hh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
12345 1 - 50 av 209
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Aerts, Arend
    et al.
    Eindhoven University of Technology, Eindhoven, The Netherlands.
    Reniers, Michel A.
    Eindhoven University of Technology, Eindhoven, The Netherlands.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Model-Based Testing of Cyber-Physical Systems2016Ingår i: Cyber-Physical Systems: Foundations, Principles and Applications / [ed] H. Song, D.B. Rawat, S. Jeschke, and Ch. Brecher, Saint Louis: Elsevier, 2016, s. 287-304Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Cyber-physical systems (CPSs) are the result of the integration of connected computer systems with the physical world. They feature complex interactions that go beyond traditional communication schemes and protocols in computer systems. One distinguished feature of such complex interactions is the tight coupling between discrete and continuous interactions, captured by hybrid system models.

    Due to the complexity of CPSs, providing rigorous and model-based analysis methods and tools for verifying correctness of such systems is of the utmost importance. Model-based testing (MBT) is one such verification technique that can be used for checking the conformance of an implementation of a system to its specification (model).

    In this chapter, we first review the main concepts and techniques in MBT. Subsequently, we review the most common modeling formalisms for CPSs, with focus on hybrid system models. Subsequently, we provide a brief overview of conformance relations and conformance testing techniques for CPSs. © 2017 Elsevier Inc. All rights reserved.

  • 2.
    Afrim, Cerimi
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Norén, Joakim
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Motåtgärder vid IT-forensisk liveanalys2011Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Liveanalys är ett begrepp som i detta arbete innebär att man undersöker ett datorsystem under tiden det är igång. Detta kan göras av flera skäl, t.ex. när det är risk för att kryptering finns på systemet vilket kan aktiveras när det stängs ner. Annars är det vanligt om man vill undersöka nätverkskopplingar, aktiva processer eller andra företeelser som kan vara volatila, dvs. försvinner när systemet stängs ner. Detta arbete kommer att ha fokus på motåtgärder vid forensisk liveanalys och redogöra för olika metoder och strategier som kan användas för dessa motåtgärder. Vi har bland annat skrivit ett program som automatiskt stänger ner systemet när man sätter i ett USB-minne eller annan media. Dessa media är oftast de man har sina forensiska program på när man ska göra en liveanalys. Andra viktiga element i arbetet är användning av kryptering, tidstämplar och sabotagekod för att försvåra liveanalysen. Vår analys i ämnet visar att det är relativt enkelt att förhindra att en liveanalys kan utföras på ett tillförlitligt sätt.

    Ladda ner fulltext (pdf)
    fulltext
  • 3.
    Agelis, Sacki
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Optoelectronic router with a reconfigurable shuffle network based on micro-optoelectromechanical systems2004Ingår i: Journal of Optical Networking, ISSN 1536-5379, Vol. 4, nr 1, s. 1-10Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    An optoelectronic router with a shuffle exchange network is presented and enhanced by the addition of micro-optoelectromechanical systems (MOEMS) in the network to add the ability to reconfigure the shuffle network. The MOEMS described here are fully connected any-to-any crossbar switches. The added reconfigurability provides the opportunity to adapt the system to different common application characteristics. Two representative application models are described: The first has symmetric properties, and the second has asymmetric properties. The router system is simulated with the specified applications and an analysis of the results is carried out. By use of MOEMS in the optical network, and thus reconfigurability, greater than 50% increased throughput performance and decreased average packet delay are obtained for the given application. Network congestion is avoided throughout the system if reconfigurability is used.

    Ladda ner fulltext (pdf)
    fulltext
  • 4.
    Ahmed, Iftikhar
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Farooq, Muhammad
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Switched Multi-hop Priority Queued Networks-Influence of priority levels on Soft Real-time Performance2010Självständigt arbete på avancerad nivå (magisterexamen), 15 poäng / 22,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In the last few years, the number of real-time applications has increased. These applications are sensitive and require the methods to utilize existing network capacity efficiently to meet performance requirements and achieve the maximum throughput to overcome delay, jitter and packet loss. In such cases, when the network needs to support highly interactive traffic like packet-switched voice, the network congestion is an issue that can lead to various problems. If the level of congestion is high enough, the users may not be able to complete their calls and have existing calls dropped or may experience a variety of delays that make it difficult to participate smooth conversation.

    In this paper, we investigate the effect of priority levels on soft real-time performance. We use the priority queues to help us manage the congestion, handle the interactive traffic and improve the over all performance of the system. We consider switched multi-hop network with priority queues. All the switches and end-nodes control the real-time traffic with “Earlier Deadline First” scheduling. The performance of the network is characterized in terms of the average delay, the deadline missing ratio and the throughput.

    We will analyze these parameters with both the bursty traffic and evenly distributed traffic. We will analyze different priority levels and will see how the increase in priority level increases the performance of the soft real-time system.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 5.
    Aichernig, Bernhard K.
    et al.
    Graz University of Technology, Graz, Austria.
    Mostowski, Wojciech
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Department of Informatics, University of Leicester, Leicester, UK.
    Tappler, Martin
    Graz University of Technology, Graz, Austria.
    Taromirad, Masoumeh
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Model Learning and Model-Based Testing2018Ingår i: Machine Learning for Dynamic Software Analysis: Potentials and Limits / [ed] Amel Bennaceur, Reiner Hähnle, Karl Meinke, Heidelberg: Springer, 2018, s. 74-100Konferensbidrag (Refereegranskat)
    Abstract [en]

    We present a survey of the recent research efforts in integrating model learning with model-based testing. We distinguished two strands of work in this domain, namely test-based learning (also called test-based modeling) and learning-based testing. We classify the results in terms of their underlying models, their test purpose and techniques, and their target domains. © Springer International Publishing AG

  • 6.
    Alendal, Gunnar
    et al.
    NTNU, Gjøvik, Norway.
    Dyrkolbotn, Geir Olav
    NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
    Axelsson, Stefan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode2018Ingår i: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, nr Suppl., s. S60-S67Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

  • 7.
    Alfredsson, Erika
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Bengtsson, Matilda
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Bluetooth-implementation för Netbiter EC3502014Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In industries today the demand for reading the state of industrial equipment and thus prevent machine breakdown, is increasing. The company HMS Industrial Networks AB has a product on the market, Netbiter EC350 that is used to read sensors and thus find out the condition of industrial equipment. By reporting scanned data to users through a cloud service, users can keep track of their equipment.

     

    When developing Netbiter EC350 a slot was made for a Bluetooth module to offer clients a wireless reading in future developments. In this project a prototype was made to show how this Bluetooth communication can be implemented.

     

    The goal of the project was to create a Bluetooth communication between a Bluetooth sensor and Netbiter EC350. A user interface was made to allow the user to read sensor values.

     

    The result of the project shows how a Bluetooth communication can be implemented to read sensors wireless and therefore it fulfills its purpose and goal. The user can find connectable Bluetooth devices, connect to a device and read measured values through a user interface.

     

    The prototype demonstrates how a Bluetooth communication with a Netbiter EC350 can be implemented and the project is therefore considered to be a good basis for future development.

    Ladda ner fulltext (pdf)
    fulltext
  • 8.
    Ali Hamad, Rebeen
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Järpe, Eric
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Lundström, Jens
    JeCom Consulting, Halmstad, Sweden.
    Stability analysis of the t-SNE algorithm for human activity pattern data2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    Health technological systems learning from and reacting on how humans behave in sensor equipped environments are today being commercialized. These systems rely on the assumptions that training data and testing data share the same feature space, and residing from the same underlying distribution - which is commonly unrealistic in real-world applications. Instead, the use of transfer learning could be considered. In order to transfer knowledge between a source and a target domain these should be mapped to a common latent feature space. In this work, the dimensionality reduction algorithm t-SNE is used to map data to a similar feature space and is further investigated through a proposed novel analysis of output stability. The proposed analysis, Normalized Linear Procrustes Analysis (NLPA) extends the existing Procrustes and Local Procrustes algorithms for aligning manifolds. The methods are tested on data reflecting human behaviour patterns from data collected in a smart home environment. Results show high partial output stability for the t-SNE algorithm for the tested input data for which NLPA is able to detect clusters which are individually aligned and compared. The results highlight the importance of understanding output stability before incorporating dimensionality reduction algorithms into further computation, e.g. for transfer learning.

    Ladda ner fulltext (pdf)
    tsne-stability
  • 9.
    Ali, Hazem
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Patoary, Mohammad Nazrul Ishlam
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Design and Implementation of an Audio Codec (AMR-WB) using Dataflow Programming Language CAL in the OpenDF Environment2010Självständigt arbete på avancerad nivå (masterexamen), 30 poäng / 45 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Over the last three decades, computer architects have been able to achieve an increase in performance for single processors by, e.g., increasing clock speed, introducing cache memories and using instruction level parallelism. However, because of power consumption and heat dissipation constraints, this trend is going to cease. In recent times, hardware engineers have instead moved to new chip architectures with multiple processor cores on a single chip. With multi-core processors, applications can complete more total work than with one core alone. To take advantage of multi-core processors, we have to develop parallel applications that assign tasks to different cores. On each core, pipeline, data and task parallelization can be used to achieve higher performance. Dataflow programming languages are attractive for achieving parallelism because of their high-level, machine-independent, implicitly parallel notation and because of their fine-grain parallelism. These features are essential for obtaining effective, scalable utilization of multi-core processors.

    In this thesis work we have parallelized an existing audio codec - Adaptive Multi-Rate Wide Band (AMR-WB) - written in the C language for single core processor. The target platform is a multi-core AMR11 MP developer board. The final result of the efforts is a working AMR-WB encoder implemented in CAL and running in the OpenDF simulator. The C specification of the AMR-WB encoder was analysed with respect to dataflow and parallelism. The final implementation was developed in the CAL Actor Language, with the goal of exposing available parallelism - different dataflows - as well as removing unwanted data dependencies. Our thesis work discusses mapping techniques and guidelines that we followed and which can be used in any future work regarding mapping C based applications to CAL. We also propose solutions for some specific dependencies that were revealed in the AMR-WB encoder analysis and suggest further investigation of possible modifications to the encoder to enable more efficient implementation on a multi-core target system.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 10.
    Aljarbouh, Ayman
    et al.
    Centre de Recherche INRIA, Rennes, France.
    Zeng, Yingfu
    Rice University, Houston, Texas, United States.
    Duracz, Adam
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Caillaud, Benoît
    Centre de Recherche INRIA, Rennes, France.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston, Texas, United States.
    Chattering-Free Simulation for Hybrid Dynamical Systems: Semantics and Prototype Implementation2016Ingår i: 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES) / [ed] Randall Bilof, Los Alamitos: IEEE Computer Society, 2016, s. 412-422, artikel-id 7982279Konferensbidrag (Refereegranskat)
    Abstract [en]

    Chattering is a fundamental phenomenon that is unique to hybrid systems, due to the complex interaction between discrete dynamics (in the form of discrete transitions) and continuous dynamics (in the form of time). In practice, simulating chattering hybrid systems is challenging in that simulation effectively halts near the chattering time point, as an infinite number of discrete transitions would need to be simulated. In this paper, formal conditions are provided for when the simulated models of hybrid systems display chattering behavior, and methods are proposed for avoiding chattering “on the fly” in runtime. We utilize dynamical behavior analysis to derive conditions for detecting chattering without enumeration of modes. We also present a new iterative algorithm to allow for solutions to be carried past the chattering point, and we show by a prototypical implementation how to generate the equivalent chattering-free dynamics internally by the simulator in the main simulation loop. The concepts are illustrated with examples throughout the paper. © 2016 IEEE.

  • 11.
    Alonso-Fernandez, Fernando
    et al.
    ATVS/Biometric Recognition Group, Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Bigun, Josef
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Fierrez, Julian
    ATVS/Biometric Recognition Group, Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fronthaler, Hartwig
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Kollreider, Klaus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Ortega-Garcia, Javier
    ATVS/Biometric Recognition Group, Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fingerprint Recognition2009Ingår i: Guide to Biometric Reference Systems and Performance Evaluation / [ed] Dijana Petrovska-Delacrétaz, Gérard Chollet, Bernadette Dorizzi, London: Springer London, 2009, s. 51-88Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    First, an overview of the state of the art in fingerprint recognition is presented, including current issues and challenges. Fingerprint databases and evaluation campaigns, are also summarized. This is followed by the description of the BioSecure Benchmarking Framework for Fingerprints, using the NIST Fingerpint Image Software (NFIS2), the publicly available MCYT-100 database, and two evaluation protocols. Two research systems are compared within the proposed framework. The evaluated systems follow different approaches for fingerprint processing and are discussed in detail. Fusion experiments involving different combinations of the presented systems are also given. The NFIS2 software is also used to obtain the fingerprint scores for the multimodal experiments conducted within the BioSecure Multimodal Evaluation Campaign(BMEC’2007) reported in Chap.11.

    Ladda ner fulltext (pdf)
    fulltext
  • 12.
    Aloulou, Hamdi
    et al.
    Institut Mines Telecom, Paris, France & Laboratory of Informatics, Robotics and Microelectronics, Montpellier, France.
    Abdulrazak, Bessam
    Laboratory of Informatics, Robotics and Microelectronics, Montpellier, France & University of Sherbrooke, Sherbrooke, Canada.
    Endelin, Romain
    Institut Mines Telecom, Paris, France & Laboratory of Informatics, Robotics and Microelectronics, Montpellier, France.
    Bentes, João
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab). Image and Pervasive Access Laboratory, Singapore, Singapore.
    Tiberghien, Thibaut
    Institut Mines Telecom, Paris, France & Image and Pervasive Access Laboratory, Singapore, Singapore.
    Bellmunt, Joaquim
    Institut Mines Telecom, Paris, France & Image and Pervasive Access Laboratory, Singapore, Singapore.
    Simplifying Installation and Maintenance of Ambient Intelligent Solutions Toward Large Scale Deployment2016Ingår i: Inclusive Smart Cities and Digital Health: 14th International Conference on Smart Homes and Health Telematics, ICOST 2016, Wuhan, China, May 25-27, 2016. Proceedings / [ed] Chang C.K., Jin H., Cao Y., Aloulou H., Mokhtari M., Chiari L., Heidelberg: Springer, 2016, s. 121-132Konferensbidrag (Refereegranskat)
    Abstract [en]

    Simplify deployment and maintenance of Ambient Intelligence solutions is important to enable large-scale deployment and maximize the use/benefit of these solutions. More mature Ambient Intelligence solutions emerge on the market as a result of an intensive investment in research. This research targets mainly the accuracy, usefulness, and usability aspects of the solutions. Still, possibility to adapt to different environments, ease of deployment and maintenance are ongoing problems of Ambient Intelligence. Existing solutions require an expert to move on-site in order to install or maintain systems. Therefore, we present in this paper our attempt to enable quick large scale deployment. We discuss lessons learned from our approach for automating the deployment process in order to be performed by ordinary people. We also introduce a solution for simplifying the monitoring and maintenance of installed systems. © Springer International Publishing Switzerland 2016.

  • 13.
    Andersson, Magnus
    et al.
    Telematics Group, Viktoria Institute, Göteborg.
    Lindgren, Rikard
    Telematics Group, Viktoria Institute, Göteborg.
    The Mobile-Stationary Divide in Ubiquitous Computing Environments: Lessons from the Transport Industry2005Ingår i: Information systems management, ISSN 1058-0530, E-ISSN 1934-8703, Vol. 22, nr 4, s. 65-79Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The emergence of ubiquitous computing offers new possibilities and opportunities for organizations attempting to improve their productivity and effectiveness. In particular, the promises of ubiquitous computing are attractive to organizations such as transport firms, in which coordination of diverse sets of mobile units is central to organizational performance. This article analyzes the use of ubiquitous transport systems in Swedish road haulage firms and discusses the opportunities and challenges for the early adopters. It pays specific attention to the mobile-stationary divide; that is, the set of challenges associated with integration of mobile and stationary people and systems into a seamless computing environment.

  • 14.
    Andersson, Magnus
    et al.
    Telematics Group, Viktoria Institute, Göteborg, Sweden.
    Lindgren, Rikard
    Telematics Group, Viktoria Institute, Göteborg, Sweden.
    Henfridsson, Ola
    Telematics Group, Viktoria Institute, Göteborg, Sweden.
    Assessing the Mobile-Stationary Divide in Ubiquitous Transport Systems2005Ingår i: Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, New York, USA: Springer-Verlag New York, 2005, s. 123-137Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Many transport organizations seek to develop seamlessly integrated computing environments. A central problem in attempts to realize such ubiquitous transport systems is the divide that exists between stationary transport management systems and mobile applications such as embedded vehicle sensor networks and in-vehicle services for message handling. Originating from different Innovation regimes, these technologies are heterogeneous in that they rely on different technological platforms and knowledge bases, as well as the institutionalized settings from which they have emerged. This paper assesses how the mobile-stationary divide plays out in practical efforts to develop ubiquitous transport systems in road haulage firms. This assessment is conducted through a multiple-case study that identifies socio-technical challenges associated with this divide. Building on this assessment, the paper contributes a set of implications for enterprise-wide ubiquitous computing environments where coordination of diverse sets of mobile units is central to organizational performance. On a general level, these implications are important for any organization attempting to integrate mobile and stationary information systems.

  • 15.
    Aramrattana, Maytheewat
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Göteborg, Sweden.
    A Simulation-Based Safety Analysis of CACC-Enabled Highway Platooning2018Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Cooperative Intelligent Transport Systems (C-ITS) enable actors in the transport systems to interact and collaborate by exchanging information via wireless communication networks. There are several challenges to overcome before they can be implemented and deployed on public roads. Among the most important challenges are testing and evaluation in order to ensure the safety of C-ITS applications.

    This thesis focuses on testing and evaluation of C-ITS applications with regard to their safety using simulation. The main focus is on one C-ITS application, namely platooning, that is enabled by the Cooperative Adaptive Cruise Control (CACC) function. Therefore, this thesis considers two main topics: i) what should be modelled and simulated for testing and evaluation of C-ITS applications? and ii) how should CACC functions be evaluated in order to ensure safety?

    When C-ITS applications are deployed, we can expect traffic situations which consist of vehicles with different capabilities, in terms of automation and connectivity. We propose that involving human drivers in testing and evaluation is important in such mixed traffic situations. Considering important aspects of C-ITS including human drivers, we propose a simulation framework, which combines driving-, network-, and traffic simulators. The simulation framework has been validated by demonstrating several use cases in the scope of platooning. In particular, it is used to demonstrate and analyse the safety of platooning applications in cut-in situations, where a vehicle driven by a human driver cuts in between vehicles in platoon. To assess the situations, time-to-collision (TTC) and its extensions are used as safety indicators in the analyses.

    The simulation framework permits future C-ITS research in other fields such as human factors by involving human drivers in a C-ITS context. Results from the safety analyses show that cut-in situations are not always hazardous, and two factors that are the most highly correlated to the collisions are relative speed and distance between vehicles at the moment of cutting in. Moreover, we suggest that to solely rely on CACC functions is not sufficient to handle cut-in situations. Therefore, guidelines and standards are required to address these situations properly.

    Ladda ner fulltext (pdf)
    fulltext
  • 16.
    Aramrattana, Maytheewat
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Göteborg, Sweden.
    Englund, Cristofer
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab). RISE Viktoria, Göteborg, Sweden.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Göteborg, Sweden.
    Safety Evaluation of Highway Platooning Under a Cut-In Situation Using Simulation2018Ingår i: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Platooning refers to an application, where a group of connected and automated vehicles follow a lead vehicle autonomously, with short inter-vehicular distances. At merging points on highways such as on-ramp, platoons could encounter manually driven vehicles, which are merging on to the highways. In some situations, the manually driven vehicles could end up between the platooning vehicles. Such situations are expected and known as “cut-in” situations. This paper presents a simulation study of a cut-in situation, where a platoon of five vehicles encounter a manually driven vehicle at a merging point of a highway. The manually driven vehicle is driven by 37 test persons using a driving simulator. For the platooning vehicles, two longitudinal controllers with four gap settings between the platooning vehicles, i.e. 15 meters, 22.5 meters, 30 meters, and 42.5 meters, are evaluated. Results summarizing cut-in behaviours and how the participants perceived the situation are presented. Furthermore, the situation is assessed using safety indicators based on time-to-collision.

  • 17.
    Assabie, Yaregal
    et al.
    Addis Ababa University, Department of Computer Science, Addis Ababa Ethiopia .
    Bigun, Josef
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligenta system (IS-lab).
    Lexicon-based Offline Recognition of Amharic Words in Unconstrained Handwritten Text2008Ingår i: 19th International Conference on Pattern Recognition: (ICPR 2008) ; Tampa, Florida, USA 8-11 December 2008, New York: IEEE Computer Society, 2008, artikel-id 4761145Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper describes an offline handwriting recognition system for Amharic words based on lexicon. The system computes direction fields of scanned handwritten documents, from which pseudo-characters are segmented. The pseudo-characters are organized based on their proximity and direction to form text lines. Words are then segmented by analyzing the relative gap between subsequent pseudocharacters in text lines. For each segmented word image, the structural characteristics of pseudo-characters are syntactically analyzed to predict a set of plausible characters forming the word. The most likelihood word is finally selected among candidates by matching against the lexicon. The system is tested by a database of unconstrained handwritten Amharic documents collected from various sources. The lexicon is prepared from words appearing in the collected database.

  • 18.
    Bacauskiene, Marija
    et al.
    Department of Electrical and Control Equipment, Kaunas University of Technology, Kaunas, Lithuania.
    Verikas, Antanas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligenta system (IS-lab).
    Gelzinis, Adas
    Department of Electrical and Control Equipment, Kaunas University of Technology, Kaunas, Lithuania.
    Vegiene, Aurelija
    Department of Otolaryngology, Kaunas University of Medicine, Kaunas, Lithuania.
    Random forests based monitoring of human larynx using questionnaire data2012Ingår i: Expert systems with applications, ISSN 0957-4174, E-ISSN 1873-6793, Vol. 39, nr 5, s. 5506-5512Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper is concerned with soft computing techniques-based noninvasive monitoring of human larynx using subject’s questionnaire data. By applying random forests (RF), questionnaire data are categorized into a healthy class and several classes of disorders including: cancerous, noncancerous, diffuse, nodular, paralysis, and an overall pathological class. The most important questionnaire statements are determined using RF variable importance evaluations. To explore data represented by variables used by RF, the t-distributed stochastic neighbor embedding (t-SNE) and the multidimensional scaling (MDS) are applied to the RF data proximity matrix. When testing the developed tools on a set of data collected from 109 subjects, the 100% classification accuracy was obtained on unseen data in binary classification into the healthy and pathological classes. The accuracy of 80.7% was achieved when classifying the data into the healthy, cancerous, noncancerous classes. The t-SNE and MDS mapping techniques applied allow obtaining two-dimensional maps of data and facilitate data exploration aimed at identifying subjects belonging to a “risk group”. It is expected that the developed tools will be of great help in preventive health care in laryngology.

  • 19.
    Barisas, Dominykas
    et al.
    Kaunas University of Technology, Kaunas, Lithuania.
    Duracz, Adam
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston, TX, USA.
    DSLs Should be Online Applications2014Ingår i: Joint International Conference on Engineering Education & International Conference on Information Technology: ICEE/ICIT-2014: June 2 - 6, 2014: Riga, Latvia: Conference proceedings, 2014, s. 314-319Konferensbidrag (Refereegranskat)
    Abstract [en]

    Domain-Specific Languages (DSLs) play an important role in both practice and education. But developing them is challenging, because a DSL must ultimately satisfy a large and complex set of user/customer requirements to fulfil its intended role, and neither requirements nor users are fully available at all times during the development process. Requirements can be elicited using agile methods but such methods assume the availability of the users. The situation is further complicated when the user base is primarily students and when enhanced learning is a key requirement. In this paper we propose developing DSLs, especially educational ones, as online applications. We analyze how this can help requirement elicitation and learning. Being online brings language development closer to the user, yielding new opportunities to improve and accelerate the language design process. It is also well-matched to agile methods, since web- based analytics provide an abundant source of data that integrates naturally into the development process. As an example, we consider applying the method to Acumen, a DSL designed to support teaching Cyber-Physical Systems.

  • 20.
    Bengtsson, Jerker
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Baseband Processing in 3G UMTS Radio Base Stations2006Rapport (Övrigt vetenskapligt)
    Abstract [en]

    This report presents a study of functionality, service dataflows, computation characteristics and processing parameters for baseband processing in radio base stations. The study has been performed with the objective to develop a programming model that is natural and efficient to use for baseband programming and which can be efficiently compiled to parallel computing structures. In order to achieve this objective it is necessary to analyse and understand the logical architecture of the application in order to be able to define processing characteristics and thereby requirements on languages as well as on physical system architectures. Moreover, to be able to test and verify programming and mapping of functions it is necessary to have realistic but still manageable test cases. The study is focused on the third generation partnership project (3GPP) standard specifications for 3G radio base stations. The specifications cover the complete 3G network-architecture and are quite extensive and complex. To make experiments manageable, it is necessary to abstract system functionality that is not directly relevant for the RBS baseband processing. Moreover, the standard specifications only describe the required processing functionality on an abstract logical level. In this report, the functionality of the baseband functions is explained and also described using illustrations of dataflows and abstract mapping of two 3G service cases. The results of the study constitute a comprehensive description of the processing flow and the mapping of user data channels in 3G radio base stations – spanning data and control input from layer 2 to physical channel output from layer 1. Data dependencies between functions are illustrated with figures and it is concluded that these dependencies are of producer/consumer type. It is discussed how different functions can be mapped in MIMD and SIMD fashion with regard to the data dependencies, the data stream lengths and the control operations required to handle bit stream processing on word-length processor architectures.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 21.
    Bengtsson, Jerker
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Hoang Bengtsson, Hoai
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Dynamic Real-time DSP on Manycores2010Konferensbidrag (Refereegranskat)
  • 22.
    Bengtsson, Jerker
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Svensson, Bertil
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    A configurable framework for stream programming exploration in baseband applications2006Ingår i: 2006 IEEE International Parallel & Distributed Processing Symposium: Rhodes Island, Greece : 25-29 April, 2006, Piscataway, N.J.: IEEE Press, 2006, s. 8-Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a configurable framework to be used for rapid prototyping of stream based languages. The framework is based on a set of design patterns defining the elementary structure of a domain specific language for high-performance signal processing. A stream language prototype for baseband processing has been implemented using the framework. We introduce language constructs to efficiently handle dynamic reconfiguration of distributed processing parameters. It is also demonstrated how new language specific primitive data types and operators can be used to efficiently and machine independently express computations on bitfields and data-parallel vectors. These types and operators yield code that is readable, compact and amenable to a stricter type checking than is common practice. They make it possible for a programmer to explicitly express parallelism to be exploited by a compiler. In short, they provide a programming style that is less error prone and has the potential to lead to more efficient implementations.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 23.
    Bengtsson, Lars
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS). Chalmers University of Technology, Gothenburg, Sweden.
    Linde, Arne
    Chalmers University of Technology, Gothenburg, Sweden.
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS). Telecommunications Research Center Vienna (FTW), Vienna, Austria.
    Svensson, Bertil
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Taveniku, Mikael
    XCube Communication, Inc., Westford, MA, United States.
    The REMAP Reconfigurable Architecture: a Retrospective2006Ingår i: FPGA Implementations of Neural Networks, New York: Springer-Verlag New York, 2006, s. 325-360Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    The goal of the REMAP project was to gain new knowledge about the design and use of massively parallel computer architectures in embedded real-time systems. In order to support adaptive and learning behavior in such systems, the efficient execution of Artificial Neural Network (ANN) algorithms on regular processor arrays was in focus. The REMAP-β parallel computer built in the project was designed with ANN computations as the main target application area. This chapter gives an overview of the computational requirements found in ANN algorithms in general and motivates the use of regular processor arrays for the efficient execution of such algorithms. REMAP-β was implemented using the FPGA circuits that were available around 1990. The architecture, following the SIMD principle (Single Instruction stream, Multiple Data streams), is described, as well as the mapping of some important and representative ANN algorithms. Implemented in FPGA, the system served as an architecture laboratory. Variations of the architecture are discussed, as well as scalability of fully synchronous SIMD architectures. The design principles of a VLSI-implemented successor of REMAP-β are described, and the paper is concluded with a discussion of how the more powerful FPGA circuits of today could be used in a similar architecture. © 2006 Springer.

  • 24.
    Beohar, Harsh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Cuijpers, Pieter
    Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Avoiding Diamonds in Desynchronisation2014Ingår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 91, nr PART A, s. 45-69Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The design of concurrent systems often assumes synchronous communication between different parts of a system. When system components are physically apart, this assumption becomes inappropriate. Desynchronisation is a technique that aims to implement a synchronous design in an asynchronous manner by placing buffers between the components of the synchronous design. When queues are used as buffers, the so-called 'diamond property' (among others) ensures correct operation of the desynchronised design. However, this property is difficult to establish in practice. In this paper, we give sufficient and necessary conditions under which a concrete synchronous design (i.e., without the unobservable action) is equivalent to an asynchronous design and formally prove that the diamond property is no longer needed for desynchronisation when half-duplex queues are used as a communication buffer. Furthermore, we discuss how the half-duplex condition can be further relaxed when the diamond property can be partially guaranteed. To illustrate how this theory may be applied, we desynchronise the synchronous systems that are synthesised using supervisory control theory. © 2013 Elsevier B.V.

    Ladda ner fulltext (pdf)
    hb-scp-2014
  • 25.
    Beohar, Harsh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    A Pre-congruence Format for XY-simulation2015Ingår i: Fundamentals of Software Engineering: 6th International Conference, FSEN 2015 Tehran, Iran, April 22–24, 2015, Revised Selected Papers / [ed] Mehdi Dastani & Marjan Sirjani, Cham: Springer, 2015, Vol. 9392, s. 215-229Konferensbidrag (Refereegranskat)
    Abstract [en]

    XY-simulation is a generalization of bisimulation that is parameterized with two subsets of actions. XY-simulation is known in the literature under different names such as modal refinement, partial bisimulation, and alternating simulation. In this paper, we propose a precongruence rule format for XY-simulation. The format allows for checking compositionality of XY-simulation for an arbitrary language with structural operational semantics, by performing very simple checks on the syntactic shape of the rules. We apply our format to derive concrete compositionality results for different notions of behavioral pre-order with respect to different process calculi in the literature. © IFIP International Federation for Information Processing 2015

    Ladda ner fulltext (pdf)
    fulltext
  • 26.
    Beohar, Harsh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Varshosaz, Mahsa
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Basic behavioral models for software product lines: Expressiveness and testing pre-orders2016Ingår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 123, s. 42-60Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In order to provide a rigorous foundation for Software Product Lines (SPLs), several fundamental approaches have been proposed to their formal behavioral modeling. In this paper, we provide a structured overview of those formalisms based on labeled transition systems and compare their expressiveness in terms of the set of products they can specify. Moreover, we define the notion of tests for each of these formalisms and show that our notions of testing precisely capture product derivation, i.e., all valid products will pass the set of test cases of the product line and each invalid product fails at least one test case of the product line. © 2015 The Authors.

    Ladda ner fulltext (pdf)
    fulltext
  • 27.
    Bepari, Nuruzzaman
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Alam, Mohammad Zabedul
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Rahman, Md. Syadur
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Architecture of a Distributed LDAP Directory2010Självständigt arbete på avancerad nivå (magisterexamen), 15 poäng / 22,5 hpStudentuppsats (Examensarbete)
    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 28.
    Bergenhem, Carl
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    A Pipelined Ring Network - Heterogeneous Real-time in Radar Signal Processing2003Ingår i: Applied Informatics: AI 2003, ACTA Press , 2003, s. 825-832Konferensbidrag (Refereegranskat)
    Abstract [en]

    The paper presents results of simulations done with the CCR-EDF (Control Channel based Ring network with EDF scheduling) pipelined ring network together with a case study of system area networks for radar signal processing. The topology of the network is a pipelined unidirectional fibre-ribbon ring that supports several simultaneous transmissions in non-overlapping segments. Access to the network is divided into slots. In each slot the node that has the highest priority message is permitted to transmit. This feature of the medium access protocol gives the network the functionality for earliest deadline first scheduling. Different classes of traffic are supported for the user. These are guaranteed logical real-time channels (LRTC), best effort (BE) channels and non real-time (NRT) traffic. The case study used is from an airborne radar signal processing (RSP) application. Results of the simulations indicate that the CCR-EDF network works well with the RSP application studied.

  • 29.
    Bernard, Florian
    et al.
    MPI Informatics, Saarland Informatics Campus, Saarbrücken, Germany.
    Thunberg, Johan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Goncalves, Jorge
    LCSB, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
    Theobalt, Christian
    MPI Informatics, Saarland Informatics Campus, Saarbrücken, Germany.
    Synchronisation of partial multi-matchings via non-negative factorisations2019Ingår i: Pattern Recognition, ISSN 0031-3203, E-ISSN 1873-5142, Vol. 92, s. 146-155Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In this work we study permutation synchronisation for the challenging case of partial permutations, which plays an important role for the problem of matching multiple objects (e.g. images or shapes). The term synchronisation refers to the property that the set of pairwise matchings is cycle-consistent, i.e. in the full matching case all compositions of pairwise matchings over cycles must be equal to the identity. Motivated by clustering and matrix factorisation perspectives of cycle-consistency, we derive an algo- rithm to tackle the permutation synchronisation problem based on non-negative factorisations. In order to deal with the inherent non-convexity of the permutation synchronisation problem, we use an initialisation procedure based on a novel rotation scheme applied to the solution of the spectral relaxation. Moreover, this rotation scheme facilitates a convenient Euclidean projection to obtain a binary solution after solving our relaxed problem. In contrast to state-of-the-art methods, our approach is guaranteed to produce cycle-consistent results. We experimentally demonstrate the efficacy of our method and show that it achieves better results compared to existing methods. © 2019 Elsevier Ltd

  • 30.
    Bilstrup, Katrin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A preliminary study of wireless body area networks2008Rapport (Övrigt vetenskapligt)
    Abstract [en]

    The purpose of this preliminary study is to introduce wireless body area networks (WBAN) to the reader but also to give an understanding of what possibilities and challenges there are when using short range wireless communication in this domain. Up to date, there is no standard specifically intended for low-power WBANs thus a developer is referred to use proprietary solutions which could be demanding to compare and choose. This study tries to provide the reader with the knowledge about important parameters in low-power sensor networks. Energy consumption is the really weak part of a wireless sensor network since the transceiver and other hardware equipment still drain batteries. For example the startup time for a transceiver that has been in power-down mode could consume as much as three times the energy

    as compared when sending the actual bits that invoked the transceiver in first place. The actual application must be the one driving the requirements on the communication. However, the application must be designed with for example the startup time in mind. A sensor network is a true cross-layer design problem where many different areas must meet such as hardware designers, application developers and communication people.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 31.
    Bilstrup, Katrin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A survey regarding wireless communication standards intended for a high-speed vehicle environment2007Rapport (Övrigt vetenskapligt)
    Abstract [en]

    The high velocities and dynamic conditions that a vehicular environment represents introducenew and demanding challenges in the area of wireless communication. Vehicle Alert System(VAS) is a research project at Halmstad University, Sweden, focusing on reliable wirelessvehicle communication. Typical examples of applications for a vehicle alert system are pre-crash warning, communicating slippery road conditions, emergency vehicle routing etc. InVAS a set of application scenarios have been chosen specifically to illustrate as manyinteresting research aspects of a vehicle alert system as possible. The chosen scenarios includeboth vehicle-to-vehicle and vehicle-to-infrastructure communications. Research is conductedon all layers of the communication stack relevant for a vehicle alert system – application,network, data link and the physical layer. From a communication perspective a vehicle alertsystem is characterized by short event-driven control messages that have to be receivedwithout errors in time. This implies that different coding strategies, diversity andretransmission schemes must be used to achieve correctness and robustness against theimpairments of the wireless channel.

    This survey presents and discusses different wireless communication standards as well asproprietary solutions that are intended especially for a high-speed vehicular environment. Since VAS is aiming for real-time wireless communication, the examined standards will beevaluated accordingly. Real-time communication implies that there is an upper bound on thecommunication delay such that if the data never reaches its intended recipient before a certaindeadline this will have a more or less negative impact on the system performance. One of themost important features of a real-time communication system (and perhaps even more crucialin a wireless high-speed vehicular environment) is the medium access method. If it is notdeterministic (i.e., if there exists no upper bound on the delay before a station gets access tothe wireless channel) it is not possible to give guarantees about meeting the deadlines.All currently existing standards, draft specifications and proprietary solutions with explicitintention for being used in a vehicular environment are covered in this survey. In preparationof this document the standard/draft documents themselves have been studied and forproprietary solutions the respective company’s home pages and in some cases articles havebeen used for collecting information. One of the currently most discussed standards is thedraft IEEE 802.11p which has been thoroughly studied here. It inherits features from theQuality of Service amendment IEEE 802.11e and the physical layer supplement IEEE802.11a. The full protocol suite WAVE, also developed by IEEE, incorporates the 802.11p.Other standards, drafts and proprietary solutions that have been studied are IEEE 802.16,IEEE 802.20, flash-OFDM, national DSCR systems, CALM and IEEE 802.21. These systemsrange from being simple RFID-look-a-like DSRC systems to more advanced centralized WMAN standards. It can be concluded that none of the standards or proprietary solutions described in this surveyis suitable for applications such as those considered in the VAS research project. Within thedifferent standards there certainly are features suitable for a vehicle alert system but nostandard totally fit the requirements of VAS. One lacking feature common for all standardsinvestigated is the ability of providing deterministic medium access for vehicle-to-vehiclecommunication.

    Ladda ner fulltext (pdf)
    FULLTEXT01
  • 32.
    Binotto, Alécio P. D.
    et al.
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Freitas, Edison Pignaton
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Götz, Marcelo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Pereira, Carlos E.
    Informatics Institute, Federal University of Rio Grande do Sul, Brazil.
    Stork, André
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Dynamic Self-Rescheduling of Tasks over a Heterogeneous Platform2008Ingår i: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, Los Alamitos, Calif.: IEEE Computer Society, 2008, s. 253-258Konferensbidrag (Refereegranskat)
    Abstract [en]

    Modern applications require powerful high-performance platforms to deal with many different algorithms that make use of massive calculations. At the same time, low-cost and high-performance specific hardware (e.g., GPU, PPU) are rising and the CPUs turned to multiple cores, characterizing together an interesting and powerful heterogeneous execution platform. Therefore, self-adaptive computing is a potential paradigm for those scenarios as it can provide flexibility to explore the computational resources on heterogeneous cluster attached to a high-performance computer system platform. As the first step towards a run-time reschedule load-balancing framework targeting that kind of platform, application time requirements and its crosscutting behavior play an important role for task allocation decisions. This paper presents a strategy for self-reallocation of specific tasks, including dynamic created ones, using aspect-oriented paradigms to address non-functional application timing constraints in the design phase. Additionally, as a case study, a special attention on Radar Image Processing will be given in the context of a surveillance system based on Unmanned Aerial Vehicles (UAV).

  • 33.
    Bouguelia, Mohamed-Rafik
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Gonzalez, Ramon
    Robotic Mobility Group, Massachusetts Institute of Technology, Cambridge, USA.
    Iagnemma, Karl
    Robotic Mobility Group, Massachusetts Institute of Technology, Cambridge, USA.
    Byttner, Stefan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Unsupervised classification of slip events for planetary exploration rovers2017Ingår i: Journal of terramechanics, ISSN 0022-4898, E-ISSN 1879-1204, Vol. 73, s. 95-106Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper introduces an unsupervised method for the classification of discrete rovers' slip events based on proprioceptive signals. In particular, the method is able to automatically discover and track various degrees of slip (i.e. low slip, moderate slip, high slip). The proposed method is based on aggregating the data over time, since high level concepts, such as high and low slip, are concepts that are dependent on longer time perspectives. Different features and subsets of the data have been identified leading to a proper clustering, interpreting those clusters as initial models of the prospective concepts. Bayesian tracking has been used in order to continuously improve the parameters of these models, based on the new data. Two real datasets are used to validate the proposed approach in comparison to other known unsupervised and supervised machine learning methods. The first dataset is collected by a single-wheel testbed available at MIT. The second dataset was collected by means of a planetary exploration rover in real off-road conditions. Experiments prove that the proposed method is more accurate (up to 86% of accuracy vs. 80% for K-means) in discovering various levels of slip while being fully unsupervised (no need for hand-labeled data for training). © 2017 ISTVS

  • 34.
    Bouguelia, Mohamed-Rafik
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Karlsson, Alexander
    University of Skövde, Skövde, Sweden.
    Pashami, Sepideh
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Holst, Anders
    Swedish Institute of Computer Science, Kista, Sweden.
    Mode tracking using multiple data streams2018Ingår i: Information Fusion, ISSN 1566-2535, E-ISSN 1872-6305, Vol. 43, s. 33-46Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Most existing work in information fusion focuses on combining information with well-defined meaning towards a concrete, pre-specified goal. In contradistinction, we instead aim for autonomous discovery of high-level knowledge from ubiquitous data streams. This paper introduces a method for recognition and tracking of hidden conceptual modes, which are essential to fully understand the operation of complex environments. We consider a scenario of analyzing usage of a fleet of city buses, where the objective is to automatically discover and track modes such as highway route, heavy traffic, or aggressive driver, based on available on-board signals. The method we propose is based on aggregating the data over time, since the high-level modes are only apparent in the longer perspective. We search through different features and subsets of the data, and identify those that lead to good clusterings, interpreting those clusters as initial, rough models of the prospective modes. We utilize Bayesian tracking in order to continuously improve the parameters of those models, based on the new data, while at the same time following how the modes evolve over time. Experiments with artificial data of varying degrees of complexity, as well as on real-world datasets, prove the effectiveness of the proposed method in accurately discovering the modes and in identifying which one best explains the current observations from multiple data streams. © 2017 Elsevier B.V. All rights reserved.

  • 35.
    Bouguelia, Mohamed-Rafik
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Santosh, K. C.
    The University of South Dakota, Vermillion, South Dakota, USA.
    Verikas, Antanas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Agreeing to disagree: active learning with noisy labels without crowdsourcing2018Ingår i: International Journal of Machine Learning and Cybernetics, ISSN 1868-8071, E-ISSN 1868-808X, Vol. 9, nr 8, s. 1307-1319Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    We propose a new active learning method for classification, which handles label noise without relying on multiple oracles (i.e., crowdsourcing). We propose a strategy that selects (for labeling) instances with a high influence on the learned model. An instance x is said to have a high influence on the model h, if training h on x (with label y = h(x)) would result in a model that greatly disagrees with h on labeling other instances. Then, we propose another strategy that selects (for labeling) instances that are highly influenced by changes in the learned model. An instance x is said to be highly influenced, if training h with a set of instances would result in a committee of models that agree on a common label for x but disagree with h(x). We compare the two strategies and we show, on different publicly available datasets, that selecting instances according to the first strategy while eliminating noisy labels according to the second strategy, greatly improves the accuracy compared to several benchmarking methods, even when a significant amount of instances are mislabeled. © Springer-Verlag Berlin Heidelberg 2017

    Ladda ner fulltext (pdf)
    BougueliaAL
  • 36.
    Brasil, M. A. B.
    et al.
    Education Department, Industrial Technical School, Federal University of Santa Maria, Santa Maria, 97105-900, Brazil.
    Bösch, Bernhard
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Wagner, F. R.
    Institute of Informatics, Federal University of Rio Grande Do sul, Porto Alegre, 91509-900, Brazil.
    De Freitas, E. P.
    Institute of Informatics, Federal University of Rio Grande Do sul, Porto Alegre, 91509-900, Brazil.
    Performance Comparison of Multi-Agent Middleware Platforms for Wireless Sensor Networks2018Ingår i: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 18, nr 7, s. 3039-3049Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Despite the numerous possible applications of wireless sensor networks (WSNs), there is a key disadvantage related to the high complexity in programming WSNs, which is a result of their distributed and built-in features. To overcome this shortcoming, software agents have been identified as a suitable programming paradigm. The agent-based approach commonly uses a middleware for the execution of the software agents. In this regard, the present paper aims at comparing Java-based agent middleware platforms in their performance for the WSN application domain. Experiments were performed to analyze two versions of tracking applications, based on different agent models implemented for a given set of middleware platforms that support programming at a high-level of abstraction. The results highlight the differences in the resource consumption (CPU, memory, and energy) and in the communication overhead, providing an indication of suitability for each type of analyzed middleware, considering specific concerns while developing WSN applications. © 2001-2012 IEEE.

  • 37.
    Bärwald, Anton
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Aleksic, Jimmie
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Felsökning av EtherNet/IP med cross-platform applikation2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In the industry there is a need for a more efficient way to troubleshoot machines that uses the protocol EtherNet/IP. The current methods is time consuming and complex. This project gather data from a simulated network and analyze the data. The result of the analyze is presented on a cellphone application with a description and a possible solution. The application is a cross-platform application developed with Cordova. The simulated network is created on a Raspberry Pi 2. The analyze is done on another Raspberry Pi 2 running the software Node-RED. Communication between the simulated network Raspberry and the cellphone is with Bluetooth Low Energy. Communication between cellphone and the server is with MQTT. There are several areas where this kind of application may suit. This project is in one specific area – troubleshooting EtherNet/IP.

    Ladda ner fulltext (pdf)
    fulltext
  • 38.
    Calikus, Ece
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Self-Monitoring using Joint Human-Machine Learning: Algorithms and Applications2020Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    The ability to diagnose deviations and predict faults effectively is an important task in various industrial domains for minimizing costs and productivity loss and also conserving environmental resources. However, the majority of the efforts for diagnostics are still carried out by human experts in a time-consuming and expensive manner. Automated data-driven solutions are needed for continuous monitoring of complex systems over time. On the other hand, domain expertise plays a significant role in developing, evaluating, and improving diagnostics and monitoring functions. Therefore, automatically derived solutions must be able to interact with domain experts by taking advantage of available a priori knowledge and by incorporating their feedback into the learning process.

    This thesis and appended papers tackle the problem of generating a real-world self-monitoring system for continuous monitoring of machines and operations by developing algorithms that can learn data streams and their relations over time and detect anomalies using joint-human machine learning. Throughout this thesis, we have described a number of different approaches, each designed for the needs of a self-monitoring system, and have composed these methods into a coherent framework. More specifically, we presented a two-layer meta-framework, in which the first layer was concerned with learning appropriate data representations and detectinganomalies in an unsupervised fashion, and the second layer aimed at interactively exploiting available expert knowledge in a joint human-machine learning fashion.

    Furthermore, district heating has been the focus of this thesis as the application domain with the goal of automatically detecting faults and anomalies by comparing heat demands among different groups of customers. We applied and enriched different methods on this domain, which then contributed to the development and improvement of the meta-framework. The contributions that result from the studies included in this work can be summarized into four categories: (1) exploring different data representations that are suitable for the self-monitoring task based on data characteristics and domain knowledge, (2) discovering patterns and groups in data that describe normal behavior of the monitored system/systems, (3) implementing methods to successfully discriminate anomalies from the normal behavior, and (4) incorporating domain knowledge and expert feedback into self-monitoring.

    Ladda ner fulltext (pdf)
    fulltext
  • 39.
    Calikus, Ece
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Pinheiro Sant'Anna, Anita
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Dikmen, Onur
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    No Free Lunch But A Cheaper Supper: A General Framework for Streaming Anomaly Detection2020Ingår i: Expert systems with applications, ISSN 0957-4174, E-ISSN 1873-6793Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, there has been increased research interest in detecting anomalies in temporal streaming data. A variety of algorithms have been developed in the data mining community, which can be divided into two categories (i.e., general and ad hoc). In most cases, general approaches assume the one-size-fits-all solution model where a single anomaly detector can detect all anomalies in any domain.  To date, there exists no single general method that has been shown to outperform the others across different anomaly types, use cases and datasets. On the other hand, ad hoc approaches that are designed for a specific application lack flexibility. Adapting an existing algorithm is not straightforward if the specific constraints or requirements for the existing task change. In this paper, we propose SAFARI, a general framework formulated by abstracting and unifying the fundamental tasks in streaming anomaly detection, which provides a flexible and extensible anomaly detection procedure. SAFARI helps to facilitate more elaborate algorithm comparisons by allowing us to isolate the effects of shared and unique characteristics of different algorithms on detection performance. Using SAFARI, we have implemented various anomaly detectors and identified a research gap that motivates us to propose a novel learning strategy in this work. We conducted an extensive evaluation study of 20 detectors that are composed using SAFARI and compared their performances using real-world benchmark datasets with different properties. The results indicate that there is no single superior detector that works well for every case, proving our hypothesis that "there is no free lunch" in the streaming anomaly detection world. Finally, we discuss the benefits and drawbacks of each method in-depth and draw a set of conclusions to guide future users of SAFARI.

  • 40.
    Caltais, Georgiana
    et al.
    University of Konstanz, Konstanz, Germany.
    Leue, Stefan
    University of Konstanz, Konstanz, Germany.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    (De-)Composing Causality in Labeled Transition Systems2016Ingår i: 1st Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies (CREST’16) / [ed] Gregor Gössler & Oleg Sokolsky, Open Publishing Association , 2016, Vol. 224, s. 10-24Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we introduce a notion of counterfactual causality in the Halpern and Pearl sense that is compositional with respect to the interleaving of transition systems. The formal framework for reasoning on what caused the violation of a safety property is established in the context of labeled transition systems and Hennessy Milner logic. The compositionality results are devised for non-communicating systems.

    Ladda ner fulltext (pdf)
    fulltext
  • 41.
    Carpatorea, Iulian
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Rögnvaldsson, Thorsteinn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Lodin, Johan
    Volvo Group Trucks Technology, Göteborg, Sweden.
    Features extracted from APPES to enable the categorization of heavy-duty vehicle drivers2017Ingår i: 2017 Intelligent Systems Conference (IntelliSys), 2017, s. 476-481Konferensbidrag (Refereegranskat)
    Abstract [en]

    Improving the performance of systems is a goal pursued in all areas and vehicles are no exception. In places like Europe, where the majority of goods are transported over land, it is imperative for fleet operators to have the best efficiency, which results in efforts to improve all aspects of truck operations. We focus on drivers and their performance with respect to fuel consumption. Some of relevant factors are not accounted for inavailable naturalistic data, since it is not feasible to measure them. An alternative is to set up experiments to investigate driver performance but these are expensive and the results are not always conclusive. For example, drivers are usually aware of the experiment’s parameters and adapt their behavior.

    This paper proposes a method that addresses some of the challenges related to categorizing driver performance with respect to fuel consumption in a naturalistic environment. We use expert knowledge to transform the data and explore the resulting structure in a new space. We also show that the regions found in APPES provide useful information related to fuel consumption. The connection between APPES patterns and fuel consumption can be used to, for example, cluster drivers in groups that correspond to high or low performance. © 2017 IEEE

    Ladda ner fulltext (pdf)
    fulltext
  • 42.
    Carpatorea, Iulian
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Slawomir, Nowaczyk
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Rögnvaldsson, Thorsteinn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Elmer, Marcus
    Volvo Group Trucks Technology, Göteborg, Sweden.
    Lodin, Johan
    Volvo Group Trucks Technology, Göteborg, Sweden.
    Learning of Aggregate Features for Comparing Drivers Based on Naturalistic Data2016Ingår i: Proceedings: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) / [ed] Lisa O’Conner, Los Alamitos, CA: IEEE Computer Society, 2016, s. 1067-1072Konferensbidrag (Refereegranskat)
    Abstract [en]

    Fuel used by heavy duty trucks is a major cost for logistics companies, and therefore improvements in this area are highly desired. Many of the factors that influence fuel consumption, such as the road type, vehicle configuration or external environment, are difficult to influence. One of the most under-explored ways to lower the costs is training and incentivizing drivers. However, today it is difficult to measure driver performance in a comprehensive way outside of controlled, experimental setting.

    This paper proposes a machine learning methodology for quantifying and qualifying driver performance, with respect to fuel consumption, that is suitable for naturalistic driving situations. The approach is a knowledge-based feature extraction technique, constructing a normalizing fuel consumption value denoted Fuel under Predefined Conditions (FPC), which captures the effect of factors that are relevant but are not measured directly.

    The FPC, together with information available from truck sensors, is then compared against the actual fuel used on a given road segment, quantifying the effects associated with driver behavior or other variables of interest. We show that raw fuel consumption is a biased measure of driver performance, being heavily influenced by other factors such as high load or adversary weather conditions, and that using FPC leads to more accurate results. In this paper we also show evaluation the proposed method using large-scale, real-world, naturalistic database of heavy-duty vehicle operation.

    Ladda ner fulltext (pdf)
    fulltext
  • 43.
    Castellani, Ilaria
    et al.
    INRIA Sophia Antipolis Méditerranée, Valbonne, France.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Preface: Special issue on Trends in Concurrency Theory (selected invited contributions from the workshops TRENDS 2014 and 2015)2017Ingår i: The Journal of logical and algebraic methods in programming, ISSN 2352-2208, E-ISSN 2352-2216, Vol. 87, s. 93-93Artikel i tidskrift (Övrigt vetenskapligt)
  • 44.
    Chamberlain, Roger
    et al.
    Computer Science and Engineering, Washington University, Saint Louis, USA.
    Taha, WalidHögskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).Törngren, MartinDepartment of Machine Design, KTH Royal Institute of Technology, Stockholm, Sweden.
    Cyber Physical Systems. Model-Based Design: 8th International Workshop, CyPhy 2018, and 14th International Workshop, WESE 2018, Turin, Italy, October 4–5, 2018, Revised Selected Papers2019Proceedings (redaktörskap) (Refereegranskat)
    Abstract [en]

    This book constitutes the proceedings of the 8th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2018 and 14th International Workshop on Embedded and Cyber-Physical Systems Education, WESE 2018, held in conjunction with ESWeek 2018, in Torino, Italy, in October 2018. The 13 full papers presented together  with 1 short paper in this volume were carefully reviewed and selected from 18 submissions. The conference presents a wide range of domains including Modeling, simulation, verification, design, cyber-physical systems, embedded systems, real-time systems, safety, and reliability. © 2019 Springer Nature Switzerland AG. Part of Springer Nature.

  • 45.
    Dahl, Oskar
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Johansson, Fredrik
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Khoshkangini, Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Pashami, Sepideh
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Pihl, Claes
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Understanding Association Between Logged Vehicle Data and Vehicle Marketing Parameters - Using Clustering and Rule-Based Machine Learning2020Konferensbidrag (Refereegranskat)
    Abstract [en]

    Trucks are designed, configured and marketed for various working environments. There lies a concern whether trucks are used as intended by the manufacturer, as usage may impact the longevity, efficiency and productivity of the trucks.

    In this paper we propose a framework that aims to extract costumers' vehicle behaviours from LVD in order to evaluate whether they align with vehicle configurations, so-called GTA parameters. GMMs are employed to cluster and classify various vehicle behaviors from the LVD. RBML was applied on the clusters to examine whether vehicle behaviors follow the GTA configuration. Particularly, we propose an approach based on studying associations that is able to extract insights on whether the trucks are used as intended. Experimental results shown that while for the vast majority of the trucks' behaviors seemingly follows their GTA configuration, there are also interesting outliers that warrant further analysis.

  • 46.
    Deng, Der-Jiunn
    et al.
    Department of Computer Science and Information Engineering, National Changhua University of Education, Changhua, Taiwan.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Atiquzzaman, Mohammed
    Department of Computer Science, The University of Oklahoma, Norman, OK, United States.
    Editorial: Recent Advances in Heterogeneous Networking for Quality, Reliability, Security and Robustness2017Ingår i: Mobile Networks and Applications , ISSN 1383-469X, E-ISSN 1572-8153, Vol. 22, nr 1, s. 1-3Artikel i tidskrift (Övrigt vetenskapligt)
  • 47.
    Dillon, Tharam
    et al.
    Curtin University of Technology, Bentley, Australia.
    Parashar, Manish
    Rutgers University, New Jersey, USA.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Chen, Guolong
    Suzhou University, Jiangsu Sheng, China.
    Zomaya, Albert
    University of Sydney, Sydney, Australia.
    Pan, Yi
    Georgia State University, Georgia, USA.
    Message from U-Science 2014 general chairs2014Ingår i: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, Piscataway: IEEE, 2014, artikel-id 6945646Konferensbidrag (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.© 2014 IEEE

  • 48.
    Dubell, Michael
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Johansson, David
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Nätverkssäkerhet med IPS: Förbättrad nätverkssäkerhet med Intrusion Prevention Systems2013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet.

    I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket.

    Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt. Slutsatsen är att endast brandväggar och antivirusprogram inte ger ett fullgott skydd.

    Ladda ner fulltext (pdf)
    Forbattrad_natverkssakerhet_med_IPS
  • 49.
    Duracz, Adam
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Rigorous Simulation: Its Theory and Applications2016Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Designing Cyber-Physical Systems is hard. Physical testing can be slow, expensive and dangerous. Furthermore computational components make testing all possible behavior unfeasible. Model-based design mitigates these issues by making it possible to iterate over a design much faster. Traditional simulation tools can produce useful results, but their results are traditionally approximations that make it impossible to distinguish a useful simulation from one dominated by numerical error. Verification tools require skills in formal specification and a priori understanding of the particular dynamical system being studied.

    This thesis presents rigorous simulation, an approach to simulation that uses validated numerics to produce results that quantify and bound all approximation errors accumulated during simulation. This makes it possible for the user to objectively and reliably distinguish accurate simulations from ones that do not provide enough information to be useful. Explicitly quantifying the error in the output has the side-effect of leading to a tool for dealing with inputs that come with quantified uncertainty.

    We formalize the approach as an operational semantics for a core subset of the domain-specific language Acumen. The operational semantics is extended to a larger subset through a translation. Preliminary results toward proving the soundness of the operational semantics with respect to a denotational semantics are presented. A modeling environment with a rigorous simulator based on the operational semantics is described. The implementation is portable, and its source code is freely available. The accuracy of the simulator on different kinds of systems is explored through a set of benchmark models that exercise different aspects of a rigorous simulator. A case study from the automotive domain is used to evaluate the applicability of the simulator and its modeling language. In the case study, the simulator is used to compute rigorous bounds on the output of a model.

    Ladda ner fulltext (pdf)
    thesis
    Ladda ner fulltext (pdf)
    errata
  • 50.
    Duracz, Adam
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Eriksson, Henrik
    SP Technical Research Institute of Sweden, Borås, Sweden.
    Bartha, Ferenc Ágoston
    Rice University, Houston TX, USA.
    Zeng, Yingfu
    Rice University, Houston TX, USA.
    Xu, Fei
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston TX, USA.
    Using Rigorous Simulation to Support ISO 26262 Hazard Analysis and Risk Assessment2015Ingår i: 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS) / [ed] Meikang Qiu, Yongxin Zhu, Daikai Zhu & Fengling Han, Piscataway, N.J.: IEEE Press, 2015, s. 1093-1096Konferensbidrag (Refereegranskat)
    Abstract [en]

    Rigorous simulation is a new technology that can play a key role in managing uncertainty in the design of safety-critical cyber-physical systems. One of its important applications is the analysis and evaluation of functional safety for road vehicles according to international standards such as ISO 26262. Previous work  presented preliminary evidence to support the feasibility of using rigorous simulation for this purpose. Here we report on advances in our implementation of rigorous simulation and show how they enable the rigorous simulation of more refined and more complete models. A larger case study highlights the benefits of these advances and helps us identify new challenges that should be addressed by future work. © 2015 IEEE.

    Ladda ner fulltext (pdf)
    fulltext
12345 1 - 50 av 209
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf