimedia Systems2023Conference proceedings (editor) (Refereed)
  • 15.
    Afzal, Zeeshan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Towards Secure Multipath TCP Communication2017Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The evolution in networking coupled with an increasing demand to improve user experience has led to different proposals to extend the standard TCP. Multipath TCP (MPTCP) is one such extension that has the potential to overcome few inherent limitations in the standard TCP. While MPTCP's design and deployment progresses, most of the focus has been on its compatibility. The security aspect is confined to making sure that the MPTCP protocol itself offers the same security level as the standard TCP.

    The topic of this thesis is to investigate the unexpected security implications raised by using MPTCP in the traditional networking environment. The Internet of today has security middle-boxes that perform traffic analysis to detect intrusions and attacks. Such middle-boxes make use of different assumptions about the traffic, e.g., traffic from a single connection always arrives along the same path. This along with many other assumptions may not be true anymore with the advent of MPTCP as traffic can be fragmented and sent over multiple paths simultaneously.

    We investigate how practical it is to evade a security middle-box by fragmenting and sending traffic across multiple paths using MPTCP. Realistic attack traffic is used to evaluate such attacks against Snort IDS to show that these attacks are feasible. We then go on to propose possible solutions to detect such attacks and implement them in an MPTCP proxy. The proxy aims to extend the MPTCP performance advantages to servers that only support standard TCP, while ensuring that intrusions can be detected as before. Finally, we investigate the potential MPTCP scenario where security middle-boxes only have access to some of the traffic. We propose and implement an algorithm to perform intrusion detection in such situations and achieve a nearly 90% detection accuracy. Another contribution of this work is a tool, that converts IDS rules into equivalent attack traffic to automate the evaluation of a middle-box.

    Download full text (pdf)
    fulltext
    Download (jpg)
    omslag
  • 16.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). KTH Royal Institute of Technology, Sweden.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). SINTEF Digital, Trondheim, NOR.
    Using Features of Encrypted Network Traffic to Detect Malware2021In: Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings / [ed] Mikael Asplund; Simin Nadjm-Tehrani, Springer Publishing Company, 2021Conference paper (Refereed)
    Abstract [en]

    Encryption on the Internet is as pervasive as ever. This hasprotected communications and enhanced the privacy of users. Unfortu-nately, at the same time malware is also increasingly using encryptionto hide its operation. The detection of such encrypted malware is cru-cial, but the traditional detection solutions assume access to payloaddata. To overcome this limitation, such solutions employ traffic decryp-tion strategies that have severe drawbacks. This paper studies the usageof encryption for malicious and benign purposes using large datasets andproposes a machine learning based solution to detect malware using con-nection and TLS metadata without any decryption. The classification isshown to be highly accurate with high precision and recall rates by usinga small number of features. Furthermore, we consider the deployment as-pects of the solution and discuss different strategies to reduce the falsepositive rate.

  • 17.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Partial Signature Matching in an MPTCP World using Insert-only Levenshtein DistanceManuscript (preprint) (Other academic)
  • 18.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications2018In: Proceedings of NTMS 2018 Conference and Workshop, New York: IEEE, 2018, p. 1-5Conference paper (Refereed)
    Abstract [en]

    Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.

    Download full text (pdf)
    fulltext
  • 19.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Using Partial Signatures in Intrusion Detection for Multipath TCP2019In: Secure IT-systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings / [ed] Aslan Askarov, René Rydhof Hansen, Willard Rafnsson, Cham, Switzerland: Springer, 2019, p. 71-86Conference paper (Refereed)
    Abstract [en]

    Traditional security mechanisms such as signature basedintrusion detection systems (IDSs) attempt to find a perfect match of aset of signatures in network traffic. Such IDSs depend on the availabilityof a complete application data stream. With emerging protocols such asMultipath TCP (MPTCP), this precondition cannot be ensured, result-ing in false negatives and IDS evasion. On the other hand, if approximatesignature matching is used instead in an IDS, a potentially high numberof false positives make the detection impractical. In this paper, we showthat, by using a specially tailored partial signature matcher and knowl-edge about MPTCP semantics, the Snort3 IDS can be empowered withpartial signature detection. Additionally, we uncover the type of Snort3rules suitable for the task of partial matching. Experimental results withthese rules show a low false positive rate for benign traffic and highdetection coverage for attack traffic.

  • 20.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Automated Testing of IDS Rules2015In: Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, IEEE, 2015Conference paper (Refereed)
    Abstract [en]

    As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts to exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) to detect and prevent the vulnerabilities. The rule sets have become so large that it seems infeasible to verify their precision or identify overlapping rules. This work proposes a methodology consisting of a set of tools that will make rule management easier.

  • 21.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    IDS rule management made easy2016In: Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on, IEEE, 2016Conference paper (Refereed)
    Abstract [en]

    Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.

  • 22.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Multipath TCP IDS Evasion and Mitigation2015In: Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings / [ed] Javier Lopez & Chris J. Mitchell, Springer, 2015, Vol. 9290, p. 265-282Conference paper (Refereed)
    Abstract [en]

    The existing network security infrastructure is not ready for future protocols such as Multipath TCP (MPTCP). The outcome is that middleboxes are configured to block such protocols. This paper studies the security risk that arises if future protocols are used over unaware infrastructures. In particular, the practicality and severity of cross-path fragmentation attacks utilizing MPTCP against the signature-matching capability of the Snort intrusion detection system (IDS) is investigated. Results reveal that the attack is realistic and opens the possibility to evade any signature-based IDS. To mitigate the attack, a solution is also proposed in the form of the MPTCP Linker tool. The work outlines the importance of MPTCP support in future network security middleboxes.

  • 23.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lidén, Anders
    Towards Multipath TCP Aware Security Technologies2016In: 2016 8th IFIP International Conference onNew Technologies, Mobility and Security (NTMS), New York: IEEE, 2016, p. 1-8Conference paper (Refereed)
    Abstract [en]

    Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.

  • 24.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Lidén, Anders
    A Multipath TCP Proxy2015Conference paper (Refereed)
    Abstract [en]

    Multipath TCP (MPTCP) is an extension to traditionalTCP that enables a number of performance advantages,which were not offered before. While the protocol specificationis close to being finalized, there still remain some concernsregarding deployability and security. This paper describes theon going work to develop a solution that will facilitate thedeployment of MPTCP. The solution will not only allow non-MPTCP capable end-hosts to benefit from MPTCP performancegains, but also help ease the network security concerns that manymiddleboxes face due to the possibility of data stream beingfragmented across multiple subflows.

  • 25.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rossebø, Judith
    Integrated Operations, ABB AS, Norway.
    Chowdhury, Mohammad
    Talha, Batool
    ABB Corporate Research, ABB AS, Norway.
    A Wireless Intrusion Detection System for 802.11 networks2016In: PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), IEEE, 2016, p. 828-834Conference paper (Refereed)
    Abstract [en]

    Wireless local area networks (WLANs) deployment is increasing rapidly. At the same time, WLANs have become an attractive target for many potential attackers. In spite of that, the de facto standard used to implement most WLANs (IEEE 802.11) has what appear to be residual vulnerabilities related to identity spoofing. In this paper, a pragmatic study of two common attacks on the standard is conducted. These attacks are then implemented on test beds to learn attack behavior. Finally, novel attack signatures and techniques to detect these attacks are devised and implemented in a proof of concept Wireless Intrusion Detection System (WIDS).

  • 26.
    Agapi, Mesodiakaki
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Zola, Enrica
    UPC BarcelonaTECH, Barcelona Spain.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Joint User Association and Backhaul Routing for Green 5G Mesh Millimeter Wave Backhaul Networks2017In: Proceedings Of The 20Th Acm International Conference On Modelling, Analysis And Simulation Of Wireless And Mobile Systems, Association for Computing Machinery (ACM), 2017, p. 179-186Conference paper (Refereed)
    Abstract [en]

    With the advance of fifth generation (5G) networks, network density needs to grow significantly in order to meet the required capacity demands. A massive deployment of small cells may lead to a high cost for providing. ber connectivity to each node. Consequently, many small cells are expected to be connected through wireless links to the umbrella eNodeB, leading to a mesh backhaul topology. This backhaul solution will most probably be composed of high capacity point-to-point links, typically operating in the millimeter wave (mmWave) frequency band due to its massive bandwidth availability. In this paper, we propose a mathematical model that jointly solves the user association and backhaul routing problem in the aforementioned context, aiming at the energy efficiency maximization of the network. Our study considers the energy consumption of both the access and backhaul links, while taking into account the capacity constraints of all the nodes as well as the fulfillment of the service-level agreements (SLAs). Due to the high complexity of the optimal solution, we also propose an energy efficient heuristic algorithm (Joint), which solves the discussed joint problem, while inducing low complexity in the system. We numerically evaluate the algorithm performance by comparing it not only with the optimal solution but also with reference approaches under different traffic load scenarios and backhaul parameters. Our results demonstrate that Joint outperforms the state-of-the-art, while being able to find good solutions, close to optimal, in short time.

  • 27.
    Agnemyr, Anton
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Business intelligence – Ett underlag för verksamhetsutveckling: Vilken roll spelar olika informations applikationer för utvecklingen av verksamheter?2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I dagens ständigt föränderliga affärsvärld finns en mängd olika information tillgänglig för organisationer och med utvecklande teknologier finns möjligheten att tillvara ta på denna information till att bättre kunna förstå sin verksamhet och därtill utveckla den. Syftet med denna kandidatuppstas är att undersöka och identifiera vilken påverkan som informations möjliggörande business intelligence applikationer kan ha för att möjliggöra och stödja verksamhetsutveckling.

    Undersökningen är gjord utefter en kvalitativ forskningsmetodik med kvalitativa intervjuer som datainsamlingsmetod där fyra intervjuer är genomförda för fyra olika typer av organisationer där respektive intervjuperson arbetar med business intelligence på något sätt regelbundet. Intervjuerna var semi-strukturerade där frågorna togs fram utefter studiens teoretiska referensram, som sedan analyserades utefter en tematisk analys. 

    Resultaten för studien visar på att business intelligence är en möjliggörare för att kunna skapa diverse olika nyttor inom olika verksamheter med ett påtagligt värde. Slutsatserna för studien påvisar också att det är svårt att kunna härleda särskilda verksamhetsutvecklings möjligheter för enskilda informationsapplikationer inom BI-lösningar. Men att BI som en helhetslösning är ett underlag för verksamhetsutveckling och utveckling för affärsmöjligheter, processer och prestanda är något som påvisas efter genomförd studie. 

    Download full text (pdf)
    fulltext
  • 28.
    Aguiño, Gonzalo Iglesias
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks2007Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    Last decade, a lot of research has been done in wireless communication technologies. Mobile

    nodes such personal digital assistants (PDAs), notebooks and cell phones are nowadays used

    in human’s daily life.

    MANETs are networks consisting of two or more mobile nodes equipped with wireless

    communication and networking capabilities, but they don’t have any network centrilized

    infrastructure.

    In last few years, MANETs have been emerged to be an important researched subject in the

    field of wireless networking.

    MANETs are autonomous; however they can communicate with other external networks such

    the internet. They are linked to such external networks by mobile nodes acting as gateways.

    This kind of networks is known as hybrid MANETs.

    Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using

    a Internet connection instead of a regular (or analog) phone line.

    The goal of this thesis is evaluate the performance of VoIP strategies for hybrid MANETs.

    Two different aspects are evaluated, the session establishment performance and the voice

    quality.

    Network Simulator 2 is used to run several simulations, two different applications are used to

    run voice simulations (Session Initiation Protocol and Exponential traffic generator). We

    evaluate two different cases for voice traffics, voice calls between two MANET nodes and

    voice calls between MANET nodes and external nodes.

    After running the simulations, there are some performance parameters which will reveal the

    results. The key findings of the simulations are: adding gateways, number of voice traffic

    flows and the number of hops between source and destinations. There are some interesting

    results which reveal for example, that adding gateways is not always beneficial.

    Download full text (pdf)
    FULLTEXT01
  • 29. Agustí, Ramón
    et al.
    Fazekas, Péter
    Gómez Barquero, David
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Tralli, Velio
    NEWCOM DR7.2: First report on common framework/models and activities in Department 72005Report (Refereed)
    Abstract [en]

    This deliverable provides a description of the framework identified for the collaborative activities between different partners in the context of NEWCOM department 7 on QoS provision in heterogeneous wireless networks. The considered models, assumptions and expected results are pointed out for each activity. The deliverable also includes a report on the means to achieve the integration between the different partners

  • 30. Agustí, Ramón
    et al.
    Fazekas, Péter
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Studer Ferreira, Lucio
    Tralli, Velio
    NEWCOM DR7.4: Final Report on the activities carried out in Department 72007Report (Refereed)
    Abstract [en]

    This deliverable constitutes the final report of all the activities that carried out in the framework of the NEWCOM department 7. It contains a description of the main technical achievements for each one of the activities in which the department has been organised togehter with the list of indicators reflecting the degree of integration that has been achieved among the different partners

  • 31.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Finding lower bounds of localization with noisy measurements using genetic algorithms2011In: Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications (DIVANet '11), Miami, Florida, USA: Association for Computing Machinery (ACM), 2011, p. 47-54Conference paper (Refereed)
    Abstract [en]

    Vehicular Ad-Hoc Networks (VANETs) are wireless networks with mobile nodes (vehicles) which connect in an ad-hoc manner. Many vehicles use the Global Positioning System (GPS) to provide their locations. However the inaccuracy of GPS devices leads to some vehicles incorrectly assuming they are located at different positions and sometimes on different roads. VANETs can be used to increase the accuracy of each vehicle's computed location by allowing vehicles to share information regarding the measured distances to neighbouring vehicles. This paper looks at finding how much improvement can be made given the erroneous measurements present in the system. An evolutionary algorithm is used to evolve instances of parameters used by the VLOCI2 algorithm, also presented in this paper, to find instances which minimises the inaccuracy in computed locations. Simulation results show a definite improvement in location accuracy and lower bounds on how much improvement is possible is inferred.

  • 32. Ahammed, Farhan
    et al.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Finding Lower Bounds of Localization with Noisy Measurements Using Genetic Algorithms2011Report (Refereed)
  • 33.
    Ahammed, Farhan
    et al.
    The University of Sydney, Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Using simulated annealing to find lower bounds of localization with noisy measurements2012In: 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), IEEE conference proceedings, 2012, p. 601-608Conference paper (Refereed)
  • 34.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA Australia Australian Technology Park.
    LICA: Improving Localization Given Noisy Data In GPS-Equipped VANETs Using Trilateration With Cluster Analysis2011Report (Refereed)
  • 35.
    Ahammed, Farhan
    et al.
    University of Sydney.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA.
    VLOCI: Using Distance Measurements to Improve the Accuracy of Location Coordinates in GPS-Equipped VANETs2012In: Mobile and Ubiquitous Systems: 7th International ICST Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers / [ed] Patrick Sénac, Max Ott, Aruna Seneviratne, Springer Berlin/Heidelberg, 2012, Vol. 73, p. 149-161Conference paper (Refereed)
  • 36.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA Australia Australian Technology Park.
    VLOCI2: An Iterative Method To Improve Location Coordinates In GPS-Equipped VANETs in Multiple Lanes2011Report (Refereed)
  • 37.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    Australian Technology Park, Australia.
    VLOCI2: An Iterative Method To Improve Location Coordinates In GPS-Equipped VANETs in Multiple Lanes2011Report (Refereed)
  • 38.
    Ahl, Elin
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Nordberg, Nina
    Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Planning a digital transformation for a company with a process layout: A study conducted at voestalpine Precision Strip AB2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Digitalization is an upcoming trend that divides the manufacturing industry of today. As an increasing number of companies chose to implement digitalization as a business strategy, some companies still struggle with implementing digitalization into their businesses.

    Previous research has developed digital transformation models, but has been admitted as too generic. This thesis used the most comprehensive transformation model as base and aimed to make it practically implementable for a manufacturing company with a process layout. To enable this, a case study was conducted on a steel-processing company with this layout design. This thesis had an inductive approach, where primary data were collected from one selected company through a pilot study and semi structured interviews, and secondary data were collected through a literature review.

    During the study, it was discovered that a company can benefit from using a customized guidance of how to implement digitalization, to optimally use digital opportunities. This thesis contributed with additional steps and extensions of the previous transformation model. The contribution consisted of the involvement of competency, creation of definition, identified digitalization trends relating to a SWOT analysis, additional phenomenon to take into consideration when analyzing future scenarios, additional questions to consider when analyzing impacted areas, creation of a digital business strategy, a comparison of impacted areas with previous projects, additional identified actions to fill the gap between current state and goals, and five identified criteria’s on how to prioritize these actions. This study extends current research with details and depth regarding a digital transformation model, and hence make it more practical. For future research, a case study testing the potential of the transformation model on a similar company should be conducted, and thereby improve the model further.

    Download full text (pdf)
    fulltext
  • 39.
    Ahlberg, Lina
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Smarta glasögons användbarhet: Hur användarnas datorvana påverkar användbarheten av smarta glasögon2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Smarta glasögon är interaktiva glasögon som har en inbyggd dator och tillåter användaren att se en bildskärm samtidigt som den materiella omgivningen kan ses. Studiens syfte är att undersöka hur användarens datorvana påverkar den upplevda användbarheten av smarta glasögon. Genomförandet av undersökningen har bestått av att 34 respondenter genomfört ett användartest följt av en strukturerad intervju. Intervjuerna har sedan kategoriserats beroende av datorvana och respondenternas upplevelser, vilket har legat till grund för analysen. För att styrka analysen har en litteraturstudie genomförts av tidigare teori inom ämnena skillnader mellan individer, användbarhet och smarta glasögon. Studiens slutsatser visar på att det inte finns några tydliga skillnader i användarnas upplevelser till följd av den tidigare datorvanan. De skillnader som ändå identifierades är att det finns indikationer på att upplevelsen av svårigheter och effektivitet till viss del påverkats av datorvanan.

    Download full text (pdf)
    fulltext
  • 40.
    Ahlgren, Bengt
    et al.
    RISE.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio2022In: ICN 2022 - Proceedings of the 2022 9th ACM Conference on Information-Centric Networking, Association for Computing Machinery (ACM), 2022Conference paper (Refereed)
    Abstract [en]

    Information-centric networks (ICNs) intrinsically support multipath transfer and thus have been seen as an exciting paradigm for IoT and edge computing, not least in the context of 5G mobile networks. One key to ICN’s success in these and other networks that have to support a diverse set of services over a heterogeneous network infrastructure is to schedule traffic over the available network paths efficiently. This paper presents and evaluates ZQTRTT, a multipath scheduling scheme for ICN that load balances bulk traffic over available network paths and schedules latency-sensitive, non-bulk traffic to reduce its transfer delay. A new metric called zero queueing time (ZQT) ratio estimates path load and is used to compute forwarding fractions for load balancing. In particular, the paper shows through a simulation campaign that ZQTRTT can accommodate the demands of both latency-sensitive and-insensitive traffic as well as evenly distribute traffic over available network paths. 

  • 41.
    Ahlin, Karin
    Mid Sweden University.
    Design and test of a measurement method for the benefits of technical information2018Conference paper (Refereed)
    Abstract [en]

    Various measurement methods can be included in a benefit model in order to derive outputs from the benefits of a resource. In this study, the resource is technical information (TI). TI is a resource that some view as having a low status, which affects both the resource and the staff working with it by negatively influencing the work role and the management of the information. The purpose of this study is to design and test a measurement method with TI as the resource. Based on a gen-eral design for measurement methods, there are three steps in this meth-od: the input, the rule and the output. The input consists of interviews; the rule is based on the categorization of the efficient boundary object; and the output is a summation of the categorization. This study is based on a case study at a US technology company in the Midwest with re-spondents on middle management level. The key findings are that the measurement method is useful, but not without flaws. Individual and group interviews used for input lead to a rich wealth of empirical data on the benefits of TI and categorizations of those benefits. However, the method is rather time-consuming. The design requires the researcher to perform several interviews, transcriptions, and analyses. The test implied a discussion on linguistics, both for the input and the rule. The study’s serves to fill a knowledge gap of the benefits of TI in the field of Infor-mation Management, and thereby increase the status of TI.

  • 42.
    Ahlin, Karin
    Mittuniversitetet.
    Measuring the Immeasurable?: The Intangible Benefits of Digital Information2019In: Proceedings of the 52nd Hawaii International Conference on System Sciences  2019, Hawaii International Conference on System Sciences , 2019, p. 6176-6185Conference paper (Refereed)
    Abstract [en]

    The benefits of digital information are mostly viewed as intangible, meaning that they can be hard to measure. This lack of measurements makes the benefits difficult to compare and communicate, creating problems for e.g. decision-making and the strategic development of specific digital information. Therefore, I conducted a literature review to find out how the combination of intangible benefits and measurements are dealt with in the information systems field. I found that we measure the intangible benefits of information systems or information technology. Here, the measurement method is divided into input, rule, and output. The input consists of predetermined individual benefits, areas of predetermined benefits, or interpreted benefits from respondents. The rule follows an accepted theory or contextual adjusted rules, and the output (benefit) can be seen as either financial or non-financial. The avenue for further research focuses on the digital information as the primary resource, not information systems or information technology.

  • 43.
    Ahlin, Karin
    et al.
    Mittuniversitetet.
    Ahmad, Awais
    Mittuniversitetet.
    Mozelius, Peter
    Mittuniversitetet.
    Determining Testbed Requirements for Technology Enhanced Speech Rehabilitation after Stroke -the Informed Co-workers’ View Point2019In: GLOBAL HEALTH 2019: The Eighth International Conference on Global Health Challenges / [ed] Hassan Khachfe, International Academy, Research and Industry Association (IARIA), 2019, p. 20-27Conference paper (Refereed)
    Abstract [en]

    This paper analyses and discusses the identified requirements for technology enhanced systems for speech rehabilitation after a stroke. To stroke patients, a speech injury can be devastating, impacting their abilities to speak, listen, read, and write. Therefore, speech therapy is recommended as early as possible. To address the challenge with a growing percentage of older adults, therapy should include a variety of Technology Enhanced Systems (TES) to support the idea of independent living. These systems must be adapted to the patients’ needs and speech therapy requirements. Based on a design science approach, requirements were determined from an analysis of ten semi-structured interviews with knowledgeable informants. Findings indicate several important requirements, such as: TES should be motivating, joyful, individualised and built on patients’ needs and on speech therapists’ professional knowledge. Furthermore, TES services must be user-friendly and provide training in each patient’s mother tongue. Added to these requirements are ease of including close relatives as supporting persons, as well as accessibility through portable devices.

  • 44.
    Ahlin, Karin
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Crusoe, Jonathan
    Högskolan i Borås, Sweden.
    Why Should You Believe in Open Data? – A Document Study Examining PersuasionRhetoric of OGD Benefits2022In: EGOV 2022: Electronic Government / [ed] Marijn Janssen, Csaba Csáki, Ida Lindgren, Euripidis Loukis, Ulf Melin, Gabriela Viale Pereira, Manuel Pedro Rodríguez Bolívar, Efthimios Tambouris, Springer, 2022, p. 274-287Conference paper (Refereed)
    Abstract [en]

    The rhetoric of Open Government Data (OGD) concerningits benefits seems to lack anchor in practice affecting practitioners andempirical evidence restraining academia. This rhetoric could be hard tosee for those already persuaded. As such, the rhetoric could contain in-consistencies that are based more on myths than facts, contributing tothe slow pace of OGD development. OGD is sometimes based on dog-matic rhetoric that is overly simplistic, which hides significant benefitsand blocks potential audiences from seeing the practical applications ofOGD. The purpose of the present study was to analyse the persuasive-ness of present OGD arguments from a rhetorical perspective to identifyrhetorical patterns. We conducted desktop research, investigating therhetoric of eight websites emphasising OGD benefits. Our findings in-clude four common patterns of the rhetoric involving persuasion anddissuasion. The rhetoric contains paradoxes of promises and discover-ies, which we categorised as the grand quest, promised opportunities,tribal solidarity, and the silver bullet patterns. A further finding was twomythical paradoxes: (1) promises versus discovery and (2) proving whilearguing.

    Download full text (pdf)
    fulltext
  • 45.
    Ahlin, Karin
    et al.
    Mittuniversitetet.
    Mozelius, Peter
    Mittuniversitetet.
    Redesign and Evaluation of a Technology Enhanced Learning Environment for Thesis Supervision2017In: ICERI2017 PROCEEDINGS, The International Academy of Technology, Education and Development, 2017, Vol. 10, p. 636-643Conference paper (Refereed)
    Abstract [en]

    Thesis supervision is an important activity in higher education with Bachelor’s and Master’s theses mandatory parts of university programmes. In traditional education, thesis supervision has been a face-to-face activity, but today, both the student groups and the learning environments are blended. This study describes and discusses the design and implementation of a blended learning environment for a student group at Mid Sweden University.  The research question that the study aims to answer is:  Which are the important factors in the design of a course for undergraduate students, to facilitate supervision of thesis projects in a technology enhanced environment?  This study employed a Design science research strategy with three phases for design, implementation and evaluation of a blended learning environment during thesis supervision. For the first phase, design requirements were specified based on document studies and a literature review. In the second phase (first part), the created design requirements were implemented as an instance in the Moodle virtual learning environment. Second phase (second part), the implemented instance was used as the online part of a blended learning course for students writing their Bachelor’s thesis. In the third phase an evaluation was carried out with an online questionnaire were students gave their opinions on course design and teaching and learning sessions. Findings show that the learning outcomes were good and that the course aim and the learning objectives were clearly stated. Found important factors for a successful supervision were peer collaboration, multimodality, and technology enhanced interaction.  Remaining challenges are to improve course content and to motivate students for research in the field of Informatics. Most surprising positive finding was that peer situation occurred informally, which deepen their knowledge for thesis writing and presentation. 

  • 46.
    Ahlin, Karin
    et al.
    Mittuniversitetet.
    Mozelius, PeterMittuniversitetet.Sundberg, LeifMittuniversitetet.
    Digitalization in times of transition2020Conference proceedings (editor) (Other academic)
  • 47. Ahlin, Karin
    et al.
    Persson Slumpi, Thomas
    A Communication-model for Intangible Benefits of Digital Information2015In: 2015 Americas Conference on Information Systems, AMCIS 2015, 2015Conference paper (Refereed)
    Abstract [en]

    The communication of the intangible benefits to different stakeholders is important at the development for organizational resource and could be described as a boundary-spanning activity. In this study we build on Ahlin’s model (2014) and illustrates categorization of intangible benefits of digital information by using Carlile’s (2002; 2004) efficient boundary objects, the syntactic, semantic and pragmatic. Qualitative empirical pictures from three cases are illustrated by questions, derived from the efficient boundary objects. The illustrations show that this is an accessible path forward and that the illustrations can be changed to further research with the goal for practical test the communication model.The communication of the intangible benefits to different stakeholders is important at the development for organizational resource and could be described as a boundary-spanning activity. In this study we build on Ahlin’s model (2014) and illustrates categorization of intangible benefits of digital information by using Carlile’s (2002; 2004) efficient boundary objects, the syntactic, semantic and pragmatic. Qualitative empirical pictures from three cases are illustrated by questions, derived from the efficient boundary objects. The illustrations show that this is an accessible path forward and that the illustrations can be changed to further research with the goal for practical test the communication model. 

  • 48.
    Ahlin, Karin
    et al.
    Mittuniversitetet.
    Persson Slumpi, Thomas
    Mittuniversitetet.
    Öppen Innovation, den digitala vägen: Olika aspekter av digitaliseringen av öppen innovation2021Report (Other academic)
    Abstract [en]

    Syftet med denna rapport är att belysa digital teknologis påverkan på innovationsarenor. Vi har inom ramen för Interreg-projekt SMICE deltagit i arbetet med skapa innovationsarenor och då använt oss av digital teknologi. Den digitala teknologiin har använts för att främja deltagandet på innovationsarenor genom att erbjuda personer som har långt till dessa eller har andra förhinder från att kunna delta fysiskt. Vi undersökte detta genom fyra olika fall där den digitala teknologin användes på olika sätt för att säkerställa deltagande på distans och genom att verifiera våra resultat med experter inom området. Våra resultat analyserades baserat på tidigare kunskap inom öppen innovation samt distanslärande och resultatet visar att digital teknologi är en resurs att räkna med när det gäller att skapa innovationsarenor. Resultaten visar också att det finns utmaningar med att använda digital teknologi såsom: identifiera digital teknologi som kan stödja processerna, lära sig använda teknologin, inkorporera teknologin i processerna och att stödja andra aktörers teknologianvändning.Vi ser fram emot att digital teknologi används mer vid skapande av innovationsarenor och att forskningen fördjupas för att det blir ett sömlöst deltagande för alla deltagare. 

  • 49.
    Ahlin, Karin
    et al.
    Mittuniversitetet.
    Snyder, Kristen
    Mittuniversitetet.
    Person-centred Health Care Resting on Digitization and Systematic Processes: A position paper2021In: GLOBAL HEALTH 2021 The Tenth International Conference on Global Health Challenges, International Academy, Research and Industry Association (IARIA), 2021, International Academy, Research and Industry Association (IARIA), 2021Conference paper (Refereed)
    Abstract [en]

    This position paper argues for further research within person-centered healthcare using digitization and systematic process within the fields of information systems and quality management. The included state of art shows the existence of both digital applications and innovation, whereas there is lack of knowledge on how to engage users, especially when it comes to older citizens. Besides the digital application, we should focus on developing related systematic processes to increase both organizational value and patient value.      Understanding user-design and development are necessary prerequisites to engage in digitalization and is also key to transformation in health care.

  • 50.
    Ahlin, Karin
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Social and Psychological Studies (from 2013).
    Ahmad, Awais
    Uppsala Universitet.
    Nöjd, Sture
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Mozelius, Peter
    Mittuniversitetet.
    Hassan Sodhro, Ali
    Kristianstad Högskola.
    IoT in Elementary School for Everyone – A Research Plan2022In: Challenges of Trustable AI and Added-Value on Health / [ed] Brigitte Séroussi; Patrick Weber; Ferdinand Dhombres; Cyril Grouin; Jan-David Liebe; Sylvia Pelayo; Andrea Pinna; Bastien Rance; Lucia Sacchi; Adrien Ugon; Arriel Benis; Parisis Gallos, IOS Press, 2022, p. 955-956Conference paper (Refereed)
    Abstract [en]

    We propose a tentative research plan to increase students’ mental health

    in elementary schools by implementing Internet of Things (IoT) technology. The

    research plan should answer how to support students’ mental health using IoT

    solutions and the critical factors influencing testbeds for IoT solutions with the

    previously mentioned purpose. Our intended research method is Design Science,

    which we plan to use stepwise.

    Download full text (pdf)
    fulltext
1234567 1 - 50 of 3012
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf