hh.sePublications
Change search
Refine search result
1234 101 - 150 of 182
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Mousavi, Mohammad Reza
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Ravara, Antonio
    Department of Informatics, Faculty of Sciences and Technology, New University of Lisbon, Portugal.
    Foreword: Special issue on the 10th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2011)2014In: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 89, p. 68p. 1-1Article in journal (Other academic)
  • 102.
    Mårtensson, Fredrik
    et al.
    Halmstad University, School of Information Technology. Sweden.
    Holmblad, Jesper
    Halmstad University, School of Information Technology.
    Sentiment Analysis of Nordic Languages2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis explores the possibility of applying sentiment analysis to extract tonality of user reviews on the Nordic languages. Data processing is performed in the form of preprocessing through tokenization and padding. A model is built in a framework called Keras. Models for classification and regression were built using LSTM and GRU architectures. The results showed how the dataset influences the end result and the correlation between observed and predicted values for classification and regression. The project shows that it is possible to implement NLP in the Nordic languages and how limitations in input and performance in hardware affected the result. Some questions that arose during the project consist of methods for improving the dataset and alternative solutions for managing information related to big data and GDPR.

  • 103.
    Müller, Ivan
    et al.
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Cavalcante, André
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil & Electronics and Telecommunication Department, Federal University of Amazonas, Brazil.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Allgayer, Rodrigo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Pereira, Carlos
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil & Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Evaluation of RTSJ-Based Distributed Control System2011In: Smart Spaces and Next Generation Wired/Wireless Networking / [ed] Baladin, S Koucheryavy, Y & Hu, H, Heidelberg: Springer Berlin/Heidelberg, 2011, Vol. 6869, p. 295-303Conference paper (Refereed)
    Abstract [en]

    In this paper an analysis of a distributed control system based on Java is presented. A classical PID controlled system is implemented simulating each part of a real control system running in different computers connected to a local area network. The communication message time periods and their jitter are measured running the system in different computer environments and the results are presented and discussed at the end. Real time specification for Java is used in the implemented software and the results are compared to other implementations. © Springer-Verlag Berlin Heidelberg 2011.

  • 104.
    Nilsson, Kenneth
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment2002In: Biometric Authentication: International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings, Berlin: Springer Berlin/Heidelberg, 2002, p. 39-47Chapter in book (Other academic)
    Abstract [en]

    For the alignment of two fingerprints position of certain landmarks are needed. These should be automatically extracted with low misidentification rate. As landmarks we suggest the prominent symmetry points (core-points) in the fingerprint. They are extracted from the complex orientation field estimated from the global structure of the fingerprint, i.e. the overall pattern of the ridges and valleys. Complex filters, applied to the orientation field in multiple resolution scales, are used to detect the symmetry and the type of symmetry. Experimental results are reported.

  • 105.
    Nordvik, Rune
    et al.
    Norwegian University of Science and Technology, Trondheim, Norway & Norwegian Police University College, Oslo, Norway.
    Toolan, Fergus
    Norwegian Police University College, Oslo, Norway.
    Axelsson, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Norwegian University of Science and Technology, Trondheim, Norway.
    Using the Object ID index as an investigative approach for NTFS file systems2019In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 28, no Supplement, p. S30-S39Article in journal (Refereed)
    Abstract [en]

    When investigating an incident it is important to document user activity, and to document which storage device was connected to which computer. We present a new approach to documenting user activity in computer systems using the NTFS file system by using the $ObjId Index to document user activity, and to correlate this index with the corresponding records in the MFT table. This may be the only possible approach when investigating external NTFS storage devices, and is hence a valuable addition to the storage forensics toolbox. © 2019 Rune Nordvik, Fergus Toolan, Stefan Axelsson

  • 106.
    Noresson, Jolina
    Halmstad University, School of Information Technology.
    Informationssamhället och internetbedrägerier2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Denna studie behandlar utvecklingen av de internetrelaterade bedrägerierna i Sverige och hur de har utvecklats i samband med utvidgningen av informationssamhället och den eskalerade användningen av internet. Syftet med studien är att undersöka hur de internetrelaterade bedrägerierna har utvecklats sedan en bit in på 2000-talet då användningen av internet fått en allt större inverkan på våra vardagliga liv. Studien har även för avsikt att undersöka hur kriminellas tankegångar gällande bedrägeribrott kan tänkas ha ändrats i samband med den ökande internetanvändningen. För att uppnå syftet med arbetet och besvara dess frågeställningar har en genomgång av tidigare forskning gällande internetrelaterade bedrägerier och internetutvecklingen i Sverige genomförts. Som underlag för internetbedrägeriernas statistiska utveckling ligger den svenska kriminalstatistiken. För att komplettera statistiken har en semistrukturerad elitintervju med en polisinspektör genomförts. Detta för att ur en skiljaktig vinkel ge en fördjupad bild av vad statistiken faktiskt visar. Studiens resultat analyseras sedermera med hjälp av tidigare forskning och rutinaktivitetsteorin Undersökningen visar att de internetrelaterade bedrägerierna under en tid präglats av en uppåtgående trend samt att denna trend med största sannolikhet kommer att fortsätta öka tills vi bekantat oss ytterligare med informationssamhället och dess tekniker. Undersökningen visaräven att det förhöjda internetanvändandet påverkar och bidrar till ökningen av internetbedrägerier. I och med utvecklingen av informationssamhället har även förutsättningarna för bedragarna blivit allt mer gynnsamma då kontroll och lagstiftning inte följer med utvecklingen i samma takt.

  • 107.
    Norrman, Henrik
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Estimating p-values for outlier detection2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Outlier detection is useful in a vast numbers of different domains, wherever there is data and a need for analysis. The research area related to outlier detection is large and the number of available approaches is constantly growing. Most of the approaches produce a binary result: either outlier or not. In this work approaches that are able to detect outliers by producing a p-value estimate are investigated. Approaches that estimate p-values are interesting since it allows their results to easily be compared against each other, followed over time, or be used with a variable threshold.

    Four approaches are subjected to a variety of tests to attempt to measure their suitability when the data is distributed in a number of ways. The first approach, the R2S, is developed at Halmstad University. Based on finding the mid-point of the data. The second approach is based on one-class support vector machines (OCSVM). The third and fourth approaches are both based on conformal anomaly detection (CAD), but using different nonconformity measures (NCM). The Mahalanobis distance to the mean and a variation of k-NN are used as NCMs.

    The R2S and the CAD Mahalanobis are both good at estimating p-values from data generated by unimodal and symmetrical distributions. The CAD k-NN is good at estimating p-values when the data is generated by a bimodal or extremely asymmetric distribution. The OCSVM does not excel in any scenario, but produces good average results in most of the tests. The approaches are also subjected to real data, where they all produce comparable results.

  • 108.
    Nowaczyk, Sławomir
    Department of Computer Science, Lund University, Lund, Sweden.
    Learning of agents with limited resources2006In: AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2 / [ed] Anthony Cohn, Menlo Park, Calif.: AAAI Press, 2006, p. 1893-1894Conference paper (Refereed)
  • 109.
    Nowaczyk, Sławomir
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Prytz, Rune
    Volvo Group Trucks Technology, Göteborg, Sweden.
    Ideas for Fault Detection Using Relation Discovery2012In: / [ed] Lars Karlsson and Julien Bidot, Linköping: Linköping University Electronic Press, 2012, p. 1-6Conference paper (Refereed)
    Abstract [en]

    Predictive maintenance is becoming more and more important in many industries, especially taking into account the increasing focus on offering uptime guarantees to the customers. However, in automotive industry, there is a limitation on the engineering effort and sensor capabilities available for that purpose. Luckily, it has recently become feasible to analyse large amounts of data on-board vehicles in a timely manner. This allows approaches based on data mining and pattern recognition techniques to augment existing, hand crafted algorithms.

    Automated deviation detection offers both broader applicability, by virtue of detecting unexpected faults and cross-analysing data from different subsystems, as well as higher sensitivity, due to its ability to take into account specifics of a selected, small set of vehicles used in a particular way under similar conditions.

    In a project called Redi2Service we work towards developing methods for autonomous and unsupervised relationship discovery, algorithms for detecting deviations within those relationships (both considering different moments in time, and different vehicles in a fleet), as well as ways to correlate those deviations to known and unknown faults. In this paper we present the type of data we are working with, justify why we believe relationships between signals are a good knowledge representation, and show results of early experiments where supervised learning was used to evaluate discovered relations.

  • 110.
    Nowaczyk, Sławomir
    et al.
    Department of Computer Science, Lund University, Lund, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Lund, Sweden.
    An Architecture for Resource Bounded Agents2007In: Proceedings of the International Multiconference on Computer Science and Information Technology / [ed] M. Ganzha, M. Paprzycki & T. Pełech-Pilichowski, Katowice: PTI Press , 2007, Vol. 2, p. 59-69Conference paper (Refereed)
    Abstract [en]

    We study agents situated in partially observable environments, who do not have sufficient resources to create conformant (complete) plans. Instead, they create plans which are conditional and partial, execute or simulate them, and learn from experience to evaluate their quality. Our agents employ an incomplete symbolic deduction system based on Active Logic and Situation Calculus for reasoning about actions and their consequences. An Inductive Logic Programming algorithm generalises observations and deduced knowledge so that the agents can choose the best plan for execution.

    We describe an architecture which allows ideas and solutions from several sub-fields of Artificial Intelligence to be joined together in a controlled and manageable way. In our opinion, no situated agent can achieve true rationality without using at least logical reasoning and learning. In practice, it is clear that pure logicis not able to cope with all the requirements put on reasoning, thus more domain-specific solutions, like planners, are also necessary. Finally, any realistic agentneeds a reactive module to meet demands of dynamic environments. Our architecture is designed in such a way that those three elements interact in order to complement each other’s weaknesses and reinforce each other’s strengths.

  • 111.
    Nowaczyk, Sławomir
    et al.
    Department of Computer Science, Lund University, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Sweden.
    Inductive logic programming algorithm for estimating quality of partial plans2007In: MICAI 2007: Advances in Artificial Intelligence: 6th Mexican International Conference on Artificial Intelligence, Aguascalientes, Mexico, November 4-10, 2007. Proceedings / [ed] Alexander Gelbukh, Ángel Fernando Kuri Morales, Berlin: Springer Berlin/Heidelberg, 2007, p. 359-369Conference paper (Refereed)
    Abstract [en]

    We study agents situated in partially observable environments, who do not have the resources to create conformant plans. Instead, they create conditional plans which are partial, and learn from experience to choose the best of them for execution. Our agent employs an incomplete symbolic deduction system based on Active Logic and Situation Calculus for reasoning about actions and their consequences. An Inductive Logic Programming algorithm generalises observations and deduced knowledge in order to choose the best plan for execution. We show results of using PROGOL learning algorithm to distinguish "bad" plans, and we present three modifications which make the algorithm fit this class of problems better. Specifically, we limit the search space by fixing semantics of conditional branches within plans, we guide the search by specifying relative relevance of portions of knowledge base, and we integrate learning algorithm into the agent architecture by allowing it to directly access the agent's knowledge encoded in Active Logic. We report on experiments which show that those extensions lead to significantly better learning results.

  • 112.
    Nowaczyk, Sławomir
    et al.
    Department of Computer Science, Lund University, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Sweden.
    Learning to Evaluate Conditional Partial Plans2007In: Proceedings of the Planning to Learn Workshop: PlanLearn-07, September 17, 2007, Warsaw, Poland / [ed] Pavel Brazdil, Abraham Bernstein, Warsaw, 2007, p. 53-55Conference paper (Refereed)
  • 113.
    Nowaczyk, Sławomir
    et al.
    Department of Computer Science, Lund University, Sweden.
    Malec, Jacek
    Department of Computer Science, Lund University, Sweden.
    Learning to evaluate conditional partial plans2007In: ICMLA 2007: Sixth International Conference on Machine Learning and Applications : proceedings : 13-15 Dec. 2007, Cincinnati, Ohio, USA, Los Alamitos, Calif.: IEEE Computer Society, 2007, p. 235-240Conference paper (Refereed)
    Abstract [en]

    We study agents situated in partially observable environments, who do not have sufficient resources to create conformant plans. Instead, they generate plans which are conditional and partial, execute or simulate them, and learn to evaluate their quality from experience. Our agent employs an incomplete symbolic deduction system based on Active Logic and Situation Calculus for reasoning about actions and their consequences. An Inductive Logic Programming algorithm generalises observations and deduced knowledge, allowing the agent to execute a good plan. We show results of using PROGOL learning algorithm to distinguish "bad" plans early in the reasoning process, before too many resources are wasted on considering them. We show that additional knowledge needs to be provided before learning can be successful, but argue that the benefits achieved make it worthwhile. Finally, we identify several assumptions made by PROGOL, shared by other similarly universal algorithms, which are well justified in general, but fail to exploit the properties of the class of problems faced by rational agents.

  • 114.
    Nowaczyk, Sławomir
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Prytz, Rune
    Volvo Group Trucks Technology, Advanced Technology & Research, Göteborg, Sweden.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Towards a Machine Learning Algorithm for Predicting Truck Compressor Failures Using Logged Vehicle Data2013In: Twelfth Scandinavian Conference on Artificial Intelligence / [ed] Manfred Jaeger, Thomas Dyhre Nielsen, Paolo Viappiani, Amsterdam: IOS Press, 2013, p. 205-214Conference paper (Refereed)
    Abstract [en]

    Predictive maintenance is becoming more and more important for the commercial vehicle manufactures, as focus shifts from product- to service-based operation. The idea is to provide a dynamic maintenance schedule, fulfilling specific needs of individual vehicles. Luckily, the same shift of focus, as well as technological advancements in the telecommunication area, make long-term data collection more widespread, delivering the necessary data.

    We have found, however, that the standard attribute-value knowledge representation is not rich enough to capture important dependencies in this domain. Therefore, we are proposing a new rule induction algorithm, inspired by Michalski's classical AQ approach. Our method is aware that data concerning each vehicle consists of time-ordered sequences of readouts. When evaluating candidate rules, it takes into account the composite performance for each truck, instead of considering individual readouts in separation. This allows us more exibility, in particular in defining desired prediction horizon in a fuzzy, instead of crisp, manner. © 2013 The authors and IOS Press. All rights reserved.

  • 115.
    Nugent, Christopher
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research. University of Ulster, Jordanstown, North Ireland.
    Synnott, Jonathan
    University of Ulster, Jordanstown, North Ireland.
    Gabrielli, Celeste
    Marche Polytechnic University, Ancona, Italy.
    Zhang, Shuai
    University of Ulster, Jordanstown, North Ireland.
    Espinilla, Macarena
    University of Jaén, Jaen, Spain..
    Calzada, Alberto
    University of Ulster, Jordanstown, North Ireland.
    Lundström, Jens
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Cleland, Ian
    University of Ulster, Jordanstown, North Ireland.
    Synnes, Kare
    Luleå university of Technology, Luleå, Sweden.
    Hallberg, Josef
    Luleå university of Technology, Luleå, Sweden.
    Spinsante, Susanna
    Marche Polytechnic University, Ancona, Italy.
    Ortiz Barrios, Miguel Angel
    Universidad de la Costa CUC, Barranquilla, Colombia.
    Improving the Quality of User Generated Data Sets for Activity Recognition2016In: Ubiquitous Computing and Ambient Intelligence, UCAMI 2016, PT II / [ed] Garcia, CR CaballeroGil, P Burmester, M QuesadaArencibia, A, Amsterdam: Springer Publishing Company, 2016, p. 104-110Conference paper (Refereed)
    Abstract [en]

    It is fully appreciated that progress in the development of data driven approaches to activity recognition are being hampered due to the lack of large scale, high quality, annotated data sets. In an effort to address this the Open Data Initiative (ODI) was conceived as a potential solution for the creation of shared resources for the collection and sharing of open data sets. As part of this process, an analysis was undertaken of datasets collected using a smart environment simulation tool. A noticeable difference was found in the first 1-2 cycles of users generating data. Further analysis demonstrated the effects that this had on the development of activity recognition models with a decrease of performance for both support vector machine and decision tree based classifiers. The outcome of the study has led to the production of a strategy to ensure an initial training phase is considered prior to full scale collection of the data.

  • 116.
    Ortega-Garcia, Javier
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Reynolds, Douglas
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Gonzalez-Rodriguez, Joaquin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Authentication gets personal with biometrics2004In: IEEE signal processing magazine (Print), ISSN 1053-5888, E-ISSN 1558-0792, Vol. 21, no 2, p. 50-62Article in journal (Refereed)
    Abstract [en]

    Securing the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems. User authentication, a key component of any DRM system, ensures that only those with specific rights are able to access the digital information. It is here that biometrics play an essential role. It reinforces security at all stages where customer authentication is needed. Biometric recognition, as a means of personal authentication, is an emerging signal processing area focused on increasing security and convenience of use in applications where users need to be securely identified. In this article, we outline the state-of-the-art of several popular biometric modalities and technologies and provide specific applications where biometric recognition may be beneficially incorporated. In addition, the article also discussed integration strategies of biometric authentication technologies into DRM systems that satisfy the needs and requirements of consumers, content providers, and payment brokers, securing delivery channels and contents.

  • 117.
    Parsapoor, Mahboobeh
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Chaotic Time Series Prediction Using Brain Emotional Learning Based Recurrent Fuzzy System (BELRFS)2013In: International Journal of Reasoning-based Intelligent Systems, ISSN 1755-0556, Vol. 5, no 2, p. 113-126Article in journal (Refereed)
    Abstract [en]

    In this paper an architecture based on the anatomical structure of the emotional network in the brain of mammalians is applied as a prediction model for chaotic time series studies. The architecture is called BELRFS, which stands for: Brain Emotional Learning-based Recurrent Fuzzy System. It adopts neuro-fuzzy adaptive networksto mimic the functionality of brain emotional learning. In particular, the model is investigated to predict space storms, since the phenomenon has been recognized as a threat to critical infrastructure in modern society. To evaluate the performance of BELRFS, three benchmark time series: Lorenz time series, sunspot number time series and Auroral Electrojet (AE) index. The obtained results of BELRFS are compared with Linear Neuro-Fuzzy (LNF) with the Locally Linear Model Tree algorithm (LoLiMoT). The results indicate that the suggested model outperforms most of data driven models in terms of prediction accuracy. Copyright © 2013 Inderscience Enterprises Ltd.

  • 118.
    Parsapoor, Mahboobeh
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Emotional Learning Inspired Engine: for Cognitive Radio Networks2014Conference paper (Other academic)
    Abstract [en]

    This paper suggests a new engine to be used to develop cognitive nodes in cognitive radio networks. Instead of the traditional cognitive cycle, the suggested engine could be designed based on an emotional cycle that is inspired by the emotional system that reacts to the received stimulus and learns from the reaction. The engine is called ELIE that stands for Emotional Learning Inspired Engine. This paper presents the structure of ELIE and explains how it can be implemented on the basis of generic policy architecture. This paper also discusses the possible applications of the suggested engine.

  • 119.
    Parsapoor, Mahboobeh
    et al.
    McGill University, Montreal, QC H3A 2T6, Canada.
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Forecasting Solar Activity with Computational Intelligence Models2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 70902-70909Article in journal (Refereed)
    Abstract [en]

    It is vital to accurately predict solar activity, in order to decrease the plausible damage of electronic equipment in the event of a large high-intensity solar eruption. Recently, we have proposed brain emotional learning-based fuzzy inference system (BELFIS) as a tool for the forecasting of chaotic systems. The structure of BELFIS is designed based on the neural structure of fear conditioning. The function of BELFIS is implemented by assigning adaptive networks to the components of the BELFIS structure. This paper especially focuses on the performance evaluation of BELFIS as a predictor by forecasting solar cycles 16-24. The performance of BELFIS is compared with other computational models used for this purpose, in particular with the adaptive neuro-fuzzy inference system. © 2018 IEEE.

  • 120.
    Pawlik, Amadeusz
    et al.
    Halmstad University.
    Andersson, Henry
    Halmstad University.
    Visualising Interval-Based Simulations2015Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Acumen is a language and tool for modeling and simulating cyber-physical systems. It allows the user to conduct simulations using a technique called rigorous simulation that produces results with explicit error bounds, expressed as intervals. This feature can be useful when designing and testing systems where the reliability of results or taking uncertainty into account is important.

    Unfortunately, analyzing these simulation results can be difficult, as Acumen supports only two ways of presenting them: raw data tables and 2D-plots.

    These views of the data make certain kinds of analysis cumbersome, such as understanding correlations between variables. This is especially true when the model in question is large. This project proposes a new way of visualising rigorous simulation results in Acumen.

    The goal of this project is to create a method for visualising intervallic values in 3D, and implement it in Acumen. To achieve that, every span of values is represented as a series of overlapping objects. This family of objects, which constitutes an under-approximation of the true simulation result, is then wrapped inside a semi-translucent box that is a conservative over-approximation of the simulation result.

    The resulting implementation makes for a combination of mathematical correctness (rigour), and mediation of intervals in question. It enables the user to explore the results of his rigorous simulations as conveniently as with the existing, non-rigorous simulation methods, using the 3D visualisation to simplify the study of real-life problems.

    To our knowledge, no existing software features visualisation of interval-based simulation results, nor is there any convention for doing this. Some ways in which the proposed solution could be improved are suggested at the end of this report

  • 121.
    Prytz, Rune
    et al.
    Volvo Technology, Göteborg, Sweden.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Towards relation discovery for diagnostics2011In: Proceedings of the First International Workshop on Data Mining for Service and Maintenance, New York, NY: Association for Computing Machinery (ACM), 2011, p. 23-27Conference paper (Refereed)
    Abstract [en]

    It is difficult to implement predictive maintenance in the automotive industry as it looks today, since the sensor capabilities and engineering effort available for diagnostic purposes is limited. It is, in practice, impossible to develop diagnostic algorithms capable of detecting many different kinds of faults that would be applicable to a wide range of vehicle configurations and usage patterns. However, it is now becoming feasible to obtain and analyse on-board data on vehicles as they are being used. It makes automatic data-mining methods an attractive alternative, since they are capable of adapting themselves to specific vehicle configurations and usage. In order to be useful, though, such methods need to be able to detect interesting relations between a large number of available signals. This paper presents an unsupervised method for discovering useful relations between measured signals in a Volvo truck, both during normal operations and when a fault has occurred. The interesting relationships are found in a two-step procedure. In the first step, we identify a set of “good” models, by establishing an MSE threshold over the complete data set. In the second step, we estimate model parameters over time, in order to capture the dynamic behaviour of the system. We use two different approaches here, the LASSO method and the Recursive Least Squares filter. The usefulness of obtained relations is then evaluated using supervised learning to separate different classes of faults.

  • 122.
    Prytz, Rune
    et al.
    Volvo Group Trucks Technology, Advanced Technology & Research, Göteborg, Sweden.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Analysis of Truck Compressor Failures Based on Logged Vehicle Data2013In: / [ed] Hamid Reza Arabnia, CSREA Press, 2013Conference paper (Refereed)
    Abstract [en]

    In multiple industries, including automotive one, predictive maintenance is becoming more and more important, especially since the focus shifts from product to service-based operation. It requires, among other, being able to provide customers with uptime guarantees. It is natural to investigate the use of data mining techniques, especially since the same shift of focus, as well as technological advancements in the telecommunication solutions, makes long-term data collection more widespread.

    In this paper we describe our experiences in predicting compressor faults using data that is logged on-board Volvo trucks. We discuss unique challenges that are posed by the specifics of the automotive domain. We show that predictive maintenance is possible and can result in significant cost savings, despite the relatively low amount of data available. We also discuss some of the problems we have encountered by employing out-of-the-box machine learning solutions, and identify areas where our task diverges from common assumptions underlying the majority of data mining research.

  • 123. Rosberg, Felix
    et al.
    Ghassemloi, Aidin
    Machine Learning-based path prediction for emergency vehicles2018Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
  • 124.
    Rylander, Anton
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Smart Grid2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
  • 125.
    Ryttergard, Henrik
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Klemens, Livia
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Undersökning & Utvinning av Smartphones: En djupgående analys av positionsdata2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The ordinary phone of today is not the same as it was 10 years ago. We still use them tomake phone calls and to send text messages, but the ordinary phone of today has muchmore uses, it is essentially a computer. To put into context to 10 years ago, it is a verypowerful computer, capable of processing wide array of information and presenting it tothe user. Nearly every single device today has a wireless connection, which makes everyuser connectable and able to use online services and internet at any time and place.This gives the user the possibility to integrate his or hers everyday actions with socialmedia and different search functions. Being able to search the internet for persons,restaurants, public transportation and a lot more is very useful to most. Searching andinteracting in the near vicinity where you currently are is even more useful, this presents uswith location data.The usage of location data grants computer forensics a unique possibility to position adevice at a specific date and time. This can be helpful in court to sentence a perpetrator orto free an innocent.In this paper, we will try to explain the different methods used for mobile devicepositioning and present information how some popular applications make use of andmanage geographic positioning.

  • 126.
    Salama, Cherif
    et al.
    Ain Shams University, Cairo, Egypt.
    Taha, Walid
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Rice University, Houston, Texas, USA.
    Increasing Verilog’s Generative Power2014Conference paper (Refereed)
    Abstract [en]

    To cope with more complex circuits, well-understood higher-level abstraction mechanisms are needed. Verilog is already equipped with promising generative constructs making it possible to concisely describe a family of circuits as a parameterized module; however these constructs suffer from limited expressivity even in the latest IEEE standard. In this paper, we address generative constructs expressivity limitations, identifying the key extensions needed to overcome these limitations, and showing how to incorporate them in Verilog in a disciplined, backward-compatible way.

  • 127.
    Savas, Suleyman
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Implementation and Evaluation of MPEG-4 Simple Profile Decoder on a Massively Parallel Processor Array2011Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    The high demand of the video decoding has pushed the developers to implement the decoders on parallel architectures. This thesis provides the deliberations about the implementation of an MPEG-4 decoder on a massively parallel processor array (MPPA), Ambric 2045, by converting the CAL actor language implementation of the decoder. This decoder is the Xilinx model of the MPEG-4 Simple Profile decoder and consists of four main blocks; parser, acdc, idct2d and motion. The parser block is developed in another thesis work [20] and the rest of the decoder, which consists of the other three blocks, is implemented in this thesis work. Afterwards, in order to complete the decoder, the parser block is combined with the other three blocks.

    Several methods are developed for conversion purposes. Additionally, a number of other methods are developed in order to overcome the constraints of the ambric architecture such as no division support. At the beginning, for debugging purposes, the decoder is implemented on a simulator which is designed for Ambric architecture. Finally the implementation is uploaded to the Ambric 2045 chip and tested with different input streams. The performance of the implementation is analyzed and satisfying results are achieved when compared to the standards which are in use in the market. These performance results can be considered as satisfying for any real-time application as well. Furthermore, the results are compared with the results of the CAL implementation, running on a single 2GHz i7 intel processor, in terms of speed and efficiency. The Ambric implementation runs 4,7 times faster than the CAL implementation when a small input stream (300 frames with resolution of 176x144) is used. However, when a large input stream (384 frames with resolution of 720x480) is used, the Ambric implementation shows a performance which is approximately 32 times better than the CAL implementation, in terms of decoding speed and throughput. The performance may increase further together with the size of the input stream up to some point.

  • 128.
    Schwarzrock, Janaína
    et al.
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Zacarias, Iulisloi
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Bazzan, Ana L.C.
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Fernandes, Ricardo Queiroz de Araujo
    Brazilian Army, Brasilia, Brazil.
    Moreira, Leonardo Henrique
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Solving task allocation problem in multi Unmanned Aerial Vehicles systems using Swarm intelligence2018In: Engineering applications of artificial intelligence, ISSN 0952-1976, E-ISSN 1873-6769, Vol. 72, p. 10-20Article in journal (Refereed)
    Abstract [en]

    The envisaged usage of multiple Unmanned Aerial Vehicles (UAVs) to perform cooperative tasks is a promising concept for future autonomous military systems. An important aspect to make this usage a reality is the solution of the task allocation problem in these cooperative systems. This paper addresses the problem of tasks allocation among agents representing UAVs, considering that the tasks are created by a central entity, in which the decision of which task will be performed by each agent is not decided by this central entity, but by the agents themselves. The assumption that tasks are created by a central entity is a reasonable one, given the way strategic planning is carried up in military operations. To enable the UAVs to have the ability to decide which tasks to perform, concepts from swarm intelligence and multi-agent system approach are used. Heuristic methods are commonly used to solve this problem, but they present drawbacks. For example, many tasks end up not begin performed even if the UAVs have enough resources to execute them. To cope with this problem, this paper proposes three algorithm variants that complement each other to form a new method aiming to increase the amount of performed tasks, so that a better task allocation is achieved. Through experiments in a simulated environment, the proposed method was evaluated, yielding enhanced results for the addressed problem compared to existing methods reported in the literature. © 2018 Elsevier Ltd

  • 129.
    Sha, Mao Xuan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Xie, Jun
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Xu, Xiao Lin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mobile Cell Phone GPS Navigation2009Independent thesis Basic level (degree of Bachelor), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Nowadays, GPS Mobile has already become important part of our life. GPS is widely used for citizen and military. For military, they could use GPS to navigate the missile or space flight. For citizen, people use GPS, especially GPS Mobile, to navigate car. GPS also helps people to find their way to home. GPS are widely use on, police, company manage system, agriculture and so on. GPS Mobile is the most familiar device for all of us to use. To combine use GPS Mobile and Google Map, people can get their currently location and shortcut to their destination. Also, we can get information from the Google map, like shopping place, bus station and so on. The main purpose of our project is to help people reach this aim. By using our software, you can find your location on the Google map. When you travel abroad, you can have your own language map on the GPS mobile, easily and quickly. That’s really convenience. The most wonderful part, you can play game with your friend by using our software. What you need to do, it is just send a message to anyone you care about and then you can get their location and show it on the map. So, even it is a far distance between you and your friend. You can have fun together. That is our software Findyourfriendlocation.

  • 130.
    Siek, Jeremy
    et al.
    University of Colorado at Boulder, Department of Electrical & Computer Engineering, Boulder City United States .
    Garcia, Ronald
    Rice University, Houston United States .
    Taha, Walid
    Rice University, Department of Computer Science, Houston United States .
    Exploring the Design Space of Higher-Order Casts2009In: Programming languages and systems: 18th European symposium on programming, ESOP 2009, held as part of the joint european conferences on theory and practice of software, ETAPS 2009, York, UK : proceedings, Berlin: Springer Berlin/Heidelberg, 2009, p. 17-31Conference paper (Refereed)
    Abstract [en]

    This paper explores the surprisingly rich design space for the simplytyped lambda calculus with casts and a dynamic type. Such a calculus is the targetintermediate language of the gradually typed lambda calculus but it is alsointeresting in its own right. In light of diverse requirements for casts, we developa modular semantic framework, based on Henglein’s Coercion Calculus, that instantiatesa number of space-efficient, blame-tracking calculi, varying in whaterrors they detect and how they assign blame. Several of the resulting calculi extendwork from the literature with either blame tracking or space efficiency, andin doing so reveal previously unknown connections. Furthermore, we introduce anew strategy for assigning blame under which casts that respect traditional subtypingare statically guaranteed to never fail. One particularly appealing outcomeof this work is a novel cast calculus that is well-suited to gradual typing.

  • 131.
    Smeraldi, Fabrizio
    et al.
    Queen Mary, University of London, School of Electronic Engineering and Computer Science, London.
    Carmona, Olivier
    Swiss Federal Institute of Technology, Lausanne, Microprocessor and Interface Lab., Lausanne.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Saccadic search with Gabor features applied to eye detection and real-time head tracking2000In: Image and Vision Computing, ISSN 0262-8856, E-ISSN 1872-8138, Vol. 18, no 4, p. 323-329Article in journal (Refereed)
    Abstract [en]

    The Gabor decomposition is a ubiquitous tool in computer vision. Nevertheless, it is generally considered computationally demanding for active vision applications. We suggest an attention-driven approach to feature detection inspired by the human saccadic system. A dramatic speedup is achieved by computing the Gabor decomposition only on the points of a sparse retinotopic grid. An off-line eye detection application and a real-time head localisation and tracking system are presented. The real-time system features a novel eyeball-mounted camera designed to simulate the dynamic performance of the human eye and is, to the best of our knowledge, the first example of active vision system based on the Gabor decomposition.

  • 132.
    Stefanowski, Jerzy
    et al.
    Poznan University of Technology.
    Nowaczyk, Sławomir
    Lund University.
    An Experimental Study of Using Rule Induction Algorithm in Combiner Multiple Classifier2007In: International Journal of Computational Intelligence Research, ISSN 0974-1259, Vol. 3, no 4, p. 335-342Article in journal (Refereed)
    Abstract [en]

    Multiple classifiers consist of sets of subclassifiers, whose individual predictions are combined to classify new objects. These approaches attract an interest of researchers as they can outperform single classifiers on wide range of classification problems. This paper presents an experimental study of using the rule induction algorithm MODLEM in the multiple classifier scheme called combiner, which is a specific meta learning approach to aggregate answers of component classifiers. Our experimental results show that the improvement of predictive accuracy depends on the independence of errors made by the base classifiers. Moreover, we summarise our experience with using MODLEM as component in other multiple classifiers, namely bagging and n2 classifiers.

  • 133.
    Sundemo, John
    et al.
    Halmstad University.
    Rustam, Stanikzai
    Halmstad University.
    Förutse försenade tåg med machine learning2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates the performance of predicting train delays with different machine learning algorithms. The machine learning algorithms that are studied and presented in this thesis are logistic regression, decision tree and neural network. We have tried to implement all of the above algorithms with the data that is collected by ourselves into our own database with the help of Västtrafiks open API. A brief description on our data that has been collected is presented, the fundamentals of the algorithms and general information about machine learning is presented. The algorithms are compared to each other and their performance are shown with the help of AUC score and a confusion matrix.

  • 134.
    Synnott, Jonathan
    et al.
    University of Ulster, Jordanstown, North Ireland.
    Nugent, Chris
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Zhang, Shuai
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Calzada, Alberto
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Cleland, Ian
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Espinilla, Macarena
    Univ Jaen, Dept Comp Sci, Jaen, Spain..
    Medina Quero, Javier
    Univ Jaen, Dept Comp Sci, Jaen, Spain..
    Lundström, Jens
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Environment Simulation for the Promotion of the Open Data Initiative2016In: 2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), Piscataway, N.J.: IEEE, 2016, p. 246-251Conference paper (Refereed)
    Abstract [en]

    The development, testing and evaluation of novel approaches to Intelligent Environment data processing require access to datasets which are of high quality, validated and annotated. Access to such datasets is limited due to issues including cost, flexibility, practicality, and a lack of a globally standardized data format. These limitations are detrimental to the progress of research. This paper provides an overview of the Open Data Initiative and the use of simulation software (IE Sim) to provide a platform for the objective assessment and comparison of activity recognition solutions. To demonstrate the approach, a dataset was generated and distributed to 3 international research organizations. Results from this study demonstrate that the approach is capable of providing a platform for benchmarking and comparison of novel approaches.

  • 135.
    Taha, Walid
    Department of Computer Science, Rice University, Houston, TX, United States.
    A Gentle Introduction to Multi-stage Programming, Part II2008In: Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, Braga, Portugal, July 2-7, 2007. Revised Papers / [ed] Ralf Lämmel, Joost Visser, João Saraiva, Berlin: Springer Berlin/Heidelberg, 2008, p. 260-290Conference paper (Other academic)
    Abstract [en]

    As domain-specific languages (DSLs) permeate into mainstream software engineering, there is a need for economic methods for implementing languages. Following up on a paper with a similar title, this paper focuses on dynamically typed languages, covering issues ranging from parsing to defining and staging an interpreter for an interesting subset of Dr. Scheme. Preliminary experimental results indicate that the speedups reported in previous work for smaller languages and with smaller benchmarks are maintained. © 2008 Springer Berlin Heidelberg.

  • 136.
    Taha, Walid
    Oregon Graduate Institute of Science and Technology.
    Multi-Stage Programming: Its Theory and Applications1999Doctoral thesis, monograph (Other academic)
    Abstract [en]

    MetaML is a statically typed functional programming language with special support for programgeneration. In addition to providing the standard features of contemporary programminglanguages such as Standard ML, MetaML provides three staging annotations. These staging annotationsallow the construction, combination, and execution of object-programs.Our thesis is that MetaML's three staging annotations provide a useful, theoretically soundbasis for building program generators. This dissertation reports on our study of MetaML's stagingconstructs, their use, their implementation, and their formal semantics. Our results include anextended example of where MetaML allows us to produce ecient programs, an explanation ofwhy implementing these constructs in traditional ways can be challenging, two formulations ofMetaML's semantics, a type system for MetaML, and a proposal for extending MetaML with atype construct for closedness.The dissertation consolidates a number of previous publications by the author, includingMetaML's type systems and big-step semantics. The presentation is new. The proposed solutionto an implementation problem and the reduction semantics for MetaML's three staging constructsare also new.

  • 137.
    Taha, Walid
    Rice University, Houston, TX, United States.
    Resource-Aware Programming - Invited paper2004In: Embedded software and systems: first international conference, ICESS 2004, Hangzhou, China, December 9-10, 2004 ; revised selected papers, Berlin: Springer Berlin/Heidelberg, 2004, p. 38-43Conference paper (Other academic)
    Abstract [en]

    Traditional wisdom in programming language design suggests that there is a trade-off between expressive power and static guarantees. We describe a novel schema for designing a class of languages that we call Resource-aware Programming (RAP) languages. By taking into account the natural distinction between the development platform and the deployment platform for embedded software, RAP languages can alleviate the need for drastic trade-offs between expressive power and static guarantees. We describe our preliminary experience designing and programming in a RAP language for hardware design, and give a brief overview of directions for future work.

  • 138.
    Taha, Walid
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Duracz, Adam
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zeng, Yingfu
    Rice University, Houston TX, USA.
    Atkinson, Kevin
    Rice University, Houston TX, USA.
    Bartha, Ferenc Ágoston
    Rice University, Houston TX, USA.
    Brauner, Paul
    Rice University, Houston TX, USA.
    Duracz, Jan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Xu, Fei
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Cartwright, Robert
    Rice University, Houston TX, USA.
    Konečný, Michal
    Computer Science Group, Aston University, Birmingham, United Kingdom.
    Moggi, Eugenio
    University of Genova, Genoa, Italy.
    Masood, Jawad
    Rice University, Houston TX, USA.
    Andreasson, Björn Pererik
    Halmstad University, School of Information Technology.
    Inoue, Jun
    Rice University, Houston TX, USA.
    Sant'Anna, Anita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Philippsen, Roland
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Chapoutot, Alexandre
    ENSTA ParisTech - U2IS, Paris, France.
    O'Malley, Marcia
    Department of Mechanical Engineering, Rice University, Houston TX, USA.
    Ames, Aaron
    School of Mechanical Eng., Georgia Institute of Technology, Atlanta GA, USA.
    Gaspes, Veronica
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Hvatum, Lise
    Schlumberger, Houston TX, USA.
    Mehta, Shyam
    Schlumberger, Houston TX, USA.
    Eriksson, Henrik
    Dependable Systems, SP Technical Research Institute of Sweden, Borås, Sweden.
    Grante, Christian
    AB Volvo, Gothenburg, Sweden.
    Acumen: An Open-source Testbed for Cyber-Physical Systems Research2016In: Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / [ed] Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov & Radu-Laurentiu Vieriu, Heidelberg: Springer, 2016, Vol. 169, p. 118-130Conference paper (Refereed)
    Abstract [en]

    Developing Cyber-Physical Systems requires methods and tools to support simulation and verification of hybrid (both continuous and discrete) models. The Acumen modeling and simulation language is an open source testbed for exploring the design space of what rigorous-but-practical next-generation tools can deliver to developers of Cyber-Physical Systems. Like verification tools, a design goal for Acumen is to provide rigorous results. Like simulation tools, it aims to be intuitive, practical, and scalable. However, it is far from evident whether these two goals can be achieved simultaneously.

    This paper explains the primary design goals for Acumen, the core challenges that must be addressed in order to achieve these goals, the "agile research method" taken by the project, the steps taken to realize these goals, the key lessons learned, and the emerging language design. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016.

  • 139.
    Taha, Walid
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Philippsen, Roland
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Modeling Basic Aspects of Cyber-Physical Systems2012In: 3rd International Workshop on Domain-Specific Languages and models for ROBotic systems (DSLRob-12), 2012Conference paper (Refereed)
    Abstract [en]

    Designing novel cyber-physical systems entails significant, costly physical experimentation. Simulation tools can enable the virtualization of experiments. Unfortunately, current tools have shortcomings that limit their utility for virtual experimentation. Language research can be especially helpful in addressing many of these problems. As a first step in this direction, we consider the question of determining what language features are needed to model cyber-physical systems. Using a series of elementary examples of cyber-physical systems, we reflect on the extent to which a small, experimental domain-specific formalism called Acumen suffices for this purpose.

  • 140.
    Taha, Walid
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zeng, Yingfu
    Rice University, Houston, TX, USA.
    Duracz, Adam
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Xu, Fei
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Atkinson, Kevin
    Rice University, Houston, TX, USA.
    Brauner, Paul
    Rice University, Houston, TX, USA.
    Cartwright, Robert
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Rice University, Houston, TX, USA.
    Philippsen, Roland
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Developing a first course on cyber-physical systems2016In: ACM SIGBED Review, E-ISSN 1551-3688, Vol. 14, no 1, p. 44-52Article in journal (Refereed)
    Abstract [en]

    Effective and creative Cyber-Physical Systems (CPS) development requires expertise in disparate fields that have traditionally been taught in several distinct disciplines. At the same time, students seeking a CPS education generally come from diverse educational backgrounds. In this paper, we report on our recent experience of developing and teaching a course on CPS. The course addresses the following three questions: What are the core elements of CPS? How should these core concepts be integrated in the CPS design process? What types of modeling tools can assist in the design of Cyber-Physical Systems? Our experience with the first four offerings of the course has been positive overall. We also discuss the lessons we learned from some issues that were not handled well. All material including lecture notes and software used for the course are openly available online.

  • 141.
    Taromirad, Masoumeh
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Mousavi, Mohammad Reza
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Gray-Box Conformance Testing for Symbolic Reactive State Machines2017In: Fundamentals of Software Engineering: 7th International Conference, FSEN 2017, Tehran, Iran, April 26–28, 2017, Revised Selected Papers / [ed] Mehdi Dastani & Marjan Sirjani, Heidelberg: Springer Berlin/Heidelberg, 2017, p. 228-243Conference paper (Refereed)
    Abstract [en]

    Model-based testing (MBT) is typically a black-box testing technique. Therefore, generated test suites may leave some untested gaps in a given implementation under test (IUT). We propose an approach to use the structural and behavioural information exploited from the implementation domain to generate effective and efficient test suites. Our approach considers both specification models and implementation models, and generates an enriched test model which is used to automatically generate test suites. We show that the proposed approach is sound and exhaustive and cover both the specification and the implementation. We examine the applicability and the effectiveness of our approach by applying it to a well-known example from the railway domain. © 2017, IFIP International Federation for Information Processing.

  • 142.
    Teferi, Dereje
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Multi-view and Multi-scale Recognition of Symmetric Patterns2009In: Image analysis / [ed] Arnt-Børre Salberg, Jon Yngve Hardeberg and Robert Jenssen, Berlin: Springer, 2009, p. 657-666Conference paper (Refereed)
    Abstract [en]

    This paper suggests the use of symmetric patterns and their corresponding symmetry filters for pattern recognition in computer vision tasks involving multiple views and scales. Symmetry filters enable efficient computation of certain structure features as represented by the generalized structure tensor (GST). The, properties of the complex moments to changes in scale and multiple views including in-depth rotation of the patterns and the presence of noise is investigated. Images of symmetric patterns captured using a. low resolution low-cost CMOS camera, such as a phone Camera or a web-cam, from as far as three meters are precisely localized and their spatial orientation is determined from the argument of the second order complex moment I-20 without further computation.

  • 143.
    Teferi Lemma, Dereje
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Audio-video synthesis methods for improving performance of biometric systems2007Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    System security is important for any automation. It is even more so in the case of biometric systems due to the sensitive nature of the data it uses for enrollment and authentication - the subjects physical or biological trait. The performance quantification of biometric systems, such as face tracking and recognition, highly depend on the database used for testing the systems. Systems trained and tested on realistic and represenative databases evidently perform better. In fact, the main reason for evaluating any system on test data is that these data sets represent problems that system might face in the real world. However, building biometric databases that represent the real world is an expensive task due to its high demand on the side of the participants. This becomes even more difficult and unrealistic if the data is to be collected in a natural environment such as supermarkets, offices, streets, etc.

    This thesis presents a procedure to build a synthetic biometric database by damascening images from a studio recorded database with a realistic scenery. To this end, we developed an image segmenation procedure to spearate the background of a video recorded in studio conditions with the prupose to replace it with an arbitrary complex background. Furthermore, we present how several degradations such as affine transformation, imaging noise, and motion blur can be incorporated into the production of the new database to simulate natural recording environments. The system is applied to the entire XM2VTS database, which already consists of several terabytes of data, to produce the DXM2VTS - Damascened XM2VTS database.

    Moreover, the thesis presents a method to segment a video sequence in the time domain based on its audio concept. The video is then reshuffled and used for testing resilience of text-prompted biometric systems against playback attacks. The playback is supported by pyramid based frame interpolation method to reduce discontinuities created at the digit boundaries in time.

  • 144.
    Tistarelli, Massimo
    et al.
    Computer Vision Laboratory, University of Sassari, Italy.
    Bigun, JosefHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).Jain, Anil K.Departments of Computer Science & Engineering, and Electrical & Computer Engineering, Michigan State University.
    Biometric authentication: International ECCV 2002 Workshop, Copenhagen, Denmark, June 1, 2002 : proceedings2002Conference proceedings (editor) (Other academic)
    Abstract [en]

    This book constitutes the refereed proceedings of the International Workshop on Biometric Authentication held in Copenhagen, Denmark, in June 2001 as a satellite event of ECCV 2002.The 19 revised full papers presented were carefully reviewed. The papers are organized in topical sections on face recognition, fingerprint recognition, psychology and biometrics, face detection and localization, gait and signature recognition, and classifiers for recognition.

  • 145.
    Toazza, Denny Antonio
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Kim, Tae Hyun
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Navigation Control of an Unmanned Aerial Vehicle (UAV)2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The thesis covers a new navigation algorithm for UAV to fly through several given GPS coordinates without any human interference. The UAV first gets its current position from GPS receiver via Bluetooth connection with the navigator computer. With this GPS point, it draws an optimal trajectory to next destination. During the flight, the navigator computer issues the information about which direction to turn and how much to turn. This information will be used to steer the airplane servos.

    The algorithm is programmed in Java LeJOS. It uses built-in Java classes about GPS and Bluetooth. The main computer, where the navigation program runs, is a LEGO Mindstorms NXT and it is used a GPSlim240 from HOLUX as a GPS receiver.

  • 146.
    Uhlemann, Elisabeth
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Rasmussen, Lars K.
    Chalmers, Göteborg.
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Wireless Real-Time Communication Using Deadline Dependent Coding2006In: ARTES - A network for Real-Time research and graduate Education in Sweden 1997-2006: MRTC report (197/2006), Uppsala: Department of Information Technology, Uppsala university , 2006, p. 239-256Chapter in book (Other (popular science, discussion, etc.))
    Abstract [en]

    The constant evolution of wireless communication, and all the applications this enables, is rapidly increasing our demands on the performance of communication networks. As the transmission speed increases, entirely new applications and services, like for example video streaming, suddenly becomes interesting for wireless systems as well. The expectations of the general user with respect to performance of wireless applications are guided by the current quality of traditional wireline systems. This naturally implies a considerable challenge when designing wireless communication systems. Many of these new wireless applications are based on packet transmissions and are sub ject to time-critical constraints. The ob jective of the deadline dependent coding (DDC) communication protocol presented here is therefore to develop an efficient and fault tolerant real-time link layer foundation, enabling critical deadline dependent communication over unreliable wireless channels.

  • 147.
    Ul-Abdin, Zain
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Programming of Coarse-Grained Reconfigurable Architectures2011Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Coarse-grained reconfigurable architectures, which offer massive parallelism coupled with the capability of undergoing run-time reconfiguration, are gaining attention in order to meet not only the increased computational demands of high-performance embedded systems, but also to fulfill the need of adaptability to functional requirements of the application. This thesis focuses on the programming aspects of such coarse-grained reconfigurable computing devices, including the relevant computation models that are capable of exposing different kinds of parallelism inherent in the application and the ability of these models to capture the adaptability requirements of the application. The thesis suggests the occam-pi language for programming of a broad class of coarse-grained reconfigurable architectures as an intermediate language; we call it intermediate, since we believe that the applicationprogramming is best done in a high-level domain-specific language. The salient properties of the occam-pi language are explicit concurrency with built-in mechanisms for interprocessorcommunication, provision for expressing dynamic parallelism, support for the expression of dynamic reconfigurations, and placement attributes. To evaluate the programming approach, a compiler framework was extended to support the language extensions in the occam-pi language, and backends were developed to target two different coarse-grained reconfigurable architectures. XPP and Ambric. The results on XPP reveal that the occam-pi based implementations produce comparable throughput to those of NML programs, while programming at a much higher level of abstraction than that of NML. Similarly the two occam-pi implementations of autofocus criterion calculation targeted to the Ambric platform outperform the CPU implementation by factors of 11-23. Thus, the results of the implemented case-studies suggest that the occam-pi language based approach simplifies the development of applications employing run-time reconfigurable devices without compromising the performance benefits.

  • 148. Uličný, Matej
    Methods for Increasing Robustness of Deep Convolutional Neural Networks2015Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Recent discoveries uncovered flaws in machine learning algorithms such as deep neural networks. Deep neural networks seem vulnerable to small amounts of non-random noise, created by exploiting the input to output mapping of the network. Applying this noise to an input image drastically decreases classication performance. Such image is referred to as an adversarial example. The purpose of this thesis is to examine how known regularization/robustness methods perform on adversarial examples. The robustness methods: dropout, low-pass filtering, denoising autoencoder, adversarial training and committees have been implemented, combined and tested. For the well-known benchmark, the MNIST (Mixed National Institute of Standards and Technology) dataset, the best combination of robustness methods has been found. Emerged from the results of the experiments, ensemble of models trained on adversarial examples is considered to be the best approach for MNIST. Harmfulness of the adversarial noise and some robustness experiments are demonstrated on CIFAR10 (The Canadian Institute for Advanced Research) dataset as well. Apart from robustness tests, the thesis describes experiments with human classification performance on noisy images and the comparison with performance of deep neural network.

  • 149.
    Uličný, Matej
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Lundström, Jens
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Robustness of Deep Convolutional Neural Networks for Image Recognition2016In: Intelligent Computing Systems: First International Symposium, ISICS 2016, Mérida, México, March 16-18, 2016, Proceedings / [ed] Anabel Martin-Gonzalez, Victor Uc-Cetina, Cham: Springer, 2016, Vol. 597, p. 16-30Conference paper (Refereed)
    Abstract [en]

    Recent research has found deep neural networks to be vulnerable, by means of prediction error, to images corrupted by small amounts of non-random noise. These images, known as adversarial examples are created by exploiting the input to output mapping of the network. For the MNIST database, we observe in this paper how well the known regularization/robustness methods improve generalization performance of deep neural networks when classifying adversarial examples and examples perturbed with random noise. We conduct a comparison of these methods with our proposed robustness method, an ensemble of models trained on adversarial examples, able to clearly reduce prediction error. Apart from robustness experiments, human classification accuracy for adversarial examples and examples perturbed with random noise is measured. Obtained human classification accuracy is compared to the accuracy of deep neural networks measured in the same experimental settings. The results indicate, human performance does not suffer from neural network adversarial noise.

  • 150.
    Vaiciukynas, Evaldas
    et al.
    Kaunas University of Technology.
    Gelzinis, Adas
    Kaunas University of Technology.
    Bacauskiene, Marija
    Kaunas University of Technology.
    Verikas, Antanas
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Vegiene, Aurelija
    Kaunas University of Medicine.
    Exploring Kernels in SVM-Based Classification of Larynx Pathology from Human Voice2010In: Proceedings of the 5th International Conference on Electrical and Control Technologies ECT-2010, May 6-7, 2010, Kaunas, Lithuania, Kaunas: KUT , 2010, p. 67-72Conference paper (Refereed)
    Abstract [en]

    In this paper identification of laryngeal disorders using cepstral parameters of human voice is investigated. Mel-frequency cepstral coefficients (MFCC), extracted from audio recordings, are further approximated, using 3 strategies: sampling, averaging, and estimation. SVM and LS-SVM categorize pre-processed data into normal, nodular, and diffuse classes. Since it is a three-class problem, various combination schemes are explored.  Constructed custom kernels outperformed a popular non-linear RBF kernel. Features, estimated with GMM, and SVM kernels, designed to exploit this information, is an interesting fusion of probabilistic and discriminative models for human voice-based classification of larynx pathology.

1234 101 - 150 of 182
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf