hh.sePublications
Change search
Refine search result
12345 151 - 200 of 208
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Sha, Mao Xuan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Xie, Jun
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Xu, Xiao Lin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mobile Cell Phone GPS Navigation2009Independent thesis Basic level (degree of Bachelor), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Nowadays, GPS Mobile has already become important part of our life. GPS is widely used for citizen and military. For military, they could use GPS to navigate the missile or space flight. For citizen, people use GPS, especially GPS Mobile, to navigate car. GPS also helps people to find their way to home. GPS are widely use on, police, company manage system, agriculture and so on. GPS Mobile is the most familiar device for all of us to use. To combine use GPS Mobile and Google Map, people can get their currently location and shortcut to their destination. Also, we can get information from the Google map, like shopping place, bus station and so on. The main purpose of our project is to help people reach this aim. By using our software, you can find your location on the Google map. When you travel abroad, you can have your own language map on the GPS mobile, easily and quickly. That’s really convenience. The most wonderful part, you can play game with your friend by using our software. What you need to do, it is just send a message to anyone you care about and then you can get their location and show it on the map. So, even it is a far distance between you and your friend. You can have fun together. That is our software Findyourfriendlocation.

    Download full text (pdf)
    FULLTEXT01
  • 152.
    Siek, Jeremy
    et al.
    University of Colorado at Boulder, Department of Electrical & Computer Engineering, Boulder City United States .
    Garcia, Ronald
    Rice University, Houston United States .
    Taha, Walid
    Rice University, Department of Computer Science, Houston United States .
    Exploring the Design Space of Higher-Order Casts2009In: Programming languages and systems: 18th European symposium on programming, ESOP 2009, held as part of the joint european conferences on theory and practice of software, ETAPS 2009, York, UK : proceedings, Berlin: Springer Berlin/Heidelberg, 2009, p. 17-31Conference paper (Refereed)
    Abstract [en]

    This paper explores the surprisingly rich design space for the simplytyped lambda calculus with casts and a dynamic type. Such a calculus is the targetintermediate language of the gradually typed lambda calculus but it is alsointeresting in its own right. In light of diverse requirements for casts, we developa modular semantic framework, based on Henglein’s Coercion Calculus, that instantiatesa number of space-efficient, blame-tracking calculi, varying in whaterrors they detect and how they assign blame. Several of the resulting calculi extendwork from the literature with either blame tracking or space efficiency, andin doing so reveal previously unknown connections. Furthermore, we introduce anew strategy for assigning blame under which casts that respect traditional subtypingare statically guaranteed to never fail. One particularly appealing outcomeof this work is a novel cast calculus that is well-suited to gradual typing.

  • 153.
    Smeraldi, Fabrizio
    et al.
    Queen Mary, University of London, School of Electronic Engineering and Computer Science, London.
    Carmona, Olivier
    Swiss Federal Institute of Technology, Lausanne, Microprocessor and Interface Lab., Lausanne.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Saccadic search with Gabor features applied to eye detection and real-time head tracking2000In: Image and Vision Computing, ISSN 0262-8856, E-ISSN 1872-8138, Vol. 18, no 4, p. 323-329Article in journal (Refereed)
    Abstract [en]

    The Gabor decomposition is a ubiquitous tool in computer vision. Nevertheless, it is generally considered computationally demanding for active vision applications. We suggest an attention-driven approach to feature detection inspired by the human saccadic system. A dramatic speedup is achieved by computing the Gabor decomposition only on the points of a sparse retinotopic grid. An off-line eye detection application and a real-time head localisation and tracking system are presented. The real-time system features a novel eyeball-mounted camera designed to simulate the dynamic performance of the human eye and is, to the best of our knowledge, the first example of active vision system based on the Gabor decomposition.

  • 154.
    Stefanowski, Jerzy
    et al.
    Poznan University of Technology.
    Nowaczyk, Sławomir
    Lund University.
    An Experimental Study of Using Rule Induction Algorithm in Combiner Multiple Classifier2007In: International Journal of Computational Intelligence Research, ISSN 0974-1259, Vol. 3, no 4, p. 335-342Article in journal (Refereed)
    Abstract [en]

    Multiple classifiers consist of sets of subclassifiers, whose individual predictions are combined to classify new objects. These approaches attract an interest of researchers as they can outperform single classifiers on wide range of classification problems. This paper presents an experimental study of using the rule induction algorithm MODLEM in the multiple classifier scheme called combiner, which is a specific meta learning approach to aggregate answers of component classifiers. Our experimental results show that the improvement of predictive accuracy depends on the independence of errors made by the base classifiers. Moreover, we summarise our experience with using MODLEM as component in other multiple classifiers, namely bagging and n2 classifiers.

  • 155.
    Sundemo, John
    et al.
    Halmstad University.
    Rustam, Stanikzai
    Halmstad University.
    Förutse försenade tåg med machine learning2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis investigates the performance of predicting train delays with different machine learning algorithms. The machine learning algorithms that are studied and presented in this thesis are logistic regression, decision tree and neural network. We have tried to implement all of the above algorithms with the data that is collected by ourselves into our own database with the help of Västtrafiks open API. A brief description on our data that has been collected is presented, the fundamentals of the algorithms and general information about machine learning is presented. The algorithms are compared to each other and their performance are shown with the help of AUC score and a confusion matrix.

    Download full text (pdf)
    fulltext
  • 156.
    Svane, Torben Ernst
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Hello Robot! A website to raise interest in a STEM future through Internet speech controlled robots2018In: Frontiers in Education 2018. Fostering Innovation Through Diversity: 2018 Conference Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2018Conference paper (Refereed)
    Abstract [en]

    This Research to Practice Work in Progress paper reports on a project to interest children in STEM subjects (and later on, hopefully to encourage them to enroll in engineering and science programs). Initially (in 2014) the project used proprietary technology (Microsoft Xbox/Kinect). In 2015, Internet-based but region-limited technologies were tested (Google speech recognition API). In 2017 it changed to its current form, a website using the Annyang JavaScript speech recognition library. The site allows children (and others) to program robots through speech commands, or by clicking buttons. Once finished, the commands are sent by email to the university that has the robot. There, the robot actions are videotaped and uploaded to YouTube or its Chinese equivalent Youku. This will allow for a future scenario where a 7-year-old tells his/her friends "Yesterday, I programmed a robot in China. Let's watch the video!" © 2018 IEEE

  • 157.
    Synnott, Jonathan
    et al.
    University of Ulster, Jordanstown, North Ireland.
    Nugent, Chris
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Zhang, Shuai
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Calzada, Alberto
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Cleland, Ian
    Univ Ulster, Sch Comp & Math, Jordanstown, North Ireland..
    Espinilla, Macarena
    Univ Jaen, Dept Comp Sci, Jaen, Spain..
    Medina Quero, Javier
    Univ Jaen, Dept Comp Sci, Jaen, Spain..
    Lundström, Jens
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Environment Simulation for the Promotion of the Open Data Initiative2016In: 2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), Piscataway, N.J.: IEEE, 2016, p. 246-251Conference paper (Refereed)
    Abstract [en]

    The development, testing and evaluation of novel approaches to Intelligent Environment data processing require access to datasets which are of high quality, validated and annotated. Access to such datasets is limited due to issues including cost, flexibility, practicality, and a lack of a globally standardized data format. These limitations are detrimental to the progress of research. This paper provides an overview of the Open Data Initiative and the use of simulation software (IE Sim) to provide a platform for the objective assessment and comparison of activity recognition solutions. To demonstrate the approach, a dataset was generated and distributed to 3 international research organizations. Results from this study demonstrate that the approach is capable of providing a platform for benchmarking and comparison of novel approaches.

  • 158.
    Taha, Walid
    Department of Computer Science, Rice University, Houston, TX, United States.
    A Gentle Introduction to Multi-stage Programming, Part II2008In: Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, Braga, Portugal, July 2-7, 2007. Revised Papers / [ed] Ralf Lämmel, Joost Visser, João Saraiva, Berlin: Springer Berlin/Heidelberg, 2008, p. 260-290Conference paper (Other academic)
    Abstract [en]

    As domain-specific languages (DSLs) permeate into mainstream software engineering, there is a need for economic methods for implementing languages. Following up on a paper with a similar title, this paper focuses on dynamically typed languages, covering issues ranging from parsing to defining and staging an interpreter for an interesting subset of Dr. Scheme. Preliminary experimental results indicate that the speedups reported in previous work for smaller languages and with smaller benchmarks are maintained. © 2008 Springer Berlin Heidelberg.

  • 159.
    Taha, Walid
    Oregon Graduate Institute of Science and Technology.
    Multi-Stage Programming: Its Theory and Applications1999Doctoral thesis, monograph (Other academic)
    Abstract [en]

    MetaML is a statically typed functional programming language with special support for programgeneration. In addition to providing the standard features of contemporary programminglanguages such as Standard ML, MetaML provides three staging annotations. These staging annotationsallow the construction, combination, and execution of object-programs.Our thesis is that MetaML's three staging annotations provide a useful, theoretically soundbasis for building program generators. This dissertation reports on our study of MetaML's stagingconstructs, their use, their implementation, and their formal semantics. Our results include anextended example of where MetaML allows us to produce ecient programs, an explanation ofwhy implementing these constructs in traditional ways can be challenging, two formulations ofMetaML's semantics, a type system for MetaML, and a proposal for extending MetaML with atype construct for closedness.The dissertation consolidates a number of previous publications by the author, includingMetaML's type systems and big-step semantics. The presentation is new. The proposed solutionto an implementation problem and the reduction semantics for MetaML's three staging constructsare also new.

    Download full text (pdf)
    FULLTEXT01
  • 160.
    Taha, Walid
    Rice University, Houston, TX, United States.
    Resource-Aware Programming - Invited paper2004In: Embedded software and systems: first international conference, ICESS 2004, Hangzhou, China, December 9-10, 2004 ; revised selected papers, Berlin: Springer Berlin/Heidelberg, 2004, p. 38-43Conference paper (Other academic)
    Abstract [en]

    Traditional wisdom in programming language design suggests that there is a trade-off between expressive power and static guarantees. We describe a novel schema for designing a class of languages that we call Resource-aware Programming (RAP) languages. By taking into account the natural distinction between the development platform and the deployment platform for embedded software, RAP languages can alleviate the need for drastic trade-offs between expressive power and static guarantees. We describe our preliminary experience designing and programming in a RAP language for hardware design, and give a brief overview of directions for future work.

  • 161.
    Taha, Walid
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Univ Houston, Houston, TX 77004 USA & Chalmers, Gothenburg, Sweden.;Yale, New Haven, CT USA.;Rice Univ, Houston, TX 77251 USA.;Schlumberger, Sugar Land, TX USA.;Lucent Bell Labs, Murray Hill, NJ USA..
    Rigorous simulation2018In: / [ed] Salem, A., Abbas, H. M., Elkharashi, M. W., Eldin, A. M. B., Taher, M., Zaki, A. M., Institute of Electrical and Electronics Engineers (IEEE), 2018, p. XXIII-XXIVConference paper (Refereed)
  • 162.
    Taha, Walid
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Duracz, Adam
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zeng, Yingfu
    Rice University, Houston TX, USA.
    Atkinson, Kevin
    Rice University, Houston TX, USA.
    Bartha, Ferenc Ágoston
    Rice University, Houston TX, USA.
    Brauner, Paul
    Rice University, Houston TX, USA.
    Duracz, Jan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Xu, Fei
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Cartwright, Robert
    Rice University, Houston TX, USA.
    Konečný, Michal
    Computer Science Group, Aston University, Birmingham, United Kingdom.
    Moggi, Eugenio
    University of Genova, Genoa, Italy.
    Masood, Jawad
    Rice University, Houston TX, USA.
    Andreasson, Björn Pererik
    Halmstad University, School of Information Technology.
    Inoue, Jun
    Rice University, Houston TX, USA.
    Sant'Anna, Anita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Philippsen, Roland
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Chapoutot, Alexandre
    ENSTA ParisTech - U2IS, Paris, France.
    O'Malley, Marcia
    Department of Mechanical Engineering, Rice University, Houston TX, USA.
    Ames, Aaron
    School of Mechanical Eng., Georgia Institute of Technology, Atlanta GA, USA.
    Gaspes, Veronica
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Hvatum, Lise
    Schlumberger, Houston TX, USA.
    Mehta, Shyam
    Schlumberger, Houston TX, USA.
    Eriksson, Henrik
    Dependable Systems, SP Technical Research Institute of Sweden, Borås, Sweden.
    Grante, Christian
    AB Volvo, Gothenburg, Sweden.
    Acumen: An Open-source Testbed for Cyber-Physical Systems Research2016In: Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / [ed] Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov & Radu-Laurentiu Vieriu, Heidelberg: Springer, 2016, Vol. 169, p. 118-130Conference paper (Refereed)
    Abstract [en]

    Developing Cyber-Physical Systems requires methods and tools to support simulation and verification of hybrid (both continuous and discrete) models. The Acumen modeling and simulation language is an open source testbed for exploring the design space of what rigorous-but-practical next-generation tools can deliver to developers of Cyber-Physical Systems. Like verification tools, a design goal for Acumen is to provide rigorous results. Like simulation tools, it aims to be intuitive, practical, and scalable. However, it is far from evident whether these two goals can be achieved simultaneously.

    This paper explains the primary design goals for Acumen, the core challenges that must be addressed in order to achieve these goals, the "agile research method" taken by the project, the steps taken to realize these goals, the key lessons learned, and the emerging language design. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016.

    Download full text (pdf)
    fulltext
  • 163.
    Taha, Walid
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Philippsen, Roland
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Modeling Basic Aspects of Cyber-Physical Systems2012In: 3rd International Workshop on Domain-Specific Languages and models for ROBotic systems (DSLRob-12), 2012Conference paper (Refereed)
    Abstract [en]

    Designing novel cyber-physical systems entails significant, costly physical experimentation. Simulation tools can enable the virtualization of experiments. Unfortunately, current tools have shortcomings that limit their utility for virtual experimentation. Language research can be especially helpful in addressing many of these problems. As a first step in this direction, we consider the question of determining what language features are needed to model cyber-physical systems. Using a series of elementary examples of cyber-physical systems, we reflect on the extent to which a small, experimental domain-specific formalism called Acumen suffices for this purpose.

    Download full text (pdf)
    taha-philippsen--dslrob2012.pdf
  • 164.
    Taha, Walid
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Zeng, Yingfu
    Rice University, Houston, TX, USA.
    Duracz, Adam
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Xu, Fei
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Atkinson, Kevin
    Rice University, Houston, TX, USA.
    Brauner, Paul
    Rice University, Houston, TX, USA.
    Cartwright, Robert
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Rice University, Houston, TX, USA.
    Philippsen, Roland
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Developing a first course on cyber-physical systems2016In: ACM SIGBED Review, E-ISSN 1551-3688, Vol. 14, no 1, p. 44-52Article in journal (Refereed)
    Abstract [en]

    Effective and creative Cyber-Physical Systems (CPS) development requires expertise in disparate fields that have traditionally been taught in several distinct disciplines. At the same time, students seeking a CPS education generally come from diverse educational backgrounds. In this paper, we report on our recent experience of developing and teaching a course on CPS. The course addresses the following three questions: What are the core elements of CPS? How should these core concepts be integrated in the CPS design process? What types of modeling tools can assist in the design of Cyber-Physical Systems? Our experience with the first four offerings of the course has been positive overall. We also discuss the lessons we learned from some issues that were not handled well. All material including lecture notes and software used for the course are openly available online.

  • 165.
    Taromirad, Masoumeh
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Mousavi, Mohammad Reza
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Gray-Box Conformance Testing for Symbolic Reactive State Machines2017In: Fundamentals of Software Engineering: 7th International Conference, FSEN 2017, Tehran, Iran, April 26–28, 2017, Revised Selected Papers / [ed] Mehdi Dastani & Marjan Sirjani, Heidelberg: Springer Berlin/Heidelberg, 2017, p. 228-243Conference paper (Refereed)
    Abstract [en]

    Model-based testing (MBT) is typically a black-box testing technique. Therefore, generated test suites may leave some untested gaps in a given implementation under test (IUT). We propose an approach to use the structural and behavioural information exploited from the implementation domain to generate effective and efficient test suites. Our approach considers both specification models and implementation models, and generates an enriched test model which is used to automatically generate test suites. We show that the proposed approach is sound and exhaustive and cover both the specification and the implementation. We examine the applicability and the effectiveness of our approach by applying it to a well-known example from the railway domain. © 2017, IFIP International Federation for Information Processing.

  • 166.
    Teferi, Dereje
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Multi-view and Multi-scale Recognition of Symmetric Patterns2009In: Image analysis / [ed] Arnt-Børre Salberg, Jon Yngve Hardeberg and Robert Jenssen, Berlin: Springer, 2009, p. 657-666Conference paper (Refereed)
    Abstract [en]

    This paper suggests the use of symmetric patterns and their corresponding symmetry filters for pattern recognition in computer vision tasks involving multiple views and scales. Symmetry filters enable efficient computation of certain structure features as represented by the generalized structure tensor (GST). The, properties of the complex moments to changes in scale and multiple views including in-depth rotation of the patterns and the presence of noise is investigated. Images of symmetric patterns captured using a. low resolution low-cost CMOS camera, such as a phone Camera or a web-cam, from as far as three meters are precisely localized and their spatial orientation is determined from the argument of the second order complex moment I-20 without further computation.

  • 167.
    Teferi Lemma, Dereje
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Audio-video synthesis methods for improving performance of biometric systems2007Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    System security is important for any automation. It is even more so in the case of biometric systems due to the sensitive nature of the data it uses for enrollment and authentication - the subjects physical or biological trait. The performance quantification of biometric systems, such as face tracking and recognition, highly depend on the database used for testing the systems. Systems trained and tested on realistic and represenative databases evidently perform better. In fact, the main reason for evaluating any system on test data is that these data sets represent problems that system might face in the real world. However, building biometric databases that represent the real world is an expensive task due to its high demand on the side of the participants. This becomes even more difficult and unrealistic if the data is to be collected in a natural environment such as supermarkets, offices, streets, etc.

    This thesis presents a procedure to build a synthetic biometric database by damascening images from a studio recorded database with a realistic scenery. To this end, we developed an image segmenation procedure to spearate the background of a video recorded in studio conditions with the prupose to replace it with an arbitrary complex background. Furthermore, we present how several degradations such as affine transformation, imaging noise, and motion blur can be incorporated into the production of the new database to simulate natural recording environments. The system is applied to the entire XM2VTS database, which already consists of several terabytes of data, to produce the DXM2VTS - Damascened XM2VTS database.

    Moreover, the thesis presents a method to segment a video sequence in the time domain based on its audio concept. The video is then reshuffled and used for testing resilience of text-prompted biometric systems against playback attacks. The playback is supported by pyramid based frame interpolation method to reduce discontinuities created at the digit boundaries in time.

  • 168.
    Tistarelli, Massimo
    et al.
    Computer Vision Laboratory, University of Sassari, Italy.
    Bigun, JosefHalmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).Jain, Anil K.Departments of Computer Science & Engineering, and Electrical & Computer Engineering, Michigan State University.
    Biometric authentication: International ECCV 2002 Workshop, Copenhagen, Denmark, June 1, 2002 : proceedings2002Conference proceedings (editor) (Other academic)
    Abstract [en]

    This book constitutes the refereed proceedings of the International Workshop on Biometric Authentication held in Copenhagen, Denmark, in June 2001 as a satellite event of ECCV 2002.The 19 revised full papers presented were carefully reviewed. The papers are organized in topical sections on face recognition, fingerprint recognition, psychology and biometrics, face detection and localization, gait and signature recognition, and classifiers for recognition.

  • 169.
    Toazza, Denny Antonio
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Kim, Tae Hyun
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Navigation Control of an Unmanned Aerial Vehicle (UAV)2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The thesis covers a new navigation algorithm for UAV to fly through several given GPS coordinates without any human interference. The UAV first gets its current position from GPS receiver via Bluetooth connection with the navigator computer. With this GPS point, it draws an optimal trajectory to next destination. During the flight, the navigator computer issues the information about which direction to turn and how much to turn. This information will be used to steer the airplane servos.

    The algorithm is programmed in Java LeJOS. It uses built-in Java classes about GPS and Bluetooth. The main computer, where the navigation program runs, is a LEGO Mindstorms NXT and it is used a GPSlim240 from HOLUX as a GPS receiver.

    Download full text (pdf)
    FULLTEXT01
  • 170.
    Trivic, Göran
    et al.
    Halmstad University.
    Azan, Mohammed
    Halmstad University.
    Cloudify our product configuration2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 171.
    Uhlemann, Elisabeth
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Rasmussen, Lars K.
    Chalmers, Göteborg.
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Wireless Real-Time Communication Using Deadline Dependent Coding2006In: ARTES - A network for Real-Time research and graduate Education in Sweden 1997-2006: MRTC report (197/2006), Uppsala: Department of Information Technology, Uppsala university , 2006, p. 239-256Chapter in book (Other (popular science, discussion, etc.))
    Abstract [en]

    The constant evolution of wireless communication, and all the applications this enables, is rapidly increasing our demands on the performance of communication networks. As the transmission speed increases, entirely new applications and services, like for example video streaming, suddenly becomes interesting for wireless systems as well. The expectations of the general user with respect to performance of wireless applications are guided by the current quality of traditional wireline systems. This naturally implies a considerable challenge when designing wireless communication systems. Many of these new wireless applications are based on packet transmissions and are sub ject to time-critical constraints. The ob jective of the deadline dependent coding (DDC) communication protocol presented here is therefore to develop an efficient and fault tolerant real-time link layer foundation, enabling critical deadline dependent communication over unreliable wireless channels.

    Download full text (pdf)
    fulltext
  • 172.
    Ul-Abdin, Zain
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Programming of Coarse-Grained Reconfigurable Architectures2011Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Coarse-grained reconfigurable architectures, which offer massive parallelism coupled with the capability of undergoing run-time reconfiguration, are gaining attention in order to meet not only the increased computational demands of high-performance embedded systems, but also to fulfill the need of adaptability to functional requirements of the application. This thesis focuses on the programming aspects of such coarse-grained reconfigurable computing devices, including the relevant computation models that are capable of exposing different kinds of parallelism inherent in the application and the ability of these models to capture the adaptability requirements of the application. The thesis suggests the occam-pi language for programming of a broad class of coarse-grained reconfigurable architectures as an intermediate language; we call it intermediate, since we believe that the applicationprogramming is best done in a high-level domain-specific language. The salient properties of the occam-pi language are explicit concurrency with built-in mechanisms for interprocessorcommunication, provision for expressing dynamic parallelism, support for the expression of dynamic reconfigurations, and placement attributes. To evaluate the programming approach, a compiler framework was extended to support the language extensions in the occam-pi language, and backends were developed to target two different coarse-grained reconfigurable architectures. XPP and Ambric. The results on XPP reveal that the occam-pi based implementations produce comparable throughput to those of NML programs, while programming at a much higher level of abstraction than that of NML. Similarly the two occam-pi implementations of autofocus criterion calculation targeted to the Ambric platform outperform the CPU implementation by factors of 11-23. Thus, the results of the implemented case-studies suggest that the occam-pi language based approach simplifies the development of applications employing run-time reconfigurable devices without compromising the performance benefits.

    Download full text (pdf)
    FULLTEXT01
    Download (pdf)
    COVER01
    Download (pdf)
    SPIKBLAD01
  • 173.
    Uličný, Matej
    Halmstad University, School of Information Technology.
    Methods for Increasing Robustness of Deep Convolutional Neural Networks2015Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    Recent discoveries uncovered flaws in machine learning algorithms such as deep neural networks. Deep neural networks seem vulnerable to small amounts of non-random noise, created by exploiting the input to output mapping of the network. Applying this noise to an input image drastically decreases classication performance. Such image is referred to as an adversarial example. The purpose of this thesis is to examine how known regularization/robustness methods perform on adversarial examples. The robustness methods: dropout, low-pass filtering, denoising autoencoder, adversarial training and committees have been implemented, combined and tested. For the well-known benchmark, the MNIST (Mixed National Institute of Standards and Technology) dataset, the best combination of robustness methods has been found. Emerged from the results of the experiments, ensemble of models trained on adversarial examples is considered to be the best approach for MNIST. Harmfulness of the adversarial noise and some robustness experiments are demonstrated on CIFAR10 (The Canadian Institute for Advanced Research) dataset as well. Apart from robustness tests, the thesis describes experiments with human classification performance on noisy images and the comparison with performance of deep neural network.

    Download full text (pdf)
    fulltext
  • 174.
    Uličný, Matej
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Lundström, Jens
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Robustness of Deep Convolutional Neural Networks for Image Recognition2016In: Intelligent Computing Systems: First International Symposium, ISICS 2016, Mérida, México, March 16-18, 2016, Proceedings / [ed] Anabel Martin-Gonzalez, Victor Uc-Cetina, Cham: Springer, 2016, Vol. 597, p. 16-30Conference paper (Refereed)
    Abstract [en]

    Recent research has found deep neural networks to be vulnerable, by means of prediction error, to images corrupted by small amounts of non-random noise. These images, known as adversarial examples are created by exploiting the input to output mapping of the network. For the MNIST database, we observe in this paper how well the known regularization/robustness methods improve generalization performance of deep neural networks when classifying adversarial examples and examples perturbed with random noise. We conduct a comparison of these methods with our proposed robustness method, an ensemble of models trained on adversarial examples, able to clearly reduce prediction error. Apart from robustness experiments, human classification accuracy for adversarial examples and examples perturbed with random noise is measured. Obtained human classification accuracy is compared to the accuracy of deep neural networks measured in the same experimental settings. The results indicate, human performance does not suffer from neural network adversarial noise.

  • 175.
    Vaiciukynas, Evaldas
    et al.
    Kaunas University of Technology.
    Gelzinis, Adas
    Kaunas University of Technology.
    Bacauskiene, Marija
    Kaunas University of Technology.
    Verikas, Antanas
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Vegiene, Aurelija
    Kaunas University of Medicine.
    Exploring Kernels in SVM-Based Classification of Larynx Pathology from Human Voice2010In: Proceedings of the 5th International Conference on Electrical and Control Technologies ECT-2010, May 6-7, 2010, Kaunas, Lithuania, Kaunas: KUT , 2010, p. 67-72Conference paper (Refereed)
    Abstract [en]

    In this paper identification of laryngeal disorders using cepstral parameters of human voice is investigated. Mel-frequency cepstral coefficients (MFCC), extracted from audio recordings, are further approximated, using 3 strategies: sampling, averaging, and estimation. SVM and LS-SVM categorize pre-processed data into normal, nodular, and diffuse classes. Since it is a three-class problem, various combination schemes are explored.  Constructed custom kernels outperformed a popular non-linear RBF kernel. Features, estimated with GMM, and SVM kernels, designed to exploit this information, is an interesting fusion of probabilistic and discriminative models for human voice-based classification of larynx pathology.

    Download full text (pdf)
    FULLTEXT01
  • 176.
    Vedder, Benjamin
    et al.
    RISE Research Institutes of Sweden, Gothenburg, Sweden.
    Svensson, Joel
    RISE Research Institutes of Sweden, Gothenburg, Sweden.
    Vinter, Jonny
    RISE Research Institutes of Sweden, Gothenburg, Sweden.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Automated Testing of Ultra-Wideband Positioning for Autonomous DrivingManuscript (preprint) (Other academic)
    Abstract [en]

    Autonomous vehicles need accurate and dependable positioning, and these systems need to be tested extensively. We have evaluated positioning based on Ultra-Wide Band (UWB) ranging with our self-driving model car using a highly automated approach. Random drivable trajectories were generated, while the UWB position was compared against the Real-Time Kinematic Satellite Navigation (RTK-SN) positioning system that our model car also is equipped with. Fault injection was used to study the fault tolerance of the UWB positioning system. Addressed challenges are: automatically generating test cases for real-time hardware, restore the state between tests and to maintain safety by preventing collisions. We were able to automatically generate and carry out hundreds of experiments on the model car in real time, and re-run them consistently with and without fault injection enabled. Thereby we demonstrate one novel approach to perform automated testing on complex real-time hardware.

    Download full text (pdf)
    fulltext
  • 177.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bacauskiene, Marija
    Kaunas University of Technology, Lithuania.
    Gelzinis, Adas
    Kaunas University of Technology, Lithuania.
    Leverages Based Neural Networks Fusion2004In: Neural information processing, 2004, p. 446-451Conference paper (Refereed)
    Abstract [en]

    To improve estimation results, outputs of multiple neural networks can be aggregated into a committee output. In this paper, we study the usefulness of the leverages based information for creating accurate neural network committees. Based on the approximate leave-one-out error and the suggested, generalization error based, diversity test, accurate and diverse networks are selected and fused into a committee using data dependent aggregation weights. Four data dependent aggregation schemes – based on local variance, covariance, Choquet integral, and the generalized Choquet integral – are investigated. The effectiveness of the approaches is tested on one artificial and three real world data sets.

  • 178.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Gelzinis, Adas
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Training neural networks by stochastic optimisation2000In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 30, no 1-4, p. 153-172Article in journal (Refereed)
    Abstract [en]

    We present a stochastic learning algorithm for neural networks. The algorithm does not make any assumptions about transfer functions of individual neurons and does not depend on a functional form of a performance measure. The algorithm uses a random step of varying size to adapt weights. The average size of the step decreases during learning. The large steps enable the algorithm to jump over local maxima/minima, while the small ones ensure convergence in a local area. We investigate convergence properties of the proposed algorithm as well as test the algorithm on four supervised and unsupervised learning problems. We have found a superiority of this algorithm compared to several known algorithms when testing them on generated as well as real data.

  • 179.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Kaunas University of Technology, Kaunas, Lithuania.
    Gelzinis, Adas
    Kaunas University of Technology, Kaunas, Lithuania.
    Bacauskiene, Marija
    Kaunas University of Technology, Kaunas, Lithuania.
    Hållander, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Uloza, Virgilijus
    Kaunas University of Medicine, Kaunas, Lithuania.
    Kaseta, Marius
    Kaunas University of Medicine, Kaunas, Lithuania.
    Combining image, voice, and the patient's questionnaire data to categorize laryngeal disorders2010In: Artificial Intelligence in Medicine, ISSN 0933-3657, E-ISSN 1873-2860, Vol. 49, no 1, p. 43-50Article in journal (Refereed)
    Abstract [en]

    Objective: This paper is concerned with soft computing techniques for categorizing laryngeal disorders based on information extracted from an image of patient's vocal folds, a voice signal, and questionnaire data.

    Methods: Multiple feature sets are exploited to characterize images and voice signals. To characterize colour, texture, and geometry of biological structures seen in colour images of vocal folds, eight feature sets are used. Twelve feature sets are used to obtain a comprehensive characterization of a voice signal (the sustained phonation of the vowel sound /a/). Answers to 14 questions constitute the questionnaire feature set. A committee of support vector machines is designed for categorizing the image, voice, and query data represented by the multiple feature sets into the healthy, nodular and diffuse classes. Five alternatives to aggregate separate SVMs into a committee are explored. Feature selection and classifier design are combined into the same learning process based on genetic search.

    Results: Data of all the three modalities were available from 240 patients. Among those, 151 patients belong to the nodular class, 64 to the diffuse class and 25 to the healthy class. When using a single feature set to characterize each modality, the test set data classification accuracy of 75.0%, 72.1%, and 85.0% was obtained for the image, voice and questionnaire data, respectively. The use of multiple feature sets allowed to increase the accuracy to 89.5% and 87.7% for the image and voice data, respectively. The test set data classification accuracy of over 98.0% was obtained from a committee exploiting multiple feature sets from all the three modalities. The highest classification accuracy was achieved when using the SVM-based aggregation with hyper parameters of the SVM determined by genetic search. Bearing in mind the difficulty of the task, the obtained classification accuracy is rather encouraging.

    Conclusions: Combination of both multiple feature sets characterizing a single modality and the three modalities allowed to substantially improve the classification accuracy if compared to the highest accuracy obtained from a single feature set and a single modality. In spite of the unbalanced data sets used, the error rates obtained for the three classes were rather similar.

  • 180.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Gelzinis, Adas
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Bacauskiene, Marija
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Uloza, Virgilijus
    Department of Otolaryngology, Kaunas University of Medicine, Lithuania.
    Integrating global and local analysis of color, texture and geometrical information for categorizing laryngeal images2006In: International journal of pattern recognition and artificial intelligence, ISSN 0218-0014, Vol. 20, no 8, p. 1187-1205Article in journal (Refereed)
    Abstract [en]

    An approach to integrating the global and local kernel-based automated analysis of vocal fold images aiming to categorize laryngeal diseases is presented in this paper. The problem is treated as an image analysis and recognition task. A committee of support vector machines is employed for performing the categorization of vocal fold images into healthy, diffuse and nodular classes. Analysis of image color distribution, Gabor filtering, cooccurrence matrices, analysis of color edges, image segmentation into homogeneous regions from the image color, texture and geometry view point, analysis of the soft membership of the regions in the decision classes, the kernel principal components based feature extraction are the techniques employed for the global and local analysis of laryngeal images. Bearing in mind the high similarity of the decision classes, the correct classification rate of over 94% obtained when testing the system on 785 vocal fold images is rather encouraging.

  • 181.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Gelzinis, Adas
    Kaunas University of Technology, Lithuania.
    Malmqvist, Kerstin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Using unlabelled data to train a multilayer perceptron2001In: Neural Processing Letters, ISSN 1370-4621, E-ISSN 1573-773X, Vol. 14, no 3, p. 179-201Article in journal (Refereed)
    Abstract [en]

    This Letter presents an approach to using both labelled and unlabelled data to train a multilayer perceptron. The unlabelled data are iteratively pre-processed by a perceptron being trained to obtain the soft class label estimates. It is demonstrated that substantial gains in classification performance may be achieved from the use of the approach when the labelled data do not adequately represent the entire class distributions. The experimental investigations performed have shown that the approach proposed may be successfully used to train neural networks for learning different classification problems.

  • 182.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Guzaitis, Jonas
    Kaunas University of Technology.
    Gelzinis, Adas
    Kaunas University of Technology.
    Bacauskiene, Marija
    Kaunas University of Technology.
    A general framework for designing a fuzzy rule-based classifier2011In: Knowledge and Information Systems, ISSN 0219-1377, E-ISSN 0219-3116, Vol. 29, no 1, p. 203-221Article in journal (Refereed)
    Abstract [en]

    This paper presents a general framework for designing a fuzzyrule-based classifier. Structure and parameters of the classifierare evolved through a two-stage genetic search. To reduce the searchspace, the classifier structure is constrained by a tree createdusing the evolving SOM tree algorithm. Salient input variables arespecific for each fuzzy rule and are found during the genetic searchprocess. It is shown through computer simulations of four real worldproblems that a large number of rules and input variables can beeliminated from the model without deteriorating the classificationaccuracy. By contrast, the classification accuracy of unseen data isincreased due to the elimination.This paper presents a general framework for designing a fuzzyrule-based classifier. Structure and parameters of the classifierare evolved through a two-stage genetic search. To reduce the searchspace, the classifier structure is constrained by a tree createdusing the evolving SOM tree algorithm. Salient input variables arespecific for each fuzzy rule and are found during the genetic searchprocess. It is shown through computer simulations of four real worldproblems that a large number of rules and input variables can beeliminated from the model without deteriorating the classificationaccuracy. By contrast, the classification accuracy of unseen data isincreased due to the elimination.

    Download full text (pdf)
    fulltext
  • 183.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Kalsyte, Zivile
    Department of Electrical and Control Instrumentation, Kaunas University of Technology, Kaunas, Lithuania.
    Bacauskiene, Marija
    Department of Electrical and Control Instrumentation, Kaunas University of Technology, Kaunas, Lithuania.
    Gelzinis, Adas
    Department of Electrical and Control Instrumentation, Kaunas University of Technology, Kaunas, Lithuania.
    Hybrid and ensemble-based soft computing techniques in bankruptcy prediction: a survey2010In: Soft Computing - A Fusion of Foundations, Methodologies and Applications, ISSN 1432-7643, E-ISSN 1433-7479, Vol. 14, no 9, p. 995-1010Article in journal (Refereed)
    Abstract [en]

    This paper presents a comprehensive review of hybrid and ensemble-based soft computing techniques applied to bankruptcy prediction. A variety of soft computing techniques are being applied to bankruptcy prediction. Our focus is on techniques, namely how different techniques are combined, but not on obtained results. Almost all authors demonstrate that the technique they propose outperforms some other methods chosen for the comparison. However, due to different data sets used by different authors and bearing in mind the fact that confidence intervals for the prediction accuracies are seldom provided, fair comparison of results obtained by different authors is hardly possible. Simulations covering a large variety of techniques and data sets are needed for a fair comparison. We call a technique hybrid if several soft computing approaches are applied in the analysis and only one predictor is used to make the final prediction. In contrast, outputs of several predictors are combined, to obtain an ensemble-based prediction.

  • 184.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Lipnickas, Arunas
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Malmqvist, Kerstin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Selecting neural networks for a committee decision2002In: International Journal of Neural Systems, ISSN 0129-0657, E-ISSN 1793-6462, Vol. 12, no 5, p. 351-361Article in journal (Refereed)
    Abstract [en]

    To improve recognition results, decisions of multiple neural networks can be aggregated into a committee decision. In contrast to the ordinary approach of utilizing all neural networks available to make a committee decision, we propose creating adaptive committees, which are specific for each input data point. A prediction network is used to identify classification neural networks to be fused for making a committee decision about a given input data point. The jth output value of the prediction network expresses the expectation level that the jth classification neural network will make a correct decision about the class label of a given input data point. The proposed technique is tested in three aggregation schemes, namely majority vote, averaging, and aggregation by the median rule and compared with the ordinary neural networks fusion approach. The effectiveness of the approach is demonstrated on two artificial and three real data sets.

  • 185.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Lipnickas, Arunas
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Malmqvist, Kerstin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Bacauskiene, Marija
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Gelzinis, Adas
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Soft combination of neural classifiers: a comparative study1999In: Pattern Recognition Letters, ISSN 0167-8655, E-ISSN 1872-7344, Vol. 20, no 4, p. 429-444Article in journal (Refereed)
    Abstract [en]

    This paper presents four schemes for soft fusion of the outputs of multiple classifiers. In the first three approaches, the weights assigned to the classifiers or groups of them are data dependent. The first approach involves the calculation of fuzzy integrals. The second scheme performs weighted averaging with data-dependent weights. The third approach performs linear combination of the outputs of classifiers via the BADD defuzzification strategy. In the last scheme, the outputs of multiple classifiers are combined using Zimmermann's compensatory operator. An empirical evaluation using widely accessible data sets substantiates the validity of the approaches with data-dependent weights, compared to various existing combination schemes of multiple classifiers.

  • 186.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Lundström, Jens
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Bacauskiene, Marija
    Department of Electrical and Control Equipment, Kaunas University of Technology, Studentu 50, LT-51368 Kaunas, Lithuania.
    Gelzinis, Adas
    Department of Electrical and Control Equipment, Kaunas University of Technology, Studentu 50, LT-51368 Kaunas, Lithuania.
    Advances in computational intelligence-based print quality assessment and control in offset colour printing2011In: Expert systems with applications, ISSN 0957-4174, E-ISSN 1873-6793, Vol. 38, no 10, p. 13441-13447Article in journal (Refereed)
    Abstract [en]

    Nowadays most of information processing steps in printing industry are highly automated, except the last one – print quality assessment and control. Usually quality assessment is a manual, tedious, and subjective procedure. This article presents a survey of non numerous developments in the field of computational intelligence-based print quality assessment and control in offset colour printing. Recent achievements in this area and advances in applied computational intelligence, expert and decision support systems lay good foundations for creating practical tools to automate the last step of the printing process.

  • 187.
    Verikas, Antanas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Malmqvist, Kerstin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Bacauskiene, Marija
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Combining neural networks, fuzzy sets, and the evidence theory based techniques for detecting colour specks2001In: Journal of Intelligent & Fuzzy Systems, ISSN 1064-1246, E-ISSN 1875-8967, Vol. 10, no 2, p. 117-130Article in journal (Refereed)
    Abstract [en]

    An approach to detecting colour specks in an image taken from a pulp sample of recycled paper is presented. The task is solved through pixel-wise colour classification by an artificial neural network and post-processing based on the evidence theory. The network is trained using possibilistic target values, which are determined through a self-organising process in a 2D and 1D map of chromaticity and lightness, respectively. The problem of post-processing of a pixelwise-classified image is addressed from the point of view of the Dempster-Shafer theory of evidence. Each neighbour of a pixel being analysed is considered as an item of evidence supporting particular hypotheses regarding the class label of that pixel. The strength of support is defined as a function of the degree of uncertainty in class label of the neighbour, and the distance between the neighbour and the pixel being considered. The experiments performed have shown that the colour classification results correspond well with the human perception of colours of the specks.

  • 188.
    wang, wei
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Cooperative Quality-of-Service Prediction in Distributed SystemsIndependent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

     

     

    Download full text (txt)
    FULLTEXT01
  • 189.
    Wang, Yan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Domain-Specific Language for Protocol Stack Implementation in Embedded Systems2011Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Embedded network software has become increasingly interesting for both research and business as more and more networked embedded systems emerge. Well-known infrastructure protocol stacks are reimplemented on new embedded hardware and software architectures. New requirements of modern applications and devices require to implement newly designed or revised protocols. However, implementing protocol stacks for embedded systems remains a time-consuming and error-prone task due to the complexity and performancecritical nature of network software. It is even more so when targeting resource constrained embedded systems: implementations have to minimize energy consumption, memory usage etc., while programming efficiency is needed to improve on time-to-market, scalability, maintainability and product evolution. Therefore, it is worth researching on how to make protocol stack implementations for embedded systems both easier and more likely to be correct within the resource limits.

    In the work presented in this thesis, we take a language-based approach and aim to facilitate the implementation of protocol stacks while realizing performance demands and being aware of energy consumption and memory usage within the constraints imposed by embedded systems. We give background on DSL implementation techniques, investigate common practices in network protocol development to determine the potential of domain-specifi languages (DSLs) for embedded network software, and propose a domain-specifi embedded language (DSEL), Protege (Protocol Implementation Generator), for declaratively describing overlaid protocol stacks. In Protege, a high-level packet specification is dually compiled into an internal data representation for protocol logic implementation, and packet processing methods which are then integrated into the dataflow framework of a protocol overlay specification. Constructs for finite state machines allow to specify protocol logic in a concise manner, close to the protocol specification style. Protege specifications are compiled to highly portable C code for various architectures.

    Four attached scientific papers report our main results in more detail: an embedded implementation of the data description calculus in Haskell, a compilation framework for generating packet processing code with overlays, the domain-specific language Protege in overview (including embedding techniques and runtime system features), and a real-world case study implementing an industrial application protocol.

    Download full text (pdf)
    fulltext
  • 190.
    Wang, Yan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Gaspes, Veronica
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    An embedded language for programming protocol stacks in embedded systems2011In: PEPM '11: proceedings of the 20th ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation, January 24, 2011, Austin, Texas, USA, New York, NY, USA: ACM Press, 2011, p. 63-72Conference paper (Refereed)
    Abstract [en]

    Protocol stack specifications are well-structured documents that follow a number of conventions and notations that have proven very useful for the design and dissemination of communication protocols. Protocol stack implementations on the other hand, are done in low-level languages, using error-prone programming techniques resulting in programs that are difficult to relate to the specifications, difficult to maintain, modify, extend and reuse. To overcome these problems we propose a domain-specific language that provides abstractions close to the notations used in protocol specifications. From descriptions in our language we generate C programs that can be integrated with other systems software. The language provides constructs to describe packet formats, including physical layout, constraints and dependencies. It also provides constructs for state machines and for layering protocols into stacks. Experiments show that the C programs we generate are comparable in performance and binary size to hand-crafted C programs.

  • 191.
    Wecksten, Mattias
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Resource budgeting as a tool for reduced development cost for embedded real-time computer systems2004Licentiate thesis, monograph (Other academic)
    Abstract [en]

    Wouldn’t it be great if there were a systematic method for derivation of non functional constraints available at design time that made it possible to verify design and make implementa tion a much clearer task? This kind of methods are needed since systems of increasing com plexity has to be developed, and the cost for failing has proven to bee too high. The problem is how to derive the design time constraints into implementation time constraints, maintaining the traceability for the individual constraints, and early on get indications whether a project is about to fail or not.A method for implementation time constraint derivation has been developed and is presented in this thesis. Along with the basic method, several extensions are proposed. Evaluations of the practical usefulness of the method and the method’s scalability have been done. To prove the method’s importance in real development projects, a method for evaluation of the usability of this kind of methods has also been developed. The evaluation of the practicality shows that it is possible to find close to optimal solutions (within percent) in short time (within minutes). The evaluation of the scalability shows that the run time for finding implementable solutions scales polynomial with the size of the task graph. The evaluation of the usability shows that using the proposed method always leads to lower development cost than using an ad hoc method, in the case that the implementation is about to fail.

  • 192.
    Weckstén, Mattias
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vasell, J.
    Generic Systems Sweden AB.
    Derivation of implementation constraints - implementation simulation and treatment of multiple design choices2005In: Proceedings: 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005, 16-20 June 2005, Shanghai, China, Los Alamitos, Calif.: IEEE Computer Society, 2005, p. 459-466Conference paper (Refereed)
    Abstract [en]

    The industrial use of ad hoc implementation methods for non-functional constrained tasks has resulted in unnecessary expensive projects. In some cases, ad hoc methods result in overly many iterations to be made and in some severe cases, total project breakdown. To be able to solve these problems a method has been developed to derive end-to-end non-functional constraints, such as timing requirements, to task-level constraints and to promote this information to the implementation phase of the project. For a tool, as the one described above, to be really useful it is important to be able to show that there is a potential cost reduction to be made. To be able to show that a certain implementation method costs less in work hours than to use an ad hoc implementation method, a model for implementation simulation with support for multiple implementation alternatives has been developed. The experiments show that using the budget based implementation method leads to a significant cost reduction in most cases, compared to the ad hoc method. As far as we know, no similar experiments have been done to compare implementation methods.

    Download full text (pdf)
    FULLTEXT01
  • 193.
    Wehrmeister, Marco A.
    et al.
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Pereira, Carlos E.
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    An Infrastructure for UML-Based Code Generation Tools2009In: Analysis, architectures and modelling of embedded systems: Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, proceedings / [ed] Rettberg, A Zanella, MC Rammig, FJ, New York: Springer-Verlag New York, 2009, p. 32-43Conference paper (Refereed)
    Abstract [en]

    The use of Model-Driven Engineering (MDE) techniques in the domain of distributed embedded real-time systems are gain importance in order to cope with the increasing design complexity of such systems. This paper discusses an infrastructure created to build GenERTiCA, a flexible tool that supports a MDE approach, which uses aspect-oriented concepts to handle nonfunctional requirements from embedded and real-time systems domain. GenERTiCA generates source code from UML models, and also performs weaving of aspects, which have been specified within the UML model. Additionally, this paper discusses the Distributed Embedded Real-Time Compact Specification (DERCS), a PIM created to support UML-based code generation tools. Some heuristics to transform UML models into DERCS, which have been implemented in GenERTiCA, are also discussed.

  • 194.
    Yichong, Zhou
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Chenxi, Zhang
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    A database design for IDE2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The thesis is the culmination of an academic degree and an important steppingstone for the student on the way to employment. Academic and industrial institutionsrely on thesis students to explore research directions that may otherwise beoverlooked. Consequently, an efficient process for connecting students withsupervisors and relevant, viable thesis proposals is crucial for students, for academiaas well as for the industry. A database can serve as the basis of a software applicationto facilitate such a process. Support for tackling concerns such as data persistence,redundancy and security, which are challenges in most application designs, is built into common database systems. In this work, we investigate how a database system canbe leveraged as the foundation for an application that connects students with thesisproposals and supervisors.

    Download full text (pdf)
    fulltext
  • 195.
    Younas, Muhammad
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    A comparative analysis of Cisco Performance Routing (PfR) and other performance enhancing techniques - Cisco QoS and Path Control2011Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Eleven years ago Cisco introduced three types of applications on the same converged network and named it AVVID (Architecture for Voice, Video and Integrated Data). In spite of the initial interest and hype surrounding AVVID, the feature was and still is unable to confront problems such as: data priority, load balancing and network congestion. The work in this report addressed these issues within the network. Different Cisco Internetwork Operating System (IOS) methods: routing protocols, Cisco IOS QoS (including LLQ, LFI and Header Compression), Path Control and Cisco Performance Routing (PfR) were all tested to see which feature would work best at enhancing network performance.

    A practical network was created in which these features were carefully implemented one after another. In every step, the results were observed and recorded and if necessary repeated in order to check their validity. The results for RTT (Round Trip Time) and MOS (Mean Opinion Score) showed that in comparison to Path Control and Cisco IOS QoS (Quality of Service) mechanisms, Cisco PfR was able to generate routes on the fly during times of network congestion. This cannot be achieved with the use of Cisco QoS and Path Control which makes Cisco Performance Routing a far more superior feature. Although the focus of the work was VoIP (Voice over Internet Protocol) data, it is possible to construct a network with any application as Cisco PfR is able to reroute data. Cisco PfR is an easily accessible IOS feature which, once implemented, requires very little updating and maintenance.

    Download full text (pdf)
    FULLTEXT01
  • 196.
    Zacarias, Iulisloi
    et al.
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Gaspary, Luciano Paschoal
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Kohl, Andersonn
    Brazilian Army, Brasília, Brasilien.
    Fernandes, Ricardo Q. A.
    Brazilian Army, Brasília, Brasilien.
    Stocchero, Jorgito M.
    Brazilian Army, Brasília, Brasilien.
    Pignaton de Freitas, Edison
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Combining Software-Defined and Delay-Tolerant Approaches in Last-Mile Tactical Edge Networking2017In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 55, no 10, p. 22-29, article id 8067679Article in journal (Refereed)
    Abstract [en]

    Network-centric warfare is a no-way-back trend in modern military operations. The application of this concept ranges from upper-level decision making echelons to troop guidance on the battlefield, and many studies have been carried out in this area. However, most of these are concerned with either the higher-level strategic networks, that is, the networks linking the higher echelons with abundant resources, satellite communications, or even a whole network infrastructure, or high-end TEN, representing resource-rich troops in the field, with military aircraft, battleships, or ground vehicles equipped with powerful wireless communication devices and (almost) unrestricted energy resources for communication. However, these studies fail to take into account the "last-mile TEN," which comprises resource constrained communication devices carried by troopers, equipping sensor nodes deployed in the field or small unmanned aerial vehicles. In an attempt to fill this gap in the studies on battlefield networking, this article seeks to combine software-defined and delay-tolerant approaches to support the diverse range of strict requirements for applications in the last-mile TEN. © 2017 IEEE.

  • 197.
    Zacarias, Iulisloi
    et al.
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    Schwarzrock, Janaína
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    Gaspary, Luciano Paschoal
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    Kohl, Anderson
    Brazilian Army, Brasilia, DF, Brazil.
    Fernandes, Ricardo Q. A.
    Brazilian Army, Brasilia, DF, Brazil.
    Stocchero, Jorgito M.
    Brazilian Army, Brasilia, DF, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil.
    Employing SDN to control video streaming applications in military mobile networks2017In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) / [ed] Aris Gkoulalas-Divanis, Miguel P. Correia, Dimiter R. Avresky, New York: IEEE, 2017, p. 1-4Conference paper (Refereed)
    Abstract [en]

    Video streaming is an important service provided by surveillance systems to enhance situation awareness. However, in military systems, data acquisition heavily depends on the network infrastructure. In this application domain, units are spread and the distance between the sources of data and the decision makers may be very large. In the case of video streaming, the demand for high network throughput poses some extra requirements on the network. Considering the mobility patterns of the military units and the diversity of the new generations of sensors, especially those used by Unmanned Aerial Vehicles (UAV), the configuration and the management of the network must be so dynamic and so sensitive to data flow parameters that manual configuration is not acceptable. For this reason, the capability of the network to configure itself to offer the necessary Quality of Service is a must. Using principles of Software Defined Networks (SDN), this paper presents an analysis of video streaming for military surveillance in which multiple UAVs are employed as data providers through an SDN-enabled network, with promising results. ©2017 by IEEE

  • 198.
    Zacarias, Iulisloi
    et al.
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Schwarzrock, Janaína
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Gaspary, Luciano Paschoal
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Kohl, Andersonn
    Brazilian Army, Brasília, Brasilien.
    Fernandes, Ricardo Q. A.
    Brazilian Army, Brasília, Brasilien.
    Stocchero, Jorgito M.
    Brazilian Army, Brasília, Brasilien.
    Pignaton de Freitas, Edison
    Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil.
    Enhancing Mobile Military Surveillance Based on Video Streaming by Employing Software Defined Networks2018In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2018, p. 1-12, article id 2354603Article in journal (Refereed)
    Abstract [en]

    Situation awareness in surveillance systems benefits from high-quality video streaming service. This is even more important considering military systems, in which delays in image transmission may have a significant impact on the decision-making process. However, in order to deliver high-quality video streaming service, the required network infrastructure may be prohibitively complex, or even completely impossible to deploy, if mobile data providers are considered. Moreover, the demand for high network throughput poses extra requirements on the network. Considering this context, this paper addresses the problem of highly mobile networks composed of unmanned aerial vehicles (UAVs) as data providers of a military surveillance system. The proposed approach to tackle the problem is based on a Software Defined Networking (SDN) approach aiming at providing the best routes to deliver the data, enhancing the end-user quality of experience. An extensive experimental campaign was performed by means of simulations and the acquired results provide solid evidence of the usefulness of this proposal.© 2018 Iulisloi Zacarias et al.

    Download full text (pdf)
    fulltext
  • 199.
    ZAGANIDIS, ANESTIS
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Self-organising Methods for Malfunction Prediction: A Volvo bus case study2015Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    This thesis project investigates approaches for malfunction prediction using unsupervised, self-organized models, with an orientation on bus fleets. Certain bus malfunctions are not predictable with conventional methods and preventive replacements are too costly and time consuming. Malfunctions that could result in interruption of service or on degradation of safety  are of high priority to predict.The settings of the desired application define the following constraints: definition of a model by an expert is not desirable as it is not a scalable solution, ambient conditions or usage schedule must not affect the prediction, data communication between the systems is limited so data must be compressed with relevant to the problem features. In this work, definition of normal or faulty operation is not handled by an expert, but using the Wisdom of the crowd idea and Consensus Self-organized models for fault detection (COSMO), or by the system's past state by monitoring an autoencoder's reconstruction error. In COSMO each system constructs a model describing its condition and then all distances between models are estimated to find the Most Central Pattern (MCP), which is considered the normal state of the system. The measure of deviation is the tendency of a system's model to be farther from the MCP after a sequence of observations, expressed as a probability that the deviation is incidental.  Factors that apply to the total of systems, such as the weather conditions are thus minimized.The algorithms approach the problem from the scopes of: linear and non linear relations between signals, distribution of values of a single signal, spectrum information of a single signal. This is achieved by constructing relevant models of each observed system (bus). The performance of the implemented algorithms is investigated using ROC curves and real bus fleet data, targeting at predicting a set of malfunctions of the air pressure system.More tests are performed using artificial data with injected malfunctions, to evaluate the performance of the methods. By applying the method on artificial data, the ability of different methods to detect different malfunctions is exhibited.

    Download full text (pdf)
    fulltext
  • 200.
    Zain-ul-Abdin,
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Specifying Run-time Reconfiguration in Processor Arrays using High-level language2010In: WRC 2010: 4th HiPEAC Workshop on Reconfigurable Computing, Pisa, 2010, p. 1-10Conference paper (Refereed)
    Abstract [en]

    The adoption of run-time reconfigurable parallel architectures for high-performance embedded systems is constrained by the lackof a unified programming model which can express both parallelism and reconfigurability. We propose to program an emerging class of reconfigurable processor arrays by using the programming model of occam-pi and describe how the extensions of channel direction specifiers, mobile data, dynamic process invocation, and process placement attributes can be used to express run-time reconfiguration in occam-pi. We present implementations of DCT algorithm to demonstrate the applicability of occam-pi to express reconfigurability. We concluded that occam-pi appears to be a suitable programming model for programming run-time reconfigurable processor arrays.

    Download full text (pdf)
    FULLTEXT01
12345 151 - 200 of 208
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf