hh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
12345 1 - 50 av 208
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Adekolu, Adekunle Matthew
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Khan, Hasan
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Neelam, Neelam
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Network Monitoring2014Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Managing a network is a very big functional area along with performance, devicemaintenance, security, performance, monitoring, troubleshooting, plan of changeand etc. Among all of these monitoring plays a vital role. It can cover a wide area ofnetwork management. Monitoring is the only way to find out whether the networkis functioning according to plan. In order to know what is happening in a network,how its functioning at any given time, a network should have a logging system. Nowa day this logging activity is done by Network monitoring tool. It lets user know thestatus of the network at any given time. This logging can give the user a wide viewwhat can't be seen in general. For example the statistics of a week or month, even ayear. Monitoring is a very important issue in an organization network which aroseover the time.In this project we are going to implement some well known network monitoringtools in a real world scenario and we will investigate how this monitoring tool canhelp network administrators to monitor a network . Moreover, what kind ofinformation we can extract from a network by these tools.The purpose of this project is to get an overall idea about the importance of networkmonitoring and what are the facts need to be considered while monitoring anetwork. There are lots of pros and cons in monitoring a network. So choosing theappropriate tool for monitoring is very important. Monitoring a network with theleast effects on network performance is the best solution in case of monitoring.The outcome from these monitoring tools is a wide range of useful data andintegration of these data produces the status of the network at any give time.Moreover these data will be logged to create a statistical report. Different users suchas a network admin and organization can use this information from differentperspectives to make a network more efficient for users.

  • 2.
    Ahmadi, Lina
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Green Driving Application: Eco Driving2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Eco-driving has acquired great importance in recent years because it is a way to reduce energy consumption that can be applied to any type of vehicle. However, for these rules to be applied requires a process of continuous learning and motivation. For this reason many eco-driving assistants have emerged.

    This paper presents Green Driving, a driver safety app for Android that detects inattentive driving behaviors and gives corresponding feedback to drivers, scoring their driving and alerting them in case their behaviors are unsafe.  It’s about changing a person’s driving behavior by providing some kind of advice to the driver.  I have worked on an algorithm that is meant to reduce the fuel consumption of users. The algorithm is deployed in an android application.

    This application “Green Driving” is aimed at users with cars. It is basically like an assistant, suggesting the user when he should make the right gear changes, when to increase/decrease speed and avoids hard braking and rapid acceleration and etc. It is in order to drive economically, ecologic and in turn save money and safety. This is a smart way of letting a user drive economically and ecologic since almost everyone has an Android smartphone now. 

  • 3.
    Akinola, Azeez Paul
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    chong, zhang
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)2012Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Since the introduction of networks, they have been used amongst home users, companies and organizations and most damage on the network is due to inappropriate security configurations. To secure networks, a protocol suite can be used to encrypt and authenticate all IP packets of a session. Therefore, this report will include the advantages and possible solution of some techniques used to offer increased network security such as scalability and data confidentiality. Captures of traffic sent using the two security techniques, IPSec/VPN and GRE-Tunnel will be monitored. The objective behind this project is to configure a network with these two different tunneling techniques and compare the security and network performance. The report also describes the security problems encountered by networks such as the ignorance of network users, vulnerabilities and the security of the devices.IPSecis a standard security protocol solution for TCP/IP, and it provides security through authentication, encryption and data integrity. GRE encapsulates packets and create a logical hub-and spoke topology of virtual point-to-point connections. The Jperf-tool is used to measure network performance and show specific details while another tool, Wireshark is used to analyze the information captured during transmission of data sent using IPSEC and GRE. The comparison further finds that IPSec-tunnel technique makes data transfers very secure but causes network performance disadvantages in comparison to a GRE solution.

  • 4.
    Albayrak, Aras
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Automatic Pose and Position Estimation by Using Spiral Codes2014Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This master thesis is about providing the implementation of synthesis, detection of spiral symbols and estimating the pan/tilt angle and position by using camera calibration. The focus is however on the latter, the estimation of parameters of localization.

    Spiral symbols are used to be able to give an object an identity as well as to locate it. Due to the spiral symbol´s characteristic shape, we can use the generalized structure tensor (GST) algorithm which is particularly efficient to detect different members of the spiral family. Once we detect spirals, we know the position and identity parameters of the spirals within an apriori known geometric configuration (on a sheet of paper). In turn, this information can be used to estimate the 3D-position and orientation of the object on which spirals are attached using a camera calibration method.

     

    This thesis provides an insight into how automatic detection of spirals attached on a sheet of paper, and from this, automatic deduction of position and pose parameters of the sheet, can be achieved by using a network camera. GST algorithm has an advantage of running the processes of detection of spirals efficiently w.r.t detection performance and computational resources because it uses a spiral image model well adapted to spiral spatial frequency characteristic. We report results on how detection is affected by zoom parameters of the network camera, as well as by the GST parameters; such as filter size. After all spirals centers are located and identified w.r.t. their twist/bending parameter, a flexible technique for camera calibration, proposed by Zhengyou Zhang implemented in Matlab within the present study, is performed. The performance of the position and pose estimation in 3D is reported.

    The main conclusion is, we have reasonable surface angle estimations for images which were taken by a WLAN network camera in different conditions such as different illumination and different distances. 

  • 5.
    Alendal, Gunnar
    et al.
    NTNU, Gjøvik, Norway.
    Dyrkolbotn, Geir Olav
    NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
    Axelsson, Stefan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode2018Ingår i: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, nr Suppl., s. S60-S67Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

  • 6.
    Ali, Mustafa
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Abid, Hussain
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Wireless and Industrial Network2013Självständigt arbete på grundnivå (kandidatexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The purpose of this report is to implement the wireless network in a company withtwo different sites which is located in Riga and Malmo. The main task of this reportis to implement and configure wireless industrial network. This report is based oninformation we gathered from the ABC Company about their requirements for awireless network.Requirements of this ABC Company is focusing on their infrastructure planning,security and implementing them. Benefits and drawbacks of industrial wirelessnetwork will be described briefly in this report to get some idea how ABC Companywill face the problem when they will implement their wireless network.

  • 7.
    Almgren, David
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Alshammari, Hussam
    Högskolan i Halmstad, Akademin för informationsteknologi.
    SmartBand Alert: Ett armband för säkerhet2017Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Safety is a topic that is frequently discussed and spoken of in today’s society. An enhanced security for each individual is something many strive for in various industries. One of these is how to make the public feel more secure when the person in question, for example, is out walking late at night. The goal of this bachelors thesis is thus to describe and explain the product that has been developed to get ordinary people to feel more secure wherever they are. The chosen solution for this issue was hence to develop the product SmartBand Alert which consists of two parts. A bracelet and an application for IOS and Android. This bracelet should, by certain connectivity cooperate with the user’s phone to notify family members and/or others when the person thinks or knows that he or she is in danger. These persons will be notified with information about the person who has activated the alarm to simply and easily take the necessary actions to help the person. The product is designed to be used by anyone regardless of gender, age, and other characteristics individuals may hold.

  • 8.
    Alveflo, Victor
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Virtual Training Tool: Mjukvarubaserat utbildningsverktyg2014Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    En viktig del hos företag som tillverkar diverse industrimaskiner är att utbilda den personal som förväntas använda och underhålla maskinerna. Detta är för att ge användaren en god förståelse för hur maskinen i fråga fungerar och är uppbyggd. Vid sådana utbildningar är det viktigt att tillhandahålla användarvänligt utbildnings-material.

    Målet med detta examensarbete är att förbättra användarvänligheten för utbildningsmaterialet hos en viss utbildning för projektets uppdragsgivare. Den utbildning som skall förbättras går i dagsläget ut på att manuellt simulera processer hos en specifik maskin via en hårdvarubaserad simuleringsmiljö.

    Resultatet blev en lösning i form av en mjukvarubaserad simulator med tillhörande grafiskt användargränssnitt. Användaren kan därigenom på ett säkert sätt simulera maskinens beteende genom ett PC-program och då t.ex. skapa nödsituationer utan att användarens säkerhet sätts i fara.

  • 9.
    AMEEN HASHIM, FARHAN
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Al Eid, Jamal
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Al-Salem, Abdulkhaliq
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Comparing of Real-Time Properties in Networks Based On IPv6 and IPv42013Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Real time applications over IP network became widely used in different fields; social video conference, online educational lectures, industrial, military, and online robotic medical surgery.

    Online medical surgery over IP network has experienced rapid growth in the last few years primarily due to advances in technology (e.g., increased bandwidth; new cameras, monitors, and coder/decoders (CODECs)) and changes in the medical care environment (e.g., increased outpatient care, remote surgeries).

    The purpose of this study was to examine and analyze the impact of IP networks parameters; delay, jitter, throughput, and drop packet on the performance of real-time medical surgery videos sent across different IP networks; native IPv6, native IPv4, 6to4 and 6in4 tunneling transition mechanisms and compare the behavior of video packets over IP networks. The impact of each parameter over IP networks is examined by using different video codecs MPEG-1, MPEG-2, and MPEG-4.

    This study has been carried out with two main parts; theoretical and practical part, the theoretical part of this study focused on the calculations of various delays in IP networks such as transmission, processing, propagation, and queuing delays for video packet, while the practical part includes; examining of video codecs throughput over IP networks by using jperf tool and examining delay, jitter, and packet drops for different packet sizes by using IDT-G tool and how these parameters can affect quality of received video.

    The obtained theoretical and practical results were presented in different tables and plotted into different graphs to show the performance of real time video over IP networks. These results confirmed that video codecs MPEG-1, MPEG-2, and MPEG-4 were highly impacted by encapsulation and de-capsulation process except MPEG-4 codec, MPEG-4 was the least impacted by IPv4, IPv6, and IP transition mechanisms concerning throughput and wastage bandwidth. It also indicated that using IPv6-to-4 and IPv6-in-4 tunneling mechanisms caused more bandwidth wastage, high delay, jitter, and packet drop than IPv4 and IPv6.

  • 10.
    Andersson, Roland
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Utvinning av data ur mobiltelefoner: En valideringsstudie av forensiska verktyg2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Den vetenskapliga aspekten i de flesta forensiska discipliner är välgrundad och prövad under ett långt tidsperspektiv. Det ökande användandet av digital teknik har gjort att en ny forensisk disciplin har vuxit fram och den vetenskapliga grunden i detta nya forensiska område är i många avseenden fortfarande outforskat. Inom det svenskarättsväsendet krävs att de forensiska metoder som används inom en brottsutredning ska vara kvalitetssäkrade och i största mån vara ackrediterade av ettackrediteringsorgan. Det finns idag få relevanta studier kring validering av forensiska metoder som hanterar småskaliga enheter som smarta mobiler.

    I denna rapport analyseras de metoder som används för att utvinna data från mobiltelefon och hur dessa metoder kan anses vara forensiskt korrekta. Rapporten presenterar ett nytt ramverk för att validera de metoder som används av ett forensisk verktyg. Ramverket är kvalitetssäkrat genom att utgå ifrån tidigare vetenskaplig studier och är praktiskt testad i laboratoriemiljö. Ramverket ska kunna användas direkt inom en forensisk verksamhet som kräver validering.

  • 11.
    Andreasson, Henrik
    et al.
    Örebro University, Örebro, Sweden.
    Bouguerra, Abdelbaki
    Örebro University, Örebro, Sweden.
    Åstrand, Björn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Rögnvaldsson, Thorsteinn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Gold-fish SLAM: An application of SLAM to localize AGVs2014Ingår i: Field and Service Robotics: Results of the 8th International Conference / [ed] Kazuya Yoshida & Satoshi Tadokoro, Heidelberg: Springer, 2014, s. 585-598Konferensbidrag (Refereegranskat)
    Abstract [en]

    The main focus of this paper is to present a case study of a SLAM solution for Automated Guided Vehicles (AGVs) operating in real-world industrial environments. The studied solution, called Gold-fish SLAM, was implemented to provide localization estimates in dynamic industrial environments, where there are static landmarks that are only rarely perceived by the AGVs. The main idea of Gold-fish SLAM is to consider the goods that enter and leave the environment as temporary landmarks that can be used in combination with the rarely seen static landmarks to compute online estimates of AGV poses. The solution is tested and verified in a factory of paper using an eight ton diesel-truck retrofitted with an AGV control system running at speeds up to 3m/s. The paper includes also a general discussion on how SLAM can be used in industrial applications with AGVs. © Springer-Verlag Berlin Heidelberg 2014.

  • 12.
    Angelsmark, Ola
    et al.
    Department of Computer Science, Lund University, Lund, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Lund, Sweden.
    Nilsson, Klas
    Department of Computer Science, Lund University, Lund, Sweden.
    Nowaczyk, Sławomir
    Department of Computer Science, Lund University, Lund, Sweden.
    Prosperi, Leonardo
    Department of Computer Science, Lund University, Lund, Sweden.
    Knowledge Representation for Reconfigurable Automation Systems2007Konferensbidrag (Refereegranskat)
    Abstract [en]

    This article describes the work in progress on knowledge representation formalisms chosen for use in the European project SIARAS. Skill-Based Inspection and Assembly for Reconfigurable Automation Systems has a goal of creating intelligent support system for reconfiguration and adaptation of assembly systems. Knowledge is represented in an ontology expressed in OWL, for generic reasoning in Description Logic, and in a number of special-purpose reasoning modules, specific for the application domain.

  • 13.
    Aramrattana, Maytheewat
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Modelling and Simulation for Evaluation of Cooperative Intelligent Transport System Functions2016Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Future vehicles are expected to be equipped with wireless communication tech- nology, that enables them to be “connected” to each others and road infras- tructures. Complementing current autonomous vehicles and automated driving systems, the wireless communication allows the vehicles to interact, cooperate, and be aware of its surroundings beyond their own sensors’ range. Such sys- tems are often referred to as Cooperative Intelligent Transport Systems (C-ITS), which aims to provide extra safety, efficiency, and sustainability to transporta- tion systems. Several C-ITS applications are under development and will require thorough testing and evaluation before their deployment in the real-world. C- ITS depend on several sub-systems, which increase their complexity, and makes them difficult to evaluate.

    Simulations are often used to evaluate many different automotive appli- cations, including C-ITS. Although they have been used extensively, simulation tools dedicated to determine all aspects of C-ITS are rare, especially human fac- tors aspects, which are often ignored. The majority of the simulation tools for C-ITS rely heavily on different combinations of network and traffic simulators. The human factors issues have been covered in only a few C-ITS simulation tools, that involve a driving simulator. Therefore, in this thesis, a C-ITS simu- lation framework that combines driving, network, and traffic simulators is pre- sented. The simulation framework is able to evaluate C-ITS applications from three perspectives; a) human driver; b) wireless communication; and c) traffic systems.

    Cooperative Adaptive Cruise Control (CACC) and its applications are cho- sen as the first set of C-ITS functions to be evaluated. Example scenarios from CACC and platoon merging applications are presented, and used as test cases for the simulation framework, as well as to elaborate potential usages of it. Moreover, approaches, results, and challenges from composing the simulation framework are presented and discussed. The results shows the usefulness of the proposed simulation framework.

  • 14.
    Aramrattana, Maytheewat
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Englund, Cristofer
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab). RISE Viktoria, Göteborg, Sweden.
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Safety Analysis of Cooperative Adaptive Cruise Control in Vehicle Cut-in Situations2017Ingår i: Proceedings of 2017 4th International Symposium on Future Active Safety Technology towards Zero-Traffic-Accidents (FAST-zero), Society of Automotive Engineers of Japan , 2017, artikel-id 20174621Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cooperative adaptive cruise control (CACC) is a cooperative intelligent transport systems (C-ITS) function, which especially when used in platooning applications, possess many expected benefits including efficient road space utilization and reduced fuel consumption. Cut-in manoeuvres in platoons can potentially reduce those benefits, and are not desired from a safety point of view. Unfortunately, in realistic traffic scenarios, cut-in manoeuvres can be expected, especially from non-connected vehicles. In this paper two different controllers for platooning are explored, aiming at maintaining the safety of the platoon while a vehicle is cutting in from the adjacent lane. A realistic scenario, where a human driver performs the cut-in manoeuvre is used to demonstrate the effectiveness of the controllers. Safety analysis of CACC controllers using time to collision (TTC) under such situation is presented. The analysis using TTC indicate that, although potential risks are always high in CACC applications such as platooning due to the small inter-vehicular distances, dangerous TTC (TTC < 6 seconds) is not frequent. Future research directions are also discussed along with the results.

  • 15.
    Aramrattana, Maytheewat
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Cooperative Driving Simulation2016Ingår i: Proceedings of the Driving Simulation Conference 2016, 2016, s. 123-132Konferensbidrag (Refereegranskat)
    Abstract [en]

    For a few decades, driving simulators have been supporting research and development of advanced driver assistance systems (ADAS). In the near future, connected vehicles are expected to be deployed. Driving simulators will need to support evaluation of cooperative driving applications within cooperative intelligent transportation systems (C-ITS) scenarios. C-ITS utilize vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication. Simulation of the inter vehicle communication is often not supported in driving simulators. On the other hand, previous efforts have been made to connect network simulators and traffic simulators, to perform C-ITS simulations. Nevertheless, interactions between actors in the system is an essential aspect of C-ITS. Driving simulators can provide the opportunity to study interactions and reactions of human drivers to the system. This paper present simulation of a C-ITS scenario using a combination of driving, network, and traffic simulators. The architecture of the solution and important challenges of the integration are presented. A scenario from Grand Cooperative Driving Challenge (GCDC) 2016 is implemented in the simulator as an example use case. Lastly, potential usages and future developments are discussed.

  • 16.
    Aramrattana, Maytheewat
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jansson, Jonas
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Nåbo, Arne
    The Swedish National Road and Transport Research Institute (VTI), Linköping, Sweden.
    Extended Driving Simulator for Evaluation of Cooperative Intelligent Transport Systems2016Ingår i: SIGSIM-PADS '16: Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation, New York: ACM Digital Library, 2016, s. 255-278Konferensbidrag (Refereegranskat)
    Abstract [en]

    Vehicles in cooperative intelligent transport systems (C-ITS) often need to interact with each other in order to achieve their goals, safe and efficient transport services. Since human drivers are still expected to be involved in C-ITS, driving simulators are appropriate tools for evaluation of the C-ITS functions. However, driving simulators often simplify the interactions or influences from the ego vehicle on the traffic. Moreover, they normally do not support vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communication, which is the main enabler for C-ITS. Therefore, to increase the C-ITS evaluation capability, a solution on how to extend a driving simulator with traffic and network simulators to handle cooperative systems is presented as a result of this paper. Evaluation of the result using two use cases is presented. And, the observed limitations and challenges of the solution are reported and discussed. © 2016 ACM, Inc.

  • 17.
    Aronsson, John
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Bolmér, Percy
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Hur forensiska verktyg påverkar integriteten på mobiltelefoner2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Användandet av mobiltelefoner och andra mobila enheter är stort i samhället vilket gör att de förekommer allt oftare vid brott och brottsutredningar. Information i dessa enheter måste kunna utvinnas och integriteten på det utvinna materialet säkerställas. Syftet med detta arbete är att undersöker om de forensiska verktygen Xry och Encase påverkar materialet vid utvinning från mobiltelefoner. För att ta reda på detta har en litteraturstudie, en intervju och två experiment utförts. Resultatet från experimenten visade på att det fanns filer vars innehåll ändrades mellan utvinningar. En analys av resultatet visade att det var systemet själv samt processer som skedde innan utvinningen som förändrat innehållet. Slutsatsen blev att verktygen inte påverkar materialet under utvinningsprocessen

  • 18.
    Assabie, Yaregal
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Ethiopic Document Image Database for Testing Character Recognition Systems2006Rapport (Övrigt vetenskapligt)
    Abstract [en]

    In this paper we describe the acquisition and content of a large database of Ethiopic documents for testing and evaluating character recognition systems. The Ethiopic Document Image Database (EDIDB) contains documents written in Amharic and Geez languages. The database was built from a variety of documents such as printouts, books, newspapers, and magazines. Documents written in various font types, sizes and styles were included in the database. Degraded and poor quality documents were also included in the database to represent the real life situation. A total of 1,204 pages were scanned at a resolution of 300 dpi and saved as grayscale images of JPEG format. We also describe an evaluation protocol for standardizing the comparison of recognition systems and their results. The database is made available to the research community through http://www.hh.se/staff/josef/.

  • 19.
    Axelsson, Andreas
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Ambrosius, Christian
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Nya lagar och avtal: Hur kan de komma att förändra svenskarnas fildelningsvanor?2012Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    I många år nu har det varit vanligt förekommande att människor suttit hemma vid sin dator och med några få klick laddat ner filmer, musik och programvaror, till en början helt lagligt, men med åren har lagar kommit till som har gjort det mer och mer olagligt.Oavsett om det har varit lagligt eller inte, så är det troligt att många artister, filmmakare och liknande gått miste om stora summor pengar i förlorade inkomster på grund av att folk inte har betalat för att ta del av deras verk, utan istället valt att ladda ner dem över Internet.

    Det faktum att fildelning har blivit så pass vanligt och att folk inte har sett det som ett särskilt allvarligt brott, har lett till att fildelning länge har varit ett hett omdiskuterat ämne i media, bland upphovsrättsinnehavare och bland folk i allmänhet. Upphovsmän och upphovsrättsinnehavare, såsom filmbolag, författare och artister har legat på och debatterat för att försöka få till en hårdare lagstiftning för att försvåra fildelning och kopiering av upphovsrättsskyddat material, samt för att få till hårdare straff mot fildelning.

    Flera försök från beslutsfattare har gjorts för att råda bot på problemet, nya lagar har stiftats och avtal har skrivits under. Frågan är om de nya lagarna och avtalen gör någon nytta? Blir folk avskräckta från att fildela eller fortsätter de som förut? Många har säkert under många år blivit bortskämda med att kunna sitta hemma vid datorn och på några minuter få hem de senaste filmerna och den nyaste musiken helt gratis, vilket säkert gör det svårt att helt plötsligt sluta fildela och börja betala för film och musik igen.

  • 20.
    Balador, Ali
    et al.
    SICS Swedish ICT Västerås AB, Västerås, Sweden. & Polytechnic University of Valencia, Valencia, Spain.
    Böhm, Annette
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Calafate, Carlos T.
    Polytechnic University of Valencia, Valencia, Spain.
    Cano, Juan-Carlos
    Polytechnic University of Valencia, Valencia, Spain.
    A Reliable Token-Based MAC Protocol for V2V Communication in Urban VANET2016Ingår i: 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), Piscataway: IEEE , 2016, s. 1586-1591Konferensbidrag (Refereegranskat)
    Abstract [en]

    Safety applications developed for vehicular environments require every vehicle to periodically broadcast its status information (beacon) to all other vehicles, thereby avoiding the risk of car accidents in the road. Due to the high requirements on timing and reliability posed by traffic safety applications, the current IEEE 802.11p standard, which uses a random access Medium Access Control (MAC) protocol, faces difficulties to support timely and reliable data dissemination in vehicular environments where no acknowledgement or RTS/CTS (Request-to-Send/Clear-to-Send) mechanisms are adopted. In this paper, we propose the Dynamic Token-Based MAC (DTB-MAC) protocol. It implements a token passing approach on top of a random access MAC protocol to prevent channel contention as much as possible, thereby improving the reliability of safety message transmissions. Our proposed protocol selects one of the neighbouring nodes as the next transmitter; this selection accounts for the need to avoid beacon lifetime expiration. Therefore, it automatically offers retransmission opportunities to allow vehicles to successfully transmit their beacons before the next beacon is generated whenever time and bandwidth are available. Based on simulation experiments, we show that the DTB-MAC protocol can achieve better performance than IEEE 802.11p in terms of channel utilization and beacon delivery ratio for urban scenarios.

  • 21.
    Belwal, Chaitanya
    et al.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Cheng, Albert M.K.
    Dept. of Computer Science, University of Houston, Houston, USA.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Release Offset Bounds for Response Time Analysis of P-FRP using Exhaustive Enumeration2011Ingår i: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, N.J.: IEEE Press, 2011, s. 950-957Konferensbidrag (Refereegranskat)
    Abstract [en]

    Functional*Reactive Programming (FRP) is a declarative approach to modeling and building reactive systems. Priority-based FRP (P-FRP) is a formalism of FRP that guarantees real-time response. Unlike the classical preemptive model1 of real-time systems, preempted tasks in PFRP are aborted and have to restart when higher priority tasks have completed. Due to this abort-restart of nature of preemption, there is no single critical instant of release that leads to Worst-Case Response Time (WCRT) of lower priority P-FRP tasks. At this time, the only method for determining the WCRT is through an exhaustive enumeration of all release offsets of higher priority tasks between the release and deadline of the lower priority task. This makes the computational cost of WCRT dependent on the deadline of a task, and when such deadlines are large the computational costs of this technique make it infeasible even for small task sets. In this paper, we show that the release offsets of higher priority tasks have a lower and upper bound and present techniques to derive these bounds. By enumerating only those release offsets while lie within our derived bounds the number of release scenarios that have to be enumerated is significantly reduced. This leads to lower computational costs and makes determination of the WCRT in P-FRP a practically feasible proposition. © 2011 IEEE.

  • 22.
    Belwal, Chaitanya
    et al.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Cheng, Albert M.K.
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Taha, Walid
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Zhu, Angela
    Department of Computer Science, University of Houston, Houston, Texas, USA.
    Timing Analysis of the Priority based FRP System2008Ingår i: Proceedings Work-In-Progress Session of the 14th Real-Time and Embedded Technology and Applications Symposium: 22-24 April, 2008: St. Louis, USA / [ed] Ying Lu, Lincoln, NE: University of Nebraska–Lincoln, Computer Science and Engineering , 2008, s. 89-92Konferensbidrag (Refereegranskat)
    Abstract [en]

    Kaiabachev, Taha, Zhu [1] have presented a declarative programming paradigm called Functional Reactive Programming, which is based on behaviors and events. An improved system called P-FRP uses fixed priority scheduling for tasks. The system allows for the currently executing lower priority tasks to be rolled back to restoring the original state and allowing a higher priority task to run. These aborted tasks will restart again when no tasks of higher priority are in the queue. Since P-FRP has many applications in the real time domain it is critical to understand the time bound in which the tasks which have been aborted are guaranteed to run, and if the task set is schedulable. In this paper we provide an analysis of the unique execution paradigm of the P-FRP system and study the timing bounds using different constraint variables.

    1. R. Kaiabachev, W. Taha, A. Zhu, E-FRP with priorities, In the Proceedings of the 7th ACM & IEEE international conference on Embedded software, Pages: 221 - 230, 2007.

  • 23.
    Benaissa, Zine El-Abidine
    et al.
    Oregon Graduate Institute, Portland, OR, USA.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Oregon Graduate Institute, Portland, OR, USA.
    Sheard, Tim
    Oregon Graduate Institute, Portland, OR, USA.
    Logical Modalities and Multi-Stage Programming1999Konferensbidrag (Refereegranskat)
    Abstract [en]

    Multi-stage programming is a method for improving the performance of programs through the introduction of controlled program specialization. This paper makes a case for multi-stage programming with open code and closed values. We argue that a simple language exploiting interactions between two logical modalities is well suited for multi-stage programming, and report the results from our study of categorical models for multi-stage languages.

  • 24.
    Bengtsson, Matilda
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Color adjustment of digital images of clothes for truthful rendering2016Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    E-commerce is a growing market for selling gods and digital images are often used to display the product. However, there is a problem when the color of the object does not match the reality. This can lead to a dissatisfaction of the customer and a return of the product. Returned goods causes a significant loss in revenue for the suppliers. One reason for untruthful rendering of colors in images is due to different temperatures, or colors, of the illumination sources lighting the scene and the object. This effect can be reduced by a method called white balance. In this thesis, an algorithm based on the technique in Hsu et al. was implemented for a more truthful rendering of images of clothes and toys used in e-commerce. The algorithm removes unwanted color casts induced in the image from two different illumination sources. The thesis also marks important details missing in aforementioned paper as well as some drawbacks of the proposed technique, such as high processing time.

  • 25.
    Bergenhem, Carl
    et al.
    SP - Technical Research Institute of Sweden Department of Electronics, Borås, Sweden.
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Two Protocols with Heterogeneous Real-Time Services for High-Performance Embedded Networks2012Rapport (Övrigt vetenskapligt)
    Abstract [en]

    High-performance embedded networks are found in computer systems that perform applications such as radar signal processing and multimedia rendering. The system can be composed of multiple computer nodes that are interconnected with the network. Properties of the network such as latency and speed affect the performance of the entire system. A node´s access to the network is controlled by a medium access protocol. This protocol decides e.g. real-time properties and services that the network will offer its users, i.e. the nodes. Two such network protocols with heterogeneous real-time services are presented. The protocols offer different communication services and services for parallel and distributed real-time processing. The latter services include barrier synchronisation, global reduction and short message service. A network topology of a unidirectional pipelined optical fibre-ribbon ring is assumed for both presented protocols. In such a network several simultaneous transmissions in non-overlapping segments are possible. Both protocols are aimed for applications that require a high-performance embedded network such as radar signal processing and multimedia. In these applications the system can be organised as multiple interconnected computation nodes that co-operate in parallel to achieve higher performance. The computing performance of the whole system is greatly affected by the choice of network. Computing nodes in a system for radar signal processing should be tightly coupled, i.e., communications cost, such as latency, between nodes should be small. This is possible if a suitable network with an efficient protocol is used. The target applications have heterogeneous real-time requirements for communication in that different classes of data-traffic exist. The traffic can be classified according to its requirements. The proposed protocols partition data-traffic into three classes with distinctly different qualities. These classes are: traffic with hard real-time demands, such as mission critical commands; traffic with soft real-time demands, such as application data (a deadline miss here only leads to decreased performance); and traffic with no real-time constraints at all. The protocols are analysed and performance is tested through simulation with different data-traffic patterns.

  • 26. Berggren, Per
    et al.
    Hiljemark, Rasmus
    Mot grönare IT: En studie om att förstå hinder företag ställs inför vid införandet av grön-IT2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 27.
    Bigun, Josef
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Choy, Kwok-wai
    Olsson, Henrik
    Evidence on skill differences of women and men concerning face recognition2001Rapport (Övrigt vetenskapligt)
    Abstract [en]

    We present a cognitive study regarding face recognition skills of women and men. The results reveal that there are in the average sizable skill differences between women and men in human face recognition. The women had higher correct answer frequencies then men in all face recognition questions they answered. In difficult questions, those which had fewer correct answers than other questions, the performance of the best skilled women were remarkably higher than the best skilled men. The lack of caricature type information (high spatial frequencies) hampers the recognition task significantly more than the lack of silhouette and shading (low spatial frequencies) information, according to our findings. Furthermore, the results confirmed the previous findings that hair style and facial expressions degrades the face recognition performance of humans significantly. The reported results concern 1838 individuals and the study was effectuated by means of Internet.

  • 28.
    Bildtmark, Kim
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Jädersand, Robin
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Security Awareness for Mobility: En studie om företagsmobilitet och de säkerhetsrisker som följer2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 29.
    Bilstrup, Urban
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bluetooth in industrial environment2000Ingår i: 2000 IEEE International Workshop on Factory Communication Systems: proceedings : 6-8 September, 2000, ISEP, Porto, Portugal / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2000, s. 239-246Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper an initial study of the use of Bluetooth in industrial environment is presented. The tests have been performed at a paper-mill, and in an office environment at Halmstad University. It shows the possibility to use Bluetooth for wireless short range communication in an industrial environment.

  • 30.
    Bjurdelius, Andreas
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Bjurdelius, Pierre
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Blomqvist, Alexander
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Automated Router and Switch Backup2014Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Today's companies are growing in a steady pace, with more and more network devices added to the network it is very important to keep track of and monitor the status of devices. Even though the wireless evolution has come, it all depends on the wired connections to supply a continuous connection to the rest of the world.

     

    This thesis explores, tests and informs about creating a functional system that automatically creates backups of configuration files from network devices and how to troubleshoot networking problems and maintain a network to keep it in good shape.

     

    Even though many companies have manual backups of router and switch configurations, the possibility to have this part automated should be desired by most companies. It can open up for the administrators in the company to have more time over to help the employees that are experiencing problems at the same time as the automated system eliminates the possible errors that a human can cause.

    Of course one can see it the other way, that it takes away manual labor for the employees, but it is just a small part of the job yet it is so very important that making this service automated is a good choice for a company.

    Integrity is proven by the means of backups and by the option to see the difference between the previous backups and the most recent.

     

    The three of us have worked as a group to do all tests and to write the documentation. After working with a couple of companies it is clear that well functional backup systems of network devices are not as common as it should be. Companies that do take backups of the network devices often do this manually.

    When seeing this it makes sense to use a reliable system that uses revision handling so it is easy to see the recent changes made to the devices.

     

    The results ended up in a working automated backup system for routers and switches. The automated system is running Debian and connects to all the routers and switches in the network to collect the configuration files with the help of rancid.

    The thesis also explains the functions of concepts such as disaster recovery and different maintenance models.

  • 31.
    Boonen, Dries
    Högskolan i Halmstad.
    The impact of bias on the predictive value of EHR driven machine learning models.2019Självständigt arbete på grundnivå (högskoleexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The  rapid  digitization  in  the  health  care  sector  leads  to  an  increaseof  data.  This  routine  collected  data  in  the  form  of  electronic  healthrecords (EHR) is not only used by medical professionals but also hasa  secondary  purpose:  health  care  research.  It  can  be  opportune  touse this EHR data for predictive modeling in order to support medi-cal professionals in their decisions. However, using routine collecteddata  (RCD)  often  comes  with  subtle  biases  that  might  risk  efficientlearning of predictive models. In this thesis the effects of RCD on theprediction performance are reviewed.In particular we thoroughly investigate and reason if the performanceof  particular  prediction  models  is  consistent  over  a  range  of  hand-crafted sub-populations within the data.Evidence  is  presented  that  the  overall  prediction  score  of  the  algo-rithms trained by EHR significantly differ for some groups of patientsin  the  data.  A  method  is  presented  to  give  more  insight  why  thesegroups of patients have different scores.

  • 32.
    Bouguelia, Mohamed-Rafik
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Nowaczyk, Sławomir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Santosh, K. C.
    The University of South Dakota, Vermillion, South Dakota, USA.
    Verikas, Antanas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Agreeing to disagree: active learning with noisy labels without crowdsourcing2018Ingår i: International Journal of Machine Learning and Cybernetics, ISSN 1868-8071, E-ISSN 1868-808X, Vol. 9, nr 8, s. 1307-1319Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    We propose a new active learning method for classification, which handles label noise without relying on multiple oracles (i.e., crowdsourcing). We propose a strategy that selects (for labeling) instances with a high influence on the learned model. An instance x is said to have a high influence on the model h, if training h on x (with label y = h(x)) would result in a model that greatly disagrees with h on labeling other instances. Then, we propose another strategy that selects (for labeling) instances that are highly influenced by changes in the learned model. An instance x is said to be highly influenced, if training h with a set of instances would result in a committee of models that agree on a common label for x but disagree with h(x). We compare the two strategies and we show, on different publicly available datasets, that selecting instances according to the first strategy while eliminating noisy labels according to the second strategy, greatly improves the accuracy compared to several benchmarking methods, even when a significant amount of instances are mislabeled. © Springer-Verlag Berlin Heidelberg 2017

  • 33.
    Brasil, M. A. B.
    et al.
    Education Department, Industrial Technical School, Federal University of Santa Maria, Santa Maria, 97105-900, Brazil.
    Bösch, Bernhard
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Wagner, F. R.
    Institute of Informatics, Federal University of Rio Grande Do sul, Porto Alegre, 91509-900, Brazil.
    De Freitas, E. P.
    Institute of Informatics, Federal University of Rio Grande Do sul, Porto Alegre, 91509-900, Brazil.
    Performance Comparison of Multi-Agent Middleware Platforms for Wireless Sensor Networks2018Ingår i: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 18, nr 7, s. 3039-3049Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Despite the numerous possible applications of wireless sensor networks (WSNs), there is a key disadvantage related to the high complexity in programming WSNs, which is a result of their distributed and built-in features. To overcome this shortcoming, software agents have been identified as a suitable programming paradigm. The agent-based approach commonly uses a middleware for the execution of the software agents. In this regard, the present paper aims at comparing Java-based agent middleware platforms in their performance for the WSN application domain. Experiments were performed to analyze two versions of tracking applications, based on different agent models implemented for a given set of middleware platforms that support programming at a high-level of abstraction. The results highlight the differences in the resource consumption (CPU, memory, and energy) and in the communication overhead, providing an indication of suitability for each type of analyzed middleware, considering specific concerns while developing WSN applications. © 2001-2012 IEEE.

  • 34.
    Brauner, Paul
    et al.
    Rice University, Houston, United States.
    Taha, Walid
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Globally Parallel, Locally Sequential: A Preliminary Proposal for Acumen Objects2010Ingår i: POOSC'10, Proceedings of the 9th Workshop on Parallel/High-Performance Object-Oriented Scientific Computing, New York, NY: ACM Press, 2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    An important and resource-intensive class of computation codes consists of simulators for physical systems. Today, most simulation codes are written in general-purpose imperative languages such as C or FORTRAN. Unfortunately, such languages encourage the programmer to focus her attention on details of how the computation is performed, rather than on the system being modeled.

    This paper reports the design and implementation of a novel notion of an object for a physical modeling language called Acumen. A key idea underlying the language's design is encouraging a programming style that enables a "globally parallel, locally imperative" view of the world. The language is also being designed to preserve deterministic execution even when the underlying computation is performed on a highly parallel platform. Our main observation with the initial study is that extensive and continual experimental evaluation is crucial for keeping the language design process informed about bottlenecks for parallel execution.

  • 35.
    Broman, Jennifer
    Högskolan i Halmstad, Akademin för informationsteknologi.
    SNMP inom IT-forensik: Hur kan SNMP användas för IT-forensiska syften?2019Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Syftet med detta arbete är att undersöka huruvida ett nätverksprotokoll som används för nätverkshantering- och övervakning kan användas inom IT-forensiska undersökningar. Arbetet börjar med en generell granskning av protokollet SimpleNetwork Management Protocol (SNMP) och dess funktioner för att skapa en grundläggande förståelse för protokollet. Ett problemscenario framställs för att kunna simuleras i arbetets experimentutförande.

    I arbetet diskuteras hur funktionernas användbarhet inom IT-forensik kan variera beroende på till exempel inom vilken sektor de IT-forensiska utredningarna utförs inom, den privata eller den offentliga. Resultatet i detta arbete pekar på att SNMP är användbart vid IT-forensiska undersökningar, men att protokollet är mer gynnsamt för den privata sektorn av IT-forensik.

  • 36.
    Bruneau, Julien
    et al.
    INRIA, Bordeaux, France.
    Consel, Charles
    INRIA, Bordeaux, France.
    O’Malley, Marcia K.
    Rice University, Houston, TX, United States.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston, TX, United States.
    Hannourah, Wail Masry
    HVAC Consultant, Cairo, Egypt.
    Preliminary results in virtual testing for smart buildings2012Ingår i: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ISSN 1867-8211, E-ISSN 1867-822X, Vol. 73, s. 347-349Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Smart buildings promise to revolutionize the way we live. Applications ranging from climate control to fire management can have significant impact on the quality and cost of these services. However, a smart building and any technology with direct effect on the safety of its occupants must undergo extensive testing. Virtual testing by means of computer simulation can significantly reduce the cost of testing and, as a result, accelerate the development of novel applications. Unfortunately, building physically-accurate simulation codes can be labor intensive. To address this problem, we propose a framework for rapid, physically-accurate virtual testing of smart building systems. The proposed framework supports analytical modeling and simulation of both a discrete distributed system as well as the physical environment that hosts it. © 2012 Springer-Verlag Berlin Heidelberg.

  • 37.
    Bruneau, Julien
    et al.
    INRIA Bordeaux Sud-Ouest Talence, Talence, France.
    Consel, Charles
    INRIA Bordeaux Sud-Ouest Talence, Talence, France.
    O’Malley, Marcia
    Rice University Houston, Houston, USA.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Hannourah, Wail Masry
    HVAC Consultant Cairo, Cairo, Egypt.
    Virtual Testing for Smart Buildings2012Ingår i: 2012 Eighth International Conference on Intelligent Environments / [ed] Randall Bilof, Piscataway, N.J.: IEEE Press, 2012, s. 282-289, artikel-id 6258534Konferensbidrag (Refereegranskat)
    Abstract [en]

    Smart buildings promise to revolutionize the way we live. Applications ranging from climate control to fire management can have significant impact on the quality and cost of these services. However, smart buildings and any technology with direct effect on human safety and life mustundergo extensive testing. Virtual testing by means of computer simulation can significantly reduce the cost of testing and, as a result, accelerate the development of novel applications. Unfortunately, building physically-accurate simulation codes can be labor intensive.To address this problem, we propose a framework for rapid, physically-accurate virtual testing. The proposed framework supports analytical modeling of both a discrete distributed system as well as the physical environment that hosts it. The discrete models supported are accurate enough to allow the automatic generation of a dedicated programming framework that will help the developer in the implementation of these systems. The physical environment models supported are equational specifications that are accurate enough to produce running simulation codes. Combined, these two frameworks enable simulating both active systems and physical environments. These simulations can be used to monitor the behavior and gather statistics about the performance of an application in the context of precise virtual experiments. To illustrate the approach, we present models of Heating, Ventilating and Air-Conditioning (HVAC) systems. Using these models, we construct virtual experiments that illustrate how the approach can be used to optimize energy and cost of climate control for a building. © 2012 IEEE.

  • 38.
    Brunnegård, Oliver
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wikestad, Daniel
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Visual SLAM using sparse maps based on feature points2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Visual Simultaneous Localisation And Mapping is a useful tool forcreating 3D environments with feature points. These visual systemscould be very valuable in autonomous vehicles to improve the localisation.Cameras being a fairly cheap sensor with the capabilityto gather a large amount of data. More efficient algorithms are stillneeded to better interpret the most valuable information. This paperanalyses how much a feature based map can be reduced without losingsignificant accuracy during localising.

    Semantic segmentation created by a deep neural network is used toclassify the features used to create the map, the map is reduced by removingcertain classes. The results show that feature based maps cansignificantly be reduced without losing accuracy. The use of classesresulted in promising results, large amounts of feature were removedbut the system could still localise accurately. Removing some classesgave the same results or even better in certain weather conditionscompared to localisation with a full-scale map.

  • 39.
    Bärwald, Anton
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Aleksic, Jimmie
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Felsökning av EtherNet/IP med cross-platform applikation2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In the industry there is a need for a more efficient way to troubleshoot machines that uses the protocol EtherNet/IP. The current methods is time consuming and complex. This project gather data from a simulated network and analyze the data. The result of the analyze is presented on a cellphone application with a description and a possible solution. The application is a cross-platform application developed with Cordova. The simulated network is created on a Raspberry Pi 2. The analyze is done on another Raspberry Pi 2 running the software Node-RED. Communication between the simulated network Raspberry and the cellphone is with Bluetooth Low Energy. Communication between cellphone and the server is with MQTT. There are several areas where this kind of application may suit. This project is in one specific area – troubleshooting EtherNet/IP.

  • 40.
    Calcagno, Cristiano
    et al.
    DISI, University of Genoa, Genoa, Italy.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Department of Computing Sciences, Chalmers, Göteborg, Sweden.
    Closed Types as a Simple Approach to Safe Imperative Multi-Stage Programming2000Ingår i: Automata, Languages and Programming: 27th International Colloquium, ICALP 2000 Geneva, Switzerland, July 9–15, 2000 Proceedings / [ed] Ugo Montanari, José D. P. Rolim & Emo Welzl, Heidelberg: Springer, 2000, s. 25-36Konferensbidrag (Refereegranskat)
    Abstract [en]

    Safely adding computational effects to a multi-stage language has been an open problem. In previous work, a closed type constructor was used to provide a safe mechanism for executing dynamically generated code. This paper proposes a general notion of closed type as a simple approach to safely introducing computational effects into multi-stage languages. We demonstrate this approach formally in a core language called Mini-MLref BN. This core language combines safely multi-stage constructs and ML-style references. In addition to incorporating state, Mini-ML ref BN also embodies a number of technical improvements over previously proposed core languages for multi-stage programming.

  • 41.
    Calcagno, Cristiano
    et al.
    Imperial College London, London, United Kingdom.
    Moggi, Eugenio
    DISI, University of Genoa, Genoa, Italy.
    Taha, Walid
    Rice University, Texas, USA.
    ML-like Inference for Classifiers2004Ingår i: Programming Languages and Systems: 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004. Proceedings / [ed] David Schmidt, Heidelberg: Springer Berlin/Heidelberg, 2004, Vol. 2986, s. 79-93Konferensbidrag (Refereegranskat)
    Abstract [en]

    Environment classifiers were proposed as a new approach to typing multi-stage languages. Safety was established in the simply-typed and let-polymorphic settings. While the motivation for classifiers was the feasibility of inference, this was in fact not established. This paper starts with the observation that inference for the full classifier-based system fails. We then identify a subset of the original system for which inference is possible. This subset, which uses implicit classifiers, retains significant expressivity (e.g. it can embed the calculi of Davies and Pfenning) and eliminates the need for classifier names in terms. Implicit classifiers were implemented in MetaOCaml, and no changes were needed to make an existing test suite acceptable by the new type checker. © Springer-Verlag 2004.

  • 42.
    Calcagno, Cristiano
    et al.
    Imperial College London, London, United Kingdom.
    Taha, Walid
    Rice University, Houston, TX, USA.
    Huang, Liwen
    Yale University, New Haven, CT, USA.
    Leroy, Xavier
    INRIA, Roquencourt, France.
    Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection2003Ingår i: Generative Programming and Component Engineering: Second International Conference, GPCE 2003, Erfurt, Germany, September 22-25, 2003. Proceedings / [ed] Frank Pfenning & Yannis Smaragdakis, Heidelberg: Springer Berlin/Heidelberg, 2003, Vol. 2830, s. 57-76Konferensbidrag (Refereegranskat)
    Abstract [en]

    The paper addresses theoretical and practical aspects of implementing multi-stage languages using abstract syntax trees (ASTs), gensym, and reflection. We present an operational account of the correctness of this approach, and report on our experience with a bytecode compiler called MetaOCaml that is based on this strategy. Current performance measurements reveal interesting characteristics of the underlying OCaml compiler, and illustrate why this strategy can be particularly useful for implementing domain-specific languages in a typed, functional setting. © Springer-Verlag Berlin Heidelberg 2003.

  • 43.
    Carlsson, Hampus
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Marcus, Kärrman
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Cloud-based Mobile System for Free-Living Gait Analysis: System component : Server architecture2017Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Progress in the fields of wearable sensor technologies together with specialized analysis algorithms has enabled systems for gait analysis outside labs. An example of a wearable sensor is the accelerometer embedded in a typical smartphone. The goal was to propose a system design capable of hosting existing gait analysis algorithms in a cloud environment, and tailor the design as to deliver fast results with the ambition of reaching near real-time.   

    The project identified a set of enabling technologies by examining existing systems for gait analysis; the technologies included cloud computing and WebSockets. The final system design is a hierarchical composition starting with a Linux VM running Node.js, which in turn connects to a database and hosts instances of the MatLab runtime. The results show the feasibility of mobile cloud based free-living gait analysis. The architectural design provides a solution to the critical problem of enabling existing algorithms to run in a cloud environment; and shows how  the graphical output of the native algorithm could be accurately reproduced in a web browser. The system can process a chunk of 1300 data points under 3 seconds for a client streaming at 128 Hz, while simultaneously streaming the real time signal.

  • 44.
    Chairetakis, Eleftherios
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Alkudhir, Bassam
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Mystridis, Panagiotis
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Deployment of Low Interaction Honeypots in University Campus Network2013Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as new tools and techniques are being constantly developed by hackers. A new promising technology that lures the attackers in order to monitor their malicious activities and divulge their intentions is emerging with Virtual Honeypots. In the present thesis, we examine an extensive security mechanism based on three different open source low interaction honeypots. We implement this mechanism at our university campus network in an attempt to identify the potential threats and methods used against our network. The data gathered by our honeypots reveal valuable information regarding the types of attacks, the vulnerable network services within the network and the malicious activities launched by attackers.

  • 45.
    Charpentier Rojas, Jose Enrique
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Web application Security2013Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent issues to the most significant treats.The penetration test aimed to help the IT business to discover vulnerabilities in their system ensure their integrity and continue further in the web application security process. The vulnerability research perform in this report is the introduction of a big work that is under continuity for the company.Finally the success of following security standards, process and methodologies applied on this field is considered the best approach to ensure web application security and priceless information you can benefit from.

  • 46.
    Chen, Fulong
    et al.
    Department of Computer Science and Technology, Anhui Normal University, Wuhu Anhui 241000, China.
    Goyal, Rajat
    Integrated M. Tech, Mathematics and Computing, India Institute of Technology, New Delhi 110016, India .
    Westbrook, Edwin
    Department of Computer Science, Rice University, Houston, Texas 77005, USA .
    Taha, Walid
    Department of Computer Science, Rice University, Houston, Texas 77005, USA .
    Implicitly Heterogeneous Multi-Stage Programming for FPGAs2011Ingår i: Journal of Computational Information Systems, ISSN 1553-9105, Vol. 6, nr 14, s. 4915-4922Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Previous work on semantics-based multi-state programming language design focused on homogeneous and heterogeneous software designs. In homogenous software design, the source and the target software programming languages are the same. In heterogeneous software design, they are different software languages. This paper proposes a practical means to circuit design by providing specialized offshoring translations from subsets of the source software programming language to subsets of the target hardware description language (HDL). This approach avoids manually writing codes for specifying the circuit of the given algorithm. To illustrate the proposed approach, we design and implement a translation to a subset of Verilog suitable numerical and logical computation. Through the translator, programmers can specify abstract algorithms in high level languages and automatically convert them into circuit descriptions in low level languages.© 2010 Binary Information Press.

  • 47.
    Duracz, Adam
    et al.
    Rice University, Houston, TX, United States.
    Moggi, Eugenio
    DIBRIS, Genova University, Genova, Italy.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Lin, Zhenchao
    Zhejiang University, Hangzhou, China.
    A Semantic Account of Rigorous Simulation2018Ingår i: Principles of Modeling: Essays Dedicated to Edward A. Lee on the Occasion of His 60th Birthday / [ed] Marten LohstrohPatricia DerlerMarjan Sirjani, Amsterdam: Springer Berlin/Heidelberg, 2018, Vol. 10760, s. 223-239Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Hybrid systems are a powerful formalism for modeling cyber-physical systems. Reachability analysis is a general method for checking safety properties, especially in the presence of uncertainty and non-determinism. Rigorous simulation is a convenient tool for reachability analysis of hybrid systems. However, to serve as proof tool, a rigorous simulator must be correct w.r.t. a clearly defined notion of reachability, which captures what is intuitively reachable in finite time. As a step towards addressing this challenge, this paper presents a rigorous simulator in the form of an operational semantics and a specification in the form of a denotational semantics. We show that, under certain conditions about the representation of enclosures, the rigorous simulator is correct. We also show that finding a representation satisfying these assumptions is non-trivial. © 2018, Springer International Publishing AG, part of Springer Nature.

  • 48.
    Eckhardt, Jason
    et al.
    Rice University, Houston, TX 77005, USA.
    Kaiabachev, Roumen
    Rice University, Houston, TX 77005, USA.
    Pasalic, Emir
    Rice University, Houston, TX 77005, USA.
    Swadi, Kedar
    Rice University, Houston, TX 77005, USA.
    Taha, Walid
    Rice University, Houston, TX 77005, USA.
    Implicitly Heterogeneous Multi-Stage Programming2005Ingår i: Generative Programming and Component Engineering: 4th International Conference, GPCE 2005, Tallinn, Estonia, September 29 - October 1, 2005. Proceedings / [ed] Robert Glück, Michael Lowry, Heidelberg: Springer, 2005, s. 275-292Konferensbidrag (Refereegranskat)
    Abstract [en]

    Previous work on semantics-based multi-stage programming(MSP) language design focused on homogeneous designs, where the generating and the generated languages are the same. Homogeneous designssimply add a hygienic quasi-quotation and evaluation mechanism to abase language. An apparent disadvantage of this approach is that theprogrammer is bound to both the expressivity and performance characteristics of the base language. This paper proposes a practical means toavoid this by providing specialized translations from subsets of the baselanguage to different target languages. This approach preserves the homogeneous “look” of multi-stage programs, and, more importantly, thestatic guarantees about the generated code. In addition, compared to anexplicitly heterogeneous approach, it promotes reuse of generator sourcecode and systematic exploration of the performance characteristics of thetarget languages.To illustrate the proposed approach, we design and implement a translation to a subset of C suitable for numerical computation, and show thatit preserves static typing. The translation is implemented, and evaluatedwith several benchmarks. The implementation is available in the onlinedistribution of MetaOCaml.

  • 49.
    Ejdeholm, Dawid
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Harsten, Jacob
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Detection of common envoirmental interferences in front of a camera lens2018Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Modern vehicles are very dependent on sensors and especially cameras to analyze different objects and conditions. Single camera systems are frequently used for lane detection and identifying objects in the distance. These systems depend on good conditions to work properly and are easily disrupted by environmental interferences. This project is targeted in developing an image processing algorithm that can detect disturbances applied upon the camera lens. Several focus measure operators are evaluated and compared by expected outcome while still maintaining a satisfying computational time, low resource usage and accuracy with an ERR between 0% - 1%.

  • 50.
    Ek, Ida
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Hornebrant, Erik
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Kartläggning av internetbaserad tunn klient2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Då datorer i alla dess former har kommit att bära betydande mängder relevant information för diverse forensiska utredningar så krävs en ingående kunskap gällande hur denna data lämpligast infångas. En typ av klient som nyligen har gjort sitt kommersiella intåg på marknaden är den internetbaserade tunna klienten. Det existerar i dagsläget begränsat med underlag gällande huruvida en sådan klient bär information som är relevant för en IT-forensisk utredning.

    Inom denna uppsats har därför en internetbaserad tunn klient av typen Chromebook varit mål för undersökning. Syftet har varit att kartlägga vilka sårbarheter som existerar, samt om möjligt huruvida dessa kan brukas som underlag vid en forensisk utredning. För detta ändamål har klientens lagrings- samt kommunikationsmönster analyserats. För genomförandet av detta brukades experimentella metodiker i form av penetrationstest samt IT-forensisk undersökning. Det har även kartlagts huruvida programvaror avsedda för operativsystemet Linux kan exekveras på klienten. Ändamålet med detta var att fastställa om klientens volatila minne kan utvinnas med hjälp av verktyg för just Linux.

    Rapportens resultat påvisar att det inom en klient av denna typ finns forensiskt värdefull information att inhämta. Det påvisas även att Chrome OS från en användares perspektiv kan anses som säkert.

12345 1 - 50 av 208
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf