Kandidatuppsatser
Senaste titlar
-
Detecting inconsistencies of safety artifacts with Natural Language Processing Bachelor of Science Thesis
(2023-01-09)This paper investigates a method that helps detect inconsistencies between safety-critical systems’ textual safety artifacts that safety cases rely on by involving NLP techniques. A design science research study was conducted ... -
Code smells in machine learning pipelines: an MSR sample study
(2022-12-22)As technical debt in software engineering projects continues to negatively impact the development process, this study focuses on technical debt in form of code smells in machine learning pipelines and in code written by ... -
A Closer Look Into Traceability Management of Non-Functional Requirements in a DevOps Environment
(2022-10-05)Due to DevOps being a fast emerging way of conducting a software development process, there are little to no research covering how the traceability of non-functional requirements is managed in these environments. We ... -
Mining and comparing software testing metrics and evaluating the use of different test quality metric tools
(2022-09-28)Software test metrics are often compared with one another to find the most accurate predictor of test quality, however little is written about the connections between types of metrics. Moreover, open-source software is ... -
Does Gender Matter? An Interview Study on Gender Representation in Software Systems
(2022-07-06)[Context and Motivation] Inclusivity is a term that is widely used today. If you look the word up in a dictionary, it will say something along the lines of ’treating everyone fairly and equally’. How do we then make our ... -
What Data Scientists (care to) Recall
(2022-07-06)Program comprehension is a crucial activity for software developers, just as it is for data scientists. It is an activity that involves gaining new knowledge and recovering lost knowledge, and the process could be a ... -
Threat modelling and vulnerability assessment for IoT solutions: a case study
(2022-07-06)The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners ... -
Impact of a Traceability Dashboard in a Large-scale Company: A Case Study
(2022-07-06)Traceability is known as an important aspect of the development process. However, there are no universal tools that solve the traceability issues for all organizations. Thus, many choose to develop their own solutions. ... -
Testing in microservice systems: A repository mining study on open-source systems using contract testing
(2022-05-02)Context:There is a trend in the software industry to migrate systems from a monolithic to a microservice architecture (MSA) due to the gains in agility and scalability. An MSA-based system consists of a suite of small ... -
RingUpp: En videosamtalstjänst för seniorer
(2021-09-14)Studier visar att internetanvändningen bland den svenska befolkningen fortsätter att växa varje år och har under de senaste tio åren ökat mest för den äldre målgruppen. Trots detta har de flesta applikationer som utvecklas ... -
Shaping trust between users and autonomous cars in situations involving emergency vehicles: A human-centered design approach
(2021-09-14)Technological advances have accelerated the development of autonomous vehicles and fully autonomous cars are now on the horizon. As automation gradually replaces the driver, their role in the car becomes ambiguous. In ... -
Detection and localization of illicit wire less communication in an exam room through passive signal reconnaissance
(2021-09-14)Mer och mer går examination på våra universitet mot tentamen med hjälp av digitala hjälpmedel. Med detta kommer utmaningar om att vidhålla tentamenssäkerheten och att säkerställa rättvis examinering för alla studenter. ... -
Using blended learning in a university-level environment
(2021-09-14)This thesis investigates how teaching methods within blended learning can be applied to a university-level introductory programming course at Chalmers University. The course in question is planned to be renewed, and its ... -
Radio signal detection and localisation for uncovering unauthorised signals in an examination environment
(2021-09-14)Examination is a fundamental part of education, both for students and institutions. Cheating on exams is something educational institutions are trying to reduce. One form of cheating is the use of a mobile phone to ... -
Simulating an Ecosystem
(2021-09-14)Simulations are computer programs based on models, used to imitate real-life scenarios. Simulating an ecosystem is a great challenge given the various factors that interact and animals that coexist. The thesis work presented ... -
Simulate Bacterial Movement through Chemotaxis
(2021-09-14)This thesis describes the development of an agent-based simulation of E. coli chemotaxis in C# and the Unity game engine. The agents use a mathematical model of the chemical pathway underlying chemotaxis to produce either ... -
Bot or Human: Identifying BotGenerated Clicks Using Machine Learning
(2021-09-14)“I’m not a robot” is a common CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) often shown today upon entering websites. The purpose behind the challenge is to distinguish hu mans from ... -
Cultural Heritage Reconstruction of the Cinema Flamman Using VR
(2021-09-14)Virtual reality is adopted in many areas such as the military, education, health care, and preservation of cultural heritage. This thesis will further explore the possibility of cultural heritage preservation in virtual ... -
Onlinespel skapat med fokus på social interaktion
(2021-09-14)Projektets syfte var att skapa ett digitalt spel som uppmuntrar till samarbete mellan spelarna. Spelet är framtaget för att spela i lag om fyra där nyckeln för att lyckas är tätt samarbete. Metoden som använts i detta ...