hh.sePublications
Change search
Refine search result
3456789 251 - 300 of 1955
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 251.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Böhm, Annette
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Lidström, Kristoffer
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Strandén, Lars
    SP Technical Research Institute of Sweden, Borås, Sweden.
    Zakizadeh, Hossein
    Volvo Technology Corporation, Göteborg, Sweden .
    Vehicle Alert System2007In: Proceedings of 14th world congress on intelligent transport system (ITS), 2007, p. 2-9Conference paper (Refereed)
    Abstract [en]

    The Vehicle Alert System (VAS) project focuses on cooperative alert services based on timely and reliable communication under the challenging circumstances pertaining to a highly mobile vehicular network. Through a cross-layer design, we gain the flexibility needed to adapt the system to the individual requirements of three chosen application scenarios that represent different situations where cooperation between vehicles can make a significant impact. The VAS project is a collaboration involving academic as well as industrial partners and the final stage of the project is a demonstrator that implements results from the research.

  • 252.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Böhm, Annette
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Lidström, Kristoffer
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Report on the Collaboration between CVIS and CERES in the Project Vehicle Alert System (VAS)2009Report (Other academic)
    Abstract [en]

    In March 2007, an agreement was made for interchange of experiences between CVIS and the Centre for Research on Embedded Systems (CERES) at Halmstad University in Sweden. The majority of the work relating to this collaboration has been conducted within the CERES project Vehicle Alert System (VAS), aiming to use vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to provide different types of warning messages. The main focus of the VAS project is on communication and in particular the lower layers of the communication stack are investigated. VAS involves academic researchers from Halmstad University as well as researchers from Volvo Technology, SP Technical Research Institute of Sweden and the company Free2move. This report presents the results of the VAS project, its publications, and other issues of interest both to the CVIS consortium as well as a broader scope.

  • 253.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Medium access control in vehicular networks based on the upcoming IEEE 802.11p standard2008In: World Congress on Intelligent Transport Systems (ITS), 2008, World Congress on ITS , 2008, p. 12-Conference paper (Refereed)
    Abstract [en]

    In this paper, initial simulations are presented showing that the upcoming IEEE 802.11p standard is not suitable for traffic safety applications requiring reliable, low delay communication between vehicles. The medium access control procedure is one of the most important parts in the design of delay-constrained communication systems, and emerging vehicle safety applications put new stringent demands on timely and reliable delivery of data packets. The medium access procedure used in 802.11p is carrier sense multiple access, which is inherently unsuitable for time-critical data traffic since it is contention-based and cannot provide a finite upper bound on the time to channel access. The simulation results indicate that with IEEE 802.11p, channel access cannot be granted in a manner that is sufficiently predictable to support reliable, low-delay communications between vehicles on a highway.

  • 254.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication2008In: 68th IEEE Vehicular Technology Conference, 2008. VTC 2008-Fall: IEEE Vehicular Technology Conference (VTC) (2008), Piscataway, N.J.: IEEE Press, 2008, p. 1-5Conference paper (Refereed)
    Abstract [en]

    In this paper the medium access control (MAC) method of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes listen to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for time critical communications. The simulation results reveal that a specific node/vehicle is forced to drop over 80% of its heartbeat messages because no channel access was possible before the next message was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic between vehicles. This MAC method is already successfully applied in commercial surveillance applications for ships (AIS) and airplanes (VDL mode 4). Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad hoc vehicular networks.

  • 255.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the 802.11p MAC method and STDMA to support real-time vehicle-to-vehicle communications2009In: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, Vol. 2009, no 902414, p. 1-14Article in journal (Refereed)
    Abstract [en]

    Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the intelligent transportation systems (ITS) sphere. Many of these new applications require real-time communication with high reliability, meaning that packets must be successfully delivered before a certain deadline. Applications with early deadlines are expected to require direct V2V communications, and the only standard currently supporting this is the upcoming IEEE 802.11p, included in the wireless access in vehicular environment (WAVE) stack. To meet a real-time deadline, timely and predictable access to the channel is paramount. However, the medium access method used in 802.11p, carrier sense multiple access with collision avoidance (CSMA/CA), does not guarantee channel access before a finite deadline. In this paper, we analyze the communication requirements introduced by traffic safety applications, namely, low delay, reliable, real-time communications.We show by simulation of a simple, but realistic, highway scenario, that vehicles using CSMA/CA can experience unacceptable channel access delays and, therefore, 802.11p does not support real-time communications. In addition, we present a potential remedy for this problem, namely, the use of self-organizing time division multiple access (STDMA). The real-time properties of STDMA are investigated by means of the same highway simulation scenario, with promising results.

  • 256.
    Bilstrup, Katrin
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Uhlemann, Elisabeth
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Ström, Erik G.
    Chalmers, Gothenburg.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    On the ability of the IEEE 802.11p and STDMA to provide predictable channel access2009In: Proceedings of the 16th World Congress on Intelligent Transport Systems (ITS), 2009, p. 10-Conference paper (Refereed)
    Abstract [en]

    Emerging traffic safety applications requiring low delay communications will need vehicle ad-hoc networks. The only communication standard currently supporting this is IEEE 802.11p. However, 802.11p uses the medium access method CSMA/CA, which has a major drawback: unbounded worst case channel access delay. We therefore propose an algorithm already in commercial use in the shipping industry: STDMA. With STDMA, nodes always get predictable channel access regardless of the number of competing nodes and the maximum delay is deterministic. In this paper we elaborated with different parameter settings for the two protocols with the aim of improving performance without altering the standards.

     

  • 257.
    Bilstrup, Urban
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bluetooth and Wireless Multihop Networks in Industrial Communication Systems2008Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The objective of this thesis is to investigate the use of short-range wireless communication technology in industrial communication systems where there is a need for guaranteed timely delivery of correct information. Methods for achieving such capability are developed in the context of the physical layer, the data link layer and the application layer. Based on the insight that it is impossible to achieve strict determinism in a wireless communication system, a probabilistic definition of hard real-time systems is suggested, and thus a guarantee is given in the form of the probability of fulfilling a certain goal. Since a wireless channel is time variant, it is also necessary to continuously keep track of available resources. Allocation and link management methods for wireless communication systems therefore need to be dynamic and of an online character. An exhaustive resource allocation method with redundancy is first proposed for single message delivery and then extended for the operation of a single Bluetooth piconet. However, many devices in an industrial automation system have limited computational resources, especially if wireless sensors/actuators powered by battery or wireless power are considered. This implies that methods used for resource allocation must be of low computational complexity. The complexity issue becomes evident when large systems are implemented, even if each individual sensor generates small amounts of data. The upstream and downstream flows of data grow rapidly in a hierarchical system with many sub-systems, sensors and actuators. It is empirically shown that the aggregated data flow in a monitoring system requires powerful communication nodes already at low levels in the industrial communication hierarchy. A predictable system requires that representative entities for the available resources are defined. In a communication system with a single broadcast domain, such as a single Bluetooth piconet, the resource space is often limited to the time domain. When a multihop wireless network with multiple broadcast domains is considered, the spatial domain is added as an available resource and, if a multi-channel radio transceiver is used, the frequency is also added as an available resource domain. These three domains represent the physical resource space that is available for a wireless multihop network. These are subject to trade-off in all of the three lowest protocol layers, and one of the most challenging problems in the design of a wireless multihop network is how to achieve efficient sharing of these resources. This problem is addressed by proposing a clustered architecture based on a dual-radio node that enables dynamic use of these resource domains.

  • 258.
    Bilstrup, Urban
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Design Space Exploration of Wireless Multihop Networks2005Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis explores the feasible design space of wireless multihop networks and identifies fundamental design parameters. In the process of exploring it is important to ignore all details and instead take a holistic view. This means that all protocol details are overseen, all details of radio wave propagation models are overseen and the system is modelled strictly on an architectural level. From a theoretical information perspective, there is a limit to the capacity that a certain bandwidth and a certain signal-to-noise ratio at the receiver can provide. This limit is approximated as a volume in the time-frequency-space domain. A single transmission is represented as an occupied volume in this domain. A wireless multihop network covers a spatial area, and the question is how multiple numbers of transmission volumes can be fit into a given limited spatial area. This volume fitting should be done in order to maximize the overall performance or to trade available resources to favour a specific characteristic in the wireless multihop network. The volume model is used for the design space exploration of a wireless multihop network. It is argued that the fault tolerance and the energy gain achieved in a multihop topology are its strength as compared to a single-hop architecture. It is further shown that the energy gain is achieved at the expense of delay and a greater end-to-end error probability. This indicates that these parameters must be very carefully balanced in order to gain in the global overall performance perspective. It can further be concluded that the overall spatial capacity is increased as a result of the spatial channel reuse in a multihop topology. On the other hand, it is also shown that the multihop topology introduces a rather stringent geometrical capacity limitation when the number of nodes of a wireless multihop network is increased. The dynamics (e.g. node mobility, changing radio channels etc.) of a large scale wireless multihop network is also a limiting factor. The nodes’ mobility creates a knowledge horizon beyond which very little can be known about the present network topology.

  • 259.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    The use of clustered wireless multihop networks in industrial settings2007In: ETFA 2007: IEEE Conference on Emerging Technologies and Factory Automation, Vols 1-3, Piscataway, NJ: IEEE Press, 2007, p. 211-218Conference paper (Refereed)
    Abstract [en]

    This paper suggests a cluster collision avoidance mechanism and a dual transceiver architecture to be used in a clustered wireless multihop network. These two contributions make the clustered wireless multihop network the preferred architecture for future industrial wireless networks. The wireless multihop cluster consists of one master and several slaves, where some of the slaves will act as gateways between different clusters. Frequency hopping spread spectrum is used on a cluster level and to avoid frequency collisions between clusters a "neighbor cluster collision avoidance mechanism" is proposed and evaluated through simulations. To break up the dependence between the clusters, introduced by the gateway nodes, each node is equipped with two transceivers. The paper is concluded with a suggestion to use a clustered wireless multihop network with orthogonal hopping sequences for an industrial setting.

  • 260.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Bilstrup, Katrin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Using Dual-Radio Nodes to Enable Quality of Service in a Clustered Wireless Mesh Network2006In: IEEE Conference on Emerging Technologies and Factory Automation, 2006. ETFA '06, Piscataway, N.J.: IEEE Press, 2006, p. 54-61Conference paper (Refereed)
    Abstract [en]

    In this paper some well established wireless technologies are merged into a new concept solution for a future industrial wireless mesh network. The suggested clustered wireless mesh network can handle probabilistic quality of service guarantees and is based on a dual-radio node architecture using synchronized frequency hopping spread spectrum Bluetooth radios. The proposed architecture gives a heuristic solution to the inter-cluster scheduling problem of gateway nodes in clustered architectures and breaks up the dependence between the local medium access schedules of adjacent clusters. The dual-radio feature also enables higher network connectivity, implying, for example, that a higher link redundancy can be achieved.

  • 261.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    The next challenge for the communication society: co-operating embedded systems2003Conference paper (Refereed)
  • 262.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Parsapoor, Mahboobeh
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    A Framework and Architecture for a Cognitive Manager Based on a Computational Model of Human Emotional Learning2013In: Proceedings of SDR-WInnComm-Europe 2013: Wireless Innovation European Conference on Wireless Communications Technologies and Software Defined Radio / [ed] Lee Pucker, Kuan Collins & Stephanie Hamill, 2013, p. 64-72Conference paper (Refereed)
    Abstract [en]

    In this paper we propose an architecture for a cognitive engine that is based on the emotional learning cycle instead of the traditional cognitive cycle. The cognitive cycle that traditionally has been used as reference for cognitive radio is on the basis of the Unified Theories of Cognition (UTC) to model rational decision making in humans. UTC represents a rational goal-oriented decision-action made by an intelligent agent. However, the emotional cycle represents an emotional reaction-oriented cycle instead. These two models differ in function and structure of learning, decision making and optimization. In this work the structure of these two learning cycles are compared and a computational model for artificial emotional learning based engine is suggested.

  • 263.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Stranne, Frida
    Halmstad University, School of Education, Humanities and Social Science, Centrum för lärande, kultur och samhälle (CLKS). The Swedish Institute for North American Studies (SINAS), Uppsala University, Uppsala, Sweden.
    Peace in Cyberspace Will Not Take Place2016Conference paper (Refereed)
    Abstract [en]

    The ongoing debate whether cyberwar exists or not is odd and to large extent based on an Industrial age view of the definition of war. The ongoing digital revolution ends the industrial age and it was in the context of the industrial age that the Clausewitzian theories of war were defined. The industrial age was built upon machines and physical objects, and the theories of war in this era were also based on these elements. However, when the importance of physical values is vanishing and replaced by other values, as information and knowledge, the fundamental elements of war in the industrial age becomes week. An extension of the theories of war in the information age is that destruction of digital assets is representing the same element of violence, if it potentially cripples an enemy to defeat. When a society’s valuable assets are in the digital form and not necessarily even present within the geographical area of a sovereign state one maybe have to reconsider the understanding of war. This paper explores the discourse framing war in the information age, and conducts a discussion on how to define peace and war in cyberspace, especially in the context of digital violence.

  • 264.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Free2move AB.
    An architecture comparison between a wireless sensor network and an active RFID system2004In: The 29th Annual IEEE International Conference on Local Computer Networks, 2004, IEEE , 2004, p. 583-584Conference paper (Refereed)
    Abstract [en]

    In This work a new hardware platform for active RFID and wireless sensor network is presented. Furthermore a comparison of these two architectures is performed, i.e., the singlehop and the multihop architecture. The comparison reveals important issues regarding the utilization and energy consumption for the singlehop as well as for the multihop architecture.

  • 265.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    An Implementation of a 3-tier Hierarchical Wireless Sensor Network2006In: 2006 IEEE International Conference on Industrial Informatics, Piscataway, N.J.: IEEE Press, 2006, p. 138-143Conference paper (Refereed)
    Abstract [en]

    In this paper an implementation of a wireless sensor network is described. The aim with the implementation is to investigate if present design patterns are applicable on wireless sensor networks. A 3-tier model is adopted as a possible candidate for the software as well as for the network architecture. The implemented wireless sensor network consists of a heterogeneous set of hardware devices such as sensors, sensor hubs, beepers, PDAs and connectors. Most of the hardware components are COTS and most of the software is GNU licensed. All these form a 3-tier hierarchical network architecture.

  • 266.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Bluetooth in industrial environment2000In: 2000 IEEE International Workshop on Factory Communication Systems: proceedings : 6-8 September, 2000, ISEP, Porto, Portugal / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2000, p. 239-246Conference paper (Refereed)
    Abstract [en]

    In this paper an initial study of the use of Bluetooth in industrial environment is presented. The tests have been performed at a paper-mill, and in an office environment at Halmstad University. It shows the possibility to use Bluetooth for wireless short range communication in an industrial environment.

  • 267.
    Bilstrup, Urban
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Wiberg, Per-Arne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Routing protocol for wireless real-time multihop networks1999Conference paper (Refereed)
  • 268.
    Binotto, Alécio P. D.
    et al.
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Freitas, Edison Pignaton
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Götz, Marcelo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Pereira, Carlos E.
    Informatics Institute, Federal University of Rio Grande do Sul, Brazil.
    Stork, André
    Fraunhofer IGD / Technische, Universität Darmstadt, Germany.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Dynamic Self-Rescheduling of Tasks over a Heterogeneous Platform2008In: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, Los Alamitos, Calif.: IEEE Computer Society, 2008, p. 253-258Conference paper (Refereed)
    Abstract [en]

    Modern applications require powerful high-performance platforms to deal with many different algorithms that make use of massive calculations. At the same time, low-cost and high-performance specific hardware (e.g., GPU, PPU) are rising and the CPUs turned to multiple cores, characterizing together an interesting and powerful heterogeneous execution platform. Therefore, self-adaptive computing is a potential paradigm for those scenarios as it can provide flexibility to explore the computational resources on heterogeneous cluster attached to a high-performance computer system platform. As the first step towards a run-time reschedule load-balancing framework targeting that kind of platform, application time requirements and its crosscutting behavior play an important role for task allocation decisions. This paper presents a strategy for self-reallocation of specific tasks, including dynamic created ones, using aspect-oriented paradigms to address non-functional application timing constraints in the design phase. Additionally, as a case study, a special attention on Radar Image Processing will be given in the context of a surveillance system based on Unmanned Aerial Vehicles (UAV).

  • 269.
    Binotto, Alécio Pedro Delazari
    et al.
    Informatics Institute, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Informatics Institute, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pereira, Carlos Eduardo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Towards Dynamic Task Scheduling and Reconfiguration using an Aspect Oriented Approach applied on Real-time concerns of Industrial Systems2009In: Elsevier IFAC Publications / IFAC Proceedings series, ISSN 1474-6670, Vol. 13, no PART 1, p. 1423-1428Article in journal (Refereed)
    Abstract [en]

    High performance computational platforms are required by industries that make use of automatic methods to manage modern machines, which are mostly controlled by high-performance specific hardware with processing capabilities. It usually works together with CPUs, forming a powerful execution platform. On an industrial production line, distinct tasks can be assigned to be processed by different machines depending on certain conditions and production parameters. However, these conditions can change at run-time influenced mainly by machine failure and maintenance, priorities changes, and possible new better task distribution. Therefore, self-adaptive computing is a potential paradigm as it can provide flexibility to explore the machine resources and improve performance on different execution scenarios of the production line. One approach is to explore scheduling and run-time task migration among machines’ hardware towards a balancing of tasks, aiming performance and production gain. This way, the monitoring of time requirements and its crosscutting behaviour play an important role for task (re)allocation decisions. This paper introduces the use of software aspect-oriented paradigms to perform machines’ monitoring and a self-rescheduling strategy of tasks to address nonfunctional timing constraints. As case study, tasks for a production line of aluminium ingots are designed. © 2009 IFAC.

  • 270.
    Binotto, A.P.D.
    et al.
    Fraunhofer IGD / TU Darmstadt, Germany.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Pereira, Carlos Eduardo
    PPGC UFRGS, Brazil.
    Stork, André
    Fraunhofer IGD / TU Darmstadt, Germany.
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Real-time task reconfiguration support applied to an UAV-based surveillance system2008In: 2008 International Multiconference on Computer Science and Information Technology (Imcsit) / [ed] Ganzha, M, Piscataway, N.J.: IEEE Press, 2008, p. 581-588Conference paper (Refereed)
    Abstract [en]

    Modern surveillance systems, such as those based on the use of Unmanned Aerial Vehicles, require powerful high- performance platforms to deal with many different algorithms that make use of massive calculations. At the same time, low- cost and high-performance specific hardware (e.g., GPU, PPU) are rising and the CPUs turned to multiple cores, characteriz- ing together an interesting and powerful heterogeneous execu- tion platform. Therefore, reconfigurable computing is a poten- tial paradigm for those scenarios as it can provide flexibility to explore the computational resources on heterogeneous cluster attached to a high-performance computer system platform. As the first step towards a run-time reconfigurable workload bal- ancing framework targeting that kind of platform, application time requirements and its crosscutting behavior play an impor- tant role for task allocation decisions. This paper presents a strategy to reallocate specific tasks in a surveillance system composed by a fleet of Unmanned Aerial Vehicles using aspect- oriented paradigms in order to address non-functional applica- tion timing constraints in the design phase. An aspect support from a framework called DERAF is used to support reconfigu- ration requirements and provide the resource information needed by the reconfigurable load-balancing strategy. Finally, for the case study, a special attention on Radar Image Process- ing will be given.

  • 271.
    Björkman, Jimmy
    et al.
    Halmstad University, School of Information Technology.
    Curcic, Andrej
    Halmstad University, School of Information Technology.
    Att stödja och förbättra kundrelationer: - en förtroendefråga inom cloud computing2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Cloud computing är en teknik som möjliggör åtkomst till data och lagring av data genom Internet, exempelvis genom Spotify, Google Drive och Dropbox. Denna teknik utnyttjas av företag som gör det möjligt att använda sig av affärssystem som en tjänst via cloud computing. Det har dock visat sig finnas förtroendebrister för den här typen av tjänst bland företag och många tvekar till att använda sig av detta istället för mer traditionella affärsystem. Dessa förtroendebrister kan påverka kundrelationen mellan leverantör och användare för den här typen av tjänst. Med denna uppsats ämnar vi svara på hur företag arbetar med sina kundrelationer och vi ämnar även ge förslag på hur dessa kundrelationer kan stärkas för att förbättra förtroendet för den här typen av tjänst. Vi kommer att beskriva hur aktuell forskning inom området skiljer sig gentemot hur leverantörer av cloud computingaffärsystem faktiskt arbetar med att stödja och förbättra sina kundrelationer.

  • 272.
    Björn, Johansson
    Halmstad University, School of Information Technology.
    End-to-end performance testing of a healthcare alarm system2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digital services involving large systems with multiple users are ubiquitous in modern society. The systems are often complicated and made up of multiple devices and communication protocols. A fundamental problem in this context is how the behavior of a system changes as the number of users vary. In particular, when do the systems’ resources saturate and how does the system behave when close to saturation. Performance testing is key for addressing this fundamental problem. Performance testing is the scope of this project. Performance tests can be used for inference of, for example, a system's scalability. Furthermore, it can be used to provide general guarantees on the services that can be delivered. Performance testing at the company Phoniro AB is considered. The platform Phoniro Care is the back-end service for the company’s products. The Phoiro 6000 system is one of the products that uses Phoniro Care. The system allows for multiple users and offers alarm services. The primary focus of this project is to determine the behavior of that system during varying levels of simulated load, and furthermore analyze the data extracted from such simulations and tests. The open source software JMeter was used as the tool for performance testing. It was selected from a set of candidate tools that have been evaluated in the literature based on various performance criteria. The results are presented by graphs showing the time evolution of different performance indicators. A conclusion from this work is that the implemented performance testing framework helps to answer questions about the systems’ behavior. Questions that are important for the company’s further development and expansion of the system. Furthermore, the proposed framework establishes a foundation for further inquiries on the subject.

  • 273.
    Blid, Emma
    et al.
    Halmstad University, School of Information Technology.
    Massler, Patrick
    Halmstad University, School of Information Technology.
    Den IT-forensiska utvinningen i molnet: En kartläggning över den IT-forensiska utvinningen i samband med molntjänster samt vilka möjligheter och svårigheter den möter2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    It is becoming more common to save data online, rather than on physical storage media. This brings many opportunities for you as a user, but also causes new problems, especially within the crime investigations. The problems in the combination of digital forensics and cloud services can be divided into two main categories, which are legal issues and technical issues.

    The legal issues primarily concern that the server that stores data and the owner of the server is typically based in a different nation than where the suspected crime is investigated. Most legal issues may seem easy to solve through law changes, but are more extensive than that, as both the consequences it may have for the cloud suppliers, as well as the benefits it may have for the justice system, must be taken into consideration.

    The technical issues often have solutions. However, many of these cannot be considered as realistic since the size of the required storage space, and the costs caused by it, are not proportional to what could be achieved. Most technical solutions also give rise to new issues in the form of ethical dilemmas as they require enhanced storage of personal information. To save more information and to possibly need to investigate information associated with a person who is not suspected of committing the crime intrudes the personal integrity.

    The cloud, however, also brings opportunities where the foremost for digital forensics is what is called Digital Forensics as a Service. This means that the cloud’s resources are utilised to solve resource related problems that had been significantly more time consuming to implement locally, as well as the opportunities for cooperation and expertise increase, in order to facilitate and enhance IT-forensic work.

  • 274.
    Blom, Mathias Carl
    et al.
    Department of Clinical Sciences, Lund University, Lund, Sweden.
    Ashfaq, Awais
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research. Halland Hospital, Region Halland, Halmstad, Sweden.
    Pinheiro Sant'Anna, Anita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Anderson, Philip D.
    Department of Emergency Medicine, Brigham and Women’s Hospital, Boston, Massachusetts, USA & Harvard Medical School, Boston, Massachusetts, USA.
    Lingman, Markus
    Halland Hospital, Region Halland, Sweden & Department of Molecular and Clinical Medicine/Cardiology, Sahlgrenska Academy, University of Gothenburg, Gothenburg, Sweden.
    Training machine learning models to predict 30-day mortality in patients discharged from the emergency department: a retrospective, population based registry study2019In: BMJ Open, ISSN 2044-6055, E-ISSN 2044-6055, Vol. 9, no 8, article id e028015Article in journal (Refereed)
    Abstract [en]

    Background: Aggressive treatment at end-of-life (EOL) can be traumatic to patients and may not add clinical benefit. Absent an accurate prognosis of death, individual level biases may prevent timely discussions about the scope of EOL care and patients are at risk of being subject to care against their desire. The aim of this work is to develop predictive algorithms for identifying patients at EOL, with clinically meaningful discriminatory power.

    Methods: Retrospective, population-based study of patients utilizing emergency departments (EDs) in Sweden, Europe. Electronic health records (EHRs) were used to train supervised learning algorithms to predict all-cause mortality within 30 days following ED discharge. Algorithm performance was validated out of sample on EHRs from a separate hospital, to which the algorithms were previously unexposed.

    Results: Of 65,776 visits in the development set, 136 (0.21%) experienced the outcome. The algorithm with highest discrimination attained ROC-AUC 0.945 (95% CI 0.933 - 0.956), with sensitivity 0.869 (95% CI 0.802, 0.931) and specificity 0.858 (0.855, 0.860) on the validation set.

    Conclusions: Multiple algorithms displayed excellent discrimination and outperformed available indexes for short-term mortality prediction. The practical utility of the algorithms increases as the required data were captured electronically and did not require de novo data collection.

    Trial registration number: Not applicable.

  • 275.
    Blomberg, Jossefin
    et al.
    Halmstad University, School of Information Technology.
    Jansson Martén, Felicia
    Halmstad University, School of Information Technology.
    Klassificering av svenska nyhetsartiklar med hjälp av Support Vector Machines2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim of this paper is to reduce the extent of impact campaigns through use of the machine learning algorithm Support Vector Machine. The process involved a literature study and two experiments. The aim of the literature study was to give a frame of reference to text classification with Support Vector Machines. The first experiment involved training a SVM to be able to classify news articles written in swedish based on the reliability of the article. The second experiment involved a comparison between the trained SVM-model and other standard methods in the field. The results from the experiment indicates that SVM is a effective tool for classification of news articles written in Swedish, but also that other standard methods are suitable for the same task.

  • 276.
    Blomqvist, Daniel
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Byttner, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Holmberg, Ulf
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent systems (IS-lab).
    Different Strategies for Transient Control of the Air-Fuel Ratio in a SI Engine2000In: SAE transactions : journal of fuels and lubricants, Warrendale, Pa.: Society of automotive engineers (SAE) , 2000, Vol. 109Conference paper (Refereed)
    Abstract [en]

    This paper compares several strategies for air-fuel ratio tran-sient control. The strategies are: A factory-standard look-up table based system (a SAAB Trionic 5), a feedback PI controller with and without feed-forward throttle correction, a linear feed-forward control algorithm, and two nonlinear feed- forward algorithms based on artificial neural networks. The control strategies have been implemented and evaluated in a SAAB 9000 car during a transient driving test, consisting of an acceleration in the second gear from an engine speed of 1500 rpm to 3000 rpm. The best strategies are found to be the neural network based ones, followed by the table based factory system. The two feedback PI controllers offer the poorest performance.

  • 277.
    Bocharova, Irina
    et al.
    Department of Information Systems, St. Petersburg University of Information Technologies, Mechanics and Optics, St.-Petersburg, Russia & Institute of Computer Science, University of Tartu, Estonia.
    Kudryashov, Boris
    Department of Information Systems, St. Petersburg University of Information Technologies, Mechanics and Optics, St.-Petersburg, Russia & Institute of Computer Science, University of Tartu, Estonia.
    Rabi, Maben
    Halmstad University.
    Lyamin, Nikita
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Dankers, Wouter
    Volvo GTT, Goteborg, Sweden.
    Frick, Erik
    AstaZero, Hällered, Sandhult, Sweden.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Department of Electrical Engineering, Western Norway University of Applied Sciences, Bergen, Norway.
    Characterizing Packet Losses in Vehicular Networks2019In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 68, no 9, p. 8347-8358Article in journal (Refereed)
    Abstract [en]

    To enable testing and performance evaluation of new connected and autonomous driving functions, it is important to characterize packet losses caused by degradation in vehicular (V2X) communication channels. In this paper we suggest an approach to constructing packet loss models based on the socalled Pseudo-Markov chains (PMC). The PMC based model needs only short training sequences, has low computational complexity, and yet provides more precise approximations than known techniques. We show how to learn PMC models from either empirical records of packet receptions, or from analytical models of fluctuations in the received signal strength. In particular, we validate our approach by applying it on (i) V2X packet reception data collected from an active safety test run, which used the LTE network of the AstaZero automotive testing site in Sweden, and (ii) variants of the Rician fading channel models corresponding to two models of correlations of packet losses. We also show that initializing the Baum-Welch algorithm with a second order PMC model leads to a high accuracy model.

  • 278.
    Boeira, Felipe
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Federal University of Rio Grande do Sul, Porto Alegre, Brazil & Linköping University, Linköping, Sweden.
    Barcellos, Marinho P.
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Asplund, Mikael
    Linköping University, Linköping, Sweden.
    Effects of Colluding Sybil Nodes in Message Falsification Attacks for Vehicular Platooning2017In: 2017 IEEE Vehicular Networking Conference (VNC) / [ed] Onur Altintas, Claudio Casetti, Nicholas Kirsch, Renato Lo Cigno & Rui Meireles, 2017Conference paper (Refereed)
    Abstract [en]

    This paper studies the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Platooning employs Inter-Vehicular Communication (IVC) to control a group of vehicles. It uses broadcast information such as acceleration, position, and velocity to operate a longitudinal control law. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of network communication to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. To carry out this study, we evaluate five scenarios to quantify the potential impact of such attacks, identifying how platoons behave under varying Sybil attack conditions and what are the associated safety risks. This research also presents the use of location hijacking attack. In this attack, innocent vehicles that are not part of a platoon are used as a way to create trust bond between the false identities and the physical vehicles. We demonstrate that the ability to create false identities increases the effectiveness of message falsification attacks by making them easier to deploy and harder to detect in time.

  • 279.
    Boeira, Felipe
    et al.
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Barcellos, Marinho
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Asplund, Mikael
    Linköping University, Linköping, Sweden.
    On the impact of sybil attacks in cooperative driving scenarios2017In: 2017 IFIP Networking Conference (IFIP Networking) and Workshops, IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    Platooning employs a set of technologies to manage how a group of vehicles operates, including radar, GPS and Inter-Vehicular Communication (IVC). It uses broadcasted information such as acceleration, position and velocity to operate vehicle members of the platoon. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of IVC to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. In this paper we study the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Simulation results show that this attack may impact the longitudinal control and compromise the entire platoon control. © Copyright 2018 IEEE

  • 280.
    Bordag, Ljudmila A.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    On Option-Valuation in Illiquid Markets: Invariant Solutions to a Nonlinear Model2008In: Mathematical control theory and finance / [ed] Andrey Sarychev; et al, Berlin: Springer Berlin/Heidelberg, 2008, p. 71-94Conference paper (Other academic)
    Abstract [en]

    The present model describes a perfect hedging strategy for a large trader. In this case the hedging strategy affects the price of the underlying security. The feedback-effect leads to a nonlinear version of the Black-Scholes partial differential equation. Using Lie group theory we reduce in special cases the partial differential equation to some ordinary differential equations. The Lie group found for the model equation gives rise to invariant solutions. Families of exact invariant solutions for special values of parameters are described. © 2008 Springer-Verlag Berlin Heidelberg.

  • 281.
    Bordag, Ljudmila A.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Pricing options in illiquid markets: optimal systems, symmetry reductions and exact solutions2010In: Lobachevskii Journal of Mathematics, ISSN 1995-0802, E-ISSN 1818-9962, Vol. 31, no 2, p. 90-99Article in journal (Refereed)
    Abstract [en]

    We study a class of nonlinear pricing models which involves the feedback effect from the dynamic hedging strategies on the price of asset introduced by  Sircar and Papanicolaou. We are first to study the case of a nonlinear demand function involved in the model. Using a Lie group analysis we investigate the symmetry properties of these nonlinear diffusion equations. We provide the optimal systems of subalgebras and the complete set of non-equivalent reductions of studied PDEs to ODEs. In most cases we obtain families of exact solutions or derive particular solutions to the equations.

  • 282.
    Bordag, Ljudmila A.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Study of the risk-adjusted pricing methodology model with methods of geometrical analysis2011In: Stochastics: An International Journal of Probablitiy and Stochastic Processes, ISSN 1744-2508, E-ISSN 1744-2516, Vol. 83, no 4-6, p. 333-345Article in journal (Refereed)
    Abstract [en]

    Families of exact solutions are found to a nonlinear modification of the Black-Scholes equation. This risk-adjusted pricing methodology model (RAPM) incorporates both transaction costs and the risk from a volatile portfolio. Using the Lie group analysis we obtain the Lie algebra admitted by the RAPM equation. It gives us the possibility to describe an optimal system of subalgebras and the corresponding set of invariant solutions to the model. In this way we can describe the complete set of possible reductions of the nonlinear RAPM model. Reductions are given in the form of different second order ordinary differential equations. In all cases we provide exact solutions to these equations in an explicit or parametric form. Each of these solutions contains a reasonable set of parameters which allows one to approximate a wide class of boundary conditions. We discuss the properties of these reductions and the corresponding invariant solutions.

  • 283.
    Bordag, Ljudmila A.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Symmetry reductions and exact solutions for nonlinear diffusion equations2009In: International Journal of Modern Physics A, ISSN 0217-751X, E-ISSN 1793-656X, Vol. 24, no 8/9, p. 1713-1716Article in journal (Refereed)
    Abstract [en]

    The symmetry properties of nonlinear diffusion equations are studied using a Lie group analysis. Reductions and families of exact solutions are found for some of these equations.

    © 2009 World Scientific Publishing Company.

  • 284.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Applied Mathematics and Physics (CAMP).
    Chkhetiani, O. G.
    Space Research Institute, Russian Academy of Sciences.
    Frohner, M.
    Brandenburgische Technische Universität Cottbus.
    Myrnyy, V.
    Brandenburgische Technische Universität Cottbus.
    Interaction of a rotational motion and an axial flow in small geometries for a Taylor-Couette problem2005In: Journal of Fluids and Structures, ISSN 0889-9746, E-ISSN 1095-8622, Vol. 20, no 5, p. 621-641Article in journal (Refereed)
    Abstract [en]

    We analyze the stability of a Taylor-Couette flow under the imposition of a weak axial flow in the case of a very short cylinder with a narrow annulus gap. We consider an incompressible viscous fluid contained in the narrow gap between two concentric short cylinders, in which the inner cylinder rotates with constant angular velocity. The caps of the cylinders have narrow tubes conically tapering to very narrow slits, allowing an axial flow along the surface of the inner cylinder. The approximated solution for the Taylor-Couette flow for short cylinders was found and used for the stability analysis instead of the precise but bulky solution. The sensitivity of the Taylor-Couette flow to small perturbations and to weak axial flow was studied. We demonstrate that perturbations coming from the axial flow cause the propagation of dispersive waves in the Taylor-Couette flow. While in long cylinders the presence of an axial flow leads to the breaking of axial symmetry, in small cylinders it leads to the breaking of mirror symmetry. The coexistence of a rotation and an axial flow requires that, in addition to the energy and the angular momentum of the flow, the helicity must also be studied. The approximated form for the helicity formula in the case of short cylinders was derived. We found that the axial flow stabilizes the Taylor-Couette flow. The supercritical flow includes a rich variety of vortical structures, including a symmetric pair of Taylor vortices, an anomalous single vortex and quasiperiodic oscillating vortices. Pattern formation was studied at large for rated ranges of azimuthal and axial Reynolds numbers. A region where three branches of different states occur was localized. Numerical simulations in 3-D and in the axisymmetrical case of the model flow are presented, which illustrate the instabilities analyzed.

  • 285.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Chmakova, A. Y.
    Fakultät Mathematik, Naturwissenschaften und Informatik, Brandenburgische Technische Universität Cottbus, Cottbus, Germany.
    Explicit solutions for a nonlinear model of financial derivatives2007In: International Journal of Theoretical and Applied Finance, ISSN 0219-0249, Vol. 10, no 1, p. 1-21Article in journal (Refereed)
    Abstract [en]

    Families of explicit solutions are found to a nonlinear Black-Scholes equation which incorporates the feedback-effect of a large trader in case of market illiquidity. The typical solution of these families will have a payoff which approximates a strangle. These solutions were used to test numerical schemes for solving a nonlinear Black-Scholes equation. © World Scientific Publishing Company.

  • 286.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Frey, Rüdiger
    Leipzig University, Department of Mathematics.
    Pricing options in illiquid markets: symmetry reductions and exact solutions2008In: Nonlinear Models in Mathematical Finance: New Research Trends in Option Pricing / [ed] Matthias Ehrhardt, New York: Nova Science Publishers, Inc., 2008, p. 103-130Chapter in book (Other academic)
    Abstract [en]

    The present paper is concerned with nonlinear Black Scholes equations arising in certain option pricing models with a large trader and/or transaction costs. In the first part we give an overview of existing option pricing models with frictions. While the financial setup differs between models, it turns out that in many of these models derivative prices can be characterized by fully nonlinear versions of the standard parabolic Black-ScholesPDE. In the second part of the paper we study a typical nonlinear Black-Scholes equation using methods from Lie group analysis. The equation possesses a rich symmetry group. By introducing invariant variables,  invariant solutions can therefore be characterized in terms of solutions to ordinary differential equations. Finally we discuss properties and applications of these solutions.

  • 287.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Matveev, Sergey K.
    St. Petersburger State University.
    Berechnungen der Gleichgewichtslage der Welle unterpräzisierten geometrischen Voraussetzungen der Druckfluidströmung in LHS 7502009Report (Other academic)
  • 288.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Matveev, Sergey K.
    St. Petersburg State University.
    Erste  Berechnungen der Druckfluidströmung2008Report (Other academic)
  • 289.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Matveev, Sergey K.
    St. Petersburg State University.
    Präzisierte Berechnungender Druckfluidströmung in LHS 7502008Report (Other academic)
  • 290.
    Bordag, Ljudmila A.
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Mikaelyan, Anna
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Models of self-financing hedging strategies in illiquid markets: Symmetry reductions and exact solutions2011In: Letters in Mathematical Physics, ISSN 0377-9017, E-ISSN 1573-0530, Vol. 96, no 1-3, p. 191-207Article in journal (Refereed)
    Abstract [en]

    We study the general model of self-financing trading strategies inilliquid markets introduced by Schoenbucher and Wilmott, 2000.A hedging strategy in the framework of this model satisfies anonlinear partial differential equation (PDE) which contains somefunction g(alpha). This function is deep connected to anutility function.

    We describe the Lie symmetry algebra of this PDE and provide acomplete set of reductions of the PDE to ordinary differentialequations (ODEs). In addition we are able to describe all types offunctions g(alpha) for which the PDE admits an extended Liegroup. Two of three special type functions lead to modelsintroduced before by different authors, one is new. We clarify theconnection between these three special models and the generalmodel for trading strategies in illiquid markets. We study withthe Lie group analysis the new special case of the PDE describingthe self-financing strategies. In both, the general model and thenew special model, we provide the optimal systems of subalgebrasand study the complete set of reductions of the PDEs to differentODEs. In all cases we are able to provide explicit solutions tothe new special model. In one of the cases the solutions describepower derivative products.

  • 291.
    Bordag, Michael
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Interaction of a charge with a thin plasma sheet2007In: Physical Review D. Particles and fields, ISSN 0556-2821, E-ISSN 1089-4918, Vol. 76, no 6, p. 065011-Article in journal (Refereed)
    Abstract [en]

    The interaction of the electromagnetic field with a two-dimensional plasma sheet intended to describe the pi-electrons of a carbon nanotube or a C-60 molecule is investigated. By first integrating out the displacement field of the plasma or the electromagnetic field, different representations for quantities like the Casimir energy are derived which are shown to be consistent with one another. Starting from the covariant gauge for the electromagnetic field, it is shown that the matching conditions to which the presence of the plasma sheet can be reduced are different from the commonly used ones. The difference in the treatments does not show up in the Casimir force between two parallel sheets, but it is present in the Casimir-Polder force between a charge or a neutral atom and a sheet. At once, since the plasma sheet is a regularization of the conductor boundary conditions, this sheds light on the difference in physics found earlier in the realization of conductor boundary conditions as "thin" or "thick" boundary conditions in Phys. Rev. D 70, 085010 (2004).

  • 292.
    Bordag, Michael
    et al.
    Leipzig University, Institute for Theoretical Physics, Leipzig, Germany.
    Jede, Ralf
    Raith GmbH, Dortmund, Germany.
    Montelius, Lars
    Lunds University, Physics Department, Lund, Sweden.
    Pettersson, Håkan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), MPE-lab.
    Riu, Jordi
    University Rovira i Vergili, Taragona, Spain.
    Schmucker, Ulrich
    University Rovira i Vergili, Taragona, Spain.
    Zubtsov, Michael
    Fraunhofer Institute for Factory Automation, Magdeburg, Germany.
    Parallel nano-assembly directed by short-range field forces2006In: Proceedings of the 1st IEEE International Conference on Nano/Micro Engineered and Molecular Systems, Piscataway, United States: IEEE Press, 2006, p. 620-622, article id 4135031Conference paper (Refereed)
    Abstract [en]

    We present the ECs Sixth Framework Programme PARNASS project, which stands for 'Parallel nano assembling directed by short-range field forces' and represents a radical innovative approach to fabricating large volumes of hybrid nano electronic devices. The project combines in a synergy the 'top-down' and 'bottom-up' methods addressing one of the challenging physical and engineering problems of the very high accuracy over a large area. An array of specially designed nano-scale force field sources has to be a key part of this innovative approach to large-scale nano manufacturing. © 2006 IEEE.

  • 293.
    Bordag, Michael
    et al.
    Univ Leipzig, Vor Hospitaltore 1, D-04103 Leipzig, Germany..
    Nikolaev, Vladimir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Analytic corrections to the electromagnetic casimir interaction between a sphere and a plate at shortdistances2010In: International Journal of Modern Physics A, ISSN 0217-751X, E-ISSN 1793-656X, Vol. 25, no 11, p. 2171-2176Article in journal (Refereed)
    Abstract [en]

    For the vacuum interaction of a sphere in front of a plane, both obeying conductor boundary conditions, we consider the approximation of small separation. We derive the next-to-leading order of the asymptotic expansion in the separation-to-radius ratio epsilon. This correction is of order epsilon. In opposite to the scalar cases it contains also contributions proportional to logarithms in first and second order, epsilon In epsilon and e(ln epsilon)(2). We compare this result with the available findings of numerical and experimental approaches.

  • 294.
    Bordag, Michael
    et al.
    Leipzig University, Vor Dem Hospitaltore 1, D-04103 Leipzig, Germany.
    Nikolaev, Vladimir
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Analytic corrections to the electromagnetic casimir interaction between a sphere and a plate at shortdistances2010In: International Journal of Modern Physics A, ISSN 0217-751X, E-ISSN 1793-656X, Vol. 25, no 11, p. 2171-2176Article in journal (Refereed)
    Abstract [en]

    For the vacuum interaction of asphere in front of a plane,both obeying conductor boundary conditions, we consider the approximation of small separation. We derive the next-to-leading order of the asymptotic expansion in the separation-to-radius ratio epsilon. This correction is of order epsilon. In opposite to the scalar cases it contains also contributions proportional to logarithms in first and second order, epsilon ln epsilon and epsilon(ln epsilon)(2). We compare this result with the available findings of numerical and experimental approaches.

  • 295.
    Bordag, Michael
    et al.
    Leipzig University, Vor dem Hospitaltore 1, D-04103 Leipzig, Germany.
    Nikolaev, Vladimir
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Beyond proximity force approximation in the casimir effect2009In: International Journal of Modern Physics A, ISSN 0217-751X, E-ISSN 1793-656X, Vol. 24, no 8-9, p. 1743-1747Article in journal (Refereed)
    Abstract [en]

    We compare the analytical and numerical results for the Casimir force for the configuration of a plane and a cylinder in front of a plane. While for Dirichlet boundary conditions on both, plane and sphere or cylinder, agreement is found, for Neumann boundary conditions on either the plane or one of the two, cylinder or sphere, disagreement is found. This holds, for a sphere, also for different boundary conditions on the interacting surfaces. From recent, new numerical results for the cylinder, a general appearance of logarithmic contributions beyond PFA can be predicted.

  • 296.
    Bordag, Michael
    et al.
    Institute for Theoretical Physics, Leipzig University, Leipzig, Germany.
    Nikolaev, Vladimir
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Casimir force for a sphere in front of a plane beyond proximity force approximation2008In: Journal of Physics A: Mathematical and Theoretical, ISSN 1751-8113, E-ISSN 1751-8121, Vol. 41, no 16, p. 164002-Article in journal (Refereed)
    Abstract [en]

    For the configuration of a sphere in front of a plane, we calculate the first two terms of the asymptotic expansion for small separation of the Casimir force. We consider both Dirichlet and Neumann boundary conditions.

  • 297.
    Bordag, Michael
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Nikolaev, Vladimir
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    First analytic correction beyond the proximity force approximation in the Casimir effect for the electromagnetic field in sphere-plane geometry2010In: Physical Review D, ISSN 1550-7998, E-ISSN 1550-2368, Vol. 81, no 6, p. Article number 065011-Article in journal (Refereed)
    Abstract [en]

    We consider the vacuum energy for a configuration of a sphere in front of a plane, both obeying the conductor boundary condition, at small separation. For the separation becoming small we derive the first next-to-leading order of the asymptotic expansion in the separation-to-radius ratio epsilon. This correction is of order epsilon. Opposite to the scalar cases it contains also contributions proportional to logarithms in first and second order, epsilon ln epsilon and epsilon(ln epsilon)(2). We compare this result with the available findings of numerical and experimental approaches.

  • 298.
    Bordag, Michael
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Nikolaev, Vladimir
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    The vacuum energy for two cylinders with one increasing in size2009In: Journal of Physics A: Mathematical and Theoretical, ISSN 1751-8113, E-ISSN 1751-8121, Vol. 42, no 41, p. 415203-Article in journal (Refereed)
    Abstract [en]

    We consider the vacuum energy for the configuration of two cylinders and obtain its asymptotic expansion if the radius of one of these cylinders becomes large while the radius of the other one and their separation are kept fixed. We calculate explicitly the next-to-leading order correction to the vacuum energy for the radius of the other cylinder becoming large or small.

  • 299.
    Bordag, Michael
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Applied Mathematics and Physics (CAMP).
    Ribayrol, Aline
    Lund University.
    Conache, Gabriela
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Applied Mathematics and Physics (CAMP).
    Fröberg, Linus E.
    Lund University.
    Gray, Struan
    Lund University.
    Samuelson, Lars
    Lund University.
    Montelius, Lars
    Lund University.
    Pettersson, Håkan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Applied Mathematics and Physics (CAMP).
    Shear stress measurements on InAs nanowires by AFM manipulation2007In: Small, ISSN 1613-6810, Vol. 3, no 8, p. 1398-1401Article in journal (Refereed)
    Abstract [en]

    On an upward curve? The curvature of an elastically deformed nanowire pinned to a flat surface contains information about the maximum static friction force, and hence the shear stress, between the nanowire and the surface. Here, InAs nanowires are bent in a controlled manner using the tip of an atomic force microscope (see image). The shear stress can be obtained from a simple analysis according to the standard theory of elasticity.

  • 300.
    Borg, Johan
    et al.
    Halmstad University, School of Information Technology.
    From, Josefine
    Halmstad University, School of Information Technology.
    Cloud och konsulten: En studie om konsultens roll vid arbetet med cloudbaserade affärssystem2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Cloud computing beskrivs som ett paradigmskifte inom IT-branschen, cloudbaserade

    tjänster är här för att stanna. En del av cloudcomputing är cloudbaserade affärssystem.

    Genom att få både systemet och datalagringen tillhandahållen från en externsystemleverantör kan verksamheter lägga fullt fokus på sin kärnverksamhet

    och låtasystemleverantören sköta tekniken. Systemet kan dock behöva  anpassas

    för att passa verksamheten och integrering mellan ändra system kan krävas.

    Därför väljer många kunder att använda sig utav konsulter för att anpassa

    systemet och för att få hjälp att använda det på bästa satt.

    .

3456789 251 - 300 of 1955
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf