Den 5/1-2026 kommer GUPEA att vara otillgängligt för alla under hela dagen.
Browsing Kandidatuppsatser by Title
Now showing items 99-118 of 374
-
Constructive Research Study of Location-Proximity Privacy-Preserving Algorithm Capabilities as Part of a Mobile Application
(2016-06-27)Location Based Services (LBS) have been responsible for several privacy breaches of their users in recent years and a number of researchers have put forward solutions towards making LBS more secure in regards to user ... -
Creating safer reward functions for reinforcement learning agents in the gridworld
(2019-11-12)We adapted Goal-Oriented Action planning, a decision-making architecture common in video games into the machine learning world with the objective of creating a safer artificial intelligence. We evaluate it in randomly ... -
CrokuS: Improving work processes and perceived customer satisfaction with the help of mobile technology
(2011-10-11)Today, many organizations are lacking an understanding of how mobile technology could benefit both the organization and its customers. Could mobile technology not only help organizations increase efficiency but also ... -
Crunch time: the Causes and Effects of Overtime in the Games Industry
(2016-06-27)The games industry is notorious for its intense work ethics with uncompensated overtime and weekends at the office, also known as crunch. By studying postmortems and conducting interviews with employees in the industry ... -
Cultural Challenges on Information Technology Outsourcing
(2015-03-25)Outsourcing in information technology (IT) industry is growing exponentially. Numerous articles have covered the reasons why companies choose to outsource. In this research, the authors have looked into the challenges that ... -
Cultural Heritage Reconstruction of the Cinema Flamman Using VR
(2021-09-14)Virtual reality is adopted in many areas such as the military, education, health care, and preservation of cultural heritage. This thesis will further explore the possibility of cultural heritage preservation in virtual ... -
Deadly Banquet Creating believable non-player characters
(2016-11-15)NPCs (non-player characters) in computer games are often very predictable and obviously artificial, which might be the result of developers devoting more resources to maintaining high-end graphics instead of creating ... -
A Decentralised Application for Storing Electronic Health Records using Blockchain Technology
(2023-03-03)With the systems currently used in healthcare, medical records are often centrally stored in local databases or cloud services and managed by each individual healthcare provider. Due to this, the information exchange ... -
Department of Computer Science and Engineering UNIVERSITY OF GOTHENBURG CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2018 Statistical Model Update Optimization in Industrial Practice
(2019-11-19)This thesis presents a study done on optimizing machine learning model updates. The department of Quality and Functionality in a multinational telecommunication company is searching for an optimal solution to the problem ... -
Depression hos ungdomar – Familjecenterad omvårdnad
(2019-06-28)Den psykiska ohälsan bland ungdomar verkar öka i hela världen, men i synnerhet bland svenska ungdomar. Många ungdomar med depression går in i vuxenlivet, utan att ha blivit diagnosticerade. Det har hittills inte forskats ... -
Design & build a web interface for a quantum computer
(2023-03-03)The Wallenberg Centre for Quantum Technology (WACQT) is a research project that aims to develop a high-end 100-qubit quantum computer. To get an overview of the quantum computer and to gain insights about the quantum ... -
Design and Implementation for Report Layout Merging
(2012-08-06)Merge tools are an increasingly used feature in collaborative environments. Being able to combine versions gives greater access to contributors as they can work independently on the same work. However, merge tools for ... -
Designing a Decision Support System with incorporated Data Mining
(2015-07-20)In this paper we propose a software design for a Decision Support System (DSS) with incorporated Data Mining (DM), which integrates data mining operations such as classification and clustering. With the increasing amount ... -
Designing a User Interface For an End-to-end Secure Messaging System
(2012-08-06)The main goal of the report is to develop a user in- terface prototype for an easy-to-use, extendable, end-to-end secure, and privacy-aware web messag- ing application. We investigate cryptography and usability for ... -
Detecting inconsistencies of safety artifacts with Natural Language Processing Bachelor of Science Thesis
(2023-01-09)This paper investigates a method that helps detect inconsistencies between safety-critical systems’ textual safety artifacts that safety cases rely on by involving NLP techniques. A design science research study was conducted ... -
Detection and localization of illicit wire less communication in an exam room through passive signal reconnaissance
(2021-09-14)Mer och mer går examination på våra universitet mot tentamen med hjälp av digitala hjälpmedel. Med detta kommer utmaningar om att vidhålla tentamenssäkerheten och att säkerställa rättvis examinering för alla studenter. ... -
Developing a modular, high-interaction honeypot using container virtualization
(2021-09-14)A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding ... -
Digital Twins for Verification and Validation of CPS
(2023-09-21)This paper proposes standardizing the usage and practices of Digital Twins (DTs) for the seamless digital-tophysical transition of Cyber-Physical Systems (CPS) to assure their safety. It recommends adopting Artificial ... -
Does Gender Matter? An Interview Study on Gender Representation in Software Systems
(2022-07-06)[Context and Motivation] Inclusivity is a term that is widely used today. If you look the word up in a dictionary, it will say something along the lines of ’treating everyone fairly and equally’. How do we then make our ... -
Does implementation of BLE technology affect synchronous communication in an office space?
(2019-11-18)This study examines communication in a co-located context, emphasising on the role of location-awareness through the introduction of Bluetooth Low Energy (BLE) technology in an office environment. An investigation into the ...