Hide menu

Examensarbeten och uppsatser / Final Theses

Framläggningar på IDA / Presentations at IDA


Se även framläggningar annonserade hos ISY och ITN i Norrköping / See also presentations announced at ISY and ITN in Norrköping (in Swedish)

If nothing is stated about the presentation language then the presentation is in Swedish.


WExUpp - kommande framläggningar
2019-10-18 - SaS
Automated Test Case Generation for MC/DC Coverage using Incremental SAT-Based Model Checking
Oscar Holm
Avancerad (30hp)
kl 13:00, Donald Knuth (In English)
[Abstract]
The importance and requirements of certifying safety critical software is today more apparent than ever. This study focuses on the standards and practices used within the avionics, automotive and medical domain when it comes to safety critical software. We identify critical problems and trends when certifying safety critical software and propose a proof-of-concept using static analysis, model checking and incremental SAT solving as a contribution towards solving the identified problems. We present quantitative execution times and code coverage results of our proposed solution. The proposed solution is developed under the assumptions of safety critical software standards and compared to other studies proposing similar methods. Lastly, we conclude the issues and advantages of our proof-of-concept in perspective of the software developer community.
2019-10-18 - SaS
Att kartlägga anställdas kompetenser
Christoffer Johansson
Avancerad (30hp)
kl 13:15, Alan Turing (På svenska)
[Abstract]
The need to manage, map and develop a companies employees competencies is constantly increasing in today's rapidly growing market. It is therefore incredibly important to have a broad understanding of what competencies one's employees possess and which competencies the company potentially lacks. This thesis investigates how to assess, evaluate and map employees competencies in the best possible manner, followed by the potential effects this can have on the individuals undergoing the assessment. Lastly the thesis identifies how a competency management system could be implemented and which functionalities said system should contain. This study began with a systematic literature review, for me to get a better understanding of the competency concept and competency assessment. The literature study was followed by a questionnaire distributed to all Etteplans employees in Linköping and Norrköping, and lastly four interviews were conducted with employees at the office in Linköping. To get a clearer understanding of the employees thoughts regarding competency and the implementation of a new competency management system. One of the most important factors to take into consideration when applying a competency management procedure is that these implementations takes time and must be carefully planned and executed to generate the best possible results. All companies are unique and require their own competency management procedure to succeed.
2019-10-18 - SaS
System upgrade verifications
Viktor Rotting Tjädermo, Alex Tanskanen
Grundnivå (16hp)
kl 13:15, John Von Neumann (In English)
[Abstract]
We live in a society where automatization is becoming more common, whether it be cars or artificial intelligence. Software needs to be updated using patches, however, these patches have the possibility of breaking components. This study takes such a patch in the context of Ericsson, identifies what needs to be tested, investigates whether the tests can be automated and assesses how maintainable they are. Interviews were used for the identification of system and software parts in need of testing.Then tests were implemented in an automated test suite to test functionality of either a system or software. The goal was to reduce time of troubleshooting for employees without interrupting sessions for users as well as set up a working test suite.When the automated testing is completed and implemented in the test suite, the study is concluded by measuring the maintainability of the scripts using both metrics and human assessment through interviews. The result showed the testing suite proved maintainable,both from the metric point of view and from human assessment
2019-10-18 - AIICS
HMMs and RNNs for Online Gesture Recognition on the Stylaero Board
Sebastian Parmbäck
Avancerad (30hp)
kl 15:15, (In English)
[Abstract]
In this thesis, methods of implementing an online gesture recognition system for the
novel Stylaero Board device are investigated. Two methods are evaluated - one based on
RNNs and one based on HMMs - on three kinds of gestures: Tap, circle, and flick motions.
A method’s performance was measured in its accuracy in determining both whether any of
the above listed gestures were performed and, if so, which gesture, in an online single-pass
scenario. Insight was acquired regarding the technical challenges and possible solutions
to the online aspect of the problem. Poor performance was, however, observed in both
methods, with a likely culprit identified as low quality of training data, due to an arduous
and complex gesture performance capturing process. Further research improving on the
process of gathering data is suggested.
2019-10-22 - HCS
Ramverk för Uppdragsutdelare
Jacob Nilsson, William Tyrsing
Grundnivå (16hp)
kl 10:15, Alan Turing (På svenska)
[Abstract]
Samhällssäkerhet är en av de viktigaste prioriteringarna i ett land. För att effektivisera utvecklingen av
säkerhet behövs en stor satsning. I projektet WASP Research Arena - Public Safety (WARA-PS)
utforskas framtida möjligheter i sjöräddningstjänst. Genom att automatisera delar av
sjöräddningstjänst kan det avsevärt effektiviseras och rädda fler liv än vad vi idag är kapabla att rädda.
I denna rapport skapas ett designförslag för modulen Mission Partitioner (MP), en komponent i
automatiserad sjöräddningstjänst. MP skapar och optimerar högnivå-uppdrag snabbare än någon
människa. MP designas med aspekterna flexibilitet och utökningsbarhet för att enkelt kunna anpassas
till nya användningsområden. Komponenterna Mission, Environment, Operation och Planner
identifieras som de mest kritiska komponenterna för MP:s funktionalitet. Komponenten Planner
representerar möjliga planeringsmetoder, i den skapade prototypen används GOAP. De resterande
komponenterna designas med metoder som ger upphov till flexibilitet och utökningsbarhet såsom
polymorphism. Analysen visar att systemet är flexibelt och utökningsbart för de kritiska
komponenterna som tillhör MP.
2019-10-22 - ADIT
Specification-assisted hybrid fuzzing
Patrik Sletmo
Avancerad (30hp)
kl 10:15, IDA Muhammad al-Khwarizmi (In English)
[Abstract]
Over the recent years, the software industry has faced a steady increase in the number of exposed and exploited software vulnerabilities. With more software and devices being connected to the internet every day, the need for proactive security measures has never been more important. One promising new technology for making software more secure is fuzz testing. This automated testing technique is based around generating a large number of test cases with the intention of revealing dangerous bugs and vulnerabilities. In this thesis work, a new direction within grey-box fuzz testing is evaluated against previous work. The presented approach uses sampled probability data in order to guide the fuzz testing towards program states that are expected to be easy to reach and beneficial for the discovery of software vulnerabilities. Evaluation of the design shows that the suggested approach provides no obvious advantage over existing solutions, but also indicates that the performance advantage could be dependent on the structure of the system under test. However, analysis of the design itself highlights several design decisions that could benefit from more extensive research. While the design proposed in this thesis work is insufficient for replacing current state of the art fuzz testing software, it provides a solid foundation for future research within the field. With the many insights gained from the design and implementation work, this thesis work aims to both inspire others and showcase the challenges of creating a probability-based approach to grey-box fuzz testing.
2019-10-24 - SaS
Latency and traffic aware container placement in distributed cloud
Lenny Johansson
Avancerad (30hp)
kl 09:00, Herbert Simon (In English)
[Abstract]
Distributed cloud is a key technology for 5G networks and is emerging as an alternative cloud infrastructure for hosting latency critical and traffic-intense applications. Placing computational resources on the edge of networks allows applications to be hosted closer to end users and traffic generating sources, which will reduce latency and traffic deeper in the network. This thesis presents a two-phase approach to solve the combinatorial optimization problem of latency and traffic aware container placement in distributed cloud. The first phase involves placing containers in data centers and is solved using an integer programming model. Three different objective functions are presented and evaluated using acceptance ratio and average cost as performance metrics. In the second phase, containers are placed in servers. A traffic-aware heuristic is presented and evaluated against traditional bin packing heuristics. The traffic-aware heuristic managed to drastically reduce all traffic-related metrics at the cost of a few additional active servers in comparison to the bin packing heuristics. The heuristic can therefore be a good approach when placing traffic-intense applications in data centers in order to avoid network congestion.
2019-10-24 - SaS
User Deployed Hot-Spots in Rural 5G Networks
Nasir Zaman
Avancerad (30hp)
kl 10:30, Herbert Simon (In English)
[Abstract]
Cellular network expansion in rural areas has been traditionally slower than in dense urban areas. Area coverage in rural areas is fundamentally limited by the deployment cost for the operator. The 5th generation new radio (5G NR) network is designed to deliver unprecedented levels of capacity, high data rates, low latency and high reliability anytime and anywhere. The focus of 5G NR development is on relatively short-range communication using high frequency bands (e.g. mmWave-length) where lots of spectrum is available. For extremely long-range communication (e.g. in rural areas) high frequency bands are less suitable due to the high signal attenuation. One way to increase coverage in rural areas is to allow end users to deploy their own personal local hot-spot nodes that connect to the cellular network. A personal rural hot-spot can make use of higher transmission power and have better antennas than what normal user terminals can be equipped with. This thesis work will study the impacts of ”user deployed rural hot-spots” on the network like how much the network energy consumption can be decreased, what is the effect of discontinuation transmission (DTX) on network sleep mode and how inter site distance (ISD) can be increased to increase the coverage. One way to increase rural coverage by using the user deployed hot-spot is to reduce the network energy consumption for network operators and results show that by using user deployed hot-spots (enhanced UE) decreased the network energy consumption and while enhancing the BS configuration will require additional capital expense (CAPEX) investment for the network operators. User deployed hot-spot provide better connectivity for the users that are lying in network edges and helps to increase the inter site distance (ISD) of wireless networks.
2019-10-30 - SaS
Mobility Optimization for Energy Efficient 5G Networks
Oskar Gustafsson
Avancerad (30hp)
kl 08:15, Alan Turing (In English)
[Abstract]
: With the upcoming of the fifth generation of networks there are several performance requirements that need to be satisfied. This thesis focus on the topic of mobility which allows users to move through the network using the concept of handovers to switch between base stations. However, the thesis also keeps the energy efficiency in mind and investigates a strategy of reducing the energy consumption. The network is in the time of writing not free from failures, and there exists a tradeoff between too early and too late handover failures. This thesis investigates two approaches of lowering the number of failures by letting the network self-optimize parameters in the handover procedure based upon the tradeoff. The first approach includes a parameter adaption to an estimated velocity of the users and the second one making a parameter more granular. Simulating different scenarios in a detailed network simulator show performance gain by adapting handover parameters to the estimated velocity, but gathering more data regarding failures is needed before generalizing the conclusions.
2019-10-30 - SaS
Edge Computing for Mixed Reality
Johan Lindqvist
Avancerad (30hp)
kl 10:00, Alan Turing (In English)
[Abstract]
Mixed reality, where the real and the virtual worlds are combined, has seen an increase
in interest in recent years with the release of tools like Google ARCore and Apple ARkit.
Edge computing, where the distributed computing resources are located near the end device
at the edge of the network, is a paradigm that enables offloading of computing tasks
with latency requirements to dedicated servers.
This thesis studies how edge computing can be used to bring mixed reality capabilities
to mobile end devices that lack native support for that. It presents a working prototype
for delivering mixed reality, evaluates the different technologies in it in relation to stability,
responsiveness and resource usage, and studies the requirements on the end and edge
devices. The thesis presents bottlenecks and best practices found during the prototype’s
development, and how to proceed from here.
2019-11-01 - SaS
Säker hantering av programvarutillägg
Johan Hedlin, Joakim Kahlström
Grundnivå (16hp)
kl 10:00, Donald Knuth (In English)
[Abstract]
Static analysis is a technique to automatically audit code without having to execute or manually read through it. It is highly effective and can scan large amounts of code or text very quickly. This thesis uses static analysis to find potential threats within a software's extension modules. These extensions are developed by third parties and should not be allowed to access information belonging to other extensions. However, due to the structure of the software there is no easy way to restrict this and still keep the software's functionality intact. The use of a static analysis tool could detect such threats by analyzing the code of an extension before publishing it online, and therefore keep all current functionality intact. As the software is based on a lesser known language and there is a specific threat by way of information disclosure, a new static analysis tool has to be developed. To achieve this, a combination of language specific functionality and features available in C++ are combined to create an extendable tool which has the capability to detect cross-extension data access.


Page responsible: Ola Leifler
Last updated: 2017-04-27