<?xml version='1.0' encoding='UTF-8'?>

<searchRetrieveResponse xmlns="http://www.loc.gov/zing/srw/">
<version>1.1</version>
<numberOfRecords>63</numberOfRecords>
<records>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH3</genre> <titleInfo> <title>Computerized Working Memory Training in Group and the Effects of Noise: a Randomised Pilot Study with 7 to 9 year old Children</title> </titleInfo> <name type="personal"> <namePart type="given">Anna</namePart> <namePart type="family">Backman</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Erik</namePart> <namePart type="family">Truedsson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Magnus</namePart> <namePart type="family">Lindgren</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Psychology</namePart> <identifier type="lucatorg">v1000681</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The current study examines the effects of a computerised Working Memory (WM) intervention in elementary school children when training in groups of various sizes. It further examines the effects of noise during the performance of WM tasks. The children included were 7 - 9 years old and were randomly assigned to control and training groups based on Raven&amp;#39;s scores. Results showed an improvement of verbal WM, backward digit span task, and of visuospatial WM, on the visuospatial span task. Furthermore, the results indicated that group size and performance in the interventions exercises had a greater influence on visuo-spatial WM performance than on verbal WM performance. The results of the study also suggest that computerized WM training in group is less than optimal. Regarding noise, the visuospatial WM task showed an interaction effect with noise when all participating children were divided into two groups based on teacher rated school achievement. Noise influenced the results positively in average/high school achievers while not in low school achievers.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Backman_o_Truedsson.pdf">http://lup.lub.lu.se/student-papers/record/1318434/file/1318435.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">728005</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2008</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>neurophysiology</topic> <topic>neuropsychology</topic> <topic>Neurology</topic> <topic>White noise</topic> <topic>Working Memory</topic> <topic>training</topic> <topic>Neurologi</topic> <topic>neuropsykologi</topic> <topic>neurofysiologi</topic> <topic>Psychology</topic> <topic>Psykologi</topic> </subject> <subject authority="lup"> <topic>Social Sciences</topic> <topic>Medicine and Health Sciences</topic> </subject> <recordInfo> <recordIdentifier>1318434</recordIdentifier> <recordCreationDate encoding="w3cdtf">2008-06-04T00:00:00+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2009-11-17T12:58:26+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2008-01-01T00:00:00+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>1</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Simulation Study of dsDNA - Melting and Bubble Formation</title> </titleInfo> <name type="personal"> <namePart type="given">Ellen</namePart> <namePart type="family">Rieloff</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>8881845</affiliation> </name> <name type="personal"> <namePart type="given">Marie</namePart> <namePart type="family">Skepö</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Alberto</namePart> <namePart type="family">Canelas Pais</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Chemistry</namePart> <identifier type="lucatorg">v1000647</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <name type="corporate"> <namePart>Common departments, the faculties of Science and Engineering</namePart> <identifier type="lucatorg">000007000</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">A simple coarse-grained model has been developed for the purpose of studying DNA melting and especially the formation of bubbles in the melting process. The inter-strand interaction includes terms for excluded volume and electrostatics, as well as a short-ranged attraction modelling hydrogen-bonding, differing for the two base pairs. Results were obtained by canonical Monte Carlo simulations. The melting curves shows great resemblance in shape to experimental melting curves, and the model captures trends related to concentration and length. Changes in radius of gyration, end-to-end distance and persistence length is also observed upon melting. Block structures of different base pairs exhibit stepwise melting, where the AT block separates first, causing the formation of bubbles. Simulated scattering data provides information about changes in shape and size upon melting, but does not detect bubbles.</abstract> <abstract type="popular" lang="swe">DNA är en mycket viktig molekyl, eftersom den innehåller all vår genetiska information. DNA består av två komplementära strängar som tillsammans bildar en dubbelhelix. Varje sträng är en sekvens av nukleotider, med olika baser: adenin (A), tymin (T), guanin (G), och cytosin (C). A och T på olika strängar bildar baspar, likaså G och C. Därför kan man genom att läsa av ena strängen veta sekvensen på den andra strängen. &lt;br /&gt; &lt;br /&gt; DNA innehåller receptet på kroppens proteiner, men för att komma åt informationen måste dubbelhelixen öppnas, vilket görs med speciella proteiner. De bryter basparen i regioner med rätt information så att lokala bubblor bildas. Även värme kan få dubbelhelixen att öppnas. Detta sker först i regioner där det finns mycket A och T, eftersom de basparen sitter ihop svagare än GC-par. På detta sätt bildas lokala bubblor, som sedan blir större med ökad temperatur. Processen när basparen öppnas så att strängarna delar på sig kallas smältning. I detta arbete har smältprocessen och bubbelbildningen studerats, vilket ger information om DNA-molekylens egenskaper och i längden kan ge bättre förståelse för till exempel proteintillverkningen. &lt;br /&gt; &lt;br /&gt; Studien har gjorts genom att skapa en enkel modell av DNA, som sedan har simulerats. Datorsimuleringar ger möjligheten att observera exakt vad som händer med en molekyl, vilket är svårt att göra experimentellt. Simuleringar komplementerar därför experiment, och en bra modell kan dessutom förutsäga vad som kommer hända och således underlätta experiment. &lt;br /&gt; &lt;br /&gt; Modellen visar att när DNA smälter blir strängarna mer flexibla och mindre utsträckta. Smälttemperaturen påverkas av både längd på molekylen och koncentration av DNA, vilket stämmer överens med tidigare experiment. Genom att simulera data som normalt fås från den experimentella tekniken röntgenspridning har det gjorts förutsägningar om huruvida tekniken kan ge information om bubblorna i smältningen. Den simulerade datan kunde tyvärr inte detektera bubblor, men med modifieringar, så att datan bättre efterliknar röntgenspridning, kan det vara möjligt i framtiden.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="thesis.pdf">http://lup.lub.lu.se/student-papers/record/8881829/file/8891744.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">2305744</note> <accessCondition type="restrictionOnAccess">yes</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2016</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>melting</topic> <topic>DNA</topic> <topic>simulations</topic> <topic>coarse-graining</topic> <topic>Monte Carlo</topic> <topic>theoretical chemistry</topic> <topic>teoretisk kemi</topic> </subject> <subject authority="lup"> <topic>Chemistry</topic> </subject> <recordInfo> <recordIdentifier>8881829</recordIdentifier> <recordCreationDate encoding="w3cdtf">2016-06-15T16:31:17+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2016-10-07T15:24:23+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2016-10-07T15:24:23+02:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>2</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH3</genre> <titleInfo> <title>Computer Vision and Kinematic Sensing in Robotics</title> </titleInfo> <name type="personal"> <namePart type="given">Duarte</namePart> <namePart type="family">Mendonca</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Luis</namePart> <namePart type="family">Conde Bento</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">N/A</namePart> <namePart type="family">N/A</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Automatic Control</namePart> <identifier type="lucatorg">v1000253</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">To use vision in a robotic setting it is important to achieve realtime performance. Real-time vision may be used to directly steer robots using for instance visual servoing techniques. In this thesis, an experimental vision setup using a stereo rig mounted on an industrial robot (ABB Irb-6) was built from ground up and then used to perform two experiments; visual servoing and collection of data for calibration of stereo rig and positioning of second robot (ABB Irb-2000) using visual feedback. The system is currently capable of achieving a ~15Hz visual feedback rate which could be easily extended into the 20Hz domain.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="5670.pdf">http://lup.lub.lu.se/student-papers/record/8848262/file/8859492.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">2173939</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2001</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <relatedItem type="host"> <titleInfo> <title>MSc Theses</title> </titleInfo> <identifier type="issn">0280-5316</identifier> <part> <detail type="reportNumber"> <number>TFRT-5670</number> </detail> </part> </relatedItem> <recordInfo> <recordIdentifier>8848262</recordIdentifier> <recordCreationDate encoding="w3cdtf">2016-03-11T14:20:22+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2016-03-20T11:15:52+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2016-03-20T11:15:52+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>3</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Based Simulations of Polymer Pellets Flow in Pneumatic Conveying Systems and Hoppers</title> </titleInfo> <name type="personal"> <namePart type="given">Joakim</namePart> <namePart type="family">Palmberg</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>1472959</affiliation> </name> <name type="personal"> <namePart type="given">Tomas</namePart> <namePart type="family">Stafström</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Giorgos</namePart> <namePart type="family">Nikoleris</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Innovation</namePart> <identifier type="lucatorg">v1000241</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="swe">I lamineringsprocessen är polymer pellets en viktig komponent för den färdiga produkten. Innan polymer pelletsen smälts och formas till slutlig produkt i en extruder, måste de transporteras från sin lagerhållningsplats in till processen genom rörsystem. Under denna transport uppstår slitage av pelletsen i form av damm och avlagringar som har en negativ effekt på processen.&lt;br /&gt; Innan pelletsen når processen fylls de i en hopper, placerad direkt ovanför extrudern. Hoppern i sin tur matar extrudern med pellets, men fungerar också som en lokal lagringsenhet för att försäkra att extrudern konstant förses med erforderliga pellets. Att ha ett väl fungerande flöde i hoppern är därför viktigt för att undvika avbrott i produktionen.&lt;br /&gt; Tetra Pak vill utöka sin förståelse inom detta området för att kunna minimera problem i processen och säkerställa kvalitén i slutprodukten. Man vill därför förutom att göra en teoretisk studie, även undersöka möjligheterna att utföra datorsimuleringar av flödet av polymer pellets i rörsystem och i hopprar.&lt;br /&gt; Avsikten med detta examensarbete har varit att först genomföra en teoretisk studie för att identifiera vilka materialegenskaper och processparametrar som påverkar dessa flöden, men också att finna lämpliga programvaror för dessa simuleringar samt att utvärdera programvaran för hoppersimuleringar.&lt;br /&gt; I den teoretiska studien identifierades vilka materialegenskaper för polymerpelletsen som var nödvändiga för att kunna utföra datorsimuleringar. Metoder för att mäta dessa materialegenskaper utvecklades och utvärderades sedan statistiskt med Gage R&amp;amp;R. Programvaran, EDEM, utvärderades genom att utföra praktiska tester som sedan jämfördes med simuleringarna. Första simuleringensmodellen sattes upp med de uppmätta materialeparametrar, men också med en del uppskattade som inte kunde mätas. Reslutatet från denna simuleringen visade sig inte stämma överens med det praktiska testet. En känslighetsanalys utfördes i simuleringsprogrammet för att undersöka vilka materialparametrar som påverkade resultatet. Ett antal vidare simuleringar utfördes där dessa parametrar justerades tills resultatet från simuleringen stämde överens med det praktiska testet.&lt;br /&gt; För att verifiera att dessa materialparametrar var representabla, utfördes ytterligare ett praktiskt test och en simulering på en annorlunda hoppergeometri. Om materialparametrarna från den första simuleringen är representabla, skulle de ge en överensstämmande simulering även för den andra hoppergeometrin. Samma undersökning gjordes sedan med en annan polymertyp med andra materialegenskaper för att ytterligare validera simuleringsmodellen.&lt;br /&gt; Studien visar att simuleringsresultat som ligger väldigt nära verkligheten kan uppnås. De fyra slutgiltiga simuleringarna i studien visar alla goda resultat med avvikelser inom 3,9 % vad gäller tömningstid av hopprarna. Vidare så stämmer flödesmönsterna väl överens med observationer gjorda under de praktiska testerna. Man ska dock ha i åtanke att simuleringarna är väldigt tidskrävande och kräver hög datorprestanda. En simulering av flödet i en fylld hopper av den typ som Tetra Pak använder sig av kan ta flera månader att slutföra. För att spara tid har istället små hoppermodeller använts i detta arbetet. I kombination med dessa mindre hoppermodeller kan EDEM fungera som ett bra verktyg att utföra känslighetsanalyser med för att undersöka hur materialegenskaper och hoppergeometrier påverkar flödet av pellets.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Computer_Based_Simulations_of_Polymer_Pellets_Flow_in__Pneumatic_Conveying_Systems_and_Hoppers.pdf">http://lup.lub.lu.se/student-papers/record/1585776/file/1585780.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">3912451</note> <accessCondition type="allowOAdate">2015-02-15</accessCondition> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2010</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Hopper</topic> <topic>Pneumatic Conveying</topic> <topic>Computer based simulations</topic> <topic>EDEM</topic> <topic>FLUENT</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <relatedItem type="host"> <identifier type="other">ISRN LUTMDN/TMKT 10/5383-SE</identifier> </relatedItem> <recordInfo> <recordIdentifier>1585776</recordIdentifier> <recordCreationDate encoding="w3cdtf">2010-04-16T10:15:39+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2015-02-15T03:56:32+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2010-04-19T08:46:38+02:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>4</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Modelling of the Temperature Distribution in High Intensity Focused Ultrasound Thermotherapy</title> </titleInfo> <name type="personal"> <namePart type="given">Per</namePart> <namePart type="family">Axelsson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">n/a</namePart> <namePart type="family">n/a</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Atomic Physics</namePart> <identifier type="lucatorg">v1000622</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <relatedItem type="constituent"> <location> <url displayLabel="Axelsson1999.pdf">http://lup.lub.lu.se/student-papers/record/2259962/file/2297016.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">4045688</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">1999</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject authority="lup"> <topic>Physics and Astronomy</topic> </subject> <relatedItem type="host"> <titleInfo> <title>Lund Reports in Atomic Physics</title> </titleInfo> <part> <detail type="reportNumber"> <number>LRAP-246</number> </detail> </part> </relatedItem> <recordInfo> <recordIdentifier>2259962</recordIdentifier> <recordCreationDate encoding="w3cdtf">2011-12-21T21:04:59+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2012-01-31T22:43:36+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2012-01-31T22:43:36+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>5</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Aided Manufacturing Software Evaluation</title> </titleInfo> <name type="personal"> <namePart type="given">Peter</namePart> <namePart type="family">Vighagen</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>1718221</affiliation> </name> <name type="personal"> <namePart type="given">Giorgos</namePart> <namePart type="family">Nikoleris</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Innovation</namePart> <identifier type="lucatorg">v1000241</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">This report describes the evaluation process to find the best possible CAM-solution for a&lt;br /&gt; prototype department within Tetra Pak. The purpose is to manufacture unique or small series of&lt;br /&gt; aluminium moulds for injection moulding of thermoplastics with a milling machine. The program&lt;br /&gt; should be as easy as possible to use while still having enough functionality to achieve satisfying&lt;br /&gt; quality of the moulds.&lt;br /&gt; The evaluation process begins with identifying the needs of the department and establishing&lt;br /&gt; evaluation criteria and is followed by searching for CAM-software alternatives. A screening is&lt;br /&gt; made and the programs are divided into different categories and evaluated by installing a demo,&lt;br /&gt; resulting in a coarse scoring to choose which programs to evaluate more detailed.&lt;br /&gt; The detailed evaluation is performed by making operations planning on a set of chosen reference&lt;br /&gt; parts, reflecting common geometry within the department, resulting in a final scoring to rank the&lt;br /&gt; programs. A discussion is made to suggest different ways to proceed.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Rapport_v3.pdf">http://lup.lub.lu.se/student-papers/record/1718222/file/1718226.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">4346633</note> <accessCondition type="restrictionOnAccess">yes</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2010</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>CAM</topic> <topic>Computer-Aided Manufacturing</topic> <topic>Toolpath</topic> <topic>Milling</topic> <topic>Evaluation</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>1718222</recordIdentifier> <recordCreationDate encoding="w3cdtf">2010-11-17T20:57:31+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2010-11-24T14:07:50+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2010-11-24T14:07:50+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>6</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsM2</genre> <titleInfo> <title>Baumol’s Cost Disease in the Second Machine Age</title> </titleInfo> <titleInfo type="alternative"> <title>Computerization, Productivity Growth and Employment 1998-2015</title> </titleInfo> <name type="personal"> <namePart type="given">Erik</namePart> <namePart type="family">Nelsson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>8968673</affiliation> </name> <name type="personal"> <namePart type="given">Andreas</namePart> <namePart type="family">Bergh</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Fredrik N G</namePart> <namePart type="family">Andersson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Economics</namePart> <identifier type="lucatorg">v1000029</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">Baumol argued that technologically stagnant sectors with relatively low productivity growth over time will experience relatively higher prices and increased shares of total labor, and thereby slow aggregate growth. This theory, known as ‘the cost disease’, also claims that services, predominantly found in the public sector, generally are stagnant due to their perceived dependence on human labor as an input. In addition, computerization has been called ‘the second machine age’ since it is believed to change society and increase productivity on the same scale as industrialization once did. By combining these notions this thesis examines the relation between ICT, productivity growth and share of work hour development on sector level with EU KLEMS data for six advanced economies 1998-2015. This data supports Baumol’s theory, though the explanatory capacity of the independent variables appears to be rather small. Moreover, the reliability of the study is questioned due to uncertainties in public sector productivity growth and doubts regarding ICT capital intensity quality as an ICT indicator. However, both computerization theorists and Baumol claims that GDP is an inadequate measurement tool for their purposes since it underestimates the effects of computerization and unbalanced growth, thus the real economic impact might be substantially larger than this study implies. In addition, a literature survey on labor economic theories on the computerization of the labor market is supplied to explain the historical development and, possibly, give some guidance of what the future holds.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Kandidatuppsats_NEK_Erik_Nelsson_Uppladdning.pdf">http://lup.lub.lu.se/student-papers/record/8968675/file/8968676.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1762804</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2019</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>unbalanced growth computerization digitization employment</topic> </subject> <subject authority="lup"> <topic>Business and Economics</topic> </subject> <recordInfo> <recordIdentifier>8968675</recordIdentifier> <recordCreationDate encoding="w3cdtf">2019-01-29T12:40:23+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2019-02-15T14:48:16+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2019-02-15T14:48:16+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>7</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH1</genre> <titleInfo> <title>Computer vision using biomimicking AI system</title> </titleInfo> <name type="personal"> <namePart type="given">Elias</namePart> <namePart type="family">Högbom Aronsson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>9079146</affiliation> </name> <name type="personal"> <namePart type="given">Fredrik</namePart> <namePart type="family">Edman</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Electrical and Information Technology</namePart> <identifier type="lucatorg">v1000242</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The aim of this thesis was to develop a biologically inspired model for unsupervised learning on visual data. A preprocessor inspired by the retina was developed, which generated event-camera like data. This can be used as a low-cost alternative to an event-camera. Further, a neuron model was developed which showed ability to learn useful features from video data in combination with the preprocessor. A number of aspects of the system were also explored to probe its properties.&lt;br /&gt; &lt;br /&gt; A data set consisting of videos of moving 3D-printed objects was created. This was used to compare the biological model in combination with a small LSTM network against a much larger convolutional LSTM, in classifying the different objects. This gave promising results, where the biological model performed as well or better in most aspects, compared with the large convolutional LSTM.</abstract> <abstract type="popular" lang="eng">To recognize things in the world is something we do effortlessly. We can recognize a bird even if we have never seen that particular species or from that angle. For computers, this is not that easy. To define everything that makes a bird, a bird, in pixel values, is not a trivial task. Modern machine learning methods try to, instead get the computer to learn all these different aspects by itself. This has proven successful for many tasks, but requires large amounts of training data and computational resources. These methods also have problems generalizing to new situations. &lt;br /&gt; &lt;br /&gt; The company IntuiCells AI technology was built on more general assumptions and inspiration from neuroscience, to address such problems. This thesis builds on IntuiCell technology, to see if this novel approach works in the field of computer vision.&lt;br /&gt; &lt;br /&gt; First, two videos were animated and rendered, to test out different aspects of the model, as wells as to prove its promise. When this was completed a recording setup, consisting of a box with controllable LEDs and a motorized slider, where objects could be moved, was constructed. From the recordings, the model was trained to recognize different objects. This gave promising results. The model could recognize the different objects, even in some new situations. This shows a first promising result, of this novel approach to computer vision.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Master_thesis_EliasAH.pdf">http://lup.lub.lu.se/student-papers/record/9079163/file/9079164.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">24509907</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <relatedItem type="constituent"> <location> <url displayLabel="Rapp_864.pdf">http://lup.lub.lu.se/student-papers/record/9079163/file/9079248.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">6312140</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2022</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>computer vision</topic> <topic>artificial neural network</topic> <topic>artificial intelligence</topic> <topic>computational neuroscience</topic> <topic>biomimicking</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>9079163</recordIdentifier> <recordCreationDate encoding="w3cdtf">2022-05-10T17:30:47+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2022-05-12T10:50:48+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2022-05-12T10:50:48+02:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>8</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsM2</genre> <titleInfo> <title>Literature Study on the Technical Development of Invasive Recording Brain Computer Interfaces</title> </titleInfo> <titleInfo type="alternative"> <title>Litteraturstudie på den tekniska utvecklingen av invasiva icke-stimulerande Brain Computer Interfaces</title> </titleInfo> <name type="personal"> <namePart type="given">Joakim</namePart> <namePart type="family">Magnusson Fredlund</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>9158401</affiliation> </name> <name type="personal"> <namePart type="given">Josefin</namePart> <namePart type="family">Starkhammar</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Division for Biomedical Engineering</namePart> <identifier type="lucatorg">v1000202</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">Brain Computer Interfacing is a sprawling scientific field, with many competing designs in use or being tested. The goal of this project was to compile information about Utah Arrays, Michigan Probes, Neural Lace (also known as Mesh Electronics), Neuralink and Stentrode, and compare the positives and negatives of each design. Of especial interest were the parameters of material, number of electrodes, severity of foreign body response, heat generation, electrode depth, average size of measured action potentials and signal to noise ratio. The results of this comparison was as follows: Mesh Electronics and Stentrode are highly promising due to the complete avoidance of traditional foreign body response and cell death issues, however the latter trades these for the risks of long term usage of anti-coagulants. Utah Arrays have more problems than any of the other investigated designs in all parameters, including the contemporary Michigan Probe, although they both use the same primary material, silicon. There was found to be a severe lack of experimental studies rigorously comparing these two designs to each other, a lack that may become even more glaring once more of these designs become available for further medical studies.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Literature_Study_on_the_Technical_Development_of_Invasive_Recording_Brain_Computer_Interfaces_Joaki.pdf">http://lup.lub.lu.se/student-papers/record/9158403/file/9158425.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">273389</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2024</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>brain–computer interfaces</topic> <topic>neuroimplantable devices</topic> <topic>neural tissue response</topic> <topic>microelectrodes</topic> <topic>neural probes</topic> <topic>Stentrode</topic> <topic>Neuralink</topic> <topic>Utah Array</topic> <topic>Michigan Probe</topic> <topic>mesh electronics</topic> <topic>neural lace</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <relatedItem type="host"> <titleInfo> <title>Proceedings of Clinical Innovations</title> </titleInfo> </relatedItem> <recordInfo> <recordIdentifier>9158403</recordIdentifier> <recordCreationDate encoding="w3cdtf">2024-06-04T21:34:46+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2024-06-20T12:56:12+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2024-06-20T12:56:12+02:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>9</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH3</genre> <titleInfo> <title>Prediction of Allosteric Binding Modes in Homologous NMDA-Receptors</title> </titleInfo> <titleInfo type="alternative"> <title>Computer-Aided Drug Discovery in Human Glutamate Receptors</title> </titleInfo> <name type="personal"> <namePart type="given">Anton Julius</namePart> <namePart type="family">Sellerberg</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>9178410</affiliation> </name> <name type="personal"> <namePart type="given">Pär</namePart> <namePart type="family">Söderhjelm</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="personal"> <namePart type="termsOfAddress">Professor</namePart> <namePart type="given">Rasmus</namePart> <namePart type="family">Prætorius Clausen</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Biophysical Chemistry</namePart> <identifier type="lucatorg">v1000649</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The NMDA receptors are natural glutamate binders that play critical roles in the function of the&lt;br /&gt; central nervous system, with their dysfunction implicated in serious psychiatric disorders and&lt;br /&gt; neurodegenerative conditions. Understanding their roles in the brain and developing treatments&lt;br /&gt; will benefit from the existence of small molecules specifically targeting different NMDA&lt;br /&gt; receptor subtypes. This study has investigated allosteric binding sites of two homologous NMDA&lt;br /&gt; receptors. Agonist binding domains in GluN1/N2A (crystal structure) and GluN1/N2B&lt;br /&gt; (homology model) were initially subjected to Induced Fit Docking of a group of 15 analogous&lt;br /&gt; ligands. Ten of these are known binders of at least one receptor. Five ligands are newly&lt;br /&gt; synthesised analogues of known binders. Following Induced Fit Docking 23 ligand-receptor&lt;br /&gt; complexes of type GluN1/N2A and 20 ligand-receptor complexes of GluN1/N2B were&lt;br /&gt; investigated with parallel molecular dynamics (100ns) and triplicate metadynamics (20ns).&lt;br /&gt; Results suggest stable binding modes for 11 ligands in GluN1/N2A and 8 ligands in GluN1/N2B.</abstract> <abstract type="popular" lang="eng">Some vital aspects of biological systems such as ourselves cannot be observed directly. Many&lt;br /&gt; relevant phenomena occur on scales that are either so small, or so large that they cannot be&lt;br /&gt; assessed through experimentation. In trying to understand the intricacies of molecular&lt;br /&gt; interactions or the stability of an entire ecosystem, one often needs to turn to simulations. These&lt;br /&gt; controlled environments are free from the restraints of physical experimentation. Instead they&lt;br /&gt; force us to grapple with the limitations of experimental models, and the limited capabilities of&lt;br /&gt; our computers.&lt;br /&gt; Drawing meaningful conclusions from simulated biological systems remains challenging.&lt;br /&gt; Difficulty often arises because our understanding of many biological processes is incomplete,&lt;br /&gt; and computer hardware lacks the power to model biological complexity in complete detail. There&lt;br /&gt; are nevertheless ways of bridging biology and simulation in a way that advances both.&lt;br /&gt; One way of advancing our understanding of a biological system, and approaching medical&lt;br /&gt; interventions in neurodegenerative disease is by making the biochemical distinction between&lt;br /&gt; related subgroups of human glutamate receptors. To functionally tell these structures apart is a&lt;br /&gt; first step towards studying their roles in the brain. The primary excitatory neurotransmitter of the mammalian brain is found in the form of L-glutamate (Glu). Its functional diversity in the brain&lt;br /&gt; is due to the existence of two families of receptors: the Ionotropic Glutamate Receptors (iGluRs)&lt;br /&gt; and their counterpart, the Metabotropic Glutamate Receptors (mGluRs). These function in&lt;br /&gt; tandem to impact the central nervous system over complex timescales and locations (Reiner and&lt;br /&gt; Levitz, 2018). The normal activity of glutamate receptors in the brain has a central role in&lt;br /&gt; synaptic plasticity and the encoding of memory (Morris, 2013), while dysfunction of&lt;br /&gt; Glu-signalling has been linked to neurodegenerative conditions like Alzheimer&amp;#39;s and&lt;br /&gt; Huntington&amp;#39;s disease (Lewerenz and Maher, 2015). It is known to play a role in the development&lt;br /&gt; of psychiatric disorders like schizophrenia, bipolar- and major depressive disorder (Li, Yang and&lt;br /&gt; Lin, 2019).&lt;br /&gt; This work approaches the problem of drug discovery within two subtypes of iGluRs, via&lt;br /&gt; computational methods designed to evaluate and specify their interactions with a set of small&lt;br /&gt; molecules, most of which are known to interact with one or both of these receptors.&lt;br /&gt; On the way towards describing, and medically targeting the differences between closely related&lt;br /&gt; protein complexes, a high quality crystal structure paired with molecular simulations is a helpful&lt;br /&gt; starting point. The study of molecular dynamics (MD) centres around computational models of&lt;br /&gt; events at microscopic scales. These simulate interactions between atoms and calculate the&lt;br /&gt; motion that follows. By the now long held insight of Newtonian mechanics, that Force equals&lt;br /&gt; mass times acceleration, it is possible to relate the forces acting on every atomic particle to their&lt;br /&gt; future motion. Given a close enough approximation of these forces, an evolution of a theoretical&lt;br /&gt; system of particles offers insight into the properties of a real one. Forces between particles in the&lt;br /&gt; system are governed by force fields, vital ingredients to these dynamic simulations. These&lt;br /&gt; mathematical models describe things like Van der Waals-forces, electrostatic interactions and the&lt;br /&gt; flexibility of intramolecular bonds, where the force field in question must be sufficiently accurate&lt;br /&gt; to give biologically useful results (Lindorff-Larsen et al., 2012). This offers a detailed model of molecular behaviour, as the dynamics, or time-dependent&lt;br /&gt; behaviour of the system, evolves under the influence of classical mechanics. As Newton&amp;#39;s&lt;br /&gt; equations of motion are resolved one step at a time, it becomes possible to track the transitions&lt;br /&gt; between molecular states. Changes in positions, velocities and orientations lend insight into&lt;br /&gt; real-time processes like chemical reactions and molecular binding events (Hollingsworth and&lt;br /&gt; Dror, 2018).&lt;br /&gt; There is a great potential in advanced computational tools like molecular dynamics and its&lt;br /&gt; related methods. As available computing power continues to grow and be more efficiently&lt;br /&gt; utilised (Götz et al., 2012), (Stone et al., 2016), one could expect to see methods like MD spread&lt;br /&gt; into a wider range of disciplines. Aside from the growing power of simulation, another reason&lt;br /&gt; for new opportunities is the increasing availability of crystal structures in neuroscience. Such&lt;br /&gt; protein structures, integral to the processes taking place in the brain, present possible targets for&lt;br /&gt; drug discovery (Hilger, Masureel and Kobilka, 2018), (G. Brent Dawe et al., 2016).</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Thesis_final.pdf">http://lup.lub.lu.se/student-papers/record/9178601/file/9178602.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">5884605</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2024</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Molecular simulations</topic> <topic>Drug discovery</topic> <topic>Molecular dynamics</topic> <topic>Metadynamics</topic> <topic>NMDA-Receptors</topic> <topic>Computational chemistry</topic> <topic>Biophysical chemistry</topic> <topic>Neurochemistry</topic> <topic>Glutamate receptors</topic> <topic>Protein-ligand interaction</topic> <topic>Binding mode prediction</topic> </subject> <subject authority="lup"> <topic>Biology and Life Sciences</topic> <topic>Technology and Engineering</topic> </subject> <relatedItem type="supplementaryMaterial"> <titleInfo> <title>Supplementary Data</title> </titleInfo> <location> <url>http://lup.lub.lu.se/student-papers/record/9178601/file/9178604.zip</url> </location> <physicalDescription> <internetMediaType>application/zip</internetMediaType> </physicalDescription> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <relatedItem type="isPopularScience"> <titleInfo> <title>Prediction of Allosteric Binding Modes in Homologous NMDA-Receptors</title> </titleInfo> <location> <url>http://lup.lub.lu.se/student-papers/record/9178601/file/9178606.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <recordInfo> <recordIdentifier>9178601</recordIdentifier> <recordCreationDate encoding="w3cdtf">2024-12-10T16:14:28+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2024-12-11T17:15:59+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2024-12-11T09:04:35+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>10</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Vision Approaches for Extracting Fire-Safety Information from Service Drawings</title> </titleInfo> <titleInfo type="alternative"> <title>Datorseendemetoder för att Extrahera Brandsäkerhetsinformation från Serviceritningar</title> </titleInfo> <name type="personal"> <namePart type="given">Julius</namePart> <namePart type="family">Ekstrand</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>9223722</affiliation> </name> <name type="personal"> <namePart type="given">Victor</namePart> <namePart type="family">Truong</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>9223707</affiliation> </name> <name type="personal"> <namePart type="termsOfAddress">PhD</namePart> <namePart type="given">Kaan</namePart> <namePart type="family">Bür</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Electrical and Information Technology</namePart> <identifier type="lucatorg">v1000242</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">Fire-safety documentation is an essential part of regular inspections during the building operations and maintenance phase. As help, service drawings exist to detail the positions of various fire-safety devices and their addresses, as well as fire zone coverage throughout the floors and sectors of a building. Automatically extracting this information would be immensely helpful towards, for example, maintaining up-to-date documentation or integration onto digital systems. To that end, this thesis adapts multiple computer vision techniques in order to extract pertinent information: (1) a Keypoint R-CNN model is trained on a custom dataset to detect the symbols of fire devices along with their installation positions, (2) OCR is used to parse addresses and (3) a region merging procedure is implemented to segment fire zones. Additionally, symbols are also assigned to their addresses using the Hungarian algorithm, with Euclidean distance as base cost.&lt;br /&gt; &lt;br /&gt; For the symbol detection, we find that crucial model settings had to be changed in order to tailor the model for the domain and achieve satisfactory performance. High accuracy is achieved despite major class-imbalances in the dataset, but the model fails in all cases to detect the true installation positions of devices, whenever these are indicated by an auxiliary line. Assigning symbols and addresses to each other based on distance works well in most cases, while having a few edge cases that are impossible to amend with our method alone, due to inherent quirks in the service drawings. Using region merging for the fire zone segmentation gives us high recall, but low precision. The low precision is mainly due to the oversegmentation step of region merging, and partly due to the existence of hard-to-ignore false positives in most service drawings. Overall, the results across all tasks are promising while still leaving plenty of room for improvement, or alternative approaches, in further work.</abstract> <abstract type="popular" lang="eng">Fire-safety is a critical aspect of buildings where, in extreme cases, human lives are at stake. As required by law, documentation exists to record the locations of various fire-safety devices (e.g. smoke detectors) in order to support proper maintenance and regulatory compliance. This thesis mainly explores, to great success, the use of artificial intelligence to automatically extracting information from such documents.&lt;br /&gt; &lt;br /&gt; Automating this process could reduce time-consuming documentation work and make it easier to keep fire-safety systems up to date—especially for larger facilities such as hospitals, universities, or industrial sites where hundreds of documents may need to be maintained and regularly revised. Although these documents are often easy for humans to interpret at a glance, handling them at a large scale can require extensive manual effort. This would also provide great value for digital platforms seeking to simplify the management of a building&amp;#39;s fire-safety system. Our work therefore seek to bridge the gap between traditional documentation and modern digital systems by extracting structured information from complex technical drawings.&lt;br /&gt; &lt;br /&gt; We extract this information through a combination of machine learning and algorithmic methods. One important type of document is the so-called service drawing, which resembles a floor plan marked with devices and fire zones. We train a model to detect different kinds of fire-safety devices and use an algorithmic approach for extracting fire zones. Before training the model, we first had to gather and create our own dataset of service drawings from scratch, including the annotation.&lt;br /&gt; &lt;br /&gt; In general, our solutions demonstrates high accuracy for most use-cases, albeit with some limitations, where certain visual quirks of the service drawings introduce difficult ambiguities. Overall, the thesis clearly demonstrates that automated interpretation of service drawings is feasible and promising, while also highlighting opportunities for future improvement and development.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Computer_Vision_Approaches_for_Extracting_Fire-Safety_Information_from_Service_Drawings.pdf">http://lup.lub.lu.se/student-papers/record/9223713/file/9223718.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">6072642</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <relatedItem type="constituent"> <location> <url displayLabel="Rapp_1113.pdf">http://lup.lub.lu.se/student-papers/record/9223713/file/9224436.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">6314025</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2026</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>computer vision</topic> <topic>service drawings</topic> <topic>fire safety</topic> <topic>machine learning</topic> <topic>artificial intelligence</topic> <topic>symbol detection</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>9223713</recordIdentifier> <recordCreationDate encoding="w3cdtf">2026-03-06T15:47:19+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2026-03-18T14:04:05+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2026-03-18T14:04:05+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>11</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Computer Vision Phenomics for Insect Traits: Predicting Age and Weight of Pollinators Using Convolutional Neural Networks</title> </titleInfo> <name type="personal"> <namePart type="given">Jakob</namePart> <namePart type="family">Materna</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Charlie</namePart> <namePart type="family">Nicholson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Ola</namePart> <namePart type="family">Olsson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Degree Projects in Bioinformatics</namePart> <identifier type="lucatorg">LURS00014</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">Pollinators such as Bombus terrestris play a vital role in ecosystem stability and agricultural productivity. Developing methods to estimate key biological traits such as age and weight is crucial for advancing ecological understanding and conservation efforts. In eusocial insects like B. terrestris, age and weight influence behaviour, task allocation, and survivability, but traditional methods for estimating these traits are often lethal, labour intensive, or lack precision. This study investigates whether morphological features of the wing, including venation patterns and wing wear, can be used to predict individual traits. As part of this study multiple convolutional neural networks (CNNs) were trained on bee wing images with known age or weight. The models learned to identify patterns associated with these traits, offering a new method for high-throughput, non-invasive trait estimation using wing images alone. The evaluation of the developed models on unseen wing images suggests that wing images can be used as a practical alternative to traditional estimation methods that outperform statistical methods.</abstract> <abstract type="popular" lang="eng">Computer Vision Phenomics for Phenological Analysis&lt;br /&gt; &lt;br /&gt; Bees play an essential role in our lives. They pollinate many of the crops we eat and help keep ecosystems in balance. But their populations are under pressure, facing threats from disease, pesticides, and climate change. To protect them, we need to better understand how bees respond to their environment. One important factor is the agestructure of bees in a colony. Age matters because young and old bees play different roles, from cleaning and nursing to foraging for food. Until now, identifying the age of a bee has required time-consuming observations or invasive methods.&lt;br /&gt; &lt;br /&gt; My project takes a different approach by asking the question if wings of a bee hold enough clues to infer its age. Just like wrinkles tell us something about humans, the tiny details in bee wings give indications of their age. To test this, I combined wing images from different sources into a single dataset. I then trained convolutional neural networks (CNNs) to search for patterns assosiated with age. &lt;br /&gt; &lt;br /&gt; &lt;br /&gt; The resulting models were able to estimate the age of bees just by an image of their wings. This opens up exciting possibilities. Beekeepers and researchers could use wing images to quickly and non-invasively assess the age of bees and the age structure of a colony. This information would help them detect early signs of stress or imbalance, such as too few young bees to take care of larvae. Over time, such tools could support healthier colonies, which in turn benefits agriculture and biodiversity. &lt;br /&gt; &lt;br /&gt; Master’s Degree Project in Bioinformatics 60 credits 2025&lt;br /&gt; Department of Biology, Lund University&lt;br /&gt; &lt;br /&gt; Advisor: Charlie Nicholson &lt;br /&gt; Department of Biology</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Jakob_Materna.pdf">http://lup.lub.lu.se/student-papers/record/9212649/file/9212650.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1565869</note> <accessCondition type="restrictionOnAccess">yes</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2025</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject authority="lup"> <topic>Biology and Life Sciences</topic> </subject> <recordInfo> <recordIdentifier>9212649</recordIdentifier> <recordCreationDate encoding="w3cdtf">2025-09-18T08:36:50+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2025-09-22T13:55:37+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2025-09-22T13:55:37+02:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>12</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Schenker&apos;s Box Handling Processes for Dell Computers at a Cross-Docking Centre in Copenhagen.</title> </titleInfo> <name type="personal"> <namePart type="given">Henrik</namePart> <namePart type="family">Persson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Håkan</namePart> <namePart type="family">Persson</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Mats</namePart> <namePart type="family">Johnsson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Packaging Logistics</namePart> <identifier type="lucatorg">v1000238</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The 17th September 2001 the distributor Schenker started to cooperate with the computer&lt;br /&gt; &lt;br /&gt; systems manufacturer Dell to deliver Dell&amp;#39;s products to the Nordic market. In the beginning&lt;br /&gt; &lt;br /&gt; of a new cooperation new processes are formed and they are often developed to solve the&lt;br /&gt; &lt;br /&gt; local, immediate problems without considering the overall picture.&lt;br /&gt; &lt;br /&gt; In the distribution network from Dell&amp;#39;s plants in Ireland and Holland to the Nordic customers,&lt;br /&gt; &lt;br /&gt; the cross-docking centre in Copenhagen is a central part as a hub in the network. Almost all&lt;br /&gt; &lt;br /&gt; boxes are distributed through this hub in order to be sorted to one of the nine split point&lt;br /&gt; &lt;br /&gt; destinations located in Norway, Denmark, Sweden or Finland.&lt;br /&gt; &lt;br /&gt; In order to improve the packet hand ling and the effectiveness at the cross docking centre in&lt;br /&gt; &lt;br /&gt; Copenhagen different scenarios have been developed with the simulation tool AutoMod1&lt;br /&gt; &lt;br /&gt; within the boundaries of this master thesis. On the basis of the simulation models various&lt;br /&gt; &lt;br /&gt; changes and how they affect the flow have been studied in order to find a packet handling that&lt;br /&gt; &lt;br /&gt; improves the effectiveness at the cross-docking centre.&lt;br /&gt; &lt;br /&gt; Eight different models have been studied. One original model that shows how the material&lt;br /&gt; &lt;br /&gt; flow is working today, three basic models that include one alteration each in comparison to&lt;br /&gt; &lt;br /&gt; the original model and four models that include all possible combinations of the basic models.&lt;br /&gt; &lt;br /&gt; Today the cross-docking process is divided in three sub processes, one for each of the box&lt;br /&gt; &lt;br /&gt; sizes; small, medium and large. Only the medium sized boxes can use the sorting conveyor&lt;br /&gt; &lt;br /&gt; while the small and large boxes are scanned, sorted and transported manually. The basic&lt;br /&gt; &lt;br /&gt; models are:&lt;br /&gt; &lt;br /&gt; Ø The Värnamo model, which, via an extra conveyor, enables a faster cross-docking of&lt;br /&gt; &lt;br /&gt; the boxes that are going to the split-point in Värnamo, Sweden.&lt;br /&gt; &lt;br /&gt; Ø The Single Process model, where all boxes are sorted by the conveyor.&lt;br /&gt; &lt;br /&gt; Ø The RFID2 model, where all scanning of the boxes is made automatically.&lt;br /&gt; &lt;br /&gt; The flow of Dell&amp;#39;s computers from Ireland to the Nordic market has been studied but only the&lt;br /&gt; &lt;br /&gt; cross-docking centre in Copenhagen has been modelled in Automod. That means that the&lt;br /&gt; &lt;br /&gt; manufacturing sites and the transport ways have not been included in the model. The different&lt;br /&gt; &lt;br /&gt; models? cross-docking time and need of resources have been compared, but no thorough&lt;br /&gt; &lt;br /&gt; comparisons between the costs of the different packet handling strategies have been made.&lt;br /&gt; &lt;br /&gt; The Original model is somewhat optimized to the basic conditions that are equal for all the&lt;br /&gt; &lt;br /&gt; models. Therefore the original model handles the competition from the other models well in&lt;br /&gt; &lt;br /&gt; terms of cross-docking time. On the other hand several of the new models require less&lt;br /&gt; &lt;br /&gt; resources and by that holds potential to enhance their performance.&lt;br /&gt; &lt;br /&gt; In a short-term point of vie w it is realistic to implement the Single Process model if it is&lt;br /&gt; &lt;br /&gt; possible to increase the velocity of the conveyor and do a complete identification of the new&lt;br /&gt; &lt;br /&gt; bottlenecks that will arise. The model uses four resources less tha n the original model but&lt;br /&gt; &lt;br /&gt; gives a longer cross-docking time due to that only one truck is unloaded at a time. A great&lt;br /&gt; &lt;br /&gt; advantage by loading all boxes on the conveyor is that the cross-docking process is equal for&lt;br /&gt; &lt;br /&gt; all box sizes.&lt;br /&gt; &lt;br /&gt; 1 See Section 3.1.2 for a presentation of the software Automod&lt;br /&gt; &lt;br /&gt; 2 Radio Frequency Identification.&lt;br /&gt; &lt;br /&gt; The RFID model has the best performance of all simulation models and uses five resources&lt;br /&gt; &lt;br /&gt; less than the original model. Today the technology for RFID is too expensive and the&lt;br /&gt; &lt;br /&gt; performance is not good enough, but when the day comes that the price and performance on&lt;br /&gt; &lt;br /&gt; RFID is at a realistic level, the organisation and the technologies should be prepared for the&lt;br /&gt; &lt;br /&gt; RFID technology.&lt;br /&gt; &lt;br /&gt; In a long-term point of view the RFID-Single Process combination is the future for the crossdocking&lt;br /&gt; &lt;br /&gt; centre. One process for all box sizes and automatic radio frequency scanning ensures&lt;br /&gt; &lt;br /&gt; that the human errors will decrease dramatically. The potential in increasing the velocity on&lt;br /&gt; &lt;br /&gt; the conveyor and reducing the cross-docking time even more seems to be good.&lt;br /&gt; &lt;br /&gt; The Värnamo model uses one more resource and has the same cross-docking time as the&lt;br /&gt; &lt;br /&gt; Original model. All combinations involving the Värnamo concept can therefore be discarded.&lt;br /&gt; &lt;br /&gt; The adding of an extra conveyor cost money and does not result in higher capacity.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Xjobb_HenrikHaakan.pdf">http://lup.lub.lu.se/student-papers/record/1318810/file/1318811.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">3862479</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2002</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Box Handling</topic> <topic>Distribution</topic> <topic>Simulation</topic> <topic>Technological sciences</topic> <topic>Teknik</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>1318810</recordIdentifier> <recordCreationDate encoding="w3cdtf">2008-06-03T00:00:00+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2010-02-01T14:40:04+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2002-01-01T00:00:00+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>13</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH1</genre> <titleInfo> <title>Learning by computer based teaching - A case study with the teachable agent Betty</title> </titleInfo> <name type="personal"> <namePart type="given">Jan</namePart> <namePart type="family">Petersen</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Christian</namePart> <namePart type="family">Balkenius</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Cognitive Science</namePart> <identifier type="lucatorg">v1000050</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The purpose with this case study was to see if the teaching element in the&lt;br /&gt; &lt;br /&gt; teachable agent Betty increases the understanding for the students. To do this I let one group of students learn by creating a dynamic model of the content and one group learn by teaching the computer agent Betty. To measure the knowledge of the students I had a pre- and posttest. The results from the tests showed that both the learning methods were excellent. Almost all of the students scored max points. Unfortunately I cannot show if the teaching element increases&lt;br /&gt; &lt;br /&gt; the understanding for the students who taught Betty. However the students&lt;br /&gt; &lt;br /&gt; teaching Betty did only learn what they were teaching Betty. Compared to just reading the information modeling and teaching increased the students?&lt;br /&gt; &lt;br /&gt; understanding. Another interesting point was that some students managed to&lt;br /&gt; &lt;br /&gt; create a perfect model or concept map by teaching Betty with a trial and error method. This resulted in that they got a perfect teaching result without really learning the content. The problem was that these students didn?t fully understand the meaning of the concepts and the relationships in their model.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Exjobb_-_Betty.pdf">http://lup.lub.lu.se/student-papers/record/1329033/file/1329034.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1345486</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2005</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Computer science</topic> <topic>Learning</topic> <topic>Software agent</topic> <topic>Teaching</topic> <topic>numerical analysis</topic> <topic>systems</topic> <topic>control</topic> <topic>Datalogi</topic> <topic>numerisk analys</topic> <topic>system</topic> <topic>kontroll</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>1329033</recordIdentifier> <recordCreationDate encoding="w3cdtf">2006-04-20T00:00:00+02:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2009-04-20T11:12:34+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2005-01-01T00:00:00+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>14</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>Hydraulic Transient in a Pipeline (Using Computer Model to Calculate and Simulate Transient)</title> </titleInfo> <name type="personal"> <namePart type="given">Mosab</namePart> <namePart type="family">Elbashir</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Samuel</namePart> <namePart type="family">Amoah</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Lennart</namePart> <namePart type="family">Jönsson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Division of Water Resources Engineering</namePart> <identifier type="lucatorg">v1000225</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">A hydraulic transient, which is a flow condition where the velocity and pressure change rapidly with time, can collapse a water distribution system if that system is not equipped with adequate transient protection device(s). The occurrence of transients can introduce large pressure forces and rapid fluid accelerations into a water distribution system and if the system is not well protected, it can fail. A hydraulic transient normally occurs when a flow control component changes status (for example, a valve closing or pump stop), and this change flows through the system as a pressure wave. A valve can be closed in two ways; linear or stepwise (fast initial closure and slow subsequent closure). Pump stop could be due to planned stop, power failure or mechanical problem with the pump.&lt;br /&gt; &lt;br /&gt; There are many transient analysis methods, but this thesis work employed only the graphical method and the method of characteristics to construct models (using the FORTRAN language) to calculate and simulate transients in a pipeline. Many scenarios and different valve closure operations were applied to the models (with a pump and without a pump in the pipeline) to study the transients. The pump model was also used to simulate real cases. The model solutions were compared with the graphical solutions for the two transient flows.&lt;br /&gt; &lt;br /&gt; It was found that the stepwise valve closure can reduce transients significantly than the linear valve closure operation. A pump with a high inertia can also reduce transients significantly, and this inertia can be achieved by using the softstop program. The water velocity and the frictional coefficient were seen to be important factors which affect the hydraulic transient, even though both relate to each other. A high frictional coefficient reduces the velocity and as a results reduces the transients, and vice versa. Also low frictional coefficients lead to increase in water velocities and as a result increase in hydraulic transients, and vice versa. The graphical solution was found to agree well with the computer solution.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="FinalThesisWork_Transient.pdf">http://lup.lub.lu.se/student-papers/record/1324026/file/1324027.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1893864</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2007</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>soil mechanics</topic> <topic>offshore technology</topic> <topic>Hydraulic Transient</topic> <topic>Pipeline</topic> <topic>Unsteady Flow</topic> <topic>Computer Model</topic> <topic>FORTRAN Language</topic> <topic>hydraulic engineering</topic> <topic>Civil engineering</topic> <topic>Väg- och vattenbyggnadsteknik</topic> </subject> <subject authority="lup"> <topic>Technology and Engineering</topic> </subject> <recordInfo> <recordIdentifier>1324026</recordIdentifier> <recordCreationDate encoding="w3cdtf">2007-01-22T00:00:00+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2009-10-18T18:33:00+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2007-01-01T00:00:00+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>15</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH1</genre> <titleInfo> <title>The Protection of Computer Programs</title> </titleInfo> <name type="personal"> <namePart type="given">Anna</namePart> <namePart type="family">Dahlberg</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Mpazi</namePart> <namePart type="family">Sinjela</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Law</namePart> <identifier type="lucatorg">v1000142</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">This thesis concerns the patentability of computer programs from a European perspective. The main purposes of the thesis are to investigate how computer programs are protected in Europe and how case law of the EPO has developed since 2005 when the proposal for a directive on the patentability of computer- implemented inventions (CIIs) was rejected. The thesis also briefly describes the major European economies approach towards patentability of CIIs. The study is mainly based on material established on Community level as well as case law and books and articles on the subject. The conclusions of this thesis is that although the EPO has continued to grant patent for CIIs, the adoption of the EPO approach on the patentability of CIIs by the national courts and patent authorities has resulted in divergent rulings. The thesis also demonstrates that other issues have emerged since the rejection of the directive, for instance issues regarding the quality of patents on inventions involving computer programs. In this thesis it is further emphasised that patent protection of computer programs could imply that developing countries could have difficulties in gaining access to technological progress. Due to the complex technology of computer programs it may be required to obtain several patents for a computer program, which could be costly for the program developers. Since developing countries may not have the financial resources to acquire these computer programs it could be argued that intellectual property rights, and in particular patents, could imply that the developing countries access to scientific advancements could be reduced. One possible solution is the free or open source software licence which allows the user to study, redistribute, and improve the program.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="exam.pdf">http://lup.lub.lu.se/student-papers/record/1555342/file/1563627.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1986863</note> <accessCondition type="restrictionOnAccess">yes</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2009</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>International Human Rights Law and Intellectual Property Rights</topic> </subject> <subject authority="lup"> <topic>Law and Political Science</topic> </subject> <recordInfo> <recordIdentifier>1555342</recordIdentifier> <recordCreationDate encoding="w3cdtf">2010-03-08T14:54:24+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2010-03-08T15:23:25+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2010-03-08T15:23:25+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>16</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH1</genre> <titleInfo> <title>The effects of demographics and relations in children’s video and computer game selection</title> </titleInfo> <name type="personal"> <namePart type="given">Junaid</namePart> <namePart type="family">Iftikhar</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Muhammad Umer</namePart> <namePart type="family">Riaz</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Yasir</namePart> <namePart type="family">Ikram</namePart> <role> <roleTerm type="text">author</roleTerm> </role> </name> <name type="personal"> <namePart type="given">Pär-Ola</namePart> <namePart type="family">Zander</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Informatics</namePart> <identifier type="lucatorg">v1000028</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">For the last three decades, many things have changed around us. New businesses have grown up and new fields have emerged. One such field is video games which are liked by children. There is already research, which proves that children often like to play violent games which affect their personality and make their behavior violent (Rathus, 2004; Anderson &amp;amp; Dill, 2000; Crawford, 2003; Walsh, 2001) rather than playing educational and IQ games which increase their learning abilities. Our work is about what are the factors which affect the game selection in children. Main parameters for the research were demographic factors and relations. These two parameters are part of their whole environment and have different impact on the game preference; we have explored affect of these parameters in our paper. Under these two parameters we have focused relations with sibling and friends. Children demographics of age, gender and ethnicity were studied. To collect data, detailed interviews were conducted with children from three different ethnicities (Danish, Pakistani and Arabic) to see the relations between demographic factors and relations to game preferences. The collected interview data is then analyzed to draw conclusions. Gender influences the game preferences. Tendency to play fight games was more in boys then girls. Being not the dominant in sibling rivalry was a factor in behavior towards violence games in Pakistani and Arabic children. Danish children were influenced by friends rather than siblings. Ethnicity also affects the game selection. As the child age increases he tends to play more strategy oriented games.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="0003226.pdf">http://lup.lub.lu.se/student-papers/record/1335157/file/1646809.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">936595</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2008</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Relations</topic> <topic>Demographic factors</topic> <topic>video games</topic> <topic>computer games</topic> <topic>game selection</topic> <topic>children game preference</topic> <topic>effects of demographics</topic> <topic>effects of relations</topic> <topic>siblings</topic> <topic>Informatics, systems theory</topic> <topic>Informatik, systemteori</topic> </subject> <subject authority="lup"> <topic>Mathematics and Statistics</topic> </subject> <recordInfo> <recordIdentifier>1335157</recordIdentifier> <recordCreationDate encoding="w3cdtf">2008-12-01T00:00:00+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2010-08-03T10:52:00+02:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2008-11-13T00:00:00+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>17</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>E-Waste Prevention in Sweden: Fostering Computer Refurbishment and Reuse</title> </titleInfo> <titleInfo type="alternative"> <title>An Assessment of the Market, Actors and Barriers</title> </titleInfo> <name type="personal"> <namePart type="given">Markus</namePart> <namePart type="family">Scheffel</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>7853671</affiliation> </name> <name type="personal"> <namePart type="given">Thomas</namePart> <namePart type="family">Lindhqvist</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="personal"> <namePart type="termsOfAddress">Associate Professor</namePart> <namePart type="given">Oksana</namePart> <namePart type="family">Mont</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>The International Institute for Industrial Environmental Economics</namePart> <identifier type="lucatorg">v1000927</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The thesis at hand aims to provide an overview of the reuse market(s) for desktop and laptop computers in Sweden in order to support policy-makers and computer reuse organisations in developing strategies and measures to foster computer reuse and thus reducing the volume of related e-waste as outlined in the national Waste Prevention Plan 2014-2017. Existing types of computer reuse organisations, the barriers they face and their types of suppliers and (receiving) customers were assessed via telephonic in-depth interviews with representatives of nine computer reuse organisations in Sweden. Research and analysis framework were developed along the typical reverse supply chain activities of computer reuse organisations consisting of sourcing, collection, inspection, preparation for reuse, redistribution and follow up-services. Combined with the five dimensions &amp;#39;financial structure&amp;#39;, &amp;#39;business offer&amp;#39;, &amp;#39;supply chain&amp;#39; and &amp;#39;(receiving) customers&amp;#39; and &amp;#39;purpose/corporate function&amp;#39; for assessing the operating model(s), three different types of computer reuse organisations were identified.&lt;br /&gt; Those with an IT Asset Management operating model accounted for the biggest group. It offers collection, data sanitation, preparation for reuse and remarketing and preparation (of new computers) services to their suppliers who were identified as private sector companies, public administration institutions and schools. The largest part of refurbished computers was sold to resellers, brokers and computer reuse organisations abroad. Social Enterprises mainly offer collection, data sanitation services for donated computers from municipalities, schools and individuals. They are resold solely domestically to eligible individuals and non-profit organisations. Computer reuse organisations with Close the Digital Divide operating model also offer collection and data sanitation services. Their suppliers typically consist of companies, public administration institutions and educational bodies as well as kretsloppsparks. Computers are resold mainly to non-profit and non-governmental organisations conducting projects in less-developed countries. &lt;br /&gt; Three common barriers which all types of computer reuse organisations were found to face consist of the lack of access to sufficient volumes of used computers, the concerns of potential suppliers about the safety of their data earlier stored on their computers hard-drives (despite the fact that solid data safety measures exist in basically all cases) and the lack of knowledge about the suitability and reliability of used computers by potential buyers for their needs. Besides, a variety of barriers could be identified which are specific to the single operating models and thus types of organisations though. &lt;br /&gt; Thus, in regard to tackle the three identified common barriers, policy-makers should focus on adjusting current legislation in such a way that its primary focus is shifted from recycling towards reuse, providing the necessary infrastructure for the non-consumer but also the consumer-stream. Furthermore, legislation should provide incentives or impose requirements on computer users ensuring and incentivising them to consider reuse of their computers instead of recycling them. Co-operations between different types of computer reuse organisations may also provide opportunities for increased supply with and reuse of computers. Computer reuse organisations are recommended to found an industry association to act as advising organ to support policy-makers but also to conduct joint information campaigns about the safety of computer refurbishing operations in regard to data handling but also the reliability and suitability of refurbished computers for potential customers‘ needs.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="M.A._Thesis_Markus_Scheffel_Computer_Reuse_Swe.pdf">http://lup.lub.lu.se/student-papers/record/8904391/file/9148480.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">1944873</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2016</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>E-waste prevention Sweden</topic> <topic>Computer reuse market Sweden</topic> <topic>Computer reuse organisations</topic> <topic>Barriers to computer reuse organisations</topic> <topic>Suppliers to computer reuse organisations</topic> <topic>Customers of computer reuse organisations</topic> <topic>Computer Refurbishing</topic> <topic>IT Equipment Refurbishing</topic> </subject> <subject authority="lup"> <topic>Business and Economics</topic> </subject> <relatedItem type="host"> <titleInfo> <title>IIIEE Master thesis</title> </titleInfo> <identifier type="issn">1401-9191</identifier> <part> <detail type="reportNumber"> <number>2016:02</number> </detail> </part> </relatedItem> <recordInfo> <recordIdentifier>8904391</recordIdentifier> <recordCreationDate encoding="w3cdtf">2017-03-09T12:02:13+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2024-02-13T13:01:12+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2024-02-13T13:01:12+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>18</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH3</genre> <titleInfo> <title>Överlåtelse av upphovsrätt till datorprogram genom ett inkråmsförvärv - Särskilt om programmets källkod och felansvaret vid s.k. copyleft-smitta</title> </titleInfo> <titleInfo type="alternative"> <title>Transfer of copyright to a computer program through an asset acquisition - with focus on the source code and liability for a faulty good due to copyleft</title> </titleInfo> <name type="personal"> <namePart type="given">Sara</namePart> <namePart type="family">Bergqvist</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>8511608</affiliation> </name> <name type="personal"> <namePart type="termsOfAddress">Professor</namePart> <namePart type="given">Per</namePart> <namePart type="family">Samuelsson</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Law</namePart> <identifier type="lucatorg">v1000142</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <name type="corporate"> <namePart>Faculty of Law</namePart> <identifier type="lucatorg">v1000137</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">This paper examines the possibility of a complete and final transfer of copyright to a computer software through an acquisition of assets in a company. Furthermore, it is examined whether it is possible to qualify the transfer as a purchase according to The Sale of Goods Act (1990:931). The question of whether the transfer should be regarded as a purchase in accordance with The Sale of Goods Act, serves as a purpose for investigating the possibility to determine the software as a faulty good. It is also important for the question of liability in such event. This study particularly aims to investigate how the presence of open source code in proprietary source code can result in the software being considered as a faulty good. This is especially highlighted through an acquistion of assets in a company, since such a transfer could possibly result in distribution in a sense which activates the terms in GNU GPL for the entire source code. An acquistion of assets is helpful to describe the process of the transfer and highlight the risks for both parties.&lt;br /&gt; &lt;br /&gt; When an employee creates a computer program, the copyright, in its entirety, is transferred to the employer in accordance with 40 a § in the Act on Copyright in Literary and Artistic Works (1960:729). There is a principle stating that the parties must specify what parts of the copyright they intend to transfer, should the company thereafter transfer the copyright to another party. In court, the principle is applied next to general principles of contracts. The Sale of Goods Act is generally considered applicable for complete and final transfers of intellectual property.&lt;br /&gt; &lt;br /&gt; The source code is protected as a literary work in accordance with 1 § in the Copyright Act (1960:29). The source code can either be considered proprietary, and thereby a trade secret, or open, and thereby free to distribute. Copyright is used as a means to make the licensees of GNU GPL redistribute the modifications they make. Since the concept of copyleft makes the source code available to all licensees, it can be problematic if the use of open source code is unintentional.&lt;br /&gt; &lt;br /&gt; Finally, the study aims to assess whether The Sale of Goods Act constitutes an appropriate regulation of the liability for a faulty software, when open source code has been incorporated into the proprietary source code. There is no precedent ruling about the specific issue at hand, neither does the preparatory work for The Sale of Goods Act or the Copyright Act reveal a clear answer. In legal doctrine, intellectual property in general is examined and in some cases patents also. The existing material about faulty software concerns delivery from an outside party, which is relevant to the issue at hand. Thus, the answers are sought in doctrine, which appears to be fragmented. There is no uniform answer to whether The Sale of Goods Act states an appropriate regulation between the parties for when there is no agreement to determine when the good should be considered as faulty. However, the author finds that, considering the proposals in doctrine, a reasonable balance ought to be achieved if there is no strict liability. There ought to be a consideration of the circumstances in the particular case. The assessment can be based upon the buyer’s expectations about actual utilization, legal exploitation and protection against competition. The buyer’s expectation is presented a reasonable guideline in determining the liability. That is, when there is neither an agreement nor a fixed standard for determining whether the software is faulty.</abstract> <abstract lang="swe">I förevarande uppsats undersöks möjligheten till en fullständig och slutlig överlåtelse av upphovsrätten till ett datorprogram genom ett inkråmsförvärv. Vidare undersöks möjligheten att klassificera överlåtelsen som ett köp i enlighet med KöpL. Huruvida överlåtelsen är att anse som ett köp har betydelse för frågan om felansvaret. Med det här arbetet ämnas nämligen att särskilt undersöka hur förekomsten av öppen källkod i proprietär källkod kan resultera i ett felansvar, när ett datorprogram överlåts genom ett inkråmsförvärv. &lt;br /&gt; &lt;br /&gt; När ett datorprogram har utvecklats i ett anställningsförhållande i enlighet med 40 a § URL, övergår alla delar av upphovsrätten till arbetsgivaren. Inför ett förestående företagsförvärv bör det kontrolleras så att det i avtal inte föreligger några förbehåll från upphovsmannen i form av ett överlåtelseförbud. Om parterna vid ett företagsförvärv önskar att upphovsrätten till datorprogrammet ska överlåtas fullständigt och slutligt, ställer specifikationsprincipen upp ett krav på att det tydligt ska framgå av avtalet vilka delar av rätten som avses överlåtas. Specifikationsprincipen utgör ett komplement till de allmänna avtalsprinciper som också kan göras gällande vid tolkning av överlåtelseavtalet. Restriktionerna i URL är i många avseenden dispositiva, med endast ett fåtal undantag för datorprogram. Så länge avtalet stipulerar att det inte ska förekomma några begränsningar i överlåtelsen av upphovsrätten, är det för köparen möjligt att förvärva de fullständiga rättigheterna. Det framgår att en fullständig och slutlig överlåtelse som i fallet avses, möjliggör att anse överlåtelsen som ett köp i KöpL:s mening.&lt;br /&gt; &lt;br /&gt; Källkoden är den skrivna formen av ett datorprogram och åtnjuter skydd som ett litterärt verk enligt URL. Källkoden kan hållas sluten. Den benämns då som proprietär källkod och kan åtnjuta skydd som företagshemlighet enligt FHL. Källkoden kan också bli öppen i syfte att främja vidareutnyttjande. Öppen källkod täcks vanligen av en licens som utnyttjar upphovsrättens regler till att erbjuda användarna frihet till distribution. Licenserna för öppen källkod har ett antal gemensamma nämnare, men för uppsatsens syfte har särskilt licensen GNU GPL valts ut. GNU GPL innehåller en klausul, vanligen benämnd som en stark copyleft-klausul. Klausulen innebär att all källkod som blandas med GNU GPL-källkoden, täcks av licensvillkoren för GNU GPL. Det innebär exempelvis att källkoden måste göras offentlig i samband med distribution. Copyleft-konceptet är således problematiskt när det inte har avsetts att källkoden ska bli öppen och gälla under GNU GPL.&lt;br /&gt; &lt;br /&gt; I slutändan är frågan därmed om KöpL:s regler utgör en ändamålsenlig reglering av felansvaret för när det visar sig att öppen källkod, i strid med parternas önskan, finns inkorporerad i den proprietära källkoden. Det saknas rättspraxis i svensk rätt avseende den specifika frågan, och även relevant närliggande rättspraxis. Förarbetena till KöpL och URL avslöjar heller inget tydligt svar i frågan. I doktrin har det resonerats generellt om immaterialrätter och även patentöverlåtelser har fått en närmare granskning. Det som framkommer angående fel i programvara berör leverans från en extern konsult. Svaret får därmed sökas i en fragmenterad doktrin, som inte ger för handen ett enhetligt svar. Författaren finner emellertid, enligt vad som framförs däri, att en rimlig avvägning torde kunna uppnås genom att inte tillämpa ett strikt ansvar. Ett sådant strikt ansvar gäller vanligtvis för rättsliga fel, men förarbetena framhåller ett strikt ansvar som för långtgående avseende immaterialrättsliga fel. En möjlighet skulle kunna vara att tillämpa ansvarsreglerna för rådighetsfel i enlighet med i första hand 17 § första stycket och 40 § tredje stycket KöpL. Avseende ett faktiskt fel bör de särskilda omständigheterna i fallet kunna beaktas. Bedömningen kan utgå från vad köparen med fog kan förvänta sig avseende faktisk utnyttjandemöjlighet, rättslig utnyttjandemöjlighet och konkurrensskydd. Riktlinjen fyller en funktion när avtalsreglering saknas eller en fast felstandard inte är fastställd.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Examensarbete.pdf">http://lup.lub.lu.se/student-papers/record/8936899/file/8936900.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">692536</note> <accessCondition type="restrictionOnAccess">yes</accessCondition> </relatedItem> <relatedItem type="constituent"> <location> <url displayLabel="Bergqvist_Sara_VT18.pdf">http://lup.lub.lu.se/student-papers/record/8936899/file/8937593.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">699034</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2017</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">swe</languageTerm> </language> <subject> <topic>avtalsrätt</topic> <topic>civilrätt</topic> <topic>förmögenhetsrätt</topic> <topic>immaterialrätt</topic> <topic>IT-rätt</topic> <topic>upphovsrätt</topic> <topic>datorprogram</topic> <topic>överlåtelse</topic> <topic>företagsförvärv</topic> <topic>källkod</topic> <topic>öppen källkod</topic> <topic>open source</topic> <topic>proprietär källkod</topic> <topic>copyleft</topic> <topic>GNU GPL</topic> </subject> <subject authority="lup"> <topic>Law and Political Science</topic> </subject> <recordInfo> <recordIdentifier>8936899</recordIdentifier> <recordCreationDate encoding="w3cdtf">2018-03-06T09:28:52+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2018-03-20T08:51:36+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2018-03-20T08:51:36+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>19</recordPosition></record>
<record><recordSchema>info:srw/schema/1/mods-v3.3</recordSchema><recordPacking>xml</recordPacking><recordData><mods version="3.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-0.xsd"> <genre>studentPublicationsH2</genre> <titleInfo> <title>The Informal Sector Activities within the Information and Communications Technology Industry-A Case Study of the Lagos Computer Village, Nigeria.</title> </titleInfo> <name type="personal"> <namePart type="given">Lucky Imonitie</namePart> <namePart type="family">Enakhimion</namePart> <role> <roleTerm type="text">author</roleTerm> </role> <affiliation>8895033</affiliation> </name> <name type="personal"> <namePart type="given">Ellen</namePart> <namePart type="family">Hillbom</namePart> <role> <roleTerm type="text">supervisor</roleTerm> </role> </name> <name type="corporate"> <namePart>Department of Economic History</namePart> <identifier type="lucatorg">v1000022</identifier> <role> <roleTerm type="text">department</roleTerm> </role> </name> <abstract lang="eng">The informal sector is often seen as one sector with the potentials to transform the economies of developing countries if well harnessed. This is particularly true in the case of Nigeria where the informal sector creates employment opportunity for a large number of the labor force compared to the formal sector economy. However, it is also pertinent to bear in mind that the informal sector is often associated with a lot of socio-economic ills some of which are inimical to development objectives of States. This paper examines the informal sector activities within the Information and Communications Technology (ICT) industry using the Lagos Computer Village (LCV) as a case study. In doing this, three critical issues are examined: the level of tax evasion of informal sector entrepreneurs within the LCV, the extent to which the urban employment created by the informal sector activities at the LCV could be classified as a relevant case of disguised unemployment and the extent of illegality to which the informal sector entrepreneurs at the LCV are involved in terms of trading in pirated ICT components. This paper draws a conclusion by using relevant theories to analyze data collected from the field work.</abstract> <relatedItem type="constituent"> <location> <url displayLabel="Thesis_Final.pdf">http://lup.lub.lu.se/student-papers/record/8895037/file/8895038.pdf</url> </location> <physicalDescription> <internetMediaType>application/pdf</internetMediaType> </physicalDescription> <note type="fileSize">373133</note> <accessCondition type="restrictionOnAccess">no</accessCondition> </relatedItem> <originInfo> <dateIssued encoding="w3cdtf">2016</dateIssued> </originInfo> <language> <languageTerm authority="iso639-2b" type="code">eng</languageTerm> </language> <subject> <topic>Formal Sector</topic> <topic>Informal Sector</topic> <topic>Lagos Computer Village</topic> <topic>Tax Evasion</topic> <topic>ICT components.</topic> </subject> <subject authority="lup"> <topic>Business and Economics</topic> </subject> <recordInfo> <recordIdentifier>8895037</recordIdentifier> <recordCreationDate encoding="w3cdtf">2016-11-15T17:29:20+01:00</recordCreationDate> <recordChangeDate encoding="w3cdtf">2016-11-17T10:41:27+01:00</recordChangeDate> <recordDateApproved encoding="w3cdtf">2016-11-17T10:41:27+01:00</recordDateApproved> </recordInfo> </mods></recordData><recordPosition>20</recordPosition></record>
</records>

<extraResponseData></extraResponseData> 
<echoedSearchRetrieveRequest><version>1.1</version><query>title=computer* and title &amp;lt;&amp;gt; games</query><xQuery><triple xmlns="http://www.loc.gov/zing/cql/xcql/"><boolean><value>and</value></boolean><leftOperand><searchClause><index>title</index><relation><value>=</value></relation><term>computer*</term></searchClause></leftOperand><rightOperand><searchClause><index>title</index><relation><value>&lt;&gt;</value></relation><term>games</term></searchClause></rightOperand></triple></xQuery></echoedSearchRetrieveRequest>
</searchRetrieveResponse>
