hh.sePublications
Change search
Refine search result
1234 1 - 50 of 175
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Adekolu, Adekunle Matthew
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Khan, Hasan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Neelam, Neelam
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Network Monitoring2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Managing a network is a very big functional area along with performance, devicemaintenance, security, performance, monitoring, troubleshooting, plan of changeand etc. Among all of these monitoring plays a vital role. It can cover a wide area ofnetwork management. Monitoring is the only way to find out whether the networkis functioning according to plan. In order to know what is happening in a network,how its functioning at any given time, a network should have a logging system. Nowa day this logging activity is done by Network monitoring tool. It lets user know thestatus of the network at any given time. This logging can give the user a wide viewwhat can't be seen in general. For example the statistics of a week or month, even ayear. Monitoring is a very important issue in an organization network which aroseover the time.In this project we are going to implement some well known network monitoringtools in a real world scenario and we will investigate how this monitoring tool canhelp network administrators to monitor a network . Moreover, what kind ofinformation we can extract from a network by these tools.The purpose of this project is to get an overall idea about the importance of networkmonitoring and what are the facts need to be considered while monitoring anetwork. There are lots of pros and cons in monitoring a network. So choosing theappropriate tool for monitoring is very important. Monitoring a network with theleast effects on network performance is the best solution in case of monitoring.The outcome from these monitoring tools is a wide range of useful data andintegration of these data produces the status of the network at any give time.Moreover these data will be logged to create a statistical report. Different users suchas a network admin and organization can use this information from differentperspectives to make a network more efficient for users.

  • 2.
    Ahmadi, Lina
    Halmstad University, School of Information Technology.
    Green Driving Application: Eco Driving2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Eco-driving has acquired great importance in recent years because it is a way to reduce energy consumption that can be applied to any type of vehicle. However, for these rules to be applied requires a process of continuous learning and motivation. For this reason many eco-driving assistants have emerged.

    This paper presents Green Driving, a driver safety app for Android that detects inattentive driving behaviors and gives corresponding feedback to drivers, scoring their driving and alerting them in case their behaviors are unsafe.  It’s about changing a person’s driving behavior by providing some kind of advice to the driver.  I have worked on an algorithm that is meant to reduce the fuel consumption of users. The algorithm is deployed in an android application.

    This application “Green Driving” is aimed at users with cars. It is basically like an assistant, suggesting the user when he should make the right gear changes, when to increase/decrease speed and avoids hard braking and rapid acceleration and etc. It is in order to drive economically, ecologic and in turn save money and safety. This is a smart way of letting a user drive economically and ecologic since almost everyone has an Android smartphone now. 

  • 3.
    Akinola, Azeez Paul
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    chong, zhang
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Since the introduction of networks, they have been used amongst home users, companies and organizations and most damage on the network is due to inappropriate security configurations. To secure networks, a protocol suite can be used to encrypt and authenticate all IP packets of a session. Therefore, this report will include the advantages and possible solution of some techniques used to offer increased network security such as scalability and data confidentiality. Captures of traffic sent using the two security techniques, IPSec/VPN and GRE-Tunnel will be monitored. The objective behind this project is to configure a network with these two different tunneling techniques and compare the security and network performance. The report also describes the security problems encountered by networks such as the ignorance of network users, vulnerabilities and the security of the devices.IPSecis a standard security protocol solution for TCP/IP, and it provides security through authentication, encryption and data integrity. GRE encapsulates packets and create a logical hub-and spoke topology of virtual point-to-point connections. The Jperf-tool is used to measure network performance and show specific details while another tool, Wireshark is used to analyze the information captured during transmission of data sent using IPSEC and GRE. The comparison further finds that IPSec-tunnel technique makes data transfers very secure but causes network performance disadvantages in comparison to a GRE solution.

  • 4.
    Albayrak, Aras
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Automatic Pose and Position Estimation by Using Spiral Codes2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This master thesis is about providing the implementation of synthesis, detection of spiral symbols and estimating the pan/tilt angle and position by using camera calibration. The focus is however on the latter, the estimation of parameters of localization.

    Spiral symbols are used to be able to give an object an identity as well as to locate it. Due to the spiral symbol´s characteristic shape, we can use the generalized structure tensor (GST) algorithm which is particularly efficient to detect different members of the spiral family. Once we detect spirals, we know the position and identity parameters of the spirals within an apriori known geometric configuration (on a sheet of paper). In turn, this information can be used to estimate the 3D-position and orientation of the object on which spirals are attached using a camera calibration method.

     

    This thesis provides an insight into how automatic detection of spirals attached on a sheet of paper, and from this, automatic deduction of position and pose parameters of the sheet, can be achieved by using a network camera. GST algorithm has an advantage of running the processes of detection of spirals efficiently w.r.t detection performance and computational resources because it uses a spiral image model well adapted to spiral spatial frequency characteristic. We report results on how detection is affected by zoom parameters of the network camera, as well as by the GST parameters; such as filter size. After all spirals centers are located and identified w.r.t. their twist/bending parameter, a flexible technique for camera calibration, proposed by Zhengyou Zhang implemented in Matlab within the present study, is performed. The performance of the position and pose estimation in 3D is reported.

    The main conclusion is, we have reasonable surface angle estimations for images which were taken by a WLAN network camera in different conditions such as different illumination and different distances. 

  • 5.
    Alendal, Gunnar
    et al.
    NTNU, Gjøvik, Norway.
    Dyrkolbotn, Geir Olav
    NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
    Axelsson, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode2018In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, no Suppl., p. S60-S67Article in journal (Refereed)
    Abstract [en]

    The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

  • 6.
    Ali, Mustafa
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Abid, Hussain
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Wireless and Industrial Network2013Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The purpose of this report is to implement the wireless network in a company withtwo different sites which is located in Riga and Malmo. The main task of this reportis to implement and configure wireless industrial network. This report is based oninformation we gathered from the ABC Company about their requirements for awireless network.Requirements of this ABC Company is focusing on their infrastructure planning,security and implementing them. Benefits and drawbacks of industrial wirelessnetwork will be described briefly in this report to get some idea how ABC Companywill face the problem when they will implement their wireless network.

  • 7.
    Almgren, David
    et al.
    Halmstad University, School of Information Technology.
    Alshammari, Hussam
    Halmstad University, School of Information Technology.
    SmartBand Alert: Ett armband för säkerhet2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Safety is a topic that is frequently discussed and spoken of in today’s society. An enhanced security for each individual is something many strive for in various industries. One of these is how to make the public feel more secure when the person in question, for example, is out walking late at night. The goal of this bachelors thesis is thus to describe and explain the product that has been developed to get ordinary people to feel more secure wherever they are. The chosen solution for this issue was hence to develop the product SmartBand Alert which consists of two parts. A bracelet and an application for IOS and Android. This bracelet should, by certain connectivity cooperate with the user’s phone to notify family members and/or others when the person thinks or knows that he or she is in danger. These persons will be notified with information about the person who has activated the alarm to simply and easily take the necessary actions to help the person. The product is designed to be used by anyone regardless of gender, age, and other characteristics individuals may hold.

  • 8.
    Alveflo, Victor
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Virtual Training Tool: Mjukvarubaserat utbildningsverktyg2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    An important part at companies that’s manufacturing industrial machines is to provide training for the machines end-users such as daily machine operators and technicians, in order to give them a good understanding about how the concerned machine works. At these kinds of trainings it’s very important that the training material used to train the users provides a high user-friendliness.

    The goal with this thesis is to improve the user-friendliness of an existing training tool for a specific training course from the projects client. The training course that’s going to be improved is currently using a hardware-based simulator that’s used to manually simulate processes at a certain machine.

    The result was a solution in shape of a software-based simulator with associated graphical user interface. The user can thus within safe circumstances simulate the concerned machines behavior through a PC-program and e.g. create emergency situations without putting the users safety in danger. 

  • 9.
    AMEEN HASHIM, FARHAN
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Al Eid, Jamal
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Al-Salem, Abdulkhaliq
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Comparing of Real-Time Properties in Networks Based On IPv6 and IPv42013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Real time applications over IP network became widely used in different fields; social video conference, online educational lectures, industrial, military, and online robotic medical surgery.

    Online medical surgery over IP network has experienced rapid growth in the last few years primarily due to advances in technology (e.g., increased bandwidth; new cameras, monitors, and coder/decoders (CODECs)) and changes in the medical care environment (e.g., increased outpatient care, remote surgeries).

    The purpose of this study was to examine and analyze the impact of IP networks parameters; delay, jitter, throughput, and drop packet on the performance of real-time medical surgery videos sent across different IP networks; native IPv6, native IPv4, 6to4 and 6in4 tunneling transition mechanisms and compare the behavior of video packets over IP networks. The impact of each parameter over IP networks is examined by using different video codecs MPEG-1, MPEG-2, and MPEG-4.

    This study has been carried out with two main parts; theoretical and practical part, the theoretical part of this study focused on the calculations of various delays in IP networks such as transmission, processing, propagation, and queuing delays for video packet, while the practical part includes; examining of video codecs throughput over IP networks by using jperf tool and examining delay, jitter, and packet drops for different packet sizes by using IDT-G tool and how these parameters can affect quality of received video.

    The obtained theoretical and practical results were presented in different tables and plotted into different graphs to show the performance of real time video over IP networks. These results confirmed that video codecs MPEG-1, MPEG-2, and MPEG-4 were highly impacted by encapsulation and de-capsulation process except MPEG-4 codec, MPEG-4 was the least impacted by IPv4, IPv6, and IP transition mechanisms concerning throughput and wastage bandwidth. It also indicated that using IPv6-to-4 and IPv6-in-4 tunneling mechanisms caused more bandwidth wastage, high delay, jitter, and packet drop than IPv4 and IPv6.

  • 10.
    Andersson, Roland
    Halmstad University, School of Information Technology.
    Utvinning av data ur mobiltelefoner: En valideringsstudie av forensiska verktyg2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones.

    This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.

  • 11.
    Andreasson, Henrik
    et al.
    Örebro University, Örebro, Sweden.
    Bouguerra, Abdelbaki
    Örebro University, Örebro, Sweden.
    Åstrand, Björn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Gold-fish SLAM: An application of SLAM to localize AGVs2014In: Field and Service Robotics: Results of the 8th International Conference / [ed] Kazuya Yoshida & Satoshi Tadokoro, Heidelberg: Springer, 2014, p. 585-598Conference paper (Refereed)
    Abstract [en]

    The main focus of this paper is to present a case study of a SLAM solution for Automated Guided Vehicles (AGVs) operating in real-world industrial environments. The studied solution, called Gold-fish SLAM, was implemented to provide localization estimates in dynamic industrial environments, where there are static landmarks that are only rarely perceived by the AGVs. The main idea of Gold-fish SLAM is to consider the goods that enter and leave the environment as temporary landmarks that can be used in combination with the rarely seen static landmarks to compute online estimates of AGV poses. The solution is tested and verified in a factory of paper using an eight ton diesel-truck retrofitted with an AGV control system running at speeds up to 3m/s. The paper includes also a general discussion on how SLAM can be used in industrial applications with AGVs. © Springer-Verlag Berlin Heidelberg 2014.

  • 12.
    Angelsmark, Ola
    et al.
    Department of Computer Science, Lund University, Lund, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Lund, Sweden.
    Nilsson, Klas
    Department of Computer Science, Lund University, Lund, Sweden.
    Nowaczyk, Sławomir
    Department of Computer Science, Lund University, Lund, Sweden.
    Prosperi, Leonardo
    Department of Computer Science, Lund University, Lund, Sweden.
    Knowledge Representation for Reconfigurable Automation Systems2007Conference paper (Refereed)
    Abstract [en]

    This article describes the work in progress on knowledge representation formalisms chosen for use in the European project SIARAS. Skill-Based Inspection and Assembly for Reconfigurable Automation Systems has a goal of creating intelligent support system for reconfiguration and adaptation of assembly systems. Knowledge is represented in an ontology expressed in OWL, for generic reasoning in Description Logic, and in a number of special-purpose reasoning modules, specific for the application domain.

  • 13.
    Aramrattana, Maytheewat
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Modelling and Simulation for Evaluation of Cooperative Intelligent Transport System Functions2016Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Future vehicles are expected to be equipped with wireless communication tech- nology, that enables them to be “connected” to each others and road infras- tructures. Complementing current autonomous vehicles and automated driving systems, the wireless communication allows the vehicles to interact, cooperate, and be aware of its surroundings beyond their own sensors’ range. Such sys- tems are often referred to as Cooperative Intelligent Transport Systems (C-ITS), which aims to provide extra safety, efficiency, and sustainability to transporta- tion systems. Several C-ITS applications are under development and will require thorough testing and evaluation before their deployment in the real-world. C- ITS depend on several sub-systems, which increase their complexity, and makes them difficult to evaluate.

    Simulations are often used to evaluate many different automotive appli- cations, including C-ITS. Although they have been used extensively, simulation tools dedicated to determine all aspects of C-ITS are rare, especially human fac- tors aspects, which are often ignored. The majority of the simulation tools for C-ITS rely heavily on different combinations of network and traffic simulators. The human factors issues have been covered in only a few C-ITS simulation tools, that involve a driving simulator. Therefore, in this thesis, a C-ITS simu- lation framework that combines driving, network, and traffic simulators is pre- sented. The simulation framework is able to evaluate C-ITS applications from three perspectives; a) human driver; b) wireless communication; and c) traffic systems.

    Cooperative Adaptive Cruise Control (CACC) and its applications are cho- sen as the first set of C-ITS functions to be evaluated. Example scenarios from CACC and platoon merging applications are presented, and used as test cases for the simulation framework, as well as to elaborate potential usages of it. Moreover, approaches, results, and challenges from composing the simulation framework are presented and discussed. The results shows the usefulness of the proposed simulation framework.

  • 14.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Englund, Cristofer
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research. RISE Viktoria, Göteborg, Sweden.
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Safety Analysis of Cooperative Adaptive Cruise Control in Vehicle Cut-in Situations2017In: Proceedings of 2017 4th International Symposium on Future Active Safety Technology towards Zero-Traffic-Accidents (FAST-zero), Society of Automotive Engineers of Japan , 2017, article id 20174621Conference paper (Refereed)
    Abstract [en]

    Cooperative adaptive cruise control (CACC) is a cooperative intelligent transport systems (C-ITS) function, which especially when used in platooning applications, possess many expected benefits including efficient road space utilization and reduced fuel consumption. Cut-in manoeuvres in platoons can potentially reduce those benefits, and are not desired from a safety point of view. Unfortunately, in realistic traffic scenarios, cut-in manoeuvres can be expected, especially from non-connected vehicles. In this paper two different controllers for platooning are explored, aiming at maintaining the safety of the platoon while a vehicle is cutting in from the adjacent lane. A realistic scenario, where a human driver performs the cut-in manoeuvre is used to demonstrate the effectiveness of the controllers. Safety analysis of CACC controllers using time to collision (TTC) under such situation is presented. The analysis using TTC indicate that, although potential risks are always high in CACC applications such as platooning due to the small inter-vehicular distances, dangerous TTC (TTC < 6 seconds) is not frequent. Future research directions are also discussed along with the results.

  • 15.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Cooperative Driving Simulation2016In: Proceedings of the Driving Simulation Conference 2016, 2016, p. 123-132Conference paper (Refereed)
    Abstract [en]

    For a few decades, driving simulators have been supporting research and development of advanced driver assistance systems (ADAS). In the near future, connected vehicles are expected to be deployed. Driving simulators will need to support evaluation of cooperative driving applications within cooperative intelligent transportation systems (C-ITS) scenarios. C-ITS utilize vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication. Simulation of the inter vehicle communication is often not supported in driving simulators. On the other hand, previous efforts have been made to connect network simulators and traffic simulators, to perform C-ITS simulations. Nevertheless, interactions between actors in the system is an essential aspect of C-ITS. Driving simulators can provide the opportunity to study interactions and reactions of human drivers to the system. This paper present simulation of a C-ITS scenario using a combination of driving, network, and traffic simulators. The architecture of the solution and important challenges of the integration are presented. A scenario from Grand Cooperative Driving Challenge (GCDC) 2016 is implemented in the simulator as an example use case. Lastly, potential usages and future developments are discussed.

  • 16.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Extended Driving Simulator for Evaluation of Cooperative Intelligent Transport Systems2016In: SIGSIM-PADS '16: Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation, New York: ACM Digital Library, 2016, p. 255-278Conference paper (Refereed)
    Abstract [en]

    Vehicles in cooperative intelligent transport systems (C-ITS) often need to interact with each other in order to achieve their goals, safe and efficient transport services. Since human drivers are still expected to be involved in C-ITS, driving simulators are appropriate tools for evaluation of the C-ITS functions. However, driving simulators often simplify the interactions or influences from the ego vehicle on the traffic. Moreover, they normally do not support vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication, which is the main enabler for C-ITS. Therefore, to increase the C-ITS evaluation capability, a solution on how to extend a driving simulator with traffic and network simulators to handle cooperative systems is presented as a result of this paper. Evaluation of the result using two use cases is presented. And, the observed limitations and challenges of the solution are reported and discussed. © 2016 ACM, Inc.

  • 17.
    Aronsson, John
    et al.
    Halmstad University, School of Information Technology.
    Bolmér, Percy
    Halmstad University, School of Information Technology.
    Hur forensiska verktyg påverkar integriteten på mobiltelefoner2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The rising use of smartphones and other mobile devices in society today has resulted in a higher prevalence of these in crimes and crime investigations. The information in these devices must be extracted and the integrity of the extracted information assured. The goal of this project is to determine whether the two forensic software programs Xry and Encase tamper with the extracted data. To answer this, a literary study together with an interview and two experiments were performed. The result from the experiments determined that data changes occured between extractions. Further analysis explained the changes to be caused by the devices themselves, and as a consequence of rooting. The conclusion drawn from the result was that the softwares programs did not tamper with the material during the extraction-process.

  • 18.
    Assabie, Yaregal
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Ethiopic Document Image Database for Testing Character Recognition Systems2006Report (Other academic)
    Abstract [en]

    In this paper we describe the acquisition and content of a large database of Ethiopic documents for testing and evaluating character recognition systems. The Ethiopic Document Image Database (EDIDB) contains documents written in Amharic and Geez languages. The database was built from a variety of documents such as printouts, books, newspapers, and magazines. Documents written in various font types, sizes and styles were included in the database. Degraded and poor quality documents were also included in the database to represent the real life situation. A total of 1,204 pages were scanned at a resolution of 300 dpi and saved as grayscale images of JPEG format. We also describe an evaluation protocol for standardizing the comparison of recognition systems and their results. The database is made available to the research community through http://www.hh.se/staff/josef/.

  • 19.
    Axelsson, Andreas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ambrosius, Christian
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Nya lagar och avtal: Hur kan de komma att förändra svenskarnas fildelningsvanor?2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    I många år nu har det varit vanligt förekommande att människor suttit hemma vid sin dator och med några få klick laddat ner filmer, musik och programvaror, till en början helt lagligt, men med åren har lagar kommit till som har gjort det mer och mer olagligt.Oavsett om det har varit lagligt eller inte, så är det troligt att många artister, filmmakare och liknande gått miste om stora summor pengar i förlorade inkomster på grund av att folk inte har betalat för att ta del av deras verk, utan istället valt att ladda ner dem över Internet.

    Det faktum att fildelning har blivit så pass vanligt och att folk inte har sett det som ett särskilt allvarligt brott, har lett till att fildelning länge har varit ett hett omdiskuterat ämne i media, bland upphovsrättsinnehavare och bland folk i allmänhet. Upphovsmän och upphovsrättsinnehavare, såsom filmbolag, författare och artister har legat på och debatterat för att försöka få till en hårdare lagstiftning för att försvåra fildelning och kopiering av upphovsrättsskyddat material, samt för att få till hårdare straff mot fildelning.

    Flera försök från beslutsfattare har gjorts för att råda bot på problemet, nya lagar har stiftats och avtal har skrivits under. Frågan är om de nya lagarna och avtalen gör någon nytta? Blir folk avskräckta från att fildela eller fortsätter de som förut? Många har säkert under många år blivit bortskämda med att kunna sitta hemma vid datorn och på några minuter få hem de senaste filmerna och den nyaste musiken helt gratis, vilket säkert gör det svårt att helt plötsligt sluta fildela och börja betala för film och musik igen.

  • 20.
    Balador, Ali
    et al.
    SICS Swedish ICT Västerås AB, Västerås, Sweden. & Polytechnic University of Valencia, Valencia, Spain.
    Böhm, Annette
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Calafate, Carlos T.
    Polytechnic University of Valencia, Valencia, Spain.
    Cano, Juan-Carlos
    Polytechnic University of Valencia, Valencia, Spain.
    A Reliable Token-Based MAC Protocol for V2V Communication in Urban VANET2016In: 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), Piscataway: IEEE , 2016, p. 1586-1591Conference paper (Refereed)
    Abstract [en]

    Safety applications developed for vehicular environments require every vehicle to periodically broadcast its status information (beacon) to all other vehicles, thereby avoiding the risk of car accidents in the road. Due to the high requirements on timing and reliability posed by traffic safety applications, the current IEEE 802.11p standard, which uses a random access Medium Access Control (MAC) protocol, faces difficulties to support timely and reliable data dissemination in vehicular environments where no acknowledgement or RTS/CTS (Request-to-Send/Clear-to-Send) mechanisms are adopted. In this paper, we propose the Dynamic Token-Based MAC (DTB-MAC) protocol. It implements a token passing approach on top of a random access MAC protocol to prevent channel contention as much as possible, thereby improving the reliability of safety message transmissions. Our proposed protocol selects one of the neighbouring nodes as the next transmitter; this selection accounts for the need to avoid beacon lifetime expiration. Therefore, it automatically offers retransmission opportunities to allow vehicles to successfully transmit their beacons before the next beacon is generated whenever time and bandwidth are available. Based on simulation experiments, we show that the DTB-MAC protocol can achieve better performance than IEEE 802.11p in terms of channel utilization and beacon delivery ratio for urban scenarios.

  • 21.
    Belwal, Chaitanya
    et al.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Cheng, Albert M.K.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Taha, Walid
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Release Offset Bounds for Response Time Analysis of P-FRP using Exhaustive Enumeration2011In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, N.J.: IEEE Press, 2011, p. 950-957Conference paper (Refereed)
    Abstract [en]

    Functional*Reactive Programming (FRP) is a declarative approach to modeling and building reactive systems. Priority-based FRP (P-FRP) is a formalism of FRP that guarantees real-time response. Unlike the classical preemptive model1 of real-time systems, preempted tasks in PFRP are aborted and have to restart when higher priority tasks have completed. Due to this abort-restart of nature of preemption, there is no single critical instant of release that leads to Worst-Case Response Time (WCRT) of lower priority P-FRP tasks. At this time, the only method for determining the WCRT is through an exhaustive enumeration of all release offsets of higher priority tasks between the release and deadline of the lower priority task. This makes the computational cost of WCRT dependent on the deadline of a task, and when such deadlines are large the computational costs of this technique make it infeasible even for small task sets. In this paper, we show that the release offsets of higher priority tasks have a lower and upper bound and present techniques to derive these bounds. By enumerating only those release offsets while lie within our derived bounds the number of release scenarios that have to be enumerated is significantly reduced. This leads to lower computational costs and makes determination of the WCRT in P-FRP a practically feasible proposition. © 2011 IEEE.

  • 22.
    Belwal, Chaitanya
    et al.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Cheng, Albert M.K.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Taha, Walid
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Zhu, Angela
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Timing Analysis of the Priority based FRP System2008In: Proceedings Work-In-Progress Session of the 14th Real-Time and Embedded Technology and Applications Symposium: 22-24 April, 2008: St. Louis, USA / [ed] Ying Lu, Lincoln, NE: University of Nebraska–Lincoln, Computer Science and Engineering , 2008, p. 89-92Conference paper (Refereed)
    Abstract [en]

    Kaiabachev, Taha, Zhu [1] have presented a declarative programming paradigm called Functional Reactive Programming, which is based on behaviors and events. An improved system called P-FRP uses fixed priority scheduling for tasks. The system allows for the currently executing lower priority tasks to be rolled back to restoring the original state and allowing a higher priority task to run. These aborted tasks will restart again when no tasks of higher priority are in the queue. Since P-FRP has many applications in the real time domain it is critical to understand the time bound in which the tasks which have been aborted are guaranteed to run, and if the task set is schedulable. In this paper we provide an analysis of the unique execution paradigm of the P-FRP system and study the timing bounds using different constraint variables.

    1. R. Kaiabachev, W. Taha, A. Zhu, E-FRP with priorities, In the Proceedings of the 7th ACM & IEEE international conference on Embedded software, Pages: 221 - 230, 2007.

  • 23.
    Benaissa, Zine El-Abidine
    et al.
    Oregon Graduate Institute, Portland, OR, USA.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Oregon Graduate Institute, Portland, OR, USA.
    Sheard, Tim
    Oregon Graduate Institute, Portland, OR, USA.
    Logical Modalities and Multi-Stage Programming1999Conference paper (Refereed)
    Abstract [en]

    Multi-stage programming is a method for improving the performance of programs through the introduction of controlled program specialization. This paper makes a case for multi-stage programming with open code and closed values. We argue that a simple language exploiting interactions between two logical modalities is well suited for multi-stage programming, and report the results from our study of categorical models for multi-stage languages.

  • 24.
    Bengtsson, Matilda
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Color adjustment of digital images of clothes for truthful rendering2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    E-commerce is a growing market for selling gods and digital images are often used to display the product. However, there is a problem when the color of the object does not match the reality. This can lead to a dissatisfaction of the customer and a return of the product. Returned goods causes a significant loss in revenue for the suppliers. One reason for untruthful rendering of colors in images is due to different temperatures, or colors, of the illumination sources lighting the scene and the object. This effect can be reduced by a method called white balance. In this thesis, an algorithm based on the technique in Hsu et al. was implemented for a more truthful rendering of images of clothes and toys used in e-commerce. The algorithm removes unwanted color casts induced in the image from two different illumination sources. The thesis also marks important details missing in aforementioned paper as well as some drawbacks of the proposed technique, such as high processing time.

  • 25.
    Bergenhem, Carl
    et al.
    SP - Technical Research Institute of Sweden Department of Electronics, Borås, Sweden.
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Two Protocols with Heterogeneous Real-Time Services for High-Performance Embedded Networks2012Report (Other academic)
    Abstract [en]

    High-performance embedded networks are found in computer systems that perform applications such as radar signal processing and multimedia rendering. The system can be composed of multiple computer nodes that are interconnected with the network. Properties of the network such as latency and speed affect the performance of the entire system. A node´s access to the network is controlled by a medium access protocol. This protocol decides e.g. real-time properties and services that the network will offer its users, i.e. the nodes. Two such network protocols with heterogeneous real-time services are presented. The protocols offer different communication services and services for parallel and distributed real-time processing. The latter services include barrier synchronisation, global reduction and short message service. A network topology of a unidirectional pipelined optical fibre-ribbon ring is assumed for both presented protocols. In such a network several simultaneous transmissions in non-overlapping segments are possible. Both protocols are aimed for applications that require a high-performance embedded network such as radar signal processing and multimedia. In these applications the system can be organised as multiple interconnected computation nodes that co-operate in parallel to achieve higher performance. The computing performance of the whole system is greatly affected by the choice of network. Computing nodes in a system for radar signal processing should be tightly coupled, i.e., communications cost, such as latency, between nodes should be small. This is possible if a suitable network with an efficient protocol is used. The target applications have heterogeneous real-time requirements for communication in that different classes of data-traffic exist. The traffic can be classified according to its requirements. The proposed protocols partition data-traffic into three classes with distinctly different qualities. These classes are: traffic with hard real-time demands, such as mission critical commands; traffic with soft real-time demands, such as application data (a deadline miss here only leads to decreased performance); and traffic with no real-time constraints at all. The protocols are analysed and performance is tested through simulation with different data-traffic patterns.

  • 26. Berggren, Per
    et al.
    Hiljemark, Rasmus
    Mot grönare IT: En studie om att förstå hinder företag ställs inför vid införandet av grön-IT2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 27.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Choy, Kwok-wai
    Olsson, Henrik
    Evidence on skill differences of women and men concerning face recognition2001Report (Other academic)
    Abstract [en]

    We present a cognitive study regarding face recognition skills of women and men. The results reveal that there are in the average sizable skill differences between women and men in human face recognition. The women had higher correct answer frequencies then men in all face recognition questions they answered. In difficult questions, those which had fewer correct answers than other questions, the performance of the best skilled women were remarkably higher than the best skilled men. The lack of caricature type information (high spatial frequencies) hampers the recognition task significantly more than the lack of silhouette and shading (low spatial frequencies) information, according to our findings. Furthermore, the results confirmed the previous findings that hair style and facial expressions degrades the face recognition performance of humans significantly. The reported results concern 1838 individuals and the study was effectuated by means of Internet.

  • 28.
    Bildtmark, Kim
    et al.
    Halmstad University, School of Information Technology.
    Jädersand, Robin
    Halmstad University, School of Information Technology.
    Security Awareness for Mobility: En studie om företagsmobilitet och de säkerhetsrisker som följer2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 29.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bluetooth in industrial environment2000In: 2000 IEEE International Workshop on Factory Communication Systems: proceedings : 6-8 September, 2000, ISEP, Porto, Portugal / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2000, p. 239-246Conference paper (Refereed)
    Abstract [en]

    In this paper an initial study of the use of Bluetooth in industrial environment is presented. The tests have been performed at a paper-mill, and in an office environment at Halmstad University. It shows the possibility to use Bluetooth for wireless short range communication in an industrial environment.

  • 30.
    Bjurdelius, Andreas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Bjurdelius, Pierre
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Blomqvist, Alexander
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Automated Router and Switch Backup2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Today's companies are growing in a steady pace, with more and more network devices added to the network it is very important to keep track of and monitor the status of devices. Even though the wireless evolution has come, it all depends on the wired connections to supply a continuous connection to the rest of the world.

     

    This thesis explores, tests and informs about creating a functional system that automatically creates backups of configuration files from network devices and how to troubleshoot networking problems and maintain a network to keep it in good shape.

     

    Even though many companies have manual backups of router and switch configurations, the possibility to have this part automated should be desired by most companies. It can open up for the administrators in the company to have more time over to help the employees that are experiencing problems at the same time as the automated system eliminates the possible errors that a human can cause.

    Of course one can see it the other way, that it takes away manual labor for the employees, but it is just a small part of the job yet it is so very important that making this service automated is a good choice for a company.

    Integrity is proven by the means of backups and by the option to see the difference between the previous backups and the most recent.

     

    The three of us have worked as a group to do all tests and to write the documentation. After working with a couple of companies it is clear that well functional backup systems of network devices are not as common as it should be. Companies that do take backups of the network devices often do this manually.

    When seeing this it makes sense to use a reliable system that uses revision handling so it is easy to see the recent changes made to the devices.

     

    The results ended up in a working automated backup system for routers and switches. The automated system is running Debian and connects to all the routers and switches in the network to collect the configuration files with the help of rancid.

    The thesis also explains the functions of concepts such as disaster recovery and different maintenance models.

  • 31.
    Bouguelia, Mohamed-Rafik
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Santosh, K. C.
    The University of South Dakota, Vermillion, South Dakota, USA.
    Verikas, Antanas
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Agreeing to disagree: active learning with noisy labels without crowdsourcing2017In: International Journal of Machine Learning and Cybernetics, ISSN 1868-8071, E-ISSN 1868-808XArticle in journal (Refereed)
    Abstract [en]

    We propose a new active learning method for classification, which handles label noise without relying on multiple oracles (i.e., crowdsourcing). We propose a strategy that selects (for labeling) instances with a high influence on the learned model. An instance x is said to have a high influence on the model h, if training h on x (with label y = h(x)) would result in a model that greatly disagrees with h on labeling other instances. Then, we propose another strategy that selects (for labeling) instances that are highly influenced by changes in the learned model. An instance x is said to be highly influenced, if training h with a set of instances would result in a committee of models that agree on a common label for x but disagree with h(x). We compare the two strategies and we show, on different publicly available datasets, that selecting instances according to the first strategy while eliminating noisy labels according to the second strategy, greatly improves the accuracy compared to several benchmarking methods, even when a significant amount of instances are mislabeled. © Springer-Verlag Berlin Heidelberg 2017

  • 32.
    Brauner, Paul
    et al.
    Rice University, Houston, United States.
    Taha, Walid
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Globally Parallel, Locally Sequential: A Preliminary Proposal for Acumen Objects2010In: POOSC'10, Proceedings of the 9th Workshop on Parallel/High-Performance Object-Oriented Scientific Computing, New York, NY: ACM Press, 2010Conference paper (Refereed)
    Abstract [en]

    An important and resource-intensive class of computation codes consists of simulators for physical systems. Today, most simulation codes are written in general-purpose imperative languages such as C or FORTRAN. Unfortunately, such languages encourage the programmer to focus her attention on details of how the computation is performed, rather than on the system being modeled.

    This paper reports the design and implementation of a novel notion of an object for a physical modeling language called Acumen. A key idea underlying the language's design is encouraging a programming style that enables a "globally parallel, locally imperative" view of the world. The language is also being designed to preserve deterministic execution even when the underlying computation is performed on a highly parallel platform. Our main observation with the initial study is that extensive and continual experimental evaluation is crucial for keeping the language design process informed about bottlenecks for parallel execution.

  • 33.
    Bruneau, Julien
    et al.
    INRIA Bordeaux Sud-Ouest Talence, Talence, France.
    Consel, Charles
    INRIA Bordeaux Sud-Ouest Talence, Talence, France.
    O’Malley, Marcia
    Rice University Houston, Houston, USA.
    Taha, Walid
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Hannourah, Wail Masry
    HVAC Consultant Cairo, Cairo, Egypt.
    Virtual Testing for Smart Buildings2012In: 2012 Eighth International Conference on Intelligent Environments / [ed] Randall Bilof, Piscataway, N.J.: IEEE Press, 2012, p. 282-289, article id 6258534Conference paper (Refereed)
    Abstract [en]

    Smart buildings promise to revolutionize the way we live. Applications ranging from climate control to fire management can have significant impact on the quality and cost of these services. However, smart buildings and any technology with direct effect on human safety and life mustundergo extensive testing. Virtual testing by means of computer simulation can significantly reduce the cost of testing and, as a result, accelerate the development of novel applications. Unfortunately, building physically-accurate simulation codes can be labor intensive.To address this problem, we propose a framework for rapid, physically-accurate virtual testing. The proposed framework supports analytical modeling of both a discrete distributed system as well as the physical environment that hosts it. The discrete models supported are accurate enough to allow the automatic generation of a dedicated programming framework that will help the developer in the implementation of these systems. The physical environment models supported are equational specifications that are accurate enough to produce running simulation codes. Combined, these two frameworks enable simulating both active systems and physical environments. These simulations can be used to monitor the behavior and gather statistics about the performance of an application in the context of precise virtual experiments. To illustrate the approach, we present models of Heating, Ventilating and Air-Conditioning (HVAC) systems. Using these models, we construct virtual experiments that illustrate how the approach can be used to optimize energy and cost of climate control for a building. © 2012 IEEE.

  • 34.
    Brunnegård, Oliver
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wikestad, Daniel
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Visual SLAM using sparse maps based on feature points2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Visual Simultaneous Localisation And Mapping is a useful tool forcreating 3D environments with feature points. These visual systemscould be very valuable in autonomous vehicles to improve the localisation.Cameras being a fairly cheap sensor with the capabilityto gather a large amount of data. More efficient algorithms are stillneeded to better interpret the most valuable information. This paperanalyses how much a feature based map can be reduced without losingsignificant accuracy during localising.

    Semantic segmentation created by a deep neural network is used toclassify the features used to create the map, the map is reduced by removingcertain classes. The results show that feature based maps cansignificantly be reduced without losing accuracy. The use of classesresulted in promising results, large amounts of feature were removedbut the system could still localise accurately. Removing some classesgave the same results or even better in certain weather conditionscompared to localisation with a full-scale map.

  • 35.
    Bärwald, Anton
    et al.
    Halmstad University, School of Information Technology.
    Aleksic, Jimmie
    Halmstad University, School of Information Technology.
    Felsökning av EtherNet/IP med cross-platform applikation2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the industry there is a need for a more efficient way to troubleshoot machines that uses the protocol EtherNet/IP. The current methods is time consuming and complex. This project gather data from a simulated network and analyze the data. The result of the analyze is presented on a cellphone application with a description and a possible solution. The application is a cross-platform application developed with Cordova. The simulated network is created on a Raspberry Pi 2. The analyze is done on another Raspberry Pi 2 running the software Node-RED. Communication between the simulated network Raspberry and the cellphone is with Bluetooth Low Energy. Communication between cellphone and the server is with MQTT. There are several areas where this kind of application may suit. This project is in one specific area – troubleshooting EtherNet/IP.

  • 36.
    Calcagno, Cristiano
    et al.
    DISI, University of Genoa, Genoa, Italy.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Department of Computing Sciences, Chalmers, Göteborg, Sweden.
    Closed Types as a Simple Approach to Safe Imperative Multi-Stage Programming2000In: Automata, Languages and Programming: 27th International Colloquium, ICALP 2000 Geneva, Switzerland, July 9–15, 2000 Proceedings / [ed] Ugo Montanari, José D. P. Rolim & Emo Welzl, Heidelberg: Springer, 2000, p. 25-36Conference paper (Refereed)
    Abstract [en]

    Safely adding computational effects to a multi-stage language has been an open problem. In previous work, a closed type constructor was used to provide a safe mechanism for executing dynamically generated code. This paper proposes a general notion of closed type as a simple approach to safely introducing computational effects into multi-stage languages. We demonstrate this approach formally in a core language called Mini-MLref BN. This core language combines safely multi-stage constructs and ML-style references. In addition to incorporating state, Mini-ML ref BN also embodies a number of technical improvements over previously proposed core languages for multi-stage programming.

  • 37.
    Calcagno, Cristiano
    et al.
    Imperial College London, London, United Kingdom.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Rice University, Texas, USA.
    ML-like Inference for Classifiers2004In: Programming Languages and Systems: 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004. Proceedings / [ed] David Schmidt, Heidelberg: Springer Berlin/Heidelberg, 2004, Vol. 2986, p. 79-93Conference paper (Refereed)
    Abstract [en]

    Environment classifiers were proposed as a new approach to typing multi-stage languages. Safety was established in the simply-typed and let-polymorphic settings. While the motivation for classifiers was the feasibility of inference, this was in fact not established. This paper starts with the observation that inference for the full classifier-based system fails. We then identify a subset of the original system for which inference is possible. This subset, which uses implicit classifiers, retains significant expressivity (e.g. it can embed the calculi of Davies and Pfenning) and eliminates the need for classifier names in terms. Implicit classifiers were implemented in MetaOCaml, and no changes were needed to make an existing test suite acceptable by the new type checker. © Springer-Verlag 2004.

  • 38.
    Calcagno, Cristiano
    et al.
    Imperial College London, London, United Kingdom.
    Taha, Walid
    Rice University, Houston, TX, USA.
    Huang, Liwen
    Yale University, New Haven, CT, USA.
    Leroy, Xavier
    INRIA, Roquencourt, France.
    Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection2003In: Generative Programming and Component Engineering: Second International Conference, GPCE 2003, Erfurt, Germany, September 22-25, 2003. Proceedings / [ed] Frank Pfenning & Yannis Smaragdakis, Heidelberg: Springer Berlin/Heidelberg, 2003, Vol. 2830, p. 57-76Conference paper (Refereed)
    Abstract [en]

    The paper addresses theoretical and practical aspects of implementing multi-stage languages using abstract syntax trees (ASTs), gensym, and reflection. We present an operational account of the correctness of this approach, and report on our experience with a bytecode compiler called MetaOCaml that is based on this strategy. Current performance measurements reveal interesting characteristics of the underlying OCaml compiler, and illustrate why this strategy can be particularly useful for implementing domain-specific languages in a typed, functional setting. © Springer-Verlag Berlin Heidelberg 2003.

  • 39.
    Carlsson, Hampus
    et al.
    Halmstad University, School of Information Technology.
    Marcus, Kärrman
    Halmstad University, School of Information Technology.
    Cloud-based Mobile System for Free-Living Gait Analysis: System component : Server architecture2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Progress in the fields of wearable sensor technologies together with specialized analysis algorithms has enabled systems for gait analysis outside labs. An example of a wearable sensor is the accelerometer embedded in a typical smartphone. The goal was to propose a system design capable of hosting existing gait analysis algorithms in a cloud environment, and tailor the design as to deliver fast results with the ambition of reaching near real-time.   

    The project identified a set of enabling technologies by examining existing systems for gait analysis; the technologies included cloud computing and WebSockets. The final system design is a hierarchical composition starting with a Linux VM running Node.js, which in turn connects to a database and hosts instances of the MatLab runtime. The results show the feasibility of mobile cloud based free-living gait analysis. The architectural design provides a solution to the critical problem of enabling existing algorithms to run in a cloud environment; and shows how  the graphical output of the native algorithm could be accurately reproduced in a web browser. The system can process a chunk of 1300 data points under 3 seconds for a client streaming at 128 Hz, while simultaneously streaming the real time signal.

  • 40.
    Chairetakis, Eleftherios
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Alkudhir, Bassam
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mystridis, Panagiotis
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Deployment of Low Interaction Honeypots in University Campus Network2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as new tools and techniques are being constantly developed by hackers. A new promising technology that lures the attackers in order to monitor their malicious activities and divulge their intentions is emerging with Virtual Honeypots. In the present thesis, we examine an extensive security mechanism based on three different open source low interaction honeypots. We implement this mechanism at our university campus network in an attempt to identify the potential threats and methods used against our network. The data gathered by our honeypots reveal valuable information regarding the types of attacks, the vulnerable network services within the network and the malicious activities launched by attackers.

  • 41.
    Charpentier Rojas, Jose Enrique
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Web application Security2013Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent issues to the most significant treats.The penetration test aimed to help the IT business to discover vulnerabilities in their system ensure their integrity and continue further in the web application security process. The vulnerability research perform in this report is the introduction of a big work that is under continuity for the company.Finally the success of following security standards, process and methodologies applied on this field is considered the best approach to ensure web application security and priceless information you can benefit from.

  • 42.
    Chen, Fulong
    et al.
    Department of Computer Science and Technology, Anhui Normal University, Wuhu Anhui 241000, China.
    Goyal, Rajat
    Integrated M. Tech, Mathematics and Computing, India Institute of Technology, New Delhi 110016, India .
    Westbrook, Edwin
    Department of Computer Science, Rice University, Houston, Texas 77005, USA .
    Taha, Walid
    Department of Computer Science, Rice University, Houston, Texas 77005, USA .
    Implicitly Heterogeneous Multi-Stage Programming for FPGAs2011In: Journal of Computational Information Systems, ISSN 1553-9105, Vol. 6, no 14, p. 4915-4922Article in journal (Refereed)
    Abstract [en]

    Previous work on semantics-based multi-state programming language design focused on homogeneous and heterogeneous software designs. In homogenous software design, the source and the target software programming languages are the same. In heterogeneous software design, they are different software languages. This paper proposes a practical means to circuit design by providing specialized offshoring translations from subsets of the source software programming language to subsets of the target hardware description language (HDL). This approach avoids manually writing codes for specifying the circuit of the given algorithm. To illustrate the proposed approach, we design and implement a translation to a subset of Verilog suitable numerical and logical computation. Through the translator, programmers can specify abstract algorithms in high level languages and automatically convert them into circuit descriptions in low level languages.© 2010 Binary Information Press.

  • 43.
    Eckhardt, Jason
    et al.
    Rice University, Houston, TX 77005, USA.
    Kaiabachev, Roumen
    Rice University, Houston, TX 77005, USA.
    Pasalic, Emir
    Rice University, Houston, TX 77005, USA.
    Swadi, Kedar
    Rice University, Houston, TX 77005, USA.
    Taha, Walid
    Rice University, Houston, TX 77005, USA.
    Implicitly Heterogeneous Multi-Stage Programming2005In: Generative Programming and Component Engineering: 4th International Conference, GPCE 2005, Tallinn, Estonia, September 29 - October 1, 2005. Proceedings / [ed] Robert Glück, Michael Lowry, Heidelberg: Springer, 2005, p. 275-292Conference paper (Refereed)
    Abstract [en]

    Previous work on semantics-based multi-stage programming(MSP) language design focused on homogeneous designs, where the generating and the generated languages are the same. Homogeneous designssimply add a hygienic quasi-quotation and evaluation mechanism to abase language. An apparent disadvantage of this approach is that theprogrammer is bound to both the expressivity and performance characteristics of the base language. This paper proposes a practical means toavoid this by providing specialized translations from subsets of the baselanguage to different target languages. This approach preserves the homogeneous “look” of multi-stage programs, and, more importantly, thestatic guarantees about the generated code. In addition, compared to anexplicitly heterogeneous approach, it promotes reuse of generator sourcecode and systematic exploration of the performance characteristics of thetarget languages.To illustrate the proposed approach, we design and implement a translation to a subset of C suitable for numerical computation, and show thatit preserves static typing. The translation is implemented, and evaluatedwith several benchmarks. The implementation is available in the onlinedistribution of MetaOCaml.

  • 44.
    Ek, Ida
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Hornebrant, Erik
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Kartläggning av internetbaserad tunn klient2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Computers in various forms have come to carry a significant amount of relevant information for various forensic investigations. Therefore, detailed knowledge is required regarding how this data is best acquired. One type of client that has recently made its entry onto the commercial market is the Web Thin Client. As it is today, only a limited amount of relevant information can be found regarding in what capacity such a client contains data that is relevant to an IT-forensic investigation.

    For this reason, a Web thin client of the model Google Chromebook has been evaluated in this paper. The purpose of this examination has been to identify the vulnerabilities that currently exist, and if possible whether these can be used as a basis for a forensic investigation. To achieve this, the client's storage and communication patterns have been analyzed by implementation of experimental methodologies. The methods used for the purpose are penetration testing and an IT forensic investigation. Tests have also been performed to evaluate whether software for the Linux operating system can be executed on the client. The purpose of this was to determine whether the client's volatile memory can be extracted using tools created for Linux.

    The results presented in this paper demonstrate the fact that within a client of this type, valuable forensic information can be located. It is also established that Chrome OS from a user's perspective can be considered as safe.

  • 45.
    Ellner, Stephan
    et al.
    Google Inc, Mountain View, USA.
    Taha, Walid
    Rice University Houston, Houston, USA.
    The Semantics of Graphical Languages2007In: PEPM 2007: proceedings of the Workshop on Partial Evaluation and Program Manipulation : Nice, France, January 15-16, 2007, New York, NY: ACM Press, 2007, p. 122-133Conference paper (Refereed)
    Abstract [en]

    Visual notations are pervasive in circuit design, control systems, and increasingly in mainstream programming environments. Yet many of the foundational advances in programming language theory are taking place in the context of textual notations. In order to map such advances to the graphical world, and to take the concerns of the graphical world into account when working with textual formalisms, there is a need for rigorous connections between textual and graphical expressions of computation. To this end, this paper presents a graphical calculus called Uccello. Our key insight is that Ariola and Blom's work on sharing in the cyclic lambda calculus provides an excellent foundation for formalizing the semantics of graphical languages. As an example of what can be done with this foundation, we use it to extend a graphical language with staging constructs. In doing so, we provide the first formal account of sharing in a multi-stage calculus. Copyright © 2007 ACM.

  • 46.
    Emanuelsson, Herman
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Sjunnesson, Emil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Fjärrstyrt kamerafäste: HE Remote2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    At times when it is not suited to stand by a video camera can be resolved with a remote controlled camera mount. Examples of occasions is due to lack of space at a concert, a solemn ceremony in which someone must stand awkwardly  to to get good image, out in nature where animals shall be filmed without being frightened away or when you have staff shortages, a tight budget and need to control multiple cameras simultaneously. The systems that are available in the amateur market today have different functionality and is not fitting for the above problem or have very limited range and cannot connect to a mobile application.

    This project aims to develop a cost-effective and customized solution for the above problem by developing a remote-controlled camera mount in semi-professional segment where you through a controller and at a later stage with a mobile application controls the camera angle and rotation also called tilt and pan.

    The differences between this and existing solutions are that by using Bluetooth technology can control both the controller and later on also with a mobile application, the reason why it must be able to control both is that it is not always allowed to use cell phones in all environments where you want to film and therefore have a wider range of applications for camera mounting.

  • 47.
    Engberg, Emelie
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Landerup, Marina
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Riskidentifiering inom elektronisk kommunikation i Hallands län: Vilka hot föreligger den elektroniska kommunikationen och vilka risker innebär det?2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Den elektroniska kommunikationen är idag en stor och viktig del i vardagen, därför beslutade sig Länsstyrelsen i Hallands län för att starta ett projekt där de i ett samarbete med Högskolan i Halmstad skulle utföra en fullständig risk- och sårbarhetsanalys inom sektorn elektronisk kommunikation, tillsammans med kommunerna och regionen i Hallands län. Som en första del i en risk- och sårbarhetsanalys, måste en riskidentifiering göras och det är det som är syftet med rapporten. Resultatdelen i rapporten bygger på en sammanställning av svar från intervjuer med anställda inom kommunerna och Region Halland.

    Riskerna som föranletts av de identifierade hoten är relativt många och är av olika form och allvarlighetsgrad. Den vanligaste risken är att system periodvis blir långsamma, ett exempel på detta är att lönesystemet blir långsammare i slutet av månaden då det blir överbelastat för att alla löner ska betalas ut. Genom redundans i systemen reduceras risker som störningar, långsamma system och otillgängliga program och funktioner.

    Mycket ansvar kring säkerheten läggs på IT-avdelningen som många gånger känner att det både saknas ekonomiska medel men också tidsbrist för att upprätthålla en önskvärd säkerhet.

    Slutligen vill vi påstå att hotbildsanalyser och riskidentifieringar är viktiga att utföra för att kunna upprätthålla säkerhet och skydda verksamheten på rätt sätt. 

  • 48.
    Eriksson, Alexander
    et al.
    Halmstad University.
    Hvidt-Andersén, Alexander
    Halmstad University.
    Wallin, Claes
    Halmstad University.
    Initial Respons i OS X miljö: Live-forensik riktat mot OS X2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

  • 49.
    Eriksson, Felix
    Halmstad University, School of Information Technology.
    Enabling Peer-to-Peer Co-Simulation2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Simulation enables preliminary testing of products that may otherwise be dicult, ex-pensive, or dangerous to test physically. Unfortunately, intellectual property concernscan make it dicult or impossible to share the human-readable simulation models toend-users. In fact, there can even be diculties with sharing executables because ofthe possibility for reverse-engineering. This presents a problem when simulating if themodel relies on components for which the source code or executable is not available,such as proprietary components developed by another party. This thesis investigateswhether it is possible to enable a set of networked peers to all take part in computingthe same simulation without any of them having access to the entire model. One way tosolve this problem is to let each system that holds a model of a component to computeits part of the simulation for a single timestep and to share the new state through peer-to-peer connections with the other systems, once a response has been received fromall other peers, the local simulation can advance one timestep and the process can berepeated. But running a simulation over a network can make it signicantly slower,since local operations on the CPU and memory are much faster than operations overa network, and the peers will be spending most of their time waiting for each other asa result. To avoid such delays, each peer maintains expected values for variables thatare not in the local model, and updates are sent only when a local variable changes.These updates are stamped with the local simulation-time, thus allowing the recipientpeers to know when the update is required in the simulations future, or to when itshould be retroactively applied in the simulations past. Using this technique, the peerscan compute their respective local models under the assumption that the variablesthat the other peers control are unchanged. Thus the peers can advance any numberof timesteps without needing to stop and wait for other peers. These techniques willlikely result in wasted work if one or more peers are advancing their simulation timeslower than the others, when this happens, the peers have the ability to re-distributethe workload on the y by transferring control over models. This also makes it possibleto accommodate for systems joining or leaving the simulation while it is running.In this thesis we show that co-simulating in this fashion is a workable option to tra-ditional simulation when the local models are incomplete, but that the performanceis very dependent on the models being simulated. Especially the relation between thefrequency of required synchronizations, and the time to compute a timestep. In ourexperiments with fairly basic models, the performance ratio, compared to traditionalsimulation, ranged between less than one percent of that of traditional simulation, upto roughly 70%. But with slower models always having a better ratio.

  • 50.
    Fan, Xing
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Chalmers University of Technology, Göteborg, Sweden.
    Real-Time Communication Services for Distributed Computing over Switched Ethernet2004Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    In modern and future parallel and distributed processing, a large part of computation overhead comes from communication. This can be minimized if the network protocol offers the user services that are aimed at specific types of communication used in these applications. Other important properties of distributed processing applications are time-deterministic latency and guarantees to meet deadlines. Moreover, an important trend is to implement distributed real-time applications on top of standard Ethernet based networks. Therefore, in this thesis, we focus on developing and analyzing how to efficiently support real-time communication services for distributed computing applications over switched Ethernet. The network architecture currently assumed is a switched Ethernet network with only one switch.

    The work has resulted in proposed Switched Ethernet networks that offer additional features for parallel and distributed real-time processing. An active Ethernet switch concept is proposed to provide efficient support for different user services, including many-to-many communication and other group communication services with high traffic volumes of short messages. Meanwhile, the real-time support for these special communication patterns is addressed by incorporating deadline-based scheduling in the switch and the end nodes.

    Moreover, this thesis addresses real-time services by proposing an alternative solution. In this proposal, the Earliest Deadline First (EDF) algorithm is only used in the source nodes to support real-time traffic with a guaranteed bit rate and end-to-end worst-case delay bound. The thesis also reports a feasibility analysis for hard real-time traffic, which also produces figures on the minimum buffer sizes in the switch to be able to guarantee real-time demands. Meanwhile, differentiation of heterogeneous traffic is considered in the proposed system by placing traffic into several priority classes with distinctly different QoS levels.

    The performance of the proposed methods is evaluated in simulations and calculations. It is shown that the different Ethernet extensions, in many cases, are efficient choices for distributed computing systems.

1234 1 - 50 of 175
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf