Change search
Refine search result
1234567 1 - 50 of 781
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Al-Madina Higher Institute for Engineering and Technology.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Minia University, Egypt.
    Hamed, Hesham F. A.
    Minia University, Egypt.
    Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine2016In: Building Sustainable Health Ecosystems: 6th International Conference on Well-Being in the Information Society, WIS 2016, Tampere, Finland, September 16-18, 2016, Proceedings / [ed] Hongxiu Li, Pirkko Nykänen, Reima Suomi, Nilmini Wickramasinghe, Gunilla Widén, Ming Zhan, Springer International Publishing , 2016, p. 151-160Conference paper (Refereed)
    Abstract [en]

    The use of medical images has been continuously increasing, which makes manual investigations of every image a difficult task. This study focuses on classifying brain magnetic resonance images (MRIs) as normal, where a brain tumor is absent, or as abnormal, where a brain tumor is present. A hybrid intelligent system for automatic brain tumor detection and MRI classification is proposed. This system assists radiologists in interpreting the MRIs, improves the brain tumor diagnostic accuracy, and directs the focus toward the abnormal images only. The proposed computer-aided diagnosis (CAD) system consists of five steps: MRI preprocessing to remove the background noise, image segmentation by combining Otsu binarization and K-means clustering, feature extraction using the discrete wavelet transform (DWT) approach, and dimensionality reduction of the features by applying the principal component analysis (PCA) method. The major features were submitted to a kernel support vector machine (KSVM) for performing the MRI classification. The performance evaluation of the proposed system measured a maximum classification accuracy of 100 % using an available MRIs database. The processing time for all processes was recorded as 1.23 seconds. The obtained results have demonstrated the superiority of the proposed system.

  • 2.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronic and Communication Department Al-Madina Higher Institute for Engineering and Technology, Giza.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Faculty of Engineering, Minia University.
    Hamed, Hesham F. A.
    Faculty of Engineering, Minia University.
    Design and implementation of a computer-aided diagnosis system for brain tumor classification2017In: 2016 28th International Conference on Microelectronics (ICM), 2017, p. 73-76, article id 7847911Conference paper (Refereed)
    Abstract [en]

    Computer-aided diagnosis (CAD) systems have become very important for the medical diagnosis of brain tumors. The systems improve the diagnostic accuracy and reduce the required time. In this paper, a two-stage CAD system has been developed for automatic detection and classification of brain tumor through magnetic resonance images (MRIs). In the first stage, the system classifies brain tumor MRI into normal and abnormal images. In the second stage, the type of tumor is classified as benign (Noncancerous) or malignant (Cancerous) from the abnormal MRIs. The proposed CAD ensembles the following computational methods: MRI image segmentation by K-means clustering, feature extraction using discrete wavelet transform (DWT), feature reduction by applying principal component analysis (PCA). The two-stage classification has been conducted using a support vector machine (SVM). Performance evaluation of the proposed CAD has achieved promising results using a non-standard MRIs database.

  • 3.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronics and Communications Department, Al-Madina Higher Institute for Engineering and Technology, Giza, Egypt.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Faculty of Engineering, Al-Azhar University, Qena, Egypt.
    Khalaf, Ashraf A.M.
    Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt.
    Hamed, Hesham F.A.
    Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt.
    A Review on Brain Tumor Diagnosis from MRI Images: Practical Implications, Key Achievements, and Lessons Learned2019In: Magnetic Resonance Imaging, ISSN 0730-725X, E-ISSN 1873-5894, Vol. 61, p. 300-318Article in journal (Refereed)
    Abstract [en]

    The successful early diagnosis of brain tumors plays a major role in improving the treatment outcomes and thus improving patient survival. Manually evaluating the numerous magnetic resonance imaging (MRI) images produced routinely in the clinic is a difficult process. Thus, there is a crucial need for computer-aided methods with better accuracy for early tumor diagnosis. Computer-aided brain tumor diagnosis from MRI images consists of tumor detection, segmentation, and classification processes. Over the past few years, many studies have focused on traditional or classical machine learning techniques for brain tumor diagnosis. Recently, interest has developed in using deep learning techniques for diagnosing brain tumors with better accuracy and robustness. This study presents a comprehensive review of traditional machine learning techniques and evolving deep learning techniques for brain tumor diagnosis. This review paper identifies the key achievements reflected in the performance measurement metrics of the applied algorithms in the three diagnosis processes. In addition, this study discusses the key findings and draws attention to the lessons learned as a roadmap for future research.

  • 4.
    Abou-Chakra, Bisan
    Luleå University of Technology, Department of Arts, Communication and Education.
    En påhittad arabvärld: En studie av hur andra generationens invandrare ser på hur den arabiska kulturen och dess länder framställs i västerländska TV-serier.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study was conducted with the purpose of studying how the second generation of immigrants in Sweden experience the representation in western television series and how their reality image of the country overlooked the fictive. The study is analyzed based on postcolonial perspectives and theories that include representation, orientalism and stereotypes. The aim was based on whether or not these interviewees felt represented and if the image of the culture and the country were fairly visualized and how they experienced the series vs reality. The method used to answer the question was qualitative interviews where the results showed that the actual experiences of the interviewees did not match with what was shown in the series. Based on their interpretations a big part of the series was constructed by stereotypes.

  • 5.
    Alakärppä, Ismo
    et al.
    University of Lapland.
    Riekki, Jukka
    University of Oulu.
    Larsson, Sofia
    Luleå University of Technology, Department of Arts, Communication and Education, Media, audio technology and experience production and theater.
    Jaakkola, Elisa
    University of Lapland.
    Sound aided interface of a pervasive pain monitoring system2011In: 5th International Symposium on Medical Information and Communication Technology: ISMICT 2011, 2011Conference paper (Refereed)
    Abstract [en]

    We have developed a new version of a pervasivesystem for monitoring and recording subjective painexperiences. The most important service the system offers to itsusers is real-time delivery of reported pain values from patientsto nurses. Pain experiences are expressed on a six-value scalefrom "no pain" to "worst possible pain". The system was testedin four sessions with 23 test users from Finland and Sweden. Themain goal of this study was to evaluate user experience of thepatient application and the sounds we designed for the userinterface. We tested four sound options; spoken, synthetic,xylophone and mute. The material was collected through groupdiscussions and questionnaires. Familiarity, the extent to whicha sound can be identified, and the quality and the pleasantnessof the sound were found to have an effect on forming a positiveexperience. Sounds describing pain levels have to be convincing.The context of use has to be taken into account as a primarydesign driver in a sound design process.

  • 6.
    AL-Hilfi, Mohammed
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Olovsson, Emil
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Integration & Interoperabilitet vid utveckling av IT-system2017Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    This study will increase understanding of how a system developer can solve complex problems within organizations by developing a new information technology system (IT-system), with a focus on technical- and organizational interoperability at the integration process. The authors act as system developers through a case study where there is a need for a new IT-system.

    In this thesis an abductive approach is used combined with an instrumental case study. The work is split up into four phases:

    (1) Identifying problems within the organization by drawing up business models, collecting data through qualitative semi-structured interviews with stakeholders, and the development of a theoretical base. As theoretical frame of reference Integration and interoperability (I & I) is defined, business models are explained, how technical- and operational interoperability differs, how business models are created, agile software development and usability of IT-systems.

    (2) Building, intervention and evaluation. The IT-system is built using an iterative and incremental software development process where focus is on solving the identified problems. During the development stage requirements and challenges are identified to create the business model target view. The IT-system is developed to reflect this view where each iteration of the IT-system is revised from flaws discovered during interviews with stakeholders. The first iteration did not fulfill the stakeholders’ requirements and expectations, but later iterations succeeded in this and were implemented within the organization. When the IT-system had been implemented, it was evaluated by the end users to identify if the system developers had succeeded in solving the organizational problems, and to check usability of the IT-system.

    (3) Reflection and learning. The result is analyzed and discussed, compared to the theoretical frame of reference and course of action. The result shows that system developers succeeded in identifying complex problems within the organization and managed to create a new IT-system that met stakeholders’ needs, while also solving identified organizational problems.

    (4) In the last phase formalization of learning are general concepts compiled that can be used in other projects. In this thesis are eight aspects and principles are identified that can be used by system developers when developing IT-systems.

  • 7.
    Ali, Bako
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Faculty of Engineering, Al Azhar University.
    Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes2018In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, no 3, article id 817Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  • 8.
    Al-Serafi, Ayman
    et al.
    Teradata Corporation.
    Elragal, Ahmed
    Department of Business Informatics and Operations, German University in Cairo (GUC), Cairo.
    Visual trajectory pattern mining: An exploratory study in baggage handling systems2014In: Advances in data mining: Advances in data mining : applications and theoretical aspects : 14th Industrial Conference, ICDM 2014, St. Petersburg, Russia, July 16-20, 2014. Proceedings / [ed] Petra Perner, Cham: Encyclopedia of Global Archaeology/Springer Verlag, 2014, p. 159-173Conference paper (Refereed)
    Abstract [en]

    There is currently a huge amount of data being collected about movements of objects. Such data is called spatiotemporal data and paths left by moving-objects are called trajectories. Recently, researchers have been targeting those trajectories for extracting interesting and useful knowledge by means of pattern analysis and data mining. But, it is difficult to analyse huge datasets of trajectories without summarizing them and visualizing them for the knowledge seeker and for the decision makers. Therefore, this research paper focuses on utilizing visual techniques and data mining analysis of trajectory patterns in order to help extract patterns and knowledge in an interactive approach. The research study proposes a research framework which integrates multiple data analysis and visualization techniques in a coherent architecture in support of interactive trajectory pattern visualization for the decision makers. An application case-study of the techniques is conducted on an airport's baggage movement data within the Baggage Handling System (BHS). The results indicate the feasibility of the approach and its methods in visually analysing trajectory patterns in an interactive approach which can support the decision maker. © 2014 Springer International Publishing Switzerland.

  • 9. Alsér, Marie
    et al.
    Bergström, Fanny
    Nordström, Caroline Stenbacka
    Luleå University of Technology, Department of Arts, Communication and Education, Media, audio technology and experience production and theater.
    Development and integration of brand promises in the backstage experience room: a case study of Norrgavel2008Conference paper (Other academic)
  • 10.
    Altenstedt, Johanna Parikka
    Luleå University of Technology, Department of Arts, Communication and Education, Media, audio technology and experience production and theater. Luleå tekniska universitet.
    Den sociala offentligheten: en mediepedagogisk studie av den reflexiva familjen och internet2004Licentiate thesis, monograph (Other academic)
    Abstract [sv]

    Syftet med avhandling är att på ett övergripande plan studera modernismens förändringspotentialer utifrån ett familjeperspektiv. På den teoretiska nivån är syftet att studera familjen som en mediepedagogisk kontext utifrån ett senmodernistiskt förändringsperspektiv. På en mer specifik nivå studeras familjen empiriskt som en domän för medierade relationer och medierad kommunikation beträffande familjens inre dynamik, samt familjens egen konstruktion av sin representation i förhållande till andra aktörer i samhället via hemsidor på internet. Det finns även ett metodologiskt syfte inbyggt i studien genom ett försök att utveckla ett synsätt som tillåter att se internet som ett epistemologiskt fält - en sorts social offentlighet där även privatheten blir synlig och där relationerna konstrueras och reproduceras. Detta sker utifrån en ansats som tar fasta på kritisk metodologi för att på ett reflekterande sätt kunna fånga den vetenskapliga validiteten utan att kompromissa på att se det oväntade i förändringsprocesserna. Avhandlingens första forskningsfråga kretsar kring familjen och internet. Den handlar om hur ungdomar använder internet hemma och om hur väl deras föräldrar är insatta i detta, t ex hur kunskapsauktoriteten respektive relationsauktoriteten ser ut i hemmen. Frågan ställdes år 2000 till cirka hundra svarspersoner och utifrån denna empiriska explorativa undersökning fortsatte forskningsprocessen mot den andra forskningsfrågan, som i sin tur handlade om hur familjer presenterar och representerar sig själva via "familjesidor" på internet, och om det var möjligt att se "olika typer" av familjer utifrån deras självkonstruerade webbsidor. Genom en webbsidestudie söker man sedan svaret på om det är möjligt att upptäcka hur singelfamiljer, kärnfamiljer och familjer med avlidna barn, s k änglafamiljer, konstruerade sina representationer på nätet samt hur innehållet med speciell inriktning på internet, och i belysningen av begrepp som auktoritet, relation och tradition skilde sig på dessa sidor beroende på vilken "kategori av familj" det handlade om. Den här delen av licentiat thesis består av en diskursstudie, där främst Foucaults begrepp används. Dessa empiriska forskningsfrågor tillsammans med den teoretiska basen försöker att hjälpa oss att förstå en del av modernismens förändringsprocesser. En slutsats är att familjer har blivit reflexiva processer och bör studeras som sådana, medan internet och de nya medierna skapar ett relationsteknologiskt landskap som jag benämner i denna studie "den sociala offentligheten" för att betona skillnaden till Habermas "borgerlig offentlighet" eller den senare synlighetsbaserade offentligheten. De metodologiska funderingarna löper som en röd tråd igenom hela studien och en tredje forskningsfråga handlar således om hur den kritiska samhällsvetenskapliga metodologin kan tillämpas inom mediepedagogik, och då särskilt för internetstudier. Mediepedagogiken är disciplinen som kan hantera mediesamhällets medieinnehåll och medietexter utan att förlora sitt fokus på människor som skapar relationer mellan varandra med hjälp av dessa medier. I denna studie har man lagt tonvikten på familjerna, men kunskaperna kan hjälpa oss även att studera andra sociala fenomen och processer där relationer skapas eller upprätthålls med hjälp av medier och relationsteknologin.

  • 11. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Corporate Social Responsibility disclosure via Twitter by top listed UK companies: A Data Science Approach2018Conference paper (Refereed)
  • 12.
    Amin, Marian Hany
    et al.
    The German University in Cairo.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Financial Disclosure on Twitter by Top Listed UK Companies: A Data Science Approach2018Conference paper (Refereed)
    Abstract [en]

    Ongoing advancements in technology have changed dramatically the disclosure media that companies adopt. Such disclosure media have evolved from the traditional paper-based ones, to the internet as the new platform to disclose information via companies’ designated websites. However, currently the new media for disclosures are the social media. The aim of this paper is to investigate corporate social media accounts for financial disclosure, as well as, identify its determinants. The sample of the study is comprised of the tweets posted on the Twitter accounts belonging to the FTSE 350 constituents. Topic modeling is applied to identify financial disclosure tweets and logistic regression is run to identify the determinants of financial disclosure on Twitter. Results show that companies use Twitter to make corporate disclosures and some board characteristics are found to have a significant relationship with financial disclosure.

  • 13. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Twitter: An emerging media for corporate disclosure2018Conference paper (Refereed)
  • 14.
    Andersson, Adrian
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Designprinciper för digitala tjänster inom gruvindustrin2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Gruvindustrin befinner sig i en stor förändring allt eftersom digitaliseringen fortskrider. Digitaliseringen innebär att en mängd nya tekniker börjar implementeras i gruvor runt om i världen. En av dessa tekniker är att de anställda använder smartphones i arbetet. Detta medför dock problem då miljön inom gruvindustrin inte är optimal för de generella designprinciperna som finns att tillgå idag. Denna studie undersöker och utvecklar därför designprinciper som kan användas för mobila applikationer inom gruvindustrin. Studien har teori som behandlar generella designprinciper för mobila applikationer, mobila designmönster samt industri 4.0. Vidare har en kvalitativ studie genomförts i form av intervjuer med respondenter från både gruvindustrin men också personer med mångårig erfarenhet av utveckling av mobila applikationer till gruvindustrin. Kvalitativa studien genomfördes för att öka förståelsen kring kontexten som infinner sig inom gruvindustrin men också använda den expertis som finns inom området för att kunna utveckla relevanta designprinciper som kan vara till användning i praktiken. Den insamlade empirin jämfördes sedan mot teori och med hjälp av studiens analys kunde designprinciper som kan anses vara specifika för gruvindustrin identifieras. Slutsatserna visar att enkelhet är nyckeln till framgång och element såsom automatisk ifyllnad, enkel och snabb navigering, stora ikoner och användning av färger är några av de möjliga lösningar som föreslagits för att ta fram en användarvänlig applikation.   

  • 15.
    Andersson, Ingemar
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindqvist, Göran
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Randers, Frode
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Preservation Services Planning: A Decision Support Framework2014Conference paper (Refereed)
    Abstract [en]

    Commercial organizations are experiencing a growing need to access business-criticaldata in the longer term of their operations. Governmental regulations as well as commercial interestsinfluence this need. Organizations are willing to procure cost-effective services to this end - servicesthat are increasingly based as public or private cloud solutions. With the advent of autonomous cloudservices comes the possibility to assemble (mix and match) preservation services in a workflowbasedservice-oriented solution. Following the interaction with information managers in (three)commercial organizations operating in different markets and after a review of current literature, wehave revealed a lack of comprehensive guidelines and decision support in service selection as part ofpreservation planning. Existing models and frameworks used for assessing the quality of preservationservices either manage performance-based features that service provider’s offer or the technicaldetails of the preservation actions themselves. In this paper we present our preservation-planningframework (Preserv-Qual) that addresses the need for decision support in the selection ofpreservation services that explicitly acknowledge the differences among aspects of information usewithin an organization. We describe the outcome from an evaluation of the framework in threecommercial organisations as a service quality assessment and decision support tool. This papershows how our framework supports the use of existing and proven methods, models and principlesfor service assessment, digital preservation and decision support.

  • 16.
    Andersson, Ingemar
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Nilsson, Jörgen
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindqvist, Göran
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindbäck, Lena
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Runardotter, Mari
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Innovation and Design.
    Web archiving using the collaborative archiving services testbed2011In: eChallenges e2011 Conference Proceedings / [ed] Paul Cunningham; Miriam Cunningham, IIMC International Information Management Corporation , 2011Conference paper (Other academic)
    Abstract [en]

    Websites constitute one category of official records and as such should be preserved for the long term in compliance with Swedish legislation. Collaborative Archiving Services Testbed (CAST) supports actors involved in the selective web archiving process, from harvesting to the creation of an information package ready for transfer to a long-term archive at National Archives of Sweden. CAST is developed in compliance with the ISO standards Open Archival Information System (OAIS) and Producer-Archive Interface Methodology Abstract Standard (PAIMAS), and do also consider other well-known and established standards and recommendations in digital preservation area. CAST promotes cooperation, knowledge acquisition and sharing among users in an experimental step-by-step workflow, encouraging a proactive approach resulting in authority websites better adapted to digital preservation recommendations. CAST is developed at LDP Centre, a national competence centre in Sweden, within the digital preservation area.

  • 17.
    Andersson, Simon
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Forsberg, Andreas
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Användarinvolvering för ökad medvetenhet: En studie om policyutvecklingsprocessen2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Many organisations experience the new general data protection regulation (GDPR) as difficult to understand and are unsure as to how they should formulate and communicate a policy that is complied by the organisation's employees. ePrivacy is a separate regulation that works as a compliment to GDPR and makes the regulation even more complex. The purpose of this study is to identify recommendations to formulate policies that increases likelihood that the policy is complied by the organisation's employees. The study was conducted as a case study with a participating company. In this study a policy has been developed within the context of the GDPR and ePrivacythat was then used in interviews with employees of the participating company. This was done in order to research the policy development process and handling of policies in that company. With this research, the knowledge of factors within policy development that affect the employees likelihood to comply with and be aware of the organisation's policies will increase. The recommendations that are formulated as a result of the study may be usedby developers to increase the likelihood that the organisation's policies are complied with and that the employees are more aware of the policies. The recommendations of the study is that developers should take advantage of user involvement in the policy development process. This gives the employees their chance to affect their own work and their processes themselves which will increase their self efficacy and awareness of policies.

  • 18.
    Aristomenopoulos, Georgios
    et al.
    Institute of Communication and Computer Systems, Athens.
    Kaninis, Argyris
    VELTI SA of Software Products and Related Products and Services.
    Vlahopoulos, Panagiotis
    VELTI SA of Software Products and Related Products and Services.
    Sällström, Annika
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Benbadis, Farid
    Thales Communications and Security.
    Papavassiliou, Symeon
    Institute of Communication and Computer Systems, Athens.
    The QUEENS experiment through TEFIS platform2012In: Testbeds and Research Infrastructure: Development of Networks and Communities: 8th International ICST Conference, TridentCom 2012, Thessanoliki, Greece, June 11-13, 2012, Revised Selected Papers / [ed] Thanasis Korakis ; Michael Zink ; Maximilian Ott, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2012, p. 394-396Conference paper (Refereed)
    Abstract [en]

    QUEENS (Dynamic Quality User Experience ENabling Mobile Multimedia Services) aims at exploiting and leveraging on the benefits and flexibility provided by a novel dynamic real-time QoE provisioning framework in order to assess and establish a new era of user-centric mobile multimedia applications. To achieve that, QUEENS utilizes and builds on the TEFIS infrastructure (EC ICT FIRE initiative) that provides a unique integrated platform for supporting efficient Future Internet service experiment and development involving different actors and heterogeneous testbeds. The TEFIS tools and facilities for designing, planning and executing QUEENS experiment, along with a QoE-aware mobile multimedia application prototype will be demonstrated, forming the trends of future internet services and experimental procedures

  • 19.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Workshop on Emerging Aspects in Information Security2015Other (Other (popular science, discussion, etc.))
  • 20.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Communications in Computer and Information Science, Vol. 3812013Other (Other (popular science, discussion, etc.))
  • 21.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Computer Networks2011Other (Other (popular science, discussion, etc.))
    Abstract [en]

    The International Journal of Computer and Telecommunications Networking (COMNET)

  • 22.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Computers & Security2014Other (Other (popular science, discussion, etc.))
  • 23.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Concurrency and Computation: Practice and Experience2016Other (Other (popular science, discussion, etc.))
  • 24.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Health Information Science and Systems (HISS)2016Other (Other (popular science, discussion, etc.))
  • 25.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Information Sciences2013Other (Other (popular science, discussion, etc.))
  • 26.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Intelligent Systems Reference Library, Vol. 702014Other (Other (popular science, discussion, etc.))
  • 27.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Mobile and Ubiquitous Systems2013Other (Other (popular science, discussion, etc.))
  • 28.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Telecommunications2016Other (Other (popular science, discussion, etc.))
  • 29.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Telecommunications2016Other (Other (popular science, discussion, etc.))
  • 30.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Japan-Egypt Conference on Electronics, Communications and Computers2013Other (Other (popular science, discussion, etc.))
  • 31.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Journal of Computational Vision and Robotics. Special Issue on: "Advances in Soft Computing Techniques for Image Processing"2013Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Vol. 3, No. 4

  • 32.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Pattern Recognition2014Other (Other (popular science, discussion, etc.))
    Abstract [en]

    The Journal of the Pattern Recognition Society

  • 33.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Science and Information Conference2014Other (Other (popular science, discussion, etc.))
  • 34.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Science and Information Conference2013Other (Other (popular science, discussion, etc.))
  • 35.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: SpringerPlus2015Other (Other (popular science, discussion, etc.))
  • 36.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Studies in Computational Intelligence, Vol. 6302016Other (Other (popular science, discussion, etc.))
  • 37.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 28th International Conference on Image and Vision Computing New Zealand (IVCNZ 2013)2013Other (Other (popular science, discussion, etc.))
  • 38.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 29th International Conference on Image and Vision Computing New Zealand (IVCNZ 2014)2014Other (Other (popular science, discussion, etc.))
  • 39.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 30th International Conference on Image and Vision Computing New Zealand ( (IVCNZ 2015)2015Other (Other (popular science, discussion, etc.))
  • 40.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 31st International Conference Image and Vision Computing New Zealand (IVCNZ 2016)2016Other (Other (popular science, discussion, etc.))
  • 41.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 49th Hawaii International Conference on System Sciences (HICSS-49)2016Other (Other (popular science, discussion, etc.))
  • 42.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Workshop on Emerging Aspects in Information Security2014Other (Other (popular science, discussion, etc.))
  • 43.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Erratum to : Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU2016In: Soft Computing Applications: Proceedings of the 6th International Workshop Soft Computing Applications (SOFA 2014) / [ed] Valentina Emilia Balas; Lakhmi C. Jain; Branko Kovačević, New York: Encyclopedia of Global Archaeology/Springer Verlag, 2016, Vol. 2, p. E1-Conference paper (Refereed)
    Abstract [en]

    Fingerprint is one of the broadly utilized biometric traits for personal identification in both civilian and forensic applications due to its high acceptability, strong security, and low cost. Fingerprint ridge orientation is one of the global fingerprint representations that keeps the holistic ridge structure in a small storage area. The importance of fingerprint ridge orientation comes from its usage in fingerprint singular point detection, coarse level classification, and fingerprint alignment. However, processing time is an important factor in any automatic fingerprint identification system, estimating that ridge orientation image may consume long processing time. This research presents an efficient ridge orientation estimation approach by incorporating a Graphics Processing Unit (GPU) capability to the traditional pixel gradient method. The simulation work shows a significant enhancement in ridge orientation estimation time by 6.41x using a general purpose GPU in comparison to the CPU execution.

  • 44.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU2016In: Soft Computing Applications: Proceedings of the 6th International Workshop Soft Computing Applications (SOFA 2014) / [ed] Valentina Emilia Balas; Lakhmi C. Jain; Branko Kovačević, New York: Encyclopedia of Global Archaeology/Springer Verlag, 2016, Vol. 2, p. 891-902Conference paper (Refereed)
    Abstract [en]

    Fingerprint is one of the broadly utilized biometric traits for personal identification in both civilian and forensic applications due to its high acceptability, strong security, and low cost. Fingerprint ridge orientation is one of the global fingerprint representations that keeps the holistic ridge structure in a small storage area. The importance of fingerprint ridge orientation comes from its usage in fingerprint singular point detection, coarse level classification, and fingerprint alignment. However, processing time is an important factor in any automatic fingerprint identification system, estimating that ridge orientation image may consume long processing time. This research presents an efficient ridge orientation estimation approach by incorporating a Graphics Processing Unit (GPU) capability to the traditional pixel gradient method. The simulation work shows a significant enhancement in ridge orientation estimation time by 6.41x using a general purpose GPU in comparison to the CPU execution.

  • 45.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Fingerprint local invariant feature extraction on GPU with CUDA2013In: Informatica, ISSN 0350-5596, E-ISSN 1854-3871, Vol. 37, no 3, p. 279-284Article in journal (Refereed)
    Abstract [en]

    Driven from its uniqueness, immutability, acceptability, and low cost, fingerprint is in a forefront between biometric traits. Recently, the GPU has been considered as a promising parallel processing technology due to its high performance computing, commodity, and availability. Fingerprint authentication is keep growing, and includes the deployment of many image processing and computer vision algorithms. This paper introduces the fingerprint local invariant feature extraction using two dominant detectors, namely SIFT and SURF, which are running on the CPU and the GPU. The paper focuses on the consumed time as an important factor for fingerprint identification. The experimental results show that the GPU implementations produce promising behaviors for both SIFT and SURF compared to the CPU one. Moreover, the SURF feature detector provides shorter processing time compared to the SIFT CPU and GPU implementations.

  • 46.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    From classical methods to animal biometrics: A review on cattle identification and tracking2016In: Computers and Electronics in Agriculture, ISSN 0168-1699, E-ISSN 1872-7107, Vol. 123, p. 423-435Article in journal (Refereed)
    Abstract [en]

    Cattle, buffalo and cow, identification has recently played an influential role towards understanding disease trajectory, vaccination and production management, animal traceability, and animal ownership assignment. Cattle identification and tracking refers to the process of accurately recognizing individual cattle and their products via a unique identifier or marker. Classical cattle identification and tracking methods such as ear tags, branding, tattooing, and electrical methods have long been in use; however, their performance is limited due to their vulnerability to losses, duplications, fraud, and security challenges. Owing to their uniqueness, immutability, and low costs, biometric traits mapped into animal identification systems have emerged as a promising trend. Biometric identifiers for beef animals include muzzle print images, iris patterns, and retinal vascular patterns. Although using biometric identifiers has replaced human experts with computerized systems, it raises additional challenges in terms of identifier capturing, identification accuracy, processing time, and overall system operability. This article reviews the evolution in cattle identification and tracking from classical methods to animal biometrics. It reports on traditional animal identification methods and their advantages and problems. Moreover, this article describes the deployment of biometric identifiers for effectively identifying beef animals. The article presents recent research findings in animal biometrics, with a strong focus on cattle biometric identifiers such as muzzle prints, iris patterns, and retinal vascular patterns. A discussion of current challenges involved in the biometric-based identification systems appears in the conclusions, which may drive future research directions.

  • 47.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Introduction to Information Security Foundations and Applications2018In: Information Security: Foundations, technologies and applications / [ed] Ali Ismail Awad and Michael Fairhurst, Institution of Engineering and Technology, 2018, , p. 432p. 3-9Chapter in book (Refereed)
  • 48.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Andrzej, BialasInstitute of Innovative Technologies EMAG.
    Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017)2017Conference proceedings (editor) (Refereed)
    Abstract [en]

    https://fedcsis.org/2017/insert

  • 49.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hassaballah, MahmoudImage and Video Processing Lab, Faculty, South Valley University.
    Image Feature Detectors and Descriptors: Foundations and Applications2016Collection (editor) (Refereed)
  • 50.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hassanien, Aboul Ella
    Cairo University.
    Erratum: Impact of Some Biometric Modalities on Forensic Science2014In: Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Switzerland: Springer International Publishing , 2014, p. E1-Chapter in book (Refereed)
1234567 1 - 50 of 781
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf