Browsing Kandidatuppsatser by Title
Now showing items 103-122 of 368
-
Deadly Banquet Creating believable non-player characters
(2016-11-15)NPCs (non-player characters) in computer games are often very predictable and obviously artificial, which might be the result of developers devoting more resources to maintaining high-end graphics instead of creating ... -
A Decentralised Application for Storing Electronic Health Records using Blockchain Technology
(2023-03-03)With the systems currently used in healthcare, medical records are often centrally stored in local databases or cloud services and managed by each individual healthcare provider. Due to this, the information exchange ... -
Department of Computer Science and Engineering UNIVERSITY OF GOTHENBURG CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2018 Statistical Model Update Optimization in Industrial Practice
(2019-11-19)This thesis presents a study done on optimizing machine learning model updates. The department of Quality and Functionality in a multinational telecommunication company is searching for an optimal solution to the problem ... -
Depression hos ungdomar – Familjecenterad omvårdnad
(2019-06-28)Den psykiska ohälsan bland ungdomar verkar öka i hela världen, men i synnerhet bland svenska ungdomar. Många ungdomar med depression går in i vuxenlivet, utan att ha blivit diagnosticerade. Det har hittills inte forskats ... -
Design & build a web interface for a quantum computer
(2023-03-03)The Wallenberg Centre for Quantum Technology (WACQT) is a research project that aims to develop a high-end 100-qubit quantum computer. To get an overview of the quantum computer and to gain insights about the quantum ... -
Design and Implementation for Report Layout Merging
(2012-08-06)Merge tools are an increasingly used feature in collaborative environments. Being able to combine versions gives greater access to contributors as they can work independently on the same work. However, merge tools for ... -
Designing a Decision Support System with incorporated Data Mining
(2015-07-20)In this paper we propose a software design for a Decision Support System (DSS) with incorporated Data Mining (DM), which integrates data mining operations such as classification and clustering. With the increasing amount ... -
Designing a User Interface For an End-to-end Secure Messaging System
(2012-08-06)The main goal of the report is to develop a user in- terface prototype for an easy-to-use, extendable, end-to-end secure, and privacy-aware web messag- ing application. We investigate cryptography and usability for ... -
Detecting inconsistencies of safety artifacts with Natural Language Processing Bachelor of Science Thesis
(2023-01-09)This paper investigates a method that helps detect inconsistencies between safety-critical systems’ textual safety artifacts that safety cases rely on by involving NLP techniques. A design science research study was conducted ... -
Detection and localization of illicit wire less communication in an exam room through passive signal reconnaissance
(2021-09-14)Mer och mer går examination på våra universitet mot tentamen med hjälp av digitala hjälpmedel. Med detta kommer utmaningar om att vidhålla tentamenssäkerheten och att säkerställa rättvis examinering för alla studenter. ... -
Developing a modular, high-interaction honeypot using container virtualization
(2021-09-14)A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding ... -
Digital Twins for Verification and Validation of CPS
(2023-09-21)This paper proposes standardizing the usage and practices of Digital Twins (DTs) for the seamless digital-tophysical transition of Cyber-Physical Systems (CPS) to assure their safety. It recommends adopting Artificial ... -
Does Gender Matter? An Interview Study on Gender Representation in Software Systems
(2022-07-06)[Context and Motivation] Inclusivity is a term that is widely used today. If you look the word up in a dictionary, it will say something along the lines of ’treating everyone fairly and equally’. How do we then make our ... -
Does implementation of BLE technology affect synchronous communication in an office space?
(2019-11-18)This study examines communication in a co-located context, emphasising on the role of location-awareness through the introduction of Bluetooth Low Energy (BLE) technology in an office environment. An investigation into the ... -
Early Requirements Engineering Practices for Gaming Companies
(2019-11-12)Within the game development industry, requirements engineering (RE) is applied and used for finding out and setting requirements during the mid to late stages of the software development cycle. Yet, early requirements ... -
Eciton - Ett mjukvarusystem för koordinering och schemaläggning av artisttransporter under musikfestivaler och event
(2016-11-15)Denna rapport beskriver utvecklingen av Eciton, ett mjukvarusystem för koordinering och schemaläggning av transporter under musikfestivaler och event. Systemet består av en webbapplikation för koordinatorer, en ... -
Effects of Confirmation Bias on Web Search Engine Results and a differentiation between Non assumptive versus Assumptive Search Queries
(2016-06-27)This study examines how confirmation bias influences the search results of large scale web search engines for software engineers. We show how the correctness of results can change depending on the formulation of search ... -
Effects of Error Detection and Representation on the Resolution of Traceability Issues
(2016-06-27)Traceability is extremely important when developing safety critical software systems. The automotive industry has strict regulations that require developers to be able to demonstrate traceability links from requirements ... -
Effects of Video Compression formats on Neural Network Performance
(2019-11-18)The field of autonomous vehicles and driverless cars is a field which makes extensive use of machine learning and artificial intelligence, relying on it to make decisions. These decisions require a vast amount of data ... -
Efficiency and Effectiveness of Requirements Elicitation Techniques for Gathering Requirements from Children
(2017-06-22)Different requirements elicitation techniques have been researched in the context of their applicability with children, mainly within the field of Human-Computer-Interaction. These techniques have not yet been compared ...