SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "LAR1:ltu ;lar1:(his)"

Sökning: LAR1:ltu > Högskolan i Skövde

  • Resultat 1-10 av 32
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abrahamsson, Lena, et al. (författare)
  • Tankar om arbetslivet
  • 2015
  • Rapport (populärvet., debatt m.m.)abstract
    • Tre framstående arbetslivsforskare kastar av sig de akademiska reglerna och skriver fritt om arbete och livet i övrigt. Det blir underfundiga, utrerade, upplysande, uddiga, underbara, upprörande, underhållande, upphetsande och uppfriskande funderingar över arbetsliv och annat liv. Texterna var från början bloggar på Forum för arbetslivsforsknings hemsida, falf.se.
  •  
2.
  • Andersson, Angelica, et al. (författare)
  • Digital speckle-pattern interferometry: fringe retrieval for large in-plane deformations with digital speckle photography
  • 1999
  • Ingår i: Applied Optics. - : Optical Society of America. - 1559-128X .- 2155-3165. ; 38:25, s. 5408-5412
  • Tidskriftsartikel (refereegranskat)abstract
    • The compensation of large in-plane motions in digital speckle-pattern interferometry (DSPI) with the use of digital speckle photography (DSP) is demonstrated. Ordinary recordings of DSPI are recombined and analyzed with DSP. The DSP result is used to compensate for the bulk speckle motion prior to calculation of the phase map. This results in a high fringe contrast even for deformations of several speckle diameters. In addition, for the case of an in-plane deformation, it is shown that the absolute phase change in each pixel may be unwrapped by use of the DSP result as an initial guess. The principles of this method and experiments showing the in-plane rotation of a plate and the encounter of two rounded plates are presented
  •  
3.
  • Bergström, Erik, 1976-, et al. (författare)
  • Revisiting information security risk management challenges : a practice perspective
  • 2019
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 27:3, s. 358-372
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose – The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.Design/methodology/approach – The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel.Findings – Managerial and organisational concerns that go beyond a technical perspective have been . found, which affect the ongoing social build-up of knowledge in everyday information security work.Research limitations/implications – The study has delimitation as it consists of data from four public sector organisations, i.e. statistical analyses have not been in focus, while implying a better understanding of what and why certain actions are practised in their security work.Practical implications – The new challenges that have been identified offer a refined set of actionable advice to practitioners, which, for example, can support cost-efficient decisions and avoid unnecessary security trade-offs.Originality/value – Information security is increasingly relevant for organisations, yet little is still known about how related risks are handled in practice. Recent studies have indicated a gap between the espoused and the actual actions. Insights from actual, situated enactment of practice can advise on process adaption and suggest more fit approaches.
  •  
4.
  • Bergström, Erik, 1976-, et al. (författare)
  • Stress Amongst Novice Information Security Risk Management Practitioners
  • 2019
  • Ingår i: International Journal on Cyber Situational Awareness. - : Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC). - 2057-2182 .- 2057-2182. ; 4:1, s. 128-154
  • Tidskriftsartikel (refereegranskat)abstract
    • Today, information is a key asset for many organisations. Reducing risks of information compromise is increasingly prioritised. However, there is an incomplete understanding of how organisations with limited security knowledge and experience manage information security risks in practice. Previous studies have suggested that security-novice employees faced with burdensome, complex, and ambiguous security requirements can experience security-related stress (SRS), and ultimately influence their security decisions. In this study, we further this research stream by suggesting that SRS can similarly be found with security-novice managers responsible for developing and practising information security risk management (ISRM). Two organisations were targeted in the study using a case study approach, to obtain data about their practices, using SRS as an analytical lens. The study found various examples where SRS influenced security-novice managers’ decisions, and identifies several stressors and stress inhibitors in the ISRM process and supporting ISRM tools, and discusses the implications for practitioners.
  •  
5.
  • Bergström, Per, 1981-, et al. (författare)
  • Automatic in-line inspection of shape based on photogrammetry
  • 2016
  • Ingår i: The 7th International Swedish Production Symposium, SPS16, Conference Proceedings. - Lund : Swedish Production Academy. ; , s. 1-9
  • Konferensbidrag (refereegranskat)abstract
    • We are describing a fully automatic in-line shape inspection system for controlling the shape of moving objects on a conveyor belt. The shapes of the objects are measured using a full-field optical shape measurement method based on photogrammetry. The photogrammetry system consists of four cameras, a flash, and a triggering device. When an object to be measured arrives at a given position relative to the system, the flash and cameras are synchronously triggered to capture images of the moving object.From the captured images a point-cloud representing the measured shape is created. The point-cloud is then aligned to a CAD-model, which defines the nominal shape of the measured object, using a best-fit method and a feature-based alignment method. Deviations between the point-cloud and the CAD-model are computed giving the output of the inspection process. The computational time to create a point-cloud from the captured images is about 30 seconds and the computational time for the comparison with the CAD-model is about ten milliseconds. We report on recent progress with the shape inspection system.
  •  
6.
  • Bernsmed, Karin, et al. (författare)
  • An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects
  • 2022
  • Ingår i: Journal of Air Transport Management. - : Elsevier. - 0969-6997 .- 1873-2089. ; 102
  • Tidskriftsartikel (refereegranskat)abstract
    • Cyber security is a key enabler for safe Air Traffic Management (ATM). This paper presents results from an empirical study, in which we have investigated and evaluated the use of the Security Risk Assessment Methodology for SESAR (SecRAM) in European ATM research and development projects. The study was performed with the intention to find and document common issues and aspects that could be improved in the methodology. The results from the study reveal that while most of the practitioners had a positive perception of the methodology itself, they were less satisfied with the process of applying it in their projects. Based on the results, we provide a number of recommendations, which aim to improve the security risk assessment process in the ATM domain.
  •  
7.
  • Faizi, Ana, et al. (författare)
  • From rationale to lessons learned in the cloud information security risk assessment : a study of organizations in Sweden
  • 2022
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 30:2, s. 190-205
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose:This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.Design/methodology/approach:Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.Findings:The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.Originality/value:As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.
  •  
8.
  • Fornlöf, Veronica, 1984-, et al. (författare)
  • On-Condition Parts Versus Life Limited Parts : A Trade off in Aircraft Engines
  • 2016
  • Ingår i: Current Trends in Reliability, Availability, Maintainability and Safety. - Cham : Encyclopedia of Global Archaeology/Springer Verlag. - 9783319235967 - 9783319235974 ; , s. 253-262
  • Konferensbidrag (refereegranskat)abstract
    • Maintaining an aircraft engine is both complex and time consuming since an aircraft is an advanced system with high demands on safety and reliability. Each maintenance occasion must be as effective as possible and the maintenance need to be executed without performing excessive maintenance. The aim of this paper is to describe the essence of aircraft engine maintenance and to point out the potential for improvement within the maintenance planning by improving the remaining life predictions of the On-Condition parts, i.e. parts that are not given a fixed life limit.
  •  
9.
  • Galar, Diego, et al. (författare)
  • Big Data in Asset Management : Knowledge Discovery in Asset Data by the Means of Data Mining
  • 2016
  • Ingår i: Proceedings of the 10th World Congress on Engineering Asset Management (WCEAM 2015). - Cham : Springer. - 9783319270623 - 9783319270647 - 3319270648 ; , s. 161-171
  • Konferensbidrag (refereegranskat)abstract
    • Assets are complex mixes of complex systems, built from components which, over time, may fail. The ability to quickly and efficiently determine the cause of failures and propose optimum maintenance decisions, while minimizing the need for human intervention is necessary. Thus, for complex assets, much information needs to be captured and mined to assess the overall condition of the whole system. Therefore the integration of asset information is required to get an accurate health assessment of the whole system, and determine the probability of a shutdown or slowdown. Moreover, the data collected are not only huge but often dispersed across independent systems that are difficult to access, fuse and mine due to disparate nature and granularity. If the data from these independent systems are combined into a common correlated data source, this new set of information could add value to the individual data sources by the means of data mining. This paper proposes a knowledge discovery process based on CRISP-DM for failure diagnosis using big data sets. The process is exemplified by applying it on railway infrastructure assets. The proposed framework implies a progress beyond the state of the art in the development of Big Data technologies in the fields of Knowledge Discovery algorithms from heterogeneous data sources, scalable data structures, real-time communications and visualizations techniques.
  •  
10.
  • Gerdes, Mike, et al. (författare)
  • Decision Trees and the Effects of Feature Extraction Parameters for Robust Sensor Network Design
  • 2017
  • Ingår i: Eksploatacja i Niezawodność – Maintenance and Reliability. - : Polskie Naukowo - Techniczne Towarzystwo Eksploatacyjne. - 1507-2711 .- 2956-3860. ; 19:1, s. 31-42
  • Tidskriftsartikel (refereegranskat)abstract
    • Reliable sensors and information are required for reliable condition monitoring. Complex systems are commonly monitored by many sensors for health assessment and operation purposes. When one of the sensors fails, the current state of the system cannot be calculated in same reliable way or the information about the current state will not be complete. Condition monitoring can still be used with an incomplete state, but the results may not represent the true condition of the system. This is especially true if the failed sensor monitors an important system parameter. There are two possibilities to handle sensor failure. One is to make the monitoring more complex by enabling it to work better with incomplete data; the other is to introduce hard or software redundancy. Sensor reliability is a critical part of a system. Not all sensors can be made redundant because of space, cost or environmental constraints. Sensors delivering significant information about the system state need to be redundant, but an error of less important sensors is acceptable. This paper shows how to calculate the significance of the information that a sensor gives about a system by using signal processing and decision trees. It also shows how signal processing parameters influence the classification rate of a decision tree and, thus, the information. Decision trees are used to calculate and order the features based on the information gain of each feature. During the method validation, they are used for failure classification to show the influence of different features on the classification performance. The paper concludes by analysing the results of experiments showing how the method can classy different errors with a 75% probability and how different feature extraction options influence the information gain.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 32
Typ av publikation
tidskriftsartikel (21)
konferensbidrag (5)
bokkapitel (3)
rapport (1)
doktorsavhandling (1)
forskningsöversikt (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (29)
övrigt vetenskapligt/konstnärligt (2)
populärvet., debatt m.m. (1)
Författare/redaktör
Galar, Diego (8)
Lundgren, Martin (8)
Runnemalm, Anna (6)
Bergström, Erik, 197 ... (5)
Padyab, Ali (4)
Molin, Nils-Erik (3)
visa fler...
Schmidt, Bernard, 19 ... (3)
Wang, Lihui (2)
Ericson, Åsa (2)
Habibipour, Abdolras ... (2)
Gerdes, Mike (2)
Karlsson, Jan (1)
Svoboda, Ales (1)
Abrahamsson, Lena (1)
Tengblad, Stefan (1)
Ståhlbröst, Anna, 19 ... (1)
Kans, Mirka (1)
Eriksson, Irene (1)
Almgren, Torgny (1)
Kalén, Anton (1)
Gard, Gunvor (1)
Sjödahl, Mikael (1)
Sjödahl, Mikael, 196 ... (1)
Salomonsson, Kent (1)
Sperling, Lena (1)
Andersson, Alf (1)
Andersson, Angelica (1)
Supej, Matej (1)
Holmberg, Hans-Chris ... (1)
Syberfeldt, Anna (1)
Andersson, Nils-Eric (1)
Wickelgren, Mikael (1)
Linnéusson, Gary (1)
Jansson, Erik (1)
Jarfors, Anders E.W. ... (1)
Hanson, Lars (1)
Bernsmed, Karin (1)
Bour, Guillaume (1)
Bergström, Per, 1981 ... (1)
Fergusson, Michael (1)
Folkesson, Patrik (1)
Ottosson, Mattias (1)
Verdel, Nina (1)
Rizk, Aya, 1988- (1)
Faizi, Ana (1)
Naess, Andreas (1)
Fornlöf, Veronica, 1 ... (1)
Saldner, Henrik O. (1)
Gandhi, Kanika (1)
Scholz, Dieter (1)
visa färre...
Lärosäte
Luleå tekniska universitet (32)
Jönköping University (6)
Kungliga Tekniska Högskolan (2)
Högskolan Väst (1)
Lunds universitet (1)
visa fler...
Linnéuniversitetet (1)
visa färre...
Språk
Engelska (31)
Svenska (1)
Forskningsämne (UKÄ/SCB)
Teknik (19)
Naturvetenskap (12)
Samhällsvetenskap (11)
Medicin och hälsovetenskap (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy