hh.sePublications
Change search
Refine search result
1234567 1 - 50 of 335
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abika, Collins
    Halmstad University, School of Information Technology.
    Complaint system for Health Care Center Hjärtat2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today the IT support could be overwhelmed with loads of requests from the clients within the Health care center Hjärtat (Also known as HCCH) through email, which is an inefficient way to store and manage information of each complaint. Tracking down the list of requests is also an issue. For the goals to ensure the achievements of expanding to new clients, IT support needs a better alternative way to manage, store, and retrieve information. This thesis reports a prototype of a complaint management system implemented for the Healthcare center Helsingborg Hjärtat. The software architect pattern in this project is Model view control and applied on the Visual studio .Net core with the programming language of C-sharp and HTML. Test results showcase the prototype of the complaint management system as an administrator, and the result of the system handles the complaint cases well. The IT support experience keeps track of the complaints more efficiently sent from the client users.

    Download full text (pdf)
    fulltext
  • 2.
    Aboelwafa, Mariam M. N.
    et al.
    Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.
    Seddik, Karim G.
    Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.
    Eldefrawy, Mohamed Hamdy
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Gadallah, Yasser
    Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.
    Gidlund, Mikael
    Department of Information Systems and Technology, Mid Sweden University, Sundsvall, Sweden.
    A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT2020In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 7, no 9, p. 8462-8471Article in journal (Refereed)
    Abstract [en]

    The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the IIoT affecting critical security threats is what is termed as the false data injection (FDI) attack. The FDI attacks aim to mislead the industrial platforms by falsifying their sensor measurements. FDI attacks have successfully overcome the classical threat detection approaches. In this article, we present a novel method of FDI attack detection using autoencoders (AEs). We exploit the sensor data correlation in time and space, which in turn can help identify the falsified data. Moreover, the falsified data are cleaned using the denoising AEs (DAEs). Performance evaluation proves the success of our technique in detecting FDI attacks. It also significantly outperforms a support vector machine (SVM)-based approach used for the same purpose. The DAE data cleaning algorithm is also shown to be very effective in recovering clean data from corrupted (attacked) data. © 2014 IEEE.

  • 3.
    Adekolu, Adekunle Matthew
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Khan, Hasan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Neelam, Neelam
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Network Monitoring2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Managing a network is a very big functional area along with performance, devicemaintenance, security, performance, monitoring, troubleshooting, plan of changeand etc. Among all of these monitoring plays a vital role. It can cover a wide area ofnetwork management. Monitoring is the only way to find out whether the networkis functioning according to plan. In order to know what is happening in a network,how its functioning at any given time, a network should have a logging system. Nowa day this logging activity is done by Network monitoring tool. It lets user know thestatus of the network at any given time. This logging can give the user a wide viewwhat can't be seen in general. For example the statistics of a week or month, even ayear. Monitoring is a very important issue in an organization network which aroseover the time.In this project we are going to implement some well known network monitoringtools in a real world scenario and we will investigate how this monitoring tool canhelp network administrators to monitor a network . Moreover, what kind ofinformation we can extract from a network by these tools.The purpose of this project is to get an overall idea about the importance of networkmonitoring and what are the facts need to be considered while monitoring anetwork. There are lots of pros and cons in monitoring a network. So choosing theappropriate tool for monitoring is very important. Monitoring a network with theleast effects on network performance is the best solution in case of monitoring.The outcome from these monitoring tools is a wide range of useful data andintegration of these data produces the status of the network at any give time.Moreover these data will be logged to create a statistical report. Different users suchas a network admin and organization can use this information from differentperspectives to make a network more efficient for users.

    Download full text (pdf)
    fulltext
  • 4.
    Afram, Abboud
    et al.
    Halmstad University, School of Information Technology.
    Sarab Fard Sabet, Danial
    Halmstad University, School of Information Technology.
    Company Intranet2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Many companies use intranets where only authorized personnel can share, create, and access news, events, and knowledge in a company. An intranet is a web application with dynamic content. It consists of various functions and features that facilitate the information management and knowledge flow within the company. The main goal of this project is to create and design an intranet demo that is adaptable and extendable by companies and organizations. The intranet contains various primary functions that users can interact with. The designed intranet is based on the EPiServer Content Management System framework and is programmed in back-end and front-end with the Visual Studio IDE tool. The back- end part is mainly programmed in C# language to create functions and logic such as the intranet structure and then linked to the front-end part where the HTML, CSS, and JavaScript library React is used to encode the front-end and get a user interface. The finalized intranet contains various primary functions where authorized employees have individual profiles with their status and contact information. Users can share corporate events and access corporate news.

    Download full text (pdf)
    fulltext
  • 5.
    Afzal, Wahaj
    Halmstad University, School of Information Technology, Center for Applied Intelligent Systems Research (CAISR).
    A Rule-based approach for detection of spatial object relations in images2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Deep learning and Computer vision are becoming a part of everyday objects and machines. Involvement of artificial intelligence in human’s daily life open doors to new opportunities and research. This involvement provides the idea of improving upon the in-hand research of spatial relations and coming up with a more generic and robust algorithm that provides us with 2-D and 3-D spatial relations and uses RGB and RGB-D images which can help us with few complex relations such as ‘on’ or ‘in’ as well. Suggested methods are tested on the dataset with animated and real objects, where the number of objects varies in every image from at least 4 to at most 10 objects. The size and orientation of objects are also different in every image.  

    Download full text (pdf)
    fulltext
  • 6.
    Ahlbäck, Joel
    et al.
    Halmstad University, School of Information Technology.
    Jalking, Jesper
    Halmstad University, School of Information Technology.
    Logistikföretag i försörjningskedjan: Rekommendationer till logistikföretag i hanteringen av informationssäkerhet2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Information security is an important aspect when running a business. Before, information security has been separated to the business area of IT. But lately this issue has broadened and become an important part of business-activity. This has resulted in a growing interest among business leaders. Literature within the subject information security mainly focuses on how organizations maintain safe systems and protect themselves from cyber-attacks and information infringements. Existing literature identifies new security threats that have emerged after advances in internet technology, but little is known about how these threats can be managed. Researchers request research on how cooperation in supply chains poses risks to secure information management. Logistics companies provide customers with logistics services such as warehouse management, transport, order processing and packaging. Logistics companies are a central node in supply chains. They often participate in several supply chains in different industries. The extensive interconnection of companies poses a security risk. It also means that logistics companies can be seen as targets for cyber-attacks. The purpose of the study has therefore been to create an understanding of the challenges logistics companies face in managing information security in the supply chain.

     

    The research question has been answered by interviewing representatives from logistics organizations. The empirical data has undergone a thematic analysis. The results of the study show that the management of information security varies between companies. The study’s conclusions present recommendations. The recommendations describe how logistics companies can manage information security in the supply chain.

    Download full text (pdf)
    fulltext
  • 7.
    Ahmadi, Lina
    Halmstad University, School of Information Technology.
    Green Driving Application: Eco Driving2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Eco-driving has acquired great importance in recent years because it is a way to reduce energy consumption that can be applied to any type of vehicle. However, for these rules to be applied requires a process of continuous learning and motivation. For this reason many eco-driving assistants have emerged.

    This paper presents Green Driving, a driver safety app for Android that detects inattentive driving behaviors and gives corresponding feedback to drivers, scoring their driving and alerting them in case their behaviors are unsafe.  It’s about changing a person’s driving behavior by providing some kind of advice to the driver.  I have worked on an algorithm that is meant to reduce the fuel consumption of users. The algorithm is deployed in an android application.

    This application “Green Driving” is aimed at users with cars. It is basically like an assistant, suggesting the user when he should make the right gear changes, when to increase/decrease speed and avoids hard braking and rapid acceleration and etc. It is in order to drive economically, ecologic and in turn save money and safety. This is a smart way of letting a user drive economically and ecologic since almost everyone has an Android smartphone now. 

    Download full text (pdf)
    fulltext
  • 8.
    Akinola, Azeez Paul
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    chong, zhang
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Since the introduction of networks, they have been used amongst home users, companies and organizations and most damage on the network is due to inappropriate security configurations. To secure networks, a protocol suite can be used to encrypt and authenticate all IP packets of a session. Therefore, this report will include the advantages and possible solution of some techniques used to offer increased network security such as scalability and data confidentiality. Captures of traffic sent using the two security techniques, IPSec/VPN and GRE-Tunnel will be monitored. The objective behind this project is to configure a network with these two different tunneling techniques and compare the security and network performance. The report also describes the security problems encountered by networks such as the ignorance of network users, vulnerabilities and the security of the devices.IPSecis a standard security protocol solution for TCP/IP, and it provides security through authentication, encryption and data integrity. GRE encapsulates packets and create a logical hub-and spoke topology of virtual point-to-point connections. The Jperf-tool is used to measure network performance and show specific details while another tool, Wireshark is used to analyze the information captured during transmission of data sent using IPSEC and GRE. The comparison further finds that IPSec-tunnel technique makes data transfers very secure but causes network performance disadvantages in comparison to a GRE solution.

    Download full text (pdf)
    fulltext
  • 9.
    Alavijeh, Soroush Zamani
    et al.
    McMaster University, Hamilton, Canada.
    Zarrinkalam, Fattane
    University of Guelph, Guelph, Canada.
    Noorian, Zeinab
    Toronto Metropolitan University, Toronto, Canada.
    Mehrpour, Anahita
    University of Lausanne, Lausanne, Switzerland.
    Etminani, Kobra
    Halmstad University, School of Information Technology.
    What users’ musical preference on Twitter reveals about psychological disorders2023In: Information Processing & Management, ISSN 0306-4573, E-ISSN 1873-5371, Vol. 60, no 3, article id 103269Article in journal (Refereed)
    Abstract [en]

    Previous research found a strong relation between the users’ psychological disorders and their language use in social media posts in terms of vocabulary selection, emotional expressions, and psychometric attributes. However, although studying the association between psychological disorders and musical preference is considered as rather an old tradition in the clinical analysis of health data, it is not explored through the lens of social media analytics. In this study, we investigate which attributes of the music posted on social media are associated with mental health conditions of Twitter users. We created a large-scale dataset of 1519 Twitter users with six self-reported psychological disorders (depression, bipolar, anxiety, panic, post-traumatic stress disorder, and borderline) and matched with 2480 control users. We then conduct an observational study to investigate the relationship between the users’ psychological disorders and their musical preference by analyzing lyrics of the music tracks that the users shared on Twitter from multiple dimensions including word usage, linguistic style, sentiment and emotion patterns, topical interests and underlying semantics. Our findings reveal descriptive differences on the linguistic and semantic features of music tracks of affected users compared to control individuals and among users from different psychological disorders. Additionally, we build a feature-based and an (explainable) deep learning-based binary classifiers trained on disorder and control users and demonstrate that lyrics of the music tracks of users on Twitter can be considered as complementary information to their published posts to improve the accuracy of the disorder detection task. Overall, we find that the music attributes of users on Twitter allow inferences about their mental health status. © 2023 Elsevier Ltd

  • 10.
    Albayrak, Aras
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Automatic Pose and Position Estimation by Using Spiral Codes2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This master thesis is about providing the implementation of synthesis, detection of spiral symbols and estimating the pan/tilt angle and position by using camera calibration. The focus is however on the latter, the estimation of parameters of localization.

    Spiral symbols are used to be able to give an object an identity as well as to locate it. Due to the spiral symbol´s characteristic shape, we can use the generalized structure tensor (GST) algorithm which is particularly efficient to detect different members of the spiral family. Once we detect spirals, we know the position and identity parameters of the spirals within an apriori known geometric configuration (on a sheet of paper). In turn, this information can be used to estimate the 3D-position and orientation of the object on which spirals are attached using a camera calibration method.

     

    This thesis provides an insight into how automatic detection of spirals attached on a sheet of paper, and from this, automatic deduction of position and pose parameters of the sheet, can be achieved by using a network camera. GST algorithm has an advantage of running the processes of detection of spirals efficiently w.r.t detection performance and computational resources because it uses a spiral image model well adapted to spiral spatial frequency characteristic. We report results on how detection is affected by zoom parameters of the network camera, as well as by the GST parameters; such as filter size. After all spirals centers are located and identified w.r.t. their twist/bending parameter, a flexible technique for camera calibration, proposed by Zhengyou Zhang implemented in Matlab within the present study, is performed. The performance of the position and pose estimation in 3D is reported.

    The main conclusion is, we have reasonable surface angle estimations for images which were taken by a WLAN network camera in different conditions such as different illumination and different distances. 

    Download full text (pdf)
    fulltext
  • 11.
    Alendal, Gunnar
    et al.
    NTNU, Gjøvik, Norway.
    Dyrkolbotn, Geir Olav
    NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
    Axelsson, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode2018In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, no Suppl., p. S60-S67Article in journal (Refereed)
    Abstract [en]

    The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

  • 12.
    Alfakir, Omar
    et al.
    Halmstad University, School of Information Technology.
    Larsson, Viktor
    Halmstad University, School of Information Technology.
    Alonso-Fernandez, Fernando
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    A Cross-Platform Mobile Application for Ambulance CPR during Cardiac Arrests2021In: 2021 8th International Conference on Soft Computing & Machine Intelligence (ISCMI), Piscataway: IEEE, 2021, p. 120-124Conference paper (Refereed)
    Abstract [en]

    This paper describes the implementation of a cross-platform software application to aid ambulance paramedics during CPR (Cardio-Pulmonary Resuscitation). It must be able to work both on iOS and Android devices, which are the leading platforms in the mobile industry. The goal of the application is to guide paramedics in the different processes and expected medication to be administered during a cardiac arrest, a scenario that is usually stressful and fast-paced, thus prone to errors or distractions. The tool must provide timely reminders of the different actions to be performed during a cardiac arrest, and in an appropriate order, based on the results of the previous actions. A timer function will also control the duration of each step of the CPR procedure. The application is implemented in React Native which, using JavaScript as programming language, allows to deploy applications that can run both in iOS and Android native languages. Our solution could also serve as a record of events that could be transmitted (even in real-time) to the hospital without demanding explicit verbal communication of the procedures or medications administered to the patient during the ambulance trip. This would provide even higher efficiency in the process, and would allow automatic incorporation of the events to the medical record of the patient as well. © 2021 IEEE.

  • 13.
    Alfredsson, Anders
    Halmstad University, School of Information Technology.
    Cybersäkerhet på väg: Säker mjukvaruutveckling i fordonsindustrin2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Moderna vägfordon är i högre grad än tidigare styrda av mjukvara, och det är även vanligt att de har någon form av internetuppkoppling. För att fordonen ska kunna uppfylla de säkerhetskrav som ställs är det därför viktigt att mjukvaran är utvecklad på ett säkert sätt och under säkra former. Denna fallstudie undersöker med hjälp av strukturerade intervjuer hur några personer som arbetar med mjukvaruutveckling inom fordonsindustrin beskriver arbetet med säkerhet i utvecklingsprocessen. Resultatet visar att det finns en rad olika rutiner och riktlinjer som syftar till att skapa en säker produkt ur ett cybersäkerhetsperspektiv, men att det finns en tendens bland vissa utvecklare att förlita sig på processer och rutiner när det gäller att skapa en säker mjukvara.

    Download full text (pdf)
    fulltext
  • 14.
    Ali Hamad, Rebeen
    Halmstad University, School of Information Technology.
    Towards Reliable, Stable and Fast Learning for Smart Home Activity Recognition2022Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The current population age grows increasingly in industrialized societies and calls for more intelligent tools to monitor human activities.  The aims of these intelligent tools are often to support senior people in their homes, to keep track of their daily activities, and to early detect potential health problems to facilitate a long and independent life.  The recent advancements of smart environments using miniaturized sensors and wireless communications have facilitated unobtrusively human activity recognition.  

    Human activity recognition has been an active field of research due to its broad applications in different areas such as healthcare and smart home monitoring. This thesis project develops work on machine learning systems to improve the understanding of human activity patterns in smart home environments. One of the contributions of this research is to process and share information across multiple smart homes to reduce the learning time, reduce the need and effort to recollect the training data, as well as increase the accuracy for applications such as activity recognition. To achieve that, several contributions are presented to pave the way to transfer knowledge among smart homes that includes the following studies. Firstly, a method to align manifolds is proposed to facilitate transfer learning. Secondly, we propose a method to further improve the performance of activity recognition over the existing methods. Moreover, we explore imbalanced class problems in human activity recognition and propose a method to handle imbalanced human activities. The summary of these studies are provided below. 

    In our work, it is hypothesized that aligning learned low-dimensional  manifolds from disparate datasets could be used to transfer knowledge between different but related datasets. The t-distributed Stochastic Neighbor Embedding(t-SNE) is used to project the high-dimensional input dataset into low-dimensional manifolds. However, since t-SNE is a stochastic algorithm and  there is a large variance of t-SNE maps, a thorough analysis of the stability is required before applying  Transfer learning.  In response to this, an extension to Local Procrustes Analysis called Normalized Local Procrustes Analysis (NLPA) is proposed to non-linearly align manifolds by using locally linear mappings to test the stability of t-SNE low-dimensional manifolds. Experiments show that the disparity from using NLPA to align low-dimensional manifolds decreases by order of magnitude compared to the disparity obtained by Procrustes Analysis (PA). NLPA outperforms PA and provides much better alignments for the low-dimensional manifolds. This indicates that t-SNE low-dimensional manifolds are locally stable, which is the part of the contribution in this thesis.

    Human activity recognition in smart homes shows satisfying recognition results using existing methods. Often these methods process sensor readings that precede the evaluation time (where the decision is made) to evaluate and deliver real-time human activity recognition. However, there are several critical situations, such as diagnosing people with dementia where "preceding sensor activations" are not always sufficient to accurately recognize the resident's daily activities in each evaluated time. To improve performance, we propose a method that delays the recognition process to include some sensor activations that occur after the point in time where the decision needs to be made. For this, the proposed method uses multiple incremental fuzzy temporal windows to extract features from both preceding and some oncoming sensor activations. The proposed method is evaluated with two temporal deep learning models: one-dimensional convolutional neural network (1D CNN) and long short-term memory (LSTM) on a binary sensor dataset of real daily living activities.  The experimental evaluation shows that the proposed method achieves significantly better results than the previous state-of-the-art. 

    Further, one of the main problems of activity recognition in a smart home setting is that the frequency and duration of human activities are intrinsically imbalanced. The huge difference in the number of observations for the categories means that many machine learning algorithms focus on the classification of the majority examples due to their increased prior probability while ignoring or misclassifying minority examples. This thesis explores well-known class imbalance approaches (synthetic minority over-sampling technique, cost-sensitive learning and ensemble learning) applied to activity recognition data with two temporal data pre-processing for the deep learning models LSTM and 1D CNN. This thesis proposes a data level perspective combined with a temporal window technique to handle imbalanced human activities from smart homes in order to make the learning algorithms more sensitive to the minority class. The experimental results indicate that handling imbalanced human activities from the data-level outperforms algorithm level and improved the classification performance.

    Download full text (pdf)
    fulltext
  • 15.
    Ali Hamad, Rebeen
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Salguero Hidalgo, Alberto
    University of Cádiz, Cádiz, Spain.
    Bouguelia, Mohamed-Rafik
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Estevez, Macarena Espinilla
    University of Jaén, Jaén, Spain.
    Quero, Javier Medina
    University of Jaén, Jaén, Spain.
    Efficient Activity Recognition in Smart Homes Using Delayed Fuzzy Temporal Windows on Binary Sensors2020In: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 24, no 2, p. 387-395Article in journal (Refereed)
    Abstract [en]

    Human activity recognition has become an active research field over the past few years due to its wide application in various fields such as health-care, smart home monitoring, and surveillance. Existing approaches for activity recognition in smart homes have achieved promising results. Most of these approaches evaluate real-time recognition of activities using only sensor activations that precede the evaluation time (where the decision is made). However, in several critical situations, such as diagnosing people with dementia, “preceding sensor activations” are not always sufficient to accurately recognize the inhabitant's daily activities in each evaluated time. To improve performance, we propose a method that delays the recognition process in order to include some sensor activations that occur after the point in time where the decision needs to be made. For this, the proposed method uses multiple incremental fuzzy temporal windows to extract features from both preceding and some oncoming sensor activations. The proposed method is evaluated with two temporal deep learning models (convolutional neural network and long short-term memory), on a binary sensor dataset of real daily living activities. The experimental evaluation shows that the proposed method achieves significantly better results than the real-time approach, and that the representation with fuzzy temporal windows enhances performance within deep learning models. © Copyright 2020 IEEE

  • 16.
    Ali, Mustafa
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Abid, Hussain
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Wireless and Industrial Network2013Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The purpose of this report is to implement the wireless network in a company withtwo different sites which is located in Riga and Malmo. The main task of this reportis to implement and configure wireless industrial network. This report is based oninformation we gathered from the ABC Company about their requirements for awireless network.Requirements of this ABC Company is focusing on their infrastructure planning,security and implementing them. Benefits and drawbacks of industrial wirelessnetwork will be described briefly in this report to get some idea how ABC Companywill face the problem when they will implement their wireless network.

    Download full text (pdf)
    Student thesis
  • 17.
    Almgren, David
    et al.
    Halmstad University, School of Information Technology.
    Alshammari, Hussam
    Halmstad University, School of Information Technology.
    SmartBand Alert: Ett armband för säkerhet2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Safety is a topic that is frequently discussed and spoken of in today’s society. An enhanced security for each individual is something many strive for in various industries. One of these is how to make the public feel more secure when the person in question, for example, is out walking late at night. The goal of this bachelors thesis is thus to describe and explain the product that has been developed to get ordinary people to feel more secure wherever they are. The chosen solution for this issue was hence to develop the product SmartBand Alert which consists of two parts. A bracelet and an application for IOS and Android. This bracelet should, by certain connectivity cooperate with the user’s phone to notify family members and/or others when the person thinks or knows that he or she is in danger. These persons will be notified with information about the person who has activated the alarm to simply and easily take the necessary actions to help the person. The product is designed to be used by anyone regardless of gender, age, and other characteristics individuals may hold.

    Download full text (pdf)
    fulltext
  • 18.
    Alsalehy, Ahmad
    et al.
    Halmstad University, School of Information Technology.
    Alsayed, Ghada
    Halmstad University, School of Information Technology.
    Scenanalys av trafikmiljön2021Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Antalet vägtrafikanter ökar varje år, och med det ökar trängseln. Man har därför gjort undersökningar med hjälp av objektdetektionsalgoritmer på videoströmmar. Genom att analysera data resultat är det möjligt att bygga en bättre infrastruktur, för att minska trafikstockning samt olyckor. Data som analyseras kan till exempel vara att räkna hur många trafikanter som vistas på en viss väg (Slottsbron i Halmstad) under en viss tid. Detta examensarbete undersöker teoretiskt hur en YOLO algoritm samt TensorFlow kan användas för att detektera olika trafikanter. Utvärderingsmetoder som användes i projektet för att få resultatet och dra slutsatser är mAP, träning och testning av egna och andras YOLO modeller samt övervakning av FPS- och temperatur-värden. För att möjliggöra detekteringen av trafikflöde i realtid nyttjades Jetson nano toolkit. Flera olika jämförelser har skapats för att avgöra vilken YOLO modell som är lämpligast. Resultaten från tester av olika YOLO modeller visar att YOLO-TensorFlows implementationer kan detektera trafikanter med en godtagbar noggrannhet. Slutsatsen är att Jetson nano har tillräckligt med processorkraft för att detektera olika trafikanter i realtid med hjälp av original YOLO implementation. Metoderna för att detektera trafikanter är standard och fungerande för analysering av trafikflöden.Testning av mer varierande trafikmiljö under längre tidsperioder krävs för att ytterligare verifiera om Jetson nanos lämplighet.

    Download full text (pdf)
    fulltext
  • 19.
    Altarabichi, Mohammed Ghaith
    Halmstad University, School of Information Technology.
    Evolving intelligence: Overcoming challenges for Evolutionary Deep Learning2024Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Deep Learning (DL) has achieved remarkable results in both academic and industrial fields over the last few years. However, DL models are often hard to design and require proper selection of features and tuning of hyper-parameters to achieve high performance. These selections are tedious for human experts and require substantial time and resources. A difficulty that encouraged a growing number of researchers to use Evolutionary Computation (EC) algorithms to optimize Deep Neural Networks (DNN); a research branch called Evolutionary Deep Learning (EDL).

    This thesis is a two-fold exploration within the domains of EDL, and more broadly Evolutionary Machine Learning (EML). The first goal is to makeEDL/EML algorithms more practical by reducing the high computational costassociated with EC methods. In particular, we have proposed methods to alleviate the computation burden using approximate models. We show that surrogate-models can speed up EC methods by three times without compromising the quality of the final solutions. Our surrogate-assisted approach allows EC methods to scale better for both, expensive learning algorithms and large datasets with over 100K instances. Our second objective is to leverage EC methods for advancing our understanding of Deep Neural Network (DNN) design. We identify a knowledge gap in DL algorithms and introduce an EC algorithm precisely designed to optimize this uncharted aspect of DL design. Our analytical focus revolves around revealing avant-garde concepts and acquiring novel insights. In our study of randomness techniques in DNN, we offer insights into the design and training of more robust and generalizable neural networks. We also propose, in another study, a novel survival regression loss function discovered based on evolutionary search.

    Download full text (pdf)
    fulltext
  • 20.
    Altarabichi, Mohammed Ghaith
    et al.
    Halmstad University, School of Information Technology.
    Alabdallah, Abdallah
    Halmstad University, School of Information Technology.
    Pashami, Sepideh
    Halmstad University, School of Information Technology.
    Ohlsson, Mattias
    Halmstad University, School of Information Technology.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology.
    Improving Concordance Index in Regression-based Survival Analysis: Discovery of Loss Function for Neural Networks2024Manuscript (preprint) (Other academic)
    Abstract [en]

    In this work, we use an Evolutionary Algorithm (EA) to discover a novel Neural Network (NN) regression-based survival loss function with the aim of improving the C-index performance. Our contribution is threefold; firstly, we propose an evolutionary meta-learning algorithm SAGA$_{loss}$ for optimizing a neural-network regression-based loss function that maximizes the C-index; our algorithm consistently discovers specialized loss functions that outperform MSCE. Secondly, based on our analysis of the evolutionary search results, we highlight a non-intuitive insight that signifies the importance of the non-zero gradient for the censored cases part of the loss function, a property that is shown to be useful in improving concordance. Finally, based on this insight, we propose MSCE$_{Sp}$, a novel survival regression loss function that can be used off-the-shelf and generally performs better than the Mean Squared Error for censored cases. We performed extensive experiments on 19 benchmark datasets to validate our findings.

  • 21.
    Altarabichi, Mohammed Ghaith
    et al.
    Halmstad University, School of Information Technology.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology.
    Pashami, Sepideh
    Halmstad University, School of Information Technology.
    Sheikholharam Mashhadi, Peyman
    Halmstad University, School of Information Technology.
    Handl, Julia
    University of Manchester, Manchester, United Kingdom.
    Rolling the Dice for Better Deep Learning Performance: A Study of Randomness Techniques in Deep Neural Networks2024Manuscript (preprint) (Other (popular science, discussion, etc.))
    Abstract [en]

    This paper presents a comprehensive empirical investigation into the interactions between various randomness techniques in Deep Neural Networks (DNNs) and how they contribute to network performance. It is well-established that injecting randomness into the training process of DNNs, through various approaches at different stages, is often beneficial for reducing overfitting and improving generalization. However, the interactions between randomness techniques such as weight noise, dropout, and many others remain poorly understood. Consequently, it is challenging to determine which methods can be effectively combined to optimize DNN performance. To address this issue, we categorize the existing randomness techniques into four key types: data, model, optimization, and learning. We use this classification to identify gaps in the current coverage of potential mechanisms for the introduction of noise, leading to proposing two new techniques: adding noise to the loss function and random masking of the gradient updates.

    In our empirical study, we employ a Particle Swarm Optimizer (PSO) to explore the space of possible configurations to answer where and how much randomness should be injected to maximize DNN performance. We assess the impact of various types and levels of randomness for DNN architectures applied to standard computer vision benchmarks: MNIST, FASHION-MNIST, CIFAR10, and CIFAR100. Across more than 30\,000 evaluated configurations, we perform a detailed examination of the interactions between randomness techniques and their combined impact on DNN performance. Our findings reveal that randomness in data augmentation and in weight initialization are the main contributors to performance improvement. Additionally, correlation analysis demonstrates that different optimizers, such as Adam and Gradient Descent with Momentum, prefer distinct types of randomization during the training process. A GitHub repository with the complete implementation and generated dataset is available\footnote[1]{https://github.com/Ghaith81/Radnomness\_in\_Neural\_Network}.

  • 22.
    Alveflo, Victor
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Virtual Training Tool: Mjukvarubaserat utbildningsverktyg2014Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    An important part at companies that’s manufacturing industrial machines is to provide training for the machines end-users such as daily machine operators and technicians, in order to give them a good understanding about how the concerned machine works. At these kinds of trainings it’s very important that the training material used to train the users provides a high user-friendliness.

    The goal with this thesis is to improve the user-friendliness of an existing training tool for a specific training course from the projects client. The training course that’s going to be improved is currently using a hardware-based simulator that’s used to manually simulate processes at a certain machine.

    The result was a solution in shape of a software-based simulator with associated graphical user interface. The user can thus within safe circumstances simulate the concerned machines behavior through a PC-program and e.g. create emergency situations without putting the users safety in danger. 

    Download full text (pdf)
    Victor Alveflo
  • 23.
    AMEEN HASHIM, FARHAN
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Al Eid, Jamal
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Al-Salem, Abdulkhaliq
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Comparing of Real-Time Properties in Networks Based On IPv6 and IPv42013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Real time applications over IP network became widely used in different fields; social video conference, online educational lectures, industrial, military, and online robotic medical surgery.

    Online medical surgery over IP network has experienced rapid growth in the last few years primarily due to advances in technology (e.g., increased bandwidth; new cameras, monitors, and coder/decoders (CODECs)) and changes in the medical care environment (e.g., increased outpatient care, remote surgeries).

    The purpose of this study was to examine and analyze the impact of IP networks parameters; delay, jitter, throughput, and drop packet on the performance of real-time medical surgery videos sent across different IP networks; native IPv6, native IPv4, 6to4 and 6in4 tunneling transition mechanisms and compare the behavior of video packets over IP networks. The impact of each parameter over IP networks is examined by using different video codecs MPEG-1, MPEG-2, and MPEG-4.

    This study has been carried out with two main parts; theoretical and practical part, the theoretical part of this study focused on the calculations of various delays in IP networks such as transmission, processing, propagation, and queuing delays for video packet, while the practical part includes; examining of video codecs throughput over IP networks by using jperf tool and examining delay, jitter, and packet drops for different packet sizes by using IDT-G tool and how these parameters can affect quality of received video.

    The obtained theoretical and practical results were presented in different tables and plotted into different graphs to show the performance of real time video over IP networks. These results confirmed that video codecs MPEG-1, MPEG-2, and MPEG-4 were highly impacted by encapsulation and de-capsulation process except MPEG-4 codec, MPEG-4 was the least impacted by IPv4, IPv6, and IP transition mechanisms concerning throughput and wastage bandwidth. It also indicated that using IPv6-to-4 and IPv6-in-4 tunneling mechanisms caused more bandwidth wastage, high delay, jitter, and packet drop than IPv4 and IPv6.

    Download full text (pdf)
    Comparing of Real-Time
  • 24.
    Andersson, Roland
    Halmstad University, School of Information Technology.
    Utvinning av data ur mobiltelefoner: En valideringsstudie av forensiska verktyg2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones.

    This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.

    Download full text (pdf)
    fulltext
  • 25.
    Andreasson, Henrik
    et al.
    Örebro University, Örebro, Sweden.
    Bouguerra, Abdelbaki
    Örebro University, Örebro, Sweden.
    Åstrand, Björn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Gold-fish SLAM: An application of SLAM to localize AGVs2014In: Field and Service Robotics: Results of the 8th International Conference / [ed] Kazuya Yoshida & Satoshi Tadokoro, Heidelberg: Springer, 2014, p. 585-598Conference paper (Refereed)
    Abstract [en]

    The main focus of this paper is to present a case study of a SLAM solution for Automated Guided Vehicles (AGVs) operating in real-world industrial environments. The studied solution, called Gold-fish SLAM, was implemented to provide localization estimates in dynamic industrial environments, where there are static landmarks that are only rarely perceived by the AGVs. The main idea of Gold-fish SLAM is to consider the goods that enter and leave the environment as temporary landmarks that can be used in combination with the rarely seen static landmarks to compute online estimates of AGV poses. The solution is tested and verified in a factory of paper using an eight ton diesel-truck retrofitted with an AGV control system running at speeds up to 3m/s. The paper includes also a general discussion on how SLAM can be used in industrial applications with AGVs. © Springer-Verlag Berlin Heidelberg 2014.

  • 26.
    Angelsmark, Ola
    et al.
    Department of Computer Science, Lund University, Lund, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Lund, Sweden.
    Nilsson, Klas
    Department of Computer Science, Lund University, Lund, Sweden.
    Nowaczyk, Sławomir
    Department of Computer Science, Lund University, Lund, Sweden.
    Prosperi, Leonardo
    Department of Computer Science, Lund University, Lund, Sweden.
    Knowledge Representation for Reconfigurable Automation Systems2007Conference paper (Refereed)
    Abstract [en]

    This article describes the work in progress on knowledge representation formalisms chosen for use in the European project SIARAS. Skill-Based Inspection and Assembly for Reconfigurable Automation Systems has a goal of creating intelligent support system for reconfiguration and adaptation of assembly systems. Knowledge is represented in an ontology expressed in OWL, for generic reasoning in Description Logic, and in a number of special-purpose reasoning modules, specific for the application domain.

  • 27.
    Aramrattana, Maytheewat
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Modelling and Simulation for Evaluation of Cooperative Intelligent Transport System Functions2016Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Future vehicles are expected to be equipped with wireless communication tech- nology, that enables them to be “connected” to each others and road infras- tructures. Complementing current autonomous vehicles and automated driving systems, the wireless communication allows the vehicles to interact, cooperate, and be aware of its surroundings beyond their own sensors’ range. Such sys- tems are often referred to as Cooperative Intelligent Transport Systems (C-ITS), which aims to provide extra safety, efficiency, and sustainability to transporta- tion systems. Several C-ITS applications are under development and will require thorough testing and evaluation before their deployment in the real-world. C- ITS depend on several sub-systems, which increase their complexity, and makes them difficult to evaluate.

    Simulations are often used to evaluate many different automotive appli- cations, including C-ITS. Although they have been used extensively, simulation tools dedicated to determine all aspects of C-ITS are rare, especially human fac- tors aspects, which are often ignored. The majority of the simulation tools for C-ITS rely heavily on different combinations of network and traffic simulators. The human factors issues have been covered in only a few C-ITS simulation tools, that involve a driving simulator. Therefore, in this thesis, a C-ITS simu- lation framework that combines driving, network, and traffic simulators is pre- sented. The simulation framework is able to evaluate C-ITS applications from three perspectives; a) human driver; b) wireless communication; and c) traffic systems.

    Cooperative Adaptive Cruise Control (CACC) and its applications are cho- sen as the first set of C-ITS functions to be evaluated. Example scenarios from CACC and platoon merging applications are presented, and used as test cases for the simulation framework, as well as to elaborate potential usages of it. Moreover, approaches, results, and challenges from composing the simulation framework are presented and discussed. The results shows the usefulness of the proposed simulation framework.

    Download full text (pdf)
    fulltext
  • 28.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Englund, Cristofer
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research. RISE Viktoria, Göteborg, Sweden.
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Safety Analysis of Cooperative Adaptive Cruise Control in Vehicle Cut-in Situations2017In: Proceedings of 2017 4th International Symposium on Future Active Safety Technology towards Zero-Traffic-Accidents (FAST-zero), Society of Automotive Engineers of Japan , 2017, article id 20174621Conference paper (Refereed)
    Abstract [en]

    Cooperative adaptive cruise control (CACC) is a cooperative intelligent transport systems (C-ITS) function, which especially when used in platooning applications, possess many expected benefits including efficient road space utilization and reduced fuel consumption. Cut-in manoeuvres in platoons can potentially reduce those benefits, and are not desired from a safety point of view. Unfortunately, in realistic traffic scenarios, cut-in manoeuvres can be expected, especially from non-connected vehicles. In this paper two different controllers for platooning are explored, aiming at maintaining the safety of the platoon while a vehicle is cutting in from the adjacent lane. A realistic scenario, where a human driver performs the cut-in manoeuvre is used to demonstrate the effectiveness of the controllers. Safety analysis of CACC controllers using time to collision (TTC) under such situation is presented. The analysis using TTC indicate that, although potential risks are always high in CACC applications such as platooning due to the small inter-vehicular distances, dangerous TTC (TTC < 6 seconds) is not frequent. Future research directions are also discussed along with the results.

    Download full text (pdf)
    fulltext
  • 29.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Cooperative Driving Simulation2016In: Proceedings of the Driving Simulation Conference 2016, 2016, p. 123-132Conference paper (Refereed)
    Abstract [en]

    For a few decades, driving simulators have been supporting research and development of advanced driver assistance systems (ADAS). In the near future, connected vehicles are expected to be deployed. Driving simulators will need to support evaluation of cooperative driving applications within cooperative intelligent transportation systems (C-ITS) scenarios. C-ITS utilize vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication. Simulation of the inter vehicle communication is often not supported in driving simulators. On the other hand, previous efforts have been made to connect network simulators and traffic simulators, to perform C-ITS simulations. Nevertheless, interactions between actors in the system is an essential aspect of C-ITS. Driving simulators can provide the opportunity to study interactions and reactions of human drivers to the system. This paper present simulation of a C-ITS scenario using a combination of driving, network, and traffic simulators. The architecture of the solution and important challenges of the integration are presented. A scenario from Grand Cooperative Driving Challenge (GCDC) 2016 is implemented in the simulator as an example use case. Lastly, potential usages and future developments are discussed.

  • 30.
    Aramrattana, Maytheewat
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Extended Driving Simulator for Evaluation of Cooperative Intelligent Transport Systems2016In: SIGSIM-PADS '16: Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation, New York: ACM Digital Library, 2016, p. 255-278Conference paper (Refereed)
    Abstract [en]

    Vehicles in cooperative intelligent transport systems (C-ITS) often need to interact with each other in order to achieve their goals, safe and efficient transport services. Since human drivers are still expected to be involved in C-ITS, driving simulators are appropriate tools for evaluation of the C-ITS functions. However, driving simulators often simplify the interactions or influences from the ego vehicle on the traffic. Moreover, they normally do not support vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication, which is the main enabler for C-ITS. Therefore, to increase the C-ITS evaluation capability, a solution on how to extend a driving simulator with traffic and network simulators to handle cooperative systems is presented as a result of this paper. Evaluation of the result using two use cases is presented. And, the observed limitations and challenges of the solution are reported and discussed. © 2016 ACM, Inc.

  • 31.
    Aronsson, John
    et al.
    Halmstad University, School of Information Technology.
    Bolmér, Percy
    Halmstad University, School of Information Technology.
    Hur forensiska verktyg påverkar integriteten på mobiltelefoner2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The rising use of smartphones and other mobile devices in society today has resulted in a higher prevalence of these in crimes and crime investigations. The information in these devices must be extracted and the integrity of the extracted information assured. The goal of this project is to determine whether the two forensic software programs Xry and Encase tamper with the extracted data. To answer this, a literary study together with an interview and two experiments were performed. The result from the experiments determined that data changes occured between extractions. Further analysis explained the changes to be caused by the devices themselves, and as a consequence of rooting. The conclusion drawn from the result was that the softwares programs did not tamper with the material during the extraction-process.

    Download full text (pdf)
    fulltext
  • 32.
    Arshad, Hamed
    et al.
    University of Oslo, Oslo, Norway.
    Picazo-Sanchez, Pablo
    Halmstad University, School of Information Technology. Chalmers University of Technology, Gothenburg, Sweden.
    Johansen, Christian
    Norwegian University of Science And Technology, Trondheim, Norway.
    Schneider, Gerardo
    University of Gothenburg, Gothenburg, Sweden.
    Attribute-based encryption with enforceable obligations2023In: Journal of Cryptographic Engineering, ISSN 2190-8516, Vol. 13, no 3, p. 343-371Article in journal (Refereed)
    Abstract [en]

    Attribute-based encryption (ABE) is a cryptographic mechanism that provides fine-grained access control to encrypted data, which can thus be stored in, e.g., public clouds. However, ABE schemes lack the notion of obligations, which is common in attribute-based access control systems such as eXtensible Access Control Markup Language and Usage Control. Obligations are used to define and enforce extra constraints that happen before approving or denying an access request. In this paper, we propose OB-ABE, a system for extending any classical ABE with enforceable obligations. Our system architecture has as core component trusted hardware enclaves, implemented with SGX, used for enforcing obligations. We employ ProVerif to formally model OB-ABE and verify its main property called “enforceable obligations,” i.e., if a message is encrypted along with an obligation, then the message can be decrypted only after enforcing the attached obligation. OB-ABE has two more properties: (i) OB-ABE is a “conservative extension” of the underlying ABE scheme, preserving its security properties; (ii) OB-ABE is “backward compatible” in the sense that any ciphertext produced by an ABE scheme can be decrypted by its extended OB-ABE version, and moreover, a ciphertext produced by an OB-ABE scheme can be decrypted by its underlying ABE scheme provided that the ciphertext does not have obligations attached. We also implement in C using Intel SGX a prototype of an OB-ABE extending the well-known ciphertext-policy ABE. © 2023, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.

  • 33.
    Arvidsson, Christoffer
    et al.
    Halmstad University, School of Information Technology.
    Andersson, Jakob
    Halmstad University, School of Information Technology.
    Virtual Validation of Autonomous Vehicles: Virtualizing an Electric Cabin Scooter2023Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis report presents a study on the virtualization of an Electric Cabin Scooter used to validate the feasibility of converting it into an autonomous vehicle. The project aimed to design, develop, and test a virtual model of the car that can navigate from points A to B while avoiding obstacles. The report describes the methodology used in the project, which includes setting up the workspace, construction of the virtual model, implementation of ROS2 controllers, and integration of SLAM and Navigation2. The thesis report also describes and discusses related work, as well as the theoretical background of the project. Results show a successfully developed working virtual vehicle model, which provides a solid starting point for future work.

    Download full text (pdf)
    fulltext
  • 34.
    Arvidsson, Moa
    Halmstad University, School of Information Technology.
    Att använda Azure som IoT plattform2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Portability of the Internet of Things Solutions is important in today’s society. This is due to the rapid growth of smart devices. More and more companies are choosing to use cloud services for data storage and processing. Halmstad Stadsnät AB is developing and communicating the IoT-platform and using the current state of Nokia IMPACT. The problem with IMPACT is that it does not fully support End-toend solutions. Therefore, Halmstad Stadsnät AB explores other possibilities for IoT-solutions when it comes to software. Microsoft AZURE is a platform that Halmstad Kommun uses for IT-solutions. The overall goal of this project is to test the portability of Microsoft AZURE’s IoT-solutions on IMPACTplatforms. The methods used have created an End-to-end solution for AZURE and then step by step test to transfer it to IMPACT. The project concludes that portability between these two platforms is good, but it requires certain adjustments when transferring

    Download full text (pdf)
    fulltext
  • 35.
    Aslam, Muhammad Shamrooz
    et al.
    School of Automation, Guangxi University of Science and Technology, Liuzhou, P.R. China.
    Tiwari, Prayag
    Halmstad University, School of Information Technology.
    Pandey, Hari Mohan
    Data Science and Artificial Intelligence, Department of Information and Computing, Bournemouth University, Bournemouth, United Kingdom.
    Band, Shahab S.
    Future Technology Research Center, College of Future, National Yunlin University of Science and Technology, Douliou, Taiwan, Republic of China.
    Observer–Based Control for a New Stochastic Maximum Power Point tracking for Photovoltaic Systems With Networked Control System2023In: IEEE transactions on fuzzy systems, ISSN 1063-6706, E-ISSN 1941-0034, Vol. 31, no 6, p. 1870-1884Article in journal (Refereed)
    Abstract [en]

    This study discusses the new stochastic maximum power point tracking (MPPT) control approach towards the photovoltaic cells (PCs). PC generator is isolated from the grid, resulting in a direct current (DC) microgrid that can provide changing loads. In the course of the nonlinear systems through the time-varying delays, we proposed a Networked Control Systems (NCSs) beneath an event-triggered approach basically in the fuzzy system. In this scenario, we look at how random, variable loads impact the PC generator's stability and efficiency. The basic premise of this article is to load changes and the value matching to a Markov chain. PC generators are complicated nonlinear systems that pose a modeling problem. Transforming this nonlinear PC generator model into the Takagi–Sugeno (T–S) fuzzy model is another option. Takagi–Sugeno (T–S) fuzzy model is presented in a unified framework, for which 1) the fuzzy observer–based on this premise variables can be used for approximately in the infinite states to the present system, 2) the fuzzy observer–based controller can be created using this same premises be the observer, and 3) to reduce the impact of transmission burden, an event-triggered method can be investigated. Simulating in the PC generator model for the realtime climate data obtained in China demonstrates the importance of our method. In addition, by using a new Lyapunov–Krasovskii functional (LKF) for combining to the allowed weighting matrices incorporating mode-dependent integral terms, the developed model can be stochastically stable and achieves the required performances. Based on the T-P transformation, a new depiction of the nonlinear system is derived in two separate steps in which an adequate controller input is guaranteed in the first step and an adequate vertex polytope is ensured in the second step. To present the potential of our proposed method, we simulate it for PC generators. © 2022 IEEE.

    Download full text (pdf)
    fulltext
  • 36.
    Assabie, Yaregal
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Ethiopic Document Image Database for Testing Character Recognition Systems2006Report (Other academic)
    Abstract [en]

    In this paper we describe the acquisition and content of a large database of Ethiopic documents for testing and evaluating character recognition systems. The Ethiopic Document Image Database (EDIDB) contains documents written in Amharic and Geez languages. The database was built from a variety of documents such as printouts, books, newspapers, and magazines. Documents written in various font types, sizes and styles were included in the database. Degraded and poor quality documents were also included in the database to represent the real life situation. A total of 1,204 pages were scanned at a resolution of 300 dpi and saved as grayscale images of JPEG format. We also describe an evaluation protocol for standardizing the comparison of recognition systems and their results. The database is made available to the research community through http://www.hh.se/staff/josef/.

  • 37.
    Auvoja, Kevin
    et al.
    Halmstad University, School of Information Technology.
    Sturesson, Rasmus
    Halmstad University, School of Information Technology.
    Robotic Process Automation (RPA) i sjukvården:: En studie om effektivisering och dess påverkan för personal och patienter2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today's digitalization places ever higher demand on businesses, as larger amounts of data need to be handled in an efficient and secure way. Applying digital tools and technologies in businesses can support more efficient data management while freeing up human resources. In health care, a lot of time is spent on administrative tasks which means that there is less time over for the core business itself, which is the care of patients. Robotic Process Automation (RPA) is a technology that can help reduce the administrative work for healthcare staff, where staff in turn can have a greater patient focus. RPA is a digital tool that automates repetitive and rule-based business processes by operating in the same interface as a human resource. RPA imitates how a user works in a digital system and can then perform various business processes without human intervention.There are both opportunities and challenges when it comes to RPA in healthcare. The purpose of the study is to investigate the opportunities and challenges that may arise after the introduction of RPA in different hospitals. The paper will adopt a qualitative approach, where semi-structured interviews will be used to collect empirical data from several different hospitals. The empirical data, together with previous research in the field, will lead to conclusions about the opportunities and challenges that exist after the introduction of RPA in the healthcare sector. Finally, a table will be presented that shows identified opportunities and challenges linked to the three organizational objectives: efficiency, quality, and costs.

    Download full text (pdf)
    fulltext
  • 38.
    Axelsson, Andreas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ambrosius, Christian
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Nya lagar och avtal: Hur kan de komma att förändra svenskarnas fildelningsvanor?2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    I många år nu har det varit vanligt förekommande att människor suttit hemma vid sin dator och med några få klick laddat ner filmer, musik och programvaror, till en början helt lagligt, men med åren har lagar kommit till som har gjort det mer och mer olagligt.Oavsett om det har varit lagligt eller inte, så är det troligt att många artister, filmmakare och liknande gått miste om stora summor pengar i förlorade inkomster på grund av att folk inte har betalat för att ta del av deras verk, utan istället valt att ladda ner dem över Internet.

    Det faktum att fildelning har blivit så pass vanligt och att folk inte har sett det som ett särskilt allvarligt brott, har lett till att fildelning länge har varit ett hett omdiskuterat ämne i media, bland upphovsrättsinnehavare och bland folk i allmänhet. Upphovsmän och upphovsrättsinnehavare, såsom filmbolag, författare och artister har legat på och debatterat för att försöka få till en hårdare lagstiftning för att försvåra fildelning och kopiering av upphovsrättsskyddat material, samt för att få till hårdare straff mot fildelning.

    Flera försök från beslutsfattare har gjorts för att råda bot på problemet, nya lagar har stiftats och avtal har skrivits under. Frågan är om de nya lagarna och avtalen gör någon nytta? Blir folk avskräckta från att fildela eller fortsätter de som förut? Många har säkert under många år blivit bortskämda med att kunna sitta hemma vid datorn och på några minuter få hem de senaste filmerna och den nyaste musiken helt gratis, vilket säkert gör det svårt att helt plötsligt sluta fildela och börja betala för film och musik igen.

    Download full text (pdf)
    fulltext
  • 39.
    Bae, Juhee
    et al.
    University of Skövde, Skövde, Sweden.
    Helldin, Tove
    University of Skövde, Skövde, Sweden.
    Riveiro, Maria
    Jönköping University, Jönköping, Sweden & University of Skövde, Skövde, Sweden.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bouguelia, Mohamed-Rafik
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Falkman, Göran
    University of Skövde, Skövde, Sweden.
    Interactive Clustering: A Comprehensive Review2020In: ACM Computing Surveys, ISSN 0360-0300, E-ISSN 1557-7341, Vol. 53, no 1, article id 1Article in journal (Refereed)
    Abstract [en]

    In this survey, 105 papers related to interactive clustering were reviewed according to seven perspectives: (1) on what level is the interaction happening, (2) which interactive operations are involved, (3) how user feedback is incorporated, (4) how interactive clustering is evaluated, (5) which data and (6) which clustering methods have been used, and (7) what outlined challenges there are. This article serves as a comprehensive overview of the field and outlines the state of the art within the area as well as identifies challenges and future research needs. © 2020 Copyright held by the owner/author(s).

  • 40.
    Balador, Ali
    et al.
    SICS Swedish ICT Västerås AB, Västerås, Sweden. & Polytechnic University of Valencia, Valencia, Spain.
    Böhm, Annette
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Calafate, Carlos T.
    Polytechnic University of Valencia, Valencia, Spain.
    Cano, Juan-Carlos
    Polytechnic University of Valencia, Valencia, Spain.
    A Reliable Token-Based MAC Protocol for V2V Communication in Urban VANET2016In: 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), Piscataway: IEEE , 2016, p. 1586-1591Conference paper (Refereed)
    Abstract [en]

    Safety applications developed for vehicular environments require every vehicle to periodically broadcast its status information (beacon) to all other vehicles, thereby avoiding the risk of car accidents in the road. Due to the high requirements on timing and reliability posed by traffic safety applications, the current IEEE 802.11p standard, which uses a random access Medium Access Control (MAC) protocol, faces difficulties to support timely and reliable data dissemination in vehicular environments where no acknowledgement or RTS/CTS (Request-to-Send/Clear-to-Send) mechanisms are adopted. In this paper, we propose the Dynamic Token-Based MAC (DTB-MAC) protocol. It implements a token passing approach on top of a random access MAC protocol to prevent channel contention as much as possible, thereby improving the reliability of safety message transmissions. Our proposed protocol selects one of the neighbouring nodes as the next transmitter; this selection accounts for the need to avoid beacon lifetime expiration. Therefore, it automatically offers retransmission opportunities to allow vehicles to successfully transmit their beacons before the next beacon is generated whenever time and bandwidth are available. Based on simulation experiments, we show that the DTB-MAC protocol can achieve better performance than IEEE 802.11p in terms of channel utilization and beacon delivery ratio for urban scenarios.

  • 41.
    Beitollahi, Hakem
    et al.
    School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran.
    Sharif, Dyari Mohammad
    Computer Science Department, Soran University, Kurdistan Region, Soran, Iraq.
    Fazeli, Mahdi
    Halmstad University, School of Information Technology.
    Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function2022In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 63844-63854Article in journal (Refereed)
    Abstract [en]

    In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP connections. Researchers have suggested several techniques for detecting App-DDoS traffic. There is, however, no clear distinction between legitimate and attack traffic. In this paper, we go a step further and propose a Machine Learning (ML) solution by combining the Radial Basis Function (RBF) neural network with the cuckoo search algorithm to detect App-DDoS traffic. We begin by collecting training data and cleaning them, then applying data normalizing and finding an optimal subset of features using the Genetic Algorithm (GA). Next, an RBF neural network is trained by the optimal subset of features and the optimizer algorithm of cuckoo search. Finally, we compare our proposed technique to the well-known k-nearest neighbor (k-NN), Bootstrap Aggregation (Bagging), Support Vector Machine (SVM), Multi-layer Perceptron) MLP, and (Recurrent Neural Network) RNN methods. Our technique outperforms previous standard and well-known ML techniques as it has the lowest error rate according to error metrics. Moreover, according to standard performance metrics, the results of the experiments demonstrate that our proposed technique detects App-DDoS traffic more accurately than previous techniques. © 2013 IEEE.

    Download full text (pdf)
    fulltext
  • 42.
    Belwal, Chaitanya
    et al.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Cheng, Albert M.K.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Taha, Walid
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Release Offset Bounds for Response Time Analysis of P-FRP using Exhaustive Enumeration2011In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, N.J.: IEEE Press, 2011, p. 950-957Conference paper (Refereed)
    Abstract [en]

    Functional*Reactive Programming (FRP) is a declarative approach to modeling and building reactive systems. Priority-based FRP (P-FRP) is a formalism of FRP that guarantees real-time response. Unlike the classical preemptive model1 of real-time systems, preempted tasks in PFRP are aborted and have to restart when higher priority tasks have completed. Due to this abort-restart of nature of preemption, there is no single critical instant of release that leads to Worst-Case Response Time (WCRT) of lower priority P-FRP tasks. At this time, the only method for determining the WCRT is through an exhaustive enumeration of all release offsets of higher priority tasks between the release and deadline of the lower priority task. This makes the computational cost of WCRT dependent on the deadline of a task, and when such deadlines are large the computational costs of this technique make it infeasible even for small task sets. In this paper, we show that the release offsets of higher priority tasks have a lower and upper bound and present techniques to derive these bounds. By enumerating only those release offsets while lie within our derived bounds the number of release scenarios that have to be enumerated is significantly reduced. This leads to lower computational costs and makes determination of the WCRT in P-FRP a practically feasible proposition. © 2011 IEEE.

  • 43.
    Belwal, Chaitanya
    et al.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Cheng, Albert M.K.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Taha, Walid
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Zhu, Angela
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Timing Analysis of the Priority based FRP System2008In: Proceedings Work-In-Progress Session of the 14th Real-Time and Embedded Technology and Applications Symposium: 22-24 April, 2008: St. Louis, USA / [ed] Ying Lu, Lincoln, NE: University of Nebraska–Lincoln, Computer Science and Engineering , 2008, p. 89-92Conference paper (Refereed)
    Abstract [en]

    Kaiabachev, Taha, Zhu [1] have presented a declarative programming paradigm called Functional Reactive Programming, which is based on behaviors and events. An improved system called P-FRP uses fixed priority scheduling for tasks. The system allows for the currently executing lower priority tasks to be rolled back to restoring the original state and allowing a higher priority task to run. These aborted tasks will restart again when no tasks of higher priority are in the queue. Since P-FRP has many applications in the real time domain it is critical to understand the time bound in which the tasks which have been aborted are guaranteed to run, and if the task set is schedulable. In this paper we provide an analysis of the unique execution paradigm of the P-FRP system and study the timing bounds using different constraint variables.

    1. R. Kaiabachev, W. Taha, A. Zhu, E-FRP with priorities, In the Proceedings of the 7th ACM & IEEE international conference on Embedded software, Pages: 221 - 230, 2007.

  • 44.
    Benaissa, Zine El-Abidine
    et al.
    Oregon Graduate Institute, Portland, OR, USA.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Oregon Graduate Institute, Portland, OR, USA.
    Sheard, Tim
    Oregon Graduate Institute, Portland, OR, USA.
    Logical Modalities and Multi-Stage Programming1999Conference paper (Refereed)
    Abstract [en]

    Multi-stage programming is a method for improving the performance of programs through the introduction of controlled program specialization. This paper makes a case for multi-stage programming with open code and closed values. We argue that a simple language exploiting interactions between two logical modalities is well suited for multi-stage programming, and report the results from our study of categorical models for multi-stage languages.

  • 45.
    Bengtsson, Matilda
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Color adjustment of digital images of clothes for truthful rendering2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    E-commerce is a growing market for selling gods and digital images are often used to display the product. However, there is a problem when the color of the object does not match the reality. This can lead to a dissatisfaction of the customer and a return of the product. Returned goods causes a significant loss in revenue for the suppliers. One reason for untruthful rendering of colors in images is due to different temperatures, or colors, of the illumination sources lighting the scene and the object. This effect can be reduced by a method called white balance. In this thesis, an algorithm based on the technique in Hsu et al. was implemented for a more truthful rendering of images of clothes and toys used in e-commerce. The algorithm removes unwanted color casts induced in the image from two different illumination sources. The thesis also marks important details missing in aforementioned paper as well as some drawbacks of the proposed technique, such as high processing time.

    Download full text (pdf)
    fulltext
  • 46.
    Bergenhem, Carl
    et al.
    SP - Technical Research Institute of Sweden Department of Electronics, Borås, Sweden.
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Two Protocols with Heterogeneous Real-Time Services for High-Performance Embedded Networks2012Report (Other academic)
    Abstract [en]

    High-performance embedded networks are found in computer systems that perform applications such as radar signal processing and multimedia rendering. The system can be composed of multiple computer nodes that are interconnected with the network. Properties of the network such as latency and speed affect the performance of the entire system. A node´s access to the network is controlled by a medium access protocol. This protocol decides e.g. real-time properties and services that the network will offer its users, i.e. the nodes. Two such network protocols with heterogeneous real-time services are presented. The protocols offer different communication services and services for parallel and distributed real-time processing. The latter services include barrier synchronisation, global reduction and short message service. A network topology of a unidirectional pipelined optical fibre-ribbon ring is assumed for both presented protocols. In such a network several simultaneous transmissions in non-overlapping segments are possible. Both protocols are aimed for applications that require a high-performance embedded network such as radar signal processing and multimedia. In these applications the system can be organised as multiple interconnected computation nodes that co-operate in parallel to achieve higher performance. The computing performance of the whole system is greatly affected by the choice of network. Computing nodes in a system for radar signal processing should be tightly coupled, i.e., communications cost, such as latency, between nodes should be small. This is possible if a suitable network with an efficient protocol is used. The target applications have heterogeneous real-time requirements for communication in that different classes of data-traffic exist. The traffic can be classified according to its requirements. The proposed protocols partition data-traffic into three classes with distinctly different qualities. These classes are: traffic with hard real-time demands, such as mission critical commands; traffic with soft real-time demands, such as application data (a deadline miss here only leads to decreased performance); and traffic with no real-time constraints at all. The protocols are analysed and performance is tested through simulation with different data-traffic patterns.

    Download full text (pdf)
    2012_Report_TwoProt.pdf
  • 47. Berggren, Per
    et al.
    Hiljemark, Rasmus
    Mot grönare IT: En studie om att förstå hinder företag ställs inför vid införandet av grön-IT2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 48.
    Bigun, Josef
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Choy, Kwok-wai
    Olsson, Henrik
    Evidence on skill differences of women and men concerning face recognition2001Report (Other academic)
    Abstract [en]

    We present a cognitive study regarding face recognition skills of women and men. The results reveal that there are in the average sizable skill differences between women and men in human face recognition. The women had higher correct answer frequencies then men in all face recognition questions they answered. In difficult questions, those which had fewer correct answers than other questions, the performance of the best skilled women were remarkably higher than the best skilled men. The lack of caricature type information (high spatial frequencies) hampers the recognition task significantly more than the lack of silhouette and shading (low spatial frequencies) information, according to our findings. Furthermore, the results confirmed the previous findings that hair style and facial expressions degrades the face recognition performance of humans significantly. The reported results concern 1838 individuals and the study was effectuated by means of Internet.

  • 49.
    Bildtmark, Kim
    et al.
    Halmstad University, School of Information Technology.
    Jädersand, Robin
    Halmstad University, School of Information Technology.
    Security Awareness for Mobility: En studie om företagsmobilitet och de säkerhetsrisker som följer2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 50.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bluetooth in industrial environment2000In: 2000 IEEE International Workshop on Factory Communication Systems: proceedings : 6-8 September, 2000, ISEP, Porto, Portugal / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2000, p. 239-246Conference paper (Refereed)
    Abstract [en]

    In this paper an initial study of the use of Bluetooth in industrial environment is presented. The tests have been performed at a paper-mill, and in an office environment at Halmstad University. It shows the possibility to use Bluetooth for wireless short range communication in an industrial environment.

1234567 1 - 50 of 335
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf