hh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
12345 101 - 150 av 208
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 101.
    Malmström, Bonnie
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Teveldal, Philip
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Forensic analysis of the ESE database in Internet Explorer 102013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    With Internet Explorer 10, Microsoft changed the way of storing web related information. Instead of the old index.dat files, Internet Explorer 10 uses an ESE database called WebCacheV01.dat to maintain its web cache, history and cookies. This database contains a wealth of information that can be of great interest to a forensic investigator. This thesis explores the structure of the new database, what information it contains, how it behaves in different situations, and also shows that it is possible to recover deleted database records – even when the InPrivate browsing mode has been used.

  • 102.
    Mastrorilli, Andrea
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Holmgren, Josefin
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Paddle stirrer to a reverberation chamber2019Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Halmstad Högskola är för närvarande utrustad med en Ekofri kammare för att utföra EMCtestning, men ingen modväxlande kammare. Konstruktionen av en paddle-omrörare för användning i Halmstad Högskola skulle drastiskt minska tiden som krävs för att utföra EMC-testning, eftersom modväxlande kammaren är effektivare än en ekofri kammare för dessa typer av tester.Målet med detta projekt var att designa och utveckla en paddle-omrörare, både strukturen samt ett styrsystem som kan rotera den till specifika repeterbara absoluta vinklar med en noggrannhet av en tiondel av en grad, hantera en massa upp till 70 kg och rotera en massa upp till 20 kg fördelad på en 1x1m yta. För att uppnå detta mål har systemet konstruerats med en basstruktur gjord av metall, lager har placerats i axeln för att reducera friktion, en stegmotor är anslutentill kugghjul för att öka vridmomentet, en magnetisk roterande sensor och ett styrsystem med en dubbel återkoppling från interrupts och från sensorn för att förbättra systemets noggrannhet och tillförlitlighet. Resultatet är en helt fungerande prototyp som uppfyller alla krav, förutom hastigheten. Målhastigheten har inte uppnåtts på grund av otillräckligt vridmoment hos stegmotorn.

  • 103.
    Maxson, Jakob
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Djupgående analys av testhanteringsverktyg2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna rapport analyserar testhanteringsverktyg åt Statens Kriminaltekniska Laboratorium. Ett testhanteringsverktyg är ett samlingsnamn på ett verktyg som testar och dokumenterar resultatet på diverse mjukvarutester. I rapporten analyseras tre gratisverktyg, deras funktioner och hur man går tillväga för att använda dem. De tre verktyg som används och betygsätts är Testia Tarantula, TestLink och Testopia. TestLink är det verktyg som får flest poäng, men det är inte det verktyg som slutligen rekommenderas. Denna rapport är användbar för större företag som behöver ett testhanteringsverktyg med krav på hög kvalitet på genomförande och dokumentation. 

  • 104.
    Moggi, Eugenio
    et al.
    University of Genoa, Genova, Italy.
    Taha, Walid
    Oregon Graduate Institute, Portland, OR, USA.
    Benaissa, Zine El-Abidine
    Oregon Graduate Institute, Portland, OR, USA.
    Sheard, Tim
    Oregon Graduate Institute, Portland, OR, USA.
    An Idealized MetaML: Simpler, and More Expressive1999Ingår i: Programming Languages and Systems: 8th European Symposium on Programming, ESOP'99, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, March 22-28, 1999 : proceedings / [ed] S. Doaitse Swierstra, Berlin: Springer Berlin/Heidelberg, 1999, s. 193-207Konferensbidrag (Refereegranskat)
    Abstract [en]

    MetaML is a multi-stage functional programming language featuring three constructs that can be viewed as statically-typed refinements of the back-quote, comma, and eval of Scheme. Thus it provides special support for writing code generators and serves as a semanticallysound basis for systems involving multiple interdependent computational stages. In previous work, we reported on an implementation of MetaML, and on a reduction semantics and type-system for MetaML. In this paper, we present An Idealized MetaML (AIM) that is the result of our study of a categorical model for MetaML. An important outstanding problem is finding a type system that provides the user with a means for manipulating both open and closed code. This problem has eluded efforts by us and other researchers for over three years. AIM solves the issue by providing two type constructors, one classifies closed code and the other open code, and exploiting the way they interact. We point out that AIM can be verbose, and outline a possible remedy relating to the strictness of the closed code type. © Springer International Publishing AG, Part of Springer Science+Business Media 1999

  • 105.
    Mohammed, Ali
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Sama, Sachin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Mohammed, Majeed
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Enhancing Network Security in Linux Environment2012Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network.

    This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation. After analysing the security measures for implementing network security, it is important to understand the role of network monitoring tools and Linux inbuilt log management in maintaining the security of a network. This is accomplished by presenting a detailed discussion on network monitoring tools and log management in Linux.

    In order to test the network security, a network is designed using Linux systems by configuring different servers and application firewall for packet filtering. The security measures configured on each server to enhance its security are presented as part of the implementation. The results obtained while an unauthorized user accessing the servers from the external network are also documented along with attack information retrieved by different network monitoring tools and Linux inbuilt log messages.

  • 106.
    Montemayor Ayala, Hector
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Probabilistic Lane Change Prediction in Highway Scenarios: Lane change Maneuver Prediction in Highway Scenarios2011Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The concern for more energy efficient vehicles has grown in the last years; the increase of oil prices and the need to curb greenhouse gas emissions has called for the search of solutions and alternatives to the fossil-fuel usage. 

    On one hand there is the search for better fuel sources while on the other, the development for better driver assistance systems These systems should be capable of maximizing the driver's security and comfort while minimizing the fuel consumption. This can be achieved by the understanding of the environment surrounding the vehicle. Therefore the assistance should use this knowledge of its environment to alert the driver from any situation of risk so that they can be prevented. Moreover, reducing the number of accidents and unnecessary maneuvers will help reduce the fuel consumption by avoiding emergency breaking and other unnecesary situations. 

    This thesis explains the development of a maneuver prediction system for highway scenarios. The system should identify lane changing vehicles with enough time to allow the driver to take the necessary precautions and maintain an efficient and more secure driving. To achieve this gial a set of features that describe the environment around the Ego vehicle is obtained. Afterwards, these Features are analyzed using state of the art data mining techniques and their performance is evaluated using a set of classification algorithms (Linear Discriminant Analysis, Neural networks and Random Forests). 

    According to the present set of input data, it is possible to identify a left lane change from a right lane change with low misclassification error. But it is not possible to identify with the same efficiency a lane change from a no lane change. The best performance was obtained with a random forest where half of the lane changes are recognized while at the same time achieving a low number of false alarms; in another test, using a sub set of data by filtering noisy observations, it was possible to recognize left and right lane changes with more than 70\% efficiency. 

  • 107.
    Mosallam, Ahmed
    et al.
    Örebro University.
    Byttner, Stefan
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Laboratoriet för intelligenta system.
    Svensson, Magnus
    Volvo Technology.
    Rögnvaldsson, Thorsteinn
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Laboratoriet för intelligenta system.
    Nonlinear relation mining for maintenance prediction2011Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a method for mining nonlinear relationships in machine data with the purpose of using such relationships to detect faults, isolate faults and predict wear and maintenance needs. The method is based on the symmetrical uncertainty measure from information theory, hierarchical clustering and self-organizing maps. It is demonstrated on synthetic data sets where it is shown to be able to detect interesting signal relations and outperform linear methods. It is also demonstrated on real data sets where it is considerably harder to select small feature sets. It is also demonstrated on the real data sets that there is information about system wear and system faults in the detected relationships. The work is part of a long-term research project with the aim to construct a self-organizing autonomic computing system for self-monitoring of mechatronic systems.

  • 108.
    Mostowski, Wojciech
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). University of Twente, Enschede, The Netherlands.
    Dynamic Frames Based Verification Method for Concurrent Java Programs2016Ingår i: Verified Software: Theories, Tools, and Experiments: 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Revised Selected Papers / [ed] Arie Gurfinkel & Sanjit A. Seshia, New York: Springer International Publishing Switzerland , 2016, Vol. 9593, s. 124-141Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we discuss a verification method for concurrent Java programs based on the concept of dynamic frames. We build on our earlier work that proposes a new, symbolic permission system for concurrent reasoning and we provide the following new contributions. First, we describe our approach for proving program specifications to be self-framed w.r.t. permissions, which is a necessary condition to maintain soundness in concurrent reasoning. Second, we show how we use predicates to provide modular and reusable specifications for program synchronisation points, like locks or forked threads. Our work primarily targets the KeY verification system with its specification language JML* and symbolic execution proving method. Hence, we also give the current status of the work on implementation and we discuss some examples that are verifiable with KeY. © Springer International Publishing Switzerland 2016

  • 109.
    Mugarza, Imanol
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Constrained dynamic path planning for a tractor and semi-trailer vehicle2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The aim for this project is to design and implement a dynamic path planningmethod for a tractor and semi-trailer vehicle. This vehicle will be in environmentwhich is simulated as a harbour, where containers and other autonomously guidedvehicles are represented as possible objects. Various physical limitations of thevehicle are taken into consideration.

    For this purpose, a simulator is built, where the environment is reproduced.During the simulation, the vehicle should drive towards the goal avoiding contain-ers and other vehicles, which are sensed by a detection and tracking system. Also,a case study is provided where the functionality of the proposed solution is shownin a given environment.

    Based on the results of the project, the vehicle computes and follows a tra-jectory towards the goal until a collision is predicted. A new alternative path iscalculated then in order to avoid the obstacle.

  • 110.
    Munir, Sarmad
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Habib, Yasir
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Javed, Sheraz
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    IPv6@HH   Campus Network Design2011Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The aim of this thesis project to design and implement a campus network based on IPv6, as IPv6 is the protocol of the future communication.There are many papers available which discuss upgrade from IPv4 to IPv6 and their side by side implementations and functionalities. Contrary to this we are working on running a network entirely based on IPv6. So we built this network infrastructure, monitored it and tested it.A network working on IPv6 is not just about a different addressing plan. Rather there are some serious questions. Network administrators are quite happy and comfortable with the current setup of IPv4. Would this IPv6 be able to provide them same facilities on one-to-one basis? If not, would it be upgrade or degrade on some functionality? Is there solution to every problem available or they would have to discover it themselves? All these and many more questions were faced and tackled in the course of this thesis.

  • 111.
    Müller, Moritz
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Mobile order-management system: by the example of K-Con logistics service provider2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Smartphones and tablets are present in our everyday life. They emerged as an enter-taining device but nowadays mobile devices also getting more and more important forbusiness uses. Their big advantage is the light weight and small dimensions. They canbe easily used in a train or bus - difficult to imagine with a desktop pc or even a laptop.With business apps employees can do their work in office or out of office.This thesis deals with the modernization of the order-management system from K-Con. The modernization includes the development of an mobile web application whichenables agents to access order-data by smartphone or tablet.The heart of the new order-management-system is a RESTful webservice implementedwith the Web API technology. This services provides SSL-encrypted read- and write-access to the order data which are stored in a MSSQL-database. The web-applicationusing this web-service is build with the ASP.NET MVC5 framework and jQueryMobile.An UI-prototype for an desktop application collaborating with the new web-service hasbeen finalized. An agile process approach and prototyping has been used to develop an application that meets K-Con´s requirements.

  • 112.
    Nazari, Mahmood
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Zhou, Kun
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Campus Network Design and Man-In-The-Middle Attack2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Security is at the front line of most networks, and most companies apply an exclusive security policy enclosing many of the Open Systems Interconnection (OSI) layers, from application layer all the way down to Internet Protocol (IP) security. On the other hand, an area that is often not protected with high level of security is the second layer of OSI model and this can compromise the entire network to a diversity of attacks.This report presents an experimental performance analysis within the real environment. It focuses on understanding and preventing the Man-In-The-Middle (MITM) also known as Address Resolution Protocol (ARP) Poisoning on the Cisco Catalyst 3560 series switches with Cisco IOS Software. The Linux Command Line (CLI) tools and Ettercap tool were used to launch the Layer 2 attacks that you might come up against. Mitigation methods to stop this attack are evaluated and concluded. Finally we will answer if Secure Socket Layer (SSL) is enough to protect the users’ data against MITM in the network.A HP laptop and two DELL PCs were utilized for these tests and acted as the attacker, the Server and the victim. Victim PC runs Windows 7, attacker’s Laptop and server run Linux.Finally, three different case studies were analyzed and compared with each other and different solutions that might help to solve or detect the issue of MITM attack are concluded.

  • 113.
    Nilsson, Felix
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Image analysis for smart manufacturing2019Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Industriell tillverkning har förändrats mycket under de senaste decennierna. Det har gått från en process som krävt mycket manuellt arbete till en process som är nästan helt uppkopplad och automatiserad. Nästa stora steg inom industriell tillverkning går under benämningen industri 4.0 eller smart tillverkning. Med industri 4.0 kommer en ökad integration mellan IT-system och fabriksgolvet. Denna förändring har visat sig vara särskilt svår att implementera i redan existerande fabriker som kan ha en förväntad livstid på flera årtionden. En av de viktigaste parametrarna att mäta inom industriell tillverkning är varje maskins operativa timmar. Denna information kan hjälpa företag att bättre utnyttja tillgängliga resurser och därigenom spara stora summor pengar. Målet är att utveckla en lösning som, med hjälp av bildanalys och de signalljus som maskinerna kommer utrustade med, kan mäta maskinernas operativa timmar. Med hjälp av metoder som vanligen används för trafikljusigenkänning i autonoma fordon har ett system med en träffsäkerhet på över 99% under de förutsättningar som presenteras i rapporten utvecklats. Om mer video med större variation blir tillgänglig är det mycket troligt att det går att utveckla ett system som har hög pålitlighet i de flesta produktionsmiljöer. 

  • 114.
    Nilsson, Tor
    Högskolan i Halmstad.
    It-forensikers Guide till Universum: Framtagning av övningsmaterial för nyanställda IT-forensiker2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Syftet med denna rapport är att återge en del av den verklighet IT-forensikern står inför och vilka utmaningar som hör till denna samt att producera ett övningsmaterial som kan användas när IT-forensiker nyanställs.

    För att åstadkomma detta brukas en variation av Case-metodik. Mer precist används ett fiktivt brottsfall som grund för ett virtuellt operativsystem. I detta system planteras information som är relevant för utredningen av det påhittade fallet. Övningen i sig består i att eleven, utifrån givna ledtrådar, skall söka rätt på tillräckligt mycket komprometterande data för att kunna stödja en misstanke. Utmaningen är att skapa en miljö som står nära verkligheten. Arbetet baserar sig dels på intervjuer med faktiska IT-forensiker men också på en samling rapporter och nyhetsartiklar ur webblitteratur.

  • 115.
    Nugent, Christopher
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab). University of Ulster, Jordanstown, North Ireland.
    Synnott, Jonathan
    University of Ulster, Jordanstown, North Ireland.
    Gabrielli, Celeste
    Marche Polytechnic University, Ancona, Italy.
    Zhang, Shuai
    University of Ulster, Jordanstown, North Ireland.
    Espinilla, Macarena
    University of Jaén, Jaen, Spain..
    Calzada, Alberto
    University of Ulster, Jordanstown, North Ireland.
    Lundström, Jens
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Cleland, Ian
    University of Ulster, Jordanstown, North Ireland.
    Synnes, Kare
    Luleå university of Technology, Luleå, Sweden.
    Hallberg, Josef
    Luleå university of Technology, Luleå, Sweden.
    Spinsante, Susanna
    Marche Polytechnic University, Ancona, Italy.
    Ortiz Barrios, Miguel Angel
    Universidad de la Costa CUC, Barranquilla, Colombia.
    Improving the Quality of User Generated Data Sets for Activity Recognition2016Ingår i: Ubiquitous Computing and Ambient Intelligence, UCAMI 2016, PT II / [ed] Garcia, CR CaballeroGil, P Burmester, M QuesadaArencibia, A, Amsterdam: Springer Publishing Company, 2016, s. 104-110Konferensbidrag (Refereegranskat)
    Abstract [en]

    It is fully appreciated that progress in the development of data driven approaches to activity recognition are being hampered due to the lack of large scale, high quality, annotated data sets. In an effort to address this the Open Data Initiative (ODI) was conceived as a potential solution for the creation of shared resources for the collection and sharing of open data sets. As part of this process, an analysis was undertaken of datasets collected using a smart environment simulation tool. A noticeable difference was found in the first 1-2 cycles of users generating data. Further analysis demonstrated the effects that this had on the development of activity recognition models with a decrease of performance for both support vector machine and decision tree based classifiers. The outcome of the study has led to the production of a strategy to ensure an initial training phase is considered prior to full scale collection of the data.

  • 116.
    Nunga, Jude
    et al.
    Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), School of Information Science, Computer and Electrical Engineering (IDE).
    Okeke, Godwin
    Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), School of Information Science, Computer and Electrical Engineering (IDE).
    Investigating Security Options for StudentDevelop.com and the Testing of SSL2012Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Security issues have become a key problem with most e-commerce platforms these days and information sent over the internet needs to be protected. When operating an e-commerce platform such as studentdevelop.com financial transactions are involved. Data communication is very vital to e-commerce and needs to be processed securely.

    This thesis shall investigate Secure Socket Layer (SSL) as a possible solution to provide added security such as data integrity and confidentiality on the StudentDevelop.com web portal. This thesis shall also compare other known security suites available for use which could suit the StudentDevelop.com web platform. A vivid comparison shall be carried out to evaluate SSL and Pretty Good Privacy (PGP) with the aim of testing the preferred choice to provide encryption and data confidentiality on the StudentDevelop.com platform.

    Protocols like SSL make up the next layers of mechanisms that support applications with electronic payment schemes. Cryptography being an essential security technology involving the encryption algorithm and digital signatures can provide the basic building blocks. SSL shall be tested on the StudentDevelop.com platform by installing a self-signed certificate, including a test of a digital certificate obtained from a certificate authority. In SSL, the web browser is the client and the web-site server is the server.

    As a result to authenticate consumers on e-commerce platform such as studentdevelop.com, SSL increased the security for web transactions by using public-key encryption and digital certificate to achieve authentication. Encryption algorithm and digital signatures provided the basic building blocks, while SSL protocol made up the next layer of mechanisms that in return support the application layer. In the fourth coming sub chapters, we will look in to the problem description of this thesis and the investigation of security solutions for studentdevelop.com.

  • 117.
    Olofsson, Andreas
    et al.
    Adapteva Inc., Lexington, MA, USA.
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ul-Abdin, Zain
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Kickstarting High-performance Energy-efficient Manycore Architectures with Epiphany2014Ingår i: Conference record: Forty-Eighth Asilomar Conference on Signals, Systems & Computers, November 2-5, 2014, Pacific Grove, California / [ed] Michael B. Matthews, Piscataway, NJ: IEEE Press, 2014, s. 1719-1726Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we introduce Epiphany as a high-performance energy-efficient manycore architecture suitable for real-time embedded systems. This scalable architecture supports floating point operations in hardware and achieves 50 GFLOPS/W in 28 nm technology, making it suitable for high performance streaming applications like radio base stations and radar signal processing. Through an efficient 2D mesh Network-on-Chip and a distributed shared memory model, the architecture is scalable to thousands of cores on a single chip. An Epiphany-based open source computer named Parallella was launched in 2012 through Kickstarter crowd funding and has now shipped to thousands of customers around the world. ©2014 IEEE.

  • 118.
    Olsson Wall, Robin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Nätverksprojekt: Säkerhet i ett större nätverk2012Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Datornätverk har blivit en oerhört central och viktig del av dagens samhälle. Deanvänds världen över och är något som många använder sig av i deras dagliga liv.De medför dock även en säkerhetsrisk. Utan något skydd för dessa risker kan manutsätta sitt nätverk för många olika sorters attacker, där till exempel privatföretagsinformation kan läcka ut. Sådana attacker, samt andra attacker som tillexempel kan leda till ett helt utslaget nätverk, kan vara förödande för de som ärberoende av sitt datornätverk.På grund av de stora riskerna samt den förödande effekt dessa attacker kan ha ärdet väldigt viktigt att skydda sig mot dem. Denna rapport kommer att täcka arbetetmed att implementera säkerhetslösningar i ett företags datornätverk i syfte attförhindra att dessa potentiellt ödesdigra situationer uppstår.

  • 119.
    Ostrovský, Karol
    et al.
    Department of Computing Science, Chalmers University of Technology, Gothenburg, Sweden.
    Prasad, K. V. S.
    Department of Computing Science, Chalmers University of Technology, Gothenburg, Sweden.
    Taha, Walid
    Department of Computer Science, Rice University, Houston, TX, USA.
    Towards a Primitive Higher Order Calculus of Broadcasting Systems2002Ingår i: PPDP '02: Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming, New York, NY: ACM Press, 2002, s. 2-13Konferensbidrag (Refereegranskat)
    Abstract [en]

    Ethernet-style broadcast is a pervasive style of computer communication. In this style, the medium is a single nameless channel. Previous work on modelling such systems proposed a first order process calculus called CBS. In this paper, we propose a fundamentally different calculus called HOBS. Compared to CBS, HOBS 1) is higher order rather than first order, 2) supports dynamic subsystem encapsulation rather than static, and 3) does not require an "underlying language" to be Turing-complete. Moving to a higher order calculus is key to increasing the expressivity of the primitive calculus and alleviating the need for an underlying language. The move, however, raises the need for significantly more machinery to establish the basic properties of the new calculus. This paper develops the basic theory for HOBS and presents two example programs that illustrate programming in this language. The key technical underpinning is an adaptation of Howe's method to HOBS to prove that bisimulation is a congruence. From this result, HOBS is shown to embed the lazy λ-calculus.

  • 120.
    Ourique de Morais, Wagner
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wickström, Nicholas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    A Serious Computer Game to Assist Tai Chi Training for the Elderly2011Ingår i: 2011 IEEE 1st International Conference on Serious Games and Applications for Health, SeGAH 2011, Piscataway: IEEE Press, 2011Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper describes the development of a computer-based serious game to enable older individuals to practice Tai Chi at home on their own. The player plays the game by imitating Tai Chi movements presented by a virtual instructor on the screen. The proposed system is decomposed into two modules. The first module is the game design, i.e., the process of recording an instructor training Tai Chi. Acquired data are used to create gesture templates and a virtual instructor. The second module is the game play in which the player attempts to mimic the virtual instructor. Gestures are measured in real-time and then compared with the prerecorded Tai Chi gesture template corresponding to the displayed movement. Visual feedback indicates how well the player imitated the instructor. The proposed system is not designed to classify gestures but to evaluate the similarity of a given gesture with a gesture template. The Longest Common Sub-Sequence (LCSS) method is applied to compute such similarity. The proposed approach (1) facilitates the design of assessment tools in which the user has to follow a sequence of predefined movements and (2) applicable to other domains, such as telerehabilitation.

  • 121.
    Pamplona, Rodrigo Christovam
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Data replication in mobile computing2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    With the advances of technology and the popularization of mobile devices, the need of researching and discussing subjects related to mobile devices has raised. One of the subjects that needs to be further analyzed is data replication.

    This study investigates data replication on mobile devices focusing on power consumption. It presents four different scenarios that propose, describe, apply and evaluate data replication mechanisms, with the purpose of finding the best scenario that presents less energy consumption.

    In order to make the experiments, Sun SPOT was chosen as a mobile device. This device is fully programmed in a java environment. A different software was created in each scenario in order to verify the performance of the mobile devices regarding energy saving.

    The results found did not meet the expectations. While trying to find the best scenario a hardware limitation was found. Although software can be easily changed to fix errors, hardware cannot be changed as easily. The implications for the hardware limitation found in this study prevented the results to be optimal. The results found also imply that new hardware should be used in further experimentation. As this study proved to be limited, it suggests that additional studies should be carried out applying the new version of the hardware used in this study.

  • 122.
    Parsapoor, Mahboobeh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    An emotional learning-inspired ensemble classifier (ELiEC)2013Ingår i: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems (FedCSIS) / [ed] M. Ganzha, L. Maciaszek & M. Paprzycki, Los Alamitos, CA: IEEE Computer Society, 2013, s. 137-141, artikel-id 6643988Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we suggest an inspired architecture by brain emotional processing for classification applications. The architecture is a type of ensemble classifier and is referred to as 'emotional learning-inspired ensemble classifier' (ELiEC). In this paper, we suggest the weighted k-nearest neighbor classifier as the basic classifier of ELiEC. We evaluate the ELiEC's performance by classifying some benchmark datasets. © 2013 Polish Information Processing Society.

  • 123.
    Parsapoor, Mahboobeh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Brain Emotional Learning Based Fuzzy Inference System (BELFIS) for Solar Activity Forecasting2012Ingår i: 2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012), Vol. 1, Piscataway, NJ: IEEE Press, 2012, s. 532-539, artikel-id 6495090Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a new architecture based on a brain emotional learning model that can be us.ed in a wide varieties of AI applications such as prediction, identification and classification. The architecture is referred to as: Brain Emotional Learning Based Fuzzy Inference System (BELFIS) and it is developed from merging the idea of prior emotional models with fuzzy inference systems. The main aim of this model is presenting a desirable learning model for chaotic system prediction imitating the brain emotional network. In this research work, the model is used for predicting the solar activity, since it has been recognized as a threat to critical infrastructures in modern society. Specifically sunspot numbers are predicted by applying the proposed brain emotional learning model. The prediction results are compared with the outcomes of using other previous models like the locally linear model tree (LOLIMOT) and radial bias function (RBF) and adaptive neuro-fuzzy inference system (ANFIS). © 2012 IEEE.

  • 124.
    Parsapoor, Mahboobeh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Brain Emotional Learning Based Fuzzy Inference System (Modified using Radial Basis Function)2013Ingår i: Eighth International Conference on Digital Information Management (ICDIM 2013), Piscataway, NJ: IEEE Press, 2013, s. 206-211, artikel-id 6693994Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a modified model of brain emotional learning based fuzzy inference system (BELFIS). It has been suggested to predict chaotic time series. We modify the BELFIS model merging radial basis function network with adaptive neuro-fuzzy network. The suggested model is evaluated by testing on complex systems and the obtained results are compared with the results of other studies. © 2013 IEEE.

  • 125.
    Parsapoor, Mahboobeh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Neuro-Fuzzy Models, BELRFS and LOLIMOT, for Prediction of Chaotic Time Series2012Ingår i: INISTA 2012: International Symposium on Innovations in Intelligent Systems and Applications : 2-4 July, 2012 : Trabzon, Turkey, Piscataway, N.J.: IEEE Press, 2012, s. Article number 6247025-, artikel-id 624702Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper suggests a novel learning model for prediction of chaotic time series, brain emotional learning-based recurrent fuzzy system (BELRFS). The prediction model is inspired by the emotional learning system of the mammal brain. BELRFS is applied for predicting Lorenz and Ikeda time series and the results are compared with the results from a prediction model based on local linear neuro-fuzzy models with linear model tree algorithm (LoLiMoT). © 2012 IEEE.

  • 126.
    Parsapoor, Mahboobeh
    et al.
    McGill University, Montreal, QC H3A 2T6, Canada.
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Svensson, Bertil
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Forecasting Solar Activity with Computational Intelligence Models2018Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 6, s. 70902-70909Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    It is vital to accurately predict solar activity, in order to decrease the plausible damage of electronic equipment in the event of a large high-intensity solar eruption. Recently, we have proposed brain emotional learning-based fuzzy inference system (BELFIS) as a tool for the forecasting of chaotic systems. The structure of BELFIS is designed based on the neural structure of fear conditioning. The function of BELFIS is implemented by assigning adaptive networks to the components of the BELFIS structure. This paper especially focuses on the performance evaluation of BELFIS as a predictor by forecasting solar cycles 16-24. The performance of BELFIS is compared with other computational models used for this purpose, in particular with the adaptive neuro-fuzzy inference system. © 2018 IEEE.

  • 127.
    Parsapoor, Mahboobeh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). School of Computer Science, Faculty of Engineering & Physic al Science, The University of Manchester, Manchester, United Kingdom.
    Bilstrup, Urban
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Svensson, Bertil
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Prediction of Solar Cycle 24: Using a Connectionist Model of the Emotional System2015Ingår i: 2015 International Joint Conference on Neural Networks (IJCNN), Piscataway, NJ: IEEE Press, 2015, artikel-id 7280839Konferensbidrag (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    Accurate prediction of solar activity as one aspect of space weather phenomena is essential to decrease the damage from these activities on the ground based communication, power grids, etc. Recently, the connectionist models of the brain such as neural networks and neuro-fuzzy methods have been proposed to forecast space weather phenomena; however, they have not been able to predict solar activity accurately. That has been a motivation for the development of the connectionist model of the brain; this paper aims to apply a connectionist model of the brain to accurately forecasting solar activity, in particular, solar cycle 24. The neuro-fuzzy method has been referred to as the brain emotional learning-based recurrent fuzzy system (BELRFS). BELRFS is tested for prediction of solar cycle 24, and the obtained results are compared with well-known neuro-fuzzy methods and neural networks as well as with physical-based methods. @2015 IEEE

  • 128.
    Pašalić, Emir
    et al.
    OGI School of Science & Engineering, Oregon Health & Science University, Hillsboro, Oregon, USA.
    Taha, Walid
    Computer Science Department, Rice University, Houston, TX, USA.
    Sheard, Tim
    OGI School of Science & Engineering, Oregon Health & Science University, Portland, Oregon, USA.
    Tagless Staged Interpreters for Typed Languages2002Ingår i: ICFP '02: Proceedings of the Seventh ACM SIGPLAN International Conference on Functional Programming, New York, NY: ACM Press, 2002, Vol. 37, s. 218-229Konferensbidrag (Refereegranskat)
    Abstract [en]

    Multi-stage programming languages provide a convenient notation for explicitly staging programs. Staging a definitional interpreter for a domain specific language is one way of deriving an implementation that is both readable and efficient. In an untyped setting, staging an interpreter "removes a complete layer of interpretive overhead", just like partial evaluation. In a typed setting however, Hindley-Milner type systems do not allow us to exploit typing information in the language being interpreted. In practice, this can mean a slowdown cost by a factor of three or more. Previously, both type specialization and tag elimination were applied to this problem. In this paper we propose an alternative approach, namely, expressing the definitional interpreter in a dependently typed programming language. We report on our experience with the issues that arise in writing such an interpreter and in designing such a language. To demonstrate the soundness of combining staging and dependent types in a general sense, we formalize our language (called Meta-D) and prove its type safety. To formalize Meta-D, we extend Shao, Saha, Trifonov and Papaspyrou's λH language to a multilevel setting. Building on λH allows us to demonstrate type safety in a setting where the type language contains all the calculus of inductive constructions, but without having to repeat the work needed for establishing the soundness of that system.

  • 129.
    Pipirs, Robin
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Bosbec cross-platform websocket-chatt: BCWC2016Självständigt arbete på grundnivå (kandidatexamen), 180 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Bosbec är ett företag som utvecklar tjänster för automatisering av informationsflöde via internet, sms, och IOT. När denna rapport skrevs var hybridutveckling en populär utvecklingsmetod för att spara tid och pengar genom att utveckla applikationer i ett språk som sedan kan användas på flera mobila enheter. Bosbec har sen tidigare en chattapplikation som bygger på en äldre kommunikationsstandard, något som upplevs långsamt vid hög belastning. Målet är att utveckla en prototyp för att utreda om en nyare kommunikationsmetod kan göra chattapplikationen snabbare men samtidigt behålla stöd mot den gamla applikationen för att inte mista användare.

    Metoderna som använts för utveckling utav prototypen är hybridutveckling och en utredning utav vilket kommunikationsprotokoll som passar tjänsten bäst. Resultatet av prototyputvecklingen var att kommunikationshastigheten ökade precis som Bosbec önskade, och att användarupplevelsen blev bättre jämfört med den gamla applikationen. Slutresultatet av prototyputvecklingen är att utveckling av en ny chattapplikation kommer inledas.

  • 130.
    Pomwenger, Werner
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Texture Classification by High Order Symmetry Derviatives of Gaussians2003Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In this master thesis we propose high order symmetry derivatives of gaussians for texture classification. The symmetry derivative approach is applied to a multiresolutional pyramid structure, which finally results in a more dimensional feature space represented by high order complex moments. For visualization of results the features are presented to a image classification and segmentation algorithm using multidimensional clustering and orientation adaptive boundary refinement. Test images are generated to validate the functionality of symmetry derivatives for textures with multiple orientations and in this context we propose an extension of double angle representati onto visualize multiple local orientations. Further experiments with real texture images are carried out to improve the quality of the feature space byusing different methods for preprocessing and feature space dimensionality reduction.

  • 131.
    Raase, Sebastian
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    A Dataflow Communications Library for Adapteva's Epiphany2015Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Adapteva'€™s Epiphany platform is a scalable low-power manycore architecture. Even though Adapteva provides an ANSI C compatible compiler and runtime as well as a Software Development Kit (eSDK), developing for this platform is not particularly easy.

    At Halmstad University, we are interested in dataflow applications and have developed a suitable communications library (e-commlib) for the Epiphany, which we would like to release under a permissive 2-clause BSD license. Given sufficiently aware compute kernels, e-commlib projects can also be compiled and run in a Linux-pthreads environment, which simplifies both development and (functional) debugging. This Technical Report shall document both e-commlib (version 3) and our surrounding infrastructure.

  • 132.
    Raase, Sebastian
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Exploring the Epiphany manycore architecturefor the Lattice Boltzmann algorithm2014Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Computational fluid dynamics (CFD) plays an important role in many scientific applications, ranging from designing more effective boat engines or aircraft wings to predicting tomorrow's weather, but at the cost of requiring huge amounts of computing time. Also, traditional algorithms suffer from scalability limitations, making them hard to parallelize massively.

    As a relatively new and promising method for computational fluid dynamics, the Lattice Boltzmann algorithm tries to solve the scalability problems of conventional, but well-tested algorithms in computational fluid dynamics. Through its inherently local structure, it is well suited for parallel processing, and has been implemented on many different kinds of parallel platforms.

    Adapteva's Epiphany platform is a modern, low-power manycore architecture, which is designed to scale up to thousands of cores, and has even more ambitious plans for the future. Hardware support for floating-point calculations makes it a possible choice in scientific settings.

    The goal of this thesis is to analyze the performance of the Lattice Boltzmann algorithm on the Epiphany platform. This is done by implementing and testing the lid cavity test case in two and three dimensions. In real applications, high performance on large lattices with millions of nodes is very important. Although the tested Epiphany implementation scales very good, the hardware does not provide adequate amounts of local memory and external memory bandwidth, currently preventing widespread use in computational fluid dynamics.

  • 133.
    Raase, Sebastian
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    On the Use of a Many-core Processor for Computational Fluid Dynamics Simulations2015Ingår i: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 51, s. 1403-1412Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The increased availability of modern embedded many-core architectures supporting floating-point operations in hardware makes them interesting targets in traditional high performance computing areas as well. In this paper, the Lattice Boltzmann Method (LBM) from the domain of Computational Fluid Dynamics (CFD) is evaluated on Adapteva’s Epiphany many-core architecture. Although the LBM implementation shows very good scalability and high floating-point efficiency in the lattice computations, current Epiphany hardware does not provide adequate amounts of either local memory or external memory bandwidth to provide a good foundation for simulation of the large problems commonly encountered in real CFD applications.

  • 134.
    Rasool, Muhammad Ahsan
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Muhammad Shafiq, Hafiz
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Blockchain Technology: a new domain for Cyber Forensics2018Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Traditional database with no prior security measures is becoming challenging in the era of data technology. Database storage on a central location with single point of failure and vulnerable to cyber attacks is getting exposed to big risk of being hacked with the evolution of powerful machines and modern hacking techniques. Since its commencement, the BlockChain technology has shown a promising performance for application buildup in diversed fields of life from cryptocurrency to smart contracts and decentralized applications. Although multiple studies on privacy, data confidentiality and security issues of BlockChain are performed but a systematic examination is still needs attention. In this thesis work we conduct a systematic study about the vulnerabilities of BlockChain system and review the security enhancement solutions that may point to a good future direction for further research into the area of BlockChain technology and its applications. Smart contracts are self-executable objects hosted on the 2nd generation blockchain like Ethereum, carry billions of SEK worth of cryptocoins and cannot be updated once deployed. Smart contracts are generally considered secure objects but the systematic analysis of technology and source code exposes a new class of vulnerabilities which are more likely an ethical aspect of programming than the software coding errors. Besides the literature review we empower our results with a static code analysis especially with the perspective of cyber forensics.

  • 135.
    Raval, Maharsh
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Sunkireddy, Rajkiran
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Hardware Root of Trust on IoT Gateway2019Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. Many researches and developmentswere made to countermeasure these problems. One of the significant developments was Root ofTrust (RoT). RoT can be enabled both by using hardware such as a chip named Trusted PlatformModule (TPM) and using software like Trusted Execution Environment (TEE).We propose amethod on how to enable RoT using the chip TPM 2.0 on a product, a Gateway named GWen from the company HMS Industrial Networks AB using the TPM software stack TSS2.0. We have performed tests on cryptographic operations such as key generation, key usage, and secure key storage and have shown the results in this report. Based on our results, adding and enabling the TPM 2.0 to the GWen enhances the security of its Linux distribution and makes it possible tosecurely identify and authenticate the gateway based on its secret keys that are stored securelyinside it’s TPM.

  • 136.
    Rosenberg, Robin
    et al.
    Högskolan i Halmstad.
    Eriksson, Sandra
    Högskolan i Halmstad.
    GDPR - Ansvar, utmaningar och framtiden: Med åsikter från arbetslivet2018Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Abstrakt

    Syftet med denna uppsats var att ta reda på hur GDPR kan påverka Sverige ochorganisationer som är verksamma här. GDPR är den nya stora förordningen som kommerträda i kraft den 25:e maj och alla organisationer är mitt uppe i, eller i slutskedet av arbetetmed anpassningarna. Då det inte tidigare finns mycket forskning eller uppsatser kringämnet kommer denna uppsats fokusera på utmaningarna inom implementeringen medGDPR samt att den kommer försöka besvara hur GDPR kan påverka Sverige. Det utkom 16propositioner på lagändringar som alla på sitt sätt kommer påverka privatpersoner ochorganisationer som befinner sig i Sverige.För att göra det möjligt att besvara dessa frågor kommer denna uppsats delvis utförasgenom en analys av lagtext och propositionerna. Den stora delen i denna rapport handlarom utmaningarna och för att få en bredare bild har fyra olika företag från olika delar avnäringslivet intervjuats. McDonalds, Högskolan i Halmstad, Halmstad Studentkår och DHSolutions har alla bidragit och utgör en stor del av resultatet.För att då gå vidare till resultatet och även slutsatsen har denna uppsats kommit fram tillatt GDPR’s påverkan på Sverige kommer att till en början inte vara positiv, mycketoklarheter finns och många utmaningar. De största utmaningarna som identifierats ärinventering, kommunikation till anställda och partners och till sist fullständig anpassninginom tidsramen. GDPR är en stor omställning och en omfattande lag men uppfattningen äratt i det långa loppet kommer den få en positiv påverkan på Sverige och speciellt föruppgiftslämnare. Det är tydligt att regeringen är redo och tar de steg som krävs för att, medkompletterande lagar, göra övergången.

  • 137.
    Rosenberg, Robin
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Palmgren, Erik
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Mobilforensiska verktyg: Kontaminering i fokus2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Den stigande populariteten av mobila enheter har inte bara lett till en smidigarevardag med snabb tillgang till e-post och sociala medier utan aven blivit ett allt mervanligt instrument anvant vid kriminella handlingar. Detta har medfort ett behov attkunna undersoka dessa enheter pa ett sakert satt utan att riskera att bevis blirkontaminerade. Det har arbetet har undersokt de mobilforensiska verktyg somanvands av Polisen och deras tillvagagangssatt vid utredning. Genom att anvanda ossutav Polisens tillvagagangssatt och deras verktyg sa har vi utfort experiment ochintervjuer for att undersoka om data forandras vid utvinning. Experimenten pavisaratt data forandras vid utvinning med ett givet verktyg medans intervjuerna visarskiftande asikter bland Poliser och utvecklare gallande kontaminering.Resultatet fran experimentet visade oss att verktyget UFED raderat bevisfiler frananvandardatan pa en enhet under utvinning. Polisens nonchalans gallandekontaminering bor uppmarksammas da en av deras anvanda verktyg visade ettresultat som kan ha en avgorande roll vid utredning.

  • 138.
    Ruambo, Francis Aidan
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Gebre, Endale Assefa
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Performance Analysis Of A Bifrost Open Source Router2012Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In this thesis work, we analyze the performance of a low - cost router which uses a Linux open source distribution optimized for routing, called Bifrost. The development of Bifrost started about ten years ago in the Swedish University of Agricultural Sciences (SLU). The open source community is huge and within the community exists many useful open source tools that can be integrated and used in open source community. Instead of using only commercial and proprietary equipment, which is a safe but unfortunately expensive solution, it can be a matter of great advantage to use open source technology to a large extent.For the thesis project, we install and configure the Bifrost open source software based router, on a standard desktop computer with three LAN cards and we tested its functionality and evaluated its performance. The Bifrost based router basic features analyzed are two routing protocols (BGP and OSPF) and Inter-VLAN routing. The performance of the Bifrost open source software based router is evaluated in terms of its packet forwarding throughput. The results obtained from the experiment setup for the performance analysis are discussed and compared with a commercial proprietary solution (in our case, a Cisco router of similar calibre). This is important, since the open source distributions also must offer a performance that is comparable or good enough compared with the proprietary solutions.

  • 139.
    Rögnvaldsson, Thorsteinn
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Norrman, Henrik
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Byttner, Stefan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Järpe, Eric
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Estimating p-Values for Deviation Detection2014Ingår i: Proceedings: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems SASO 2014 / [ed] Randall Bilof, Los Alamitos, CA: IEEE Computer Society, 2014, s. 100-109Konferensbidrag (Refereegranskat)
    Abstract [en]

    Deviation detection is important for self-monitoring systems. To perform deviation detection well requires methods that, given only "normal" data from a distribution of unknown parametric form, can produce a reliable statistic for rejecting the null hypothesis, i.e. evidence for devating data. One measure of the strength of this evidence based on the data is the p-value, but few deviation detection methods utilize p-value estimation. We compare three methods that can be used to produce p-values: one class support vector machine (OCSVM), conformal anomaly detection (CAD), and a simple "most central pattern" (MCP) algorithm. The SVM and the CAD method should be able to handle a distribution of any shape. The methods are evaluated on synthetic data sets to test and illustrate their strengths and weaknesses, and on data from a real life self-monitoring scenario with a city bus fleet in normal traffic. The OCSVM has a Gaussian kernel for the synthetic data and a Hellinger kernel for the empirical data. The MCP method uses the Mahalanobis metric for the synthetic data and the Hellinger metric for the empirical data. The CAD uses the same metrics as the MCP method and has a k-nearest neighbour (kNN) non-conformity measure for both sets. The conclusion is that all three methods give reasonable, and quite similar, results on the real life data set but that they have clear strengths and weaknesses on the synthetic data sets. The MCP algorithm is quick and accurate when the "normal" data distribution is unimodal and symmetric (with the chosen metric) but not otherwise. The OCSVM is a bit cumbersome to use to create (quantized) p-values but is accurate and reliable when the data distribution is multimodal and asymmetric. The CAD is also accurate for multimodal and asymmetric distributions. The experiment on the vehicle data illustrate how algorithms like these can be used in a self-monitoring system that uses a fleet of vehicles to conduct deviation detection without supervisi- n and without prior knowledge about what is being monitored. © 2014 IEEE.

  • 140.
    Samadi, Nima
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Lupan, Mihail
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Radio Jamming Detection and Forensics Analysis of Inter-Vehicular Communication Traces2019Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 141.
    Savas, Süleyman
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Hardware/Software Co-Design of Heterogeneous Manycore Architectures2019Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    In the era of big data, advanced sensing, and artificial intelligence, the required computation power is provided mostly by multicore and manycore architectures. However, the performance demand keeps growing. Thus the computer architectures need to continue evolving and provide higher performance. The applications, which are executed on the manycore architectures, are divided into several tasks to be mapped on separate cores and executed in parallel. Usually these tasks are not identical and may be executed more efficiently on different types of cores within a heterogeneous architecture. Therefore, we believe that the heterogeneous manycores are the next step for the computer architectures. However, there is a lack of knowledge on what form of heterogeneity is the best match for a given application or application domain. This knowledge can be acquired through designing these architectures and testing different design configurations. However, designing these architectures is a great challenge. Therefore, there is a need for an automated design method to facilitate the architecture design and design space exploration to gather knowledge on architectures with different configurations. Additionally, it is already difficult to program manycore architectures efficiently and this difficulty will only increase further with the introduction of heterogeneity due to the increase in the complexity of the architectures, unless this complexity is somehow hidden. There is a need for software development tools to facilitate the software development for these architectures and enable portability of the same software across different manycore platforms.

    In this thesis, we first address the challenges of the software development for manycore architectures. We evaluate a dataflow language (CAL) and a source-to-source compilation framework (Cal2Many) with several case studies in order to reveal their impact on productivity and performance of the software. The language supports task level parallelism by adopting actor model and the framework takes CAL code and generates implementations in the native language of several different architectures.

    In order to address the challenge of custom hardware development, we first evaluate a commercial manycore architecture namely Epiphany and identify its demerits. Then we study manycore architectures in order to reveal possible uses of heterogeneity in manycores and facilitate choice of architecture for software and hardware development. We define a taxonomy for manycore architectures that is based on the levels of heterogeneity they contain and discuss the benefits and drawbacks of these levels. We finally develop and evaluate a design method to design heterogeneous manycore architectures customized based on application requirements. The architectures designed with this method consist of cores with application specific accelerators. The majority of the design method is automated with software tools, which support different design configurations in order to increase the productivity of the hardware developer and enable design space exploration.

    Our results show that the dataflow language, together with the software development tool, decreases software development efforts significantly (25-50%), while having a small impact (2-17%) on the performance. The evaluation of the design method reveal that the performance of automatically generated accelerators is between 96-100% of the performance of their manually developed counterparts. Additionally, it is possible to increase the performance of the architectures by increasing the number of cores and using application specific accelerators, usually with a cost on the area usage. However, under certain circumstances, using accelerator may lead to avoiding usage of large general purpose components such as the floating-point unit and therefore improves the area utilization. Eventually, the final impact on the performance and area usage depends on the configurations. When compared to the Epiphany architecture, which is a commercial homogeneous manycore, the generated manycores show competitive results. We can conclude that the automated design method simplifies heterogeneous manycore architecture design and facilitates design space exploration with the use of configurable parameters.

  • 142.
    Savas, Süleyman
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Utilizing Heterogeneity in Manycore Architectures for Streaming Applications2017Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    In the last decade, we have seen a transition from single-core to manycore in computer architectures due to performance requirements and limitations in power consumption and heat dissipation. The first manycores had homogeneous architectures consisting of a few identical cores. However, the applications, which are executed on these architectures, usually consist of several tasks requiring different hardware resources to be executed efficiently. Therefore, we believe that utilizing heterogeneity in manycores will increase the efficiency of the architectures in terms of performance and power consumption. However, development of heterogeneous architectures is more challenging and the transition from homogeneous to heterogeneous architectures will increase the difficulty of efficient software development due to the increased complexity of the architecture. In order to increase the efficiency of hardware and software development, new hardware design methods and software development tools are required. Additionally, there is a lack of knowledge on the performance of applications when executed on manycore architectures.

    The transition began with a shift from single-core architectures to homogeneous multicore architectures consisting of a few identical cores. It now continues with a shift from homogeneous architectures with identical cores to heterogeneous architectures with different types of cores specialized for different purposes. However, this transition has increased the complexity of architectures and hence the complexity of software development and execution. In order to decrease the complexity of software development, new software tools are required. Additionally, there is a lack of knowledge on what kind of heterogeneous manycore design is most efficient for different applications and what are the performances of these applications when executed on current commercial manycores.

    This thesis studies manycore architectures in order to reveal possible uses of heterogeneity in manycores and facilitate choice of architecture for software and hardware developers. It defines a taxonomy for manycore architectures that is based on the levels of heterogeneity they contain and discusses benefits and drawbacks of these levels. Additionally, it evaluates several applications, a dataflow language (CAL), a source-to-source compilation framework (Cal2Many), and a commercial manycore architecture (Epiphany). The compilation framework takes implementations written in the dataflow language as input and generates code targetting different manycore platforms. Based on these evaluations, the thesis identifies the bottlenecks of the architecture. It finally presents a methodology for developing heterogeneoeus manycore architectures which target specific application domains.

    Our studies show that using different types of cores in manycore architectures has the potential to increase the performance of streaming applications. If we add specialized hardware blocks to a core, the performance easily increases by 15x for the target application while the core size increases by 40-50% which can be optimized further. Other results prove that dataflow languages, together with software development tools, decrease software development efforts significantly (25-50%) while having a small impact (2-17%) on the performance.

  • 143.
    Savas, Süleyman
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Hertz, Erik
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ul-Abdin, Zain
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Efficient Single-Precision Floating-Point Division Using Harmonized Parabolic Synthesis2017Ingår i: 2017 IEEE Computer Society Annual Symposium on VLSI: ISVLSI 2017 / [ed] Michael Hübner, Ricardo Reis, Mircea Stan & Nikolaos Voros, Los Alamitos: IEEE, 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper proposes a novel method for performing division on floating-point numbers represented in IEEE-754 single-precision (binary32) format. The method is based on an inverter, implemented as a combination of Parabolic Synthesis and second-degree interpolation, followed by a multiplier. It is implemented with and without pipeline stages individually and synthesized while targeting a Xilinx Ultrascale FPGA.

    The implementations show better resource usage and latency results when compared to other implementations based on different methods. In case of throughput, the proposed method outperforms most of the other works, however, some Altera FPGAs achieve higher clock rate due to the differences in the DSP slice multiplier design.

    Due to the small size, low latency and high throughput, the presented floating-point division unit is suitable for high performance embedded systems and can be integrated into accelerators or be used as a stand-alone accelerator.

  • 144.
    Savas, Süleyman
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ul-Abdin, Zain
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nordström, Tomas
    RISE Research Institutes of Sweden, Gothenburg, Sweden.
    A Configurable Two Dimensional Mesh Network-on-Chip Implementation in Chisel2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    On-chip communication plays a significant role in the performance of manycore architectures. Therefore, they require a proper on-chip communication infrastructure that can scale with the number of the cores. As a solution, network-on-chip structures have emerged and are being used.

    This paper presents description of a two dimensional mesh network-on-chip router and a network interface, which are implemented in Chisel to be integrated to the rocket chip generator that generates RISC-V (rocket) cores. The router is implemented in VHDL as well and the two implementations are verified and compared.

    Hardware resource usage and performance of different sized networks are analyzed. The implementations are synthesized for a Xilinx Ultrascale FPGA via Xilinx tools for the hardware resource usage and clock frequency results. The performance results including latency and throughput measurements with different traffic patterns, are collected with cycle accurate emulations. 

    The implementations in Chisel and VHDL do not show a significant difference. Chisel requires around 10% fewer lines of code, however, the difference in the synthesis results is negligible. Our latency result are better than the majority of the other studies. The other results such as hardware usage, clock frequency, and throughput are competitive when compared to the related works.

  • 145.
    Savas, Süleyman
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Department of Computers Science, Lund University, Lund, Sweden.
    Ul-Abdin, Zain
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nordström, Tomas
    Umeå University, Umeå, Sweden.
    A Framework to Generate Domain-Specific Manycore Architectures from Dataflow Programs2020Ingår i: Microprocessors and microsystems, ISSN 0141-9331, E-ISSN 1872-9436, artikel-id 102908Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In the last 15 years we have seen, as a response to power and thermal limits for current chip technologies, an explosion in the use of multiple and even many computer cores on a single chip. But now, to further improve performance and energy efficiency, when there are potentially hundreds of computing cores on a chip, we see a need for a specialization of individual cores and the development of heterogeneous manycore computer architectures.

    However, developing such heterogeneous architectures is a significant challenge. Therefore, we propose a design method to generate domain specific manycore architectures based on RISC-V instruction set architecture and automate the main steps of this method with software tools. The design method allows generation of manycore architectures with different configurations including core augmentation through instruction extensions and custom accelerators. The method starts from developing applications in a high-level dataflow language and ends by generating synthesizable Verilog code and cycle accurate emulator for the generated architecture.

    We evaluate the design method and the software tools by generating several architectures specialized for two different applications and measure their performance and hardware resource usages. Our results show that the design method can be used to generate specialized manycore architectures targeting applications from different domains. The specialized architectures show at least 3 to 4 times better performance than the general purpose counterparts. In certain cases, replacing general purpose components with specialized components saves hardware resources. Automating the method increases the speed of architecture development and facilitates the design space exploration of manycore architectures.

  • 146.
    Savas, Süleyman
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ul-Abdin, Zain
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Designing Domain-Specific Heterogeneous Architectures from Dataflow Programs2018Ingår i: Computers, ISSN 2073-431X, Vol. 7, nr 2, artikel-id 27Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The last ten years have seen performance and power requirements pushing computer architectures using only a single core towards so-called manycore systems with hundreds of cores on a single chip. To further increase performance and energy efficiency, we are now seeing the development of heterogeneous architectures with specialized and accelerated cores. However, designing these heterogeneous systems is a challenging task due to their inherent complexity. We proposed an approach for designing domain-specific heterogeneous architectures based on instruction augmentation through the integration of hardware accelerators into simple cores. These hardware accelerators were determined based on their common use among applications within a certain domain.The objective was to generate heterogeneous architectures by integrating many of these accelerated cores and connecting them with a network-on-chip. The proposed approach aimed to ease the design of heterogeneous manycore architectures—and, consequently, exploration of the design space—by automating the design steps. To evaluate our approach, we enhanced our software tool chain with a tool that can generate accelerated cores from dataflow programs. This new tool chain was evaluated with the aid of two use cases: radar signal processing and mobile baseband processing. We could achieve an approximately 4x improvement in performance, while executing complete applications on the augmented cores with a small impact (2.5–13%) on area usage. The generated accelerators are competitive, achieving more than 90% of the performance of hand-written implementations.

  • 147.
    Schöndorfer, Sebastian
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Design and implementation of robotic end-effectors for a prototype precision assembly system2016Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Manufacturers are facing increasing pressure to reduce the development costs and deployment times for automated assembly systems. This is especially true for a variety of precision mechatronic products. To meet new and changing market needs, the difficulties of integrating their systems must be significantly reduced. Since 1994, the Microdynamic Systems Laboratory at Carnegie Mellon University has been developing an automation framework, called Agile Assembly Architecture (AAA). Additionally to the concept, a prototype instantiation, in the form of a modular tabletop precision assembly system termed Minifactory, has been developed. The platform, provided by the Minifactory and AAA, is able to support and integrate various precision manufacturing processes. These are needed to assemble a large variety of small mechatronic products.

    In this thesis various enhancements for a second generation agent-based micro assembly system are designed, implemented, tested and improved. The project includes devising methods for tray feeding of precision high-value parts, micro fastening techniques and additional work on visual- and force-servoing. To help achieving these functions, modular and reconfigurable robot end-effectors for handling millimeter sized parts have been designed and built for the existing robotic agents. New concepts for robot end effectors to grasp and release tiny parts, including image processing and intelligent control software, were required and needed to be implemented in the prototype setup. These concepts need to distinguish themselves largely from traditional handling paradigms, in order to solve problems introduced by electrostatic and surface tension forces, that are dominant in manipulating parts that are millimeter and less in size. In order to have a modular system, the factory the main part of this project was the initialization and auto calibration of the different agents.

    The main focus, of this research, is on improving the design, deployment and reconfiguration capabilities of automated assembly systems for precision mechatronic products. This helps to shorten the development process as well as the assembly of factory systems.  A strategic application for this approach is the automated assembly of small sensors, actuators, medical devices and chip-scale atomic systems such as atomic clocks, magnetometers and gyroscopes.

  • 148.
    Sha, Maoxuan
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Xie, Jun
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Xu, Xiao Lin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Switched multi-hop EDF networks: The influence of offsets on real-time performance2011Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In computer science, real-time research is an interesting topic. Nowadays real-time applications are close to us in our daily life. Skype, MSN, satellite communication, automation car and Ethernet are all things related to the real-time field. Many of our computer systems are also real-time, such as RT-Linux, Windows CE. In other words, we live in a “real-time” world. However, not everyone knows much about its existence. Hence, we chose this thesis in order to take a knowledge journey in the real-time field. For an average reader, we hope to provide some basic knowledge about real-time. For a computer science student, we will try to provide a discussion on switched multi-hop network with offsets, and the influence of offsets on real-time network performance. We try to prove that offsets provide networks of high predictability and utilization because offsets adjust packet‟s sending time. A packet‟s sending time is the time when a sender/router starts to transmit a date packet. Packets are sent one after the other. Therefore, we need to lower the time interval between one packet and another. Hence, in our network model, network performance is more predictable and effective. There might be some things left to discuss in future, so we would like to receive any advice and also suggestions for future discussions.

  • 149.
    Shahidi, Hamed
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Security Challenges of Communication Protocols in IoT: Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices2019Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.

  • 150.
    Siek, Jeremy
    et al.
    Rice University, Houston, TX 77005, United States.
    Taha, Walid
    Rice University, Houston, TX 77005, United States.
    A Semantic Analysis of C++ Templates2006Ingår i: ECOOP 2006 - Object-Oriented Programming: 20th European Conference, Nantes, France, July 3-7, 2006, Proceedings / [ed] Dave Thomas, Heidelberg: Springer, 2006, s. 304-327Konferensbidrag (Refereegranskat)
    Abstract [en]

    Templates are a powerful but poorly understood feature ofthe C++ language. Their syntax resembles the parameterized classes ofother languages (e.g., of Java). But because C++ supports template specialization, their semantics is quite different from that of parameterizedclasses. Template specialization provides a Turing-complete sub-languagewithin C++ that executes at compile-time. Programmers put this powerto many uses. For example, templates are a popular tool for writingprogram generators.The C++ Standard defines the semantics of templates using natural language, so it is prone to misinterpretation. The meta-theoretic propertiesof C++ templates have not been studied, so the semantics of templateshas not been systematically checked for errors. In this paper we presentthe first formal account of C++ templates including some of the morecomplex aspects, such as template partial specialization. We validate oursemantics by proving type safety and verify the proof with the Isabelleproof assistant. Our formalization reveals two interesting issues in theC++ Standard: the first is a problem with member instantiation and thesecond concerns the generation of unnecessary template specializations.

12345 101 - 150 av 208
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf