hh.sePublikasjoner
Endre søk
Begrens søket
3456789 251 - 300 of 484
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 251.
    Lyamin, Nikita
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Performance evaluation of C-ACC/platooning under ITS-G5 communications2016Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. In order to enable vehicular communications European Telecommunication Standards Institute (ETSI) delivered ITS-G5 -- a of set of C-ITS standards. Considering the goals of C-ITS, inter-vehicle communications should be reliable and efficient.

    In this thesis we study the performance, efficiency, and dependability of ITS-G5 communications for Cooperative adaptive cruise control (C-ACC) and platooning C-ITS applications. We provide an overview of currently available and ongoing standardization targeting communications in C-ACC/platooning. We study the performance of ITS-G5 beaconing in a C-ACC/platooning scenario, where we show that its performance may deteriorate when implemented in cooperative driving applications due to the kinematic-dependent design of the message triggering mechanism. We explain in detail the cause of this phenomenon and test it for a wide range of parameters. Also, we study the influence of different available ITS-G5 legitimate setups on the C-ACC/platooning fuel efficiency and demonstrate that proper communication setup may enhance fuel savings. This thesis also proposes a jamming denial-of-service attack detection algorithm for platooning. The main advantage of our detector is its short learning phase that not exceed a second and low detection delay of a few hundreds of milliseconds. Under some assumptions, the proposed algorithm demonstrates the ability to detect certain types of attacks with average probability above 0.9.

    Fulltekst (pdf)
    fulltext
  • 252.
    Lyamin, Nikita
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Performance evaluation of safety critical ITS-G5 V2V communications for cooperative driving applications2019Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. In order to enable vehicular communications European Telecommunication Standards Institute (ETSI) delivered ITS-G5 -- a of set of C-ITS standards. Considering the goals of C-ITS, inter-vehicle communications should be reliable and efficient.

    The subject of this thesis is evaluation of the performance, efficiency, and dependability of ITS-G5 communications for cooperative driving applications support. This thesis includes eight scientific papers and extends the research area in three directions: evaluation of the performance of ITS-G5 beaconing protocols; studying the performance of ITS-G5 congestion control mechanisms; and studying the radio jamming Denial-of-Service (DoS) attacks and their detection methods.

    First, an overview of currently available and ongoing standardization targeting communications in C-ACC/platooning cooperative driving applications is provided. Then, as part of the first research direction, we demonstrate via a number of studies, that the adaptive beaconing approach where message generation is coupled to the speed variation of the originating ITS-s may lead to a message synchronization effect in the time domain when vehicles follow mobility scenarios that involve cooperative speed variation. We explain in detail the cause of this phenomenon and test it for a wide range of parameters. In relation to the second problem, we, first, study the influence of different available ITS-G5 legitimate setups on the C-ACC/platooning fuel efficiency and demonstrate that proper communication setup may enhance fuel savings. Then we thoroughly study the standardization of the congestion control mechanism for ITS-G5, which will affect the operation of all cooperative driving C-ITS applications as a mandatory component. We study the influence of congestion control on application performance and give recommendations for improvement to make the congestion control to target at optimizing the applications performance metrics. In the scope of the last research direction, we propose two real-time jamming DoS detection methods. The main advantage of our detection techniques is their short learning phase that not exceed a few seconds and low detection delay of a few hundreds of milliseconds. Under some assumptions, the proposed algorithms demonstrates the ability to detect certain types of attacks with high detection probability.

    Fulltekst (pdf)
    fulltext
  • 253.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Catalunya, Spain.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Age-of-Information-Aware Decentralized Congestion Control in VANETs2020Inngår i: IEEE Networking Letters, E-ISSN 2576-3156, Vol. 2, nr 1, s. 33-37Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Decentralized Congestion Control (DCC) is one the central components of inter-vehicular communications protocol stack enabling Cooperative Intelligent Transportation System (C-ITS). In this letter we first present an analytical framework that allows to tune parameters of the DCC algorithm specified by ETSI. Then we suggest two approaches to optimize the DCC configuration using our framework. Finally, we evaluate the performance of the proposed approaches using detailed simulation experiments. We demonstrate that proposed approaches are able to control channel busy ratio stably, while proposed analytical model precisely estimates application level metrics. © 2019 IEEE

  • 254.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Deng, Qichen
    Delft University of Technology, Delft, Netherlands.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Study of the Platooning Fuel Efficiency under ETSI ITS-G5 Communications2016Inngår i: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Piscataway, NJ: IEEE, 2016, s. 551-556Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper we evaluate the performance of platoon enabled by contemporary ITS-G5 vehicular communications through a number of simulation experiments. We assess platooning fuel consumption performance under two communication setups and estimate the potential influence of the communication system on the efficiency of the platooning. We also make an attempt to transform our results on platoon fuel efficiency into potential cost reduction gain. Our study shows that platooning fuel-efficiency may vary depending on the communication setup.

    Fulltekst (pdf)
    fulltext
  • 255.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Kleyko, Denis
    Luleå University of Technology, Luleå, Sweden.
    Delooz, Quentin
    University of Liège, Liège, Belgium.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    AI-Based Malicious Network Traffic Detection in VANETs2018Inngår i: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, nr 6, s. 15-21Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Inherent unreliability of wireless communications may have crucial consequences when safety-critical C-ITS applications enabled by VANETs are concerned. Although natural sources of packet losses in VANETs such as network traffic congestion are handled by decentralized congestion control (DCC), losses caused by malicious interference need to be controlled too. For example, jamming DoS attacks on CAMs may endanger vehicular safety, and first and foremost are to be detected in real time. Our first goal is to discuss key literature on jamming modeling in VANETs and revisit some existing detection methods. Our second goal is to present and evaluate our own recent results on how to address the real-time jamming detection problem in V2X safety-critical scenarios with the use of AI. We conclude that our hybrid jamming detector, which combines statistical network traffic analysis with data mining methods, allows the achievement of acceptable performance even when random jitter accompanies the generation of CAMs, which complicates the analysis of the reasons for their losses in VANETs. The use case of the study is a challenging platooning C-ITS application, where V2X-enabled vehicles move together at highway speeds with short inter-vehicle gaps.

  • 256.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Kleyko, Denis
    Department of Computer Science, Electrical and Space Engineering, Computer Science, Luleå University of Technology, Luleå, Sweden.
    Delooz, Quentin
    Center of Automotive Research on Integrated Safety Systems and Measurement Area (CARISSMA), Ingolstadt, Germany.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining2019Inngår i: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 23, nr 3, s. 442-445Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    A data mining-based method for real-time detection of radio jamming Denial-of-Service (DoS) attacks in IEEE 802.11p vehicle-to-vehicle (V2V) communications is proposed. The method aims at understanding the reasons for losses of periodic cooperative awareness messages (CAM) exchanged by vehicles in a platoon. Detection relies on a knowledge of IEEE 802.11p protocols rules as well as on historical observation of events in the V2V channel. In comparison to the state-of-the-art method, the proposed method allows operating under the realistic assumption of random jitter accompanying every CAM transmission. The method is evaluated for two jamming models: random and ON-OFF. 

  • 257.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Does ETSI beaconing frequency control provide cooperative awareness?2015Inngår i: 2015 IEEE International Conference on Communication Workshop (ICCW), Piscataway, NJ: IEEE Press, 2015, s. 2393-2398Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Platooning is an emergent vehicular application aiming at increasing road safety, efficiency and driving comfort. The cooperation between the vehicles in a platoon is achieved by the frequent exchange of periodic broadcast Cooperative Awareness Messages (CAMs) also known as beacons. CAM triggering conditions are drafted in the standard ETSI EN 302 637–2 and are based on the dynamics of an originating vehicle. These conditions are checked repeatedly with a certain sampling rate. We have discovered that the improper choice of the sampling rate value may increase the number of collisions between CAMs at the IEEE 802.11p medium access control layer and, therefore, diminish the efficiency of beaconing in a platoon. © 2015 IEEE

    Fulltekst (pdf)
    fulltext
  • 258.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Poster: On the Performance of ETSI EN 302 637-2CAM Generation Frequency Management2014Inngår i: 2014 IEEE Vehicular Networking Conference (VNC) / [ed] Falko Dressler, Onur Altintas, Suman Banerjee, Björn Scheuermann & David Eckhoff, Piscataway, NJ: IEEE Press, 2014, s. 107-108Konferansepaper (Fagfellevurdert)
    Abstract [en]

    ETSI EN 302 637-2 draft standard defines the triggering rules for Cooperative Awareness Messages (CAMs). It specifies how the frequency of CAM generation shall depend on the dynamics of an originating vehicle. We have discovered that for a group of vehicles in the proximity, which follow similar movement patterns, the performance of the CAM generation frequency management might deteriorate over time.

  • 259.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Spain.
    Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance2018Inngår i: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 67, nr 1, s. 17-28Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Cooperative Awareness on the road is aiming to support the road users with knowledge about the surroundings relying on the information exchange enabled by vehicular com- munications. To achieve this goal European Telecommunication Standard Institute (ETSI) delivered the standard EN 302 637-2 for Cooperative Awareness Messages (CAM). The CAM trig- gering conditions are based on the dynamics of the originating vehicle, which is checked periodically. In this paper, we show that standardized ETSI protocol may demonstrate a decrease in communication performance under several realistic mobility patterns. The potential influence of the discovered phenomena on two typical mobility scenarios is studied.

  • 260.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Loo, Jonathan
    Middlesex University, London, United Kingdom.
    Real-time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks2014Inngår i: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 18, nr 1, s. 110-113Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    A method for real-time detection of Denial-of-Service (DoS) attacks in IEEE 802.11p vehicular ad-hoc networks (VANETs) is proposed. The study is focused on the "jamming" of periodic position messages (beacons) exchanged by vehicles in a platoon. Probabilities of attack detection and false alarm are estimated for two different attacker models. © 2014 IEEE

  • 261.
    Lyamin, Nikita
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Smely, Dieter
    Kapsch TrafficCom, Vienna, Austria.
    Bellalta, Boris
    Universitat Pompeu Fabra, Barcelona, Spain.
    ETSI DCC: Decentralized Congestion Control in C-ITS2018Inngår i: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, nr 12, s. 112-118Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    ETSI DCC: Decentralized Congestion Control in C-ITS is a mandatory component of the 5.9 GHz ITS-G5 vehicular communication protocol stack that reduces radio channel overload, range degradation, and self interference. In this tutorial article we explain its principle, describe related ongoing standardization activities, evaluate its performance for emerging cooperative driving applications, and identify ways for improvement. We show that failure to use a proper DCC parameterization can impact negatively on the performance of cooperative vehicular applications.

  • 262.
    Lyu, Xinchen
    et al.
    Beijing University of Posts and Telecommunications, Beijing, China.
    Tian, Hui
    Beijing University of Posts and Telecommunications, Beijing, China.
    Jiang, Li
    Guangdong University of Technology, Guangzhou, China.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Maharjan, Sabita
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Gjessing, Stein
    Simula Research Laboratory, Oslo, Norway & University of Oslo, Oslo, Norway.
    Zhang, Yan
    University of Oslo, Oslo, Norway.
    Selective Offloading in Mobile Edge Computing for the Green Internet of Things2018Inngår i: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, nr 1, s. 54-60Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Mobile edge computing provides the radio access networks with cloud computing capabilities to fulfill the requirements of the Internet of Things services such as high reliability and low latency. Offloading services to edge servers can alleviate the storage and computing limitations and prolong the lifetimes of the IoT devices. However, offloading in MEC faces scalability problems due to the massive number of IoT devices. In this article, we present a new integration architecture of the cloud, MEC, and IoT, and propose a lightweight request and admission framework to resolve the scalability problem. Without coordination among devices, the proposed framework can be operated at the IoT devices and computing servers separately, by encapsulating latency requirements in offloading requests. Then a selective offloading scheme is designed to minimize the energy consumption of devices, where the signaling overhead can be further reduced by enabling the devices to be self-nominated or self-denied for offloading. Simulation results show that our proposed selective offloading scheme can satisfy the latency requirements of different services and reduce the energy consumption of IoT devices. © 2018 IEEE 

  • 263.
    Magesacher, Thomas
    et al.
    Lund University, Lund, Sweden.
    Statovci, Driton
    FTW Forschungszentrum Telekommunikation Wien GmbH, Vienna, Austria.
    Nordström, Tomas
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Riegler, Erwin
    Vienna University of Technology, Vienna, Austria.
    Performance analysis of vectored wireline systems embracing channel uncertainty2013Inngår i: 2013 IEEE International Conference on Communications (ICC): Bridging the Broadband Divide / [ed] Dong-In Kim and Peter Mueller, Piscataway, NJ: Institute of Electrical and Electronics Engineers , 2013, s. 3986-3990Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Future wireline communication systems aspire to boost the throughput in two ways: First, they exploit higher frequencies to gain more bandwidth on shorter lines in combination with vectoring. Second, they use non-differential transmission modes (such as phantom modes, common modes, split-pair modes) to exploit more dimensions. Performance predictions for systems exploiting these techniques are of great importance for upgrading copper networks to provide Internet access or deploying copper-based backhaul systems to connect mobile base-stations. Good predictions require accurate channel models. However, channel modeling for higher frequencies and nondifferential modes is still in its infancy. A mixed deterministic/stochastic channel model is proposed to remedy this problem. The outage rate is derived based on an asymptotic (in the number of participating transceivers) analysis. As application examples, performance predictions in access networks using phantom modes and frequencies up to 200 MHz are presented.

  • 264.
    Mapp, Glenford
    et al.
    Middlesex University, London, UK.
    Gosh, Arindam
    Middlesex University, London, UK.
    Paranthaman, Vishnu Vardhan
    Middlesex University, London, UK.
    Iniovosa, Victor Otite
    Middlesex University, London, UK.
    Loo, Jonathan
    Middlesex University, London, UK.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Exploring Seamless Connectivity and Proactive Handover Techniques in VANET Systems2016Inngår i: Intelligent Transportation Systems: Dependable Vehicular Communications for Improved Road Safety / [ed] Muhammad Alam, Joaquim Ferreira & José Fonseca, Cham: Springer, 2016, s. 195-220Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    In order to provide Dependable Vehicular Communications for Improved Road Safety, it is necessary to have reliable Vehicular-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communication. Such requirements demand that the handover process as vehicles move between adjacent Roadside Units (RSUs) be examined in detail to understand how seamless communication can be achieved. Since the use of beacons is a key part of VANETs, it is necessary to investigate how the beaconing process affects the opportunities to effect handovers. A framework is needed to be able to calculate the regions of overlap in adjacent RSU coverage ranges to guarantee ubiquitous connectivity. A highly mobile environment, therefore, makes this a serious challenge and points to the need to look at proactive handover techniques. This chapter, therefore, explores the development of the proactive handover mechanisms required to provide seamless connectivity and dependable communication in VANET environments.

  • 265.
    Marchand, Judicaël
    et al.
    École polytechnique de l’Université de Nantes, Nantes, France.
    Puissochet, Gaël
    École polytechnique de l’Université de Nantes, Nantes, France.
    Lithén, Thomas
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    MicroITS: A scaled-down ITS platform2019Inngår i: Lecture Notes in Computer Science, Springer, 2019, s. 214-221Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Intelligent Transportation Systems (ITS) are an excellent illustration of the types of challenges that future technologists must address. In previous work we presented a course designed to engage students with theoretical aspects of embedded and cyber-physical systems. In this paper we present MicroITS, a platform addressing applied aspects. We articulate the design goals that we believe are needed to achieve engagement in an educational setting, and describe the platform and its baseline functionality. We briefly describe example projects that can be realized using MicroITS. Our hope is that this report will encourage the development of a community of educators and students interested in the use and the continued development of the platform. © Springer Nature Switzerland AG 2019.

  • 266.
    Marinho, Marco A. M.
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Antreich, Felix
    Department of Telecommunications, Aeronautics Institute of Technology (ITA), São José dos Campos, Brazil.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Tufvesson, Fredrik
    ‡Department of Electrical and Information Technology, Lund University, Lund, Sweden.
    Atif Yaqoob, Muhammad
    TerraNet AB, Lund, Sweden.
    Non-Line-of-Sight Based Radio Localization With Dual-Polarization Antenna Arrays2020Inngår i: WSA 2020; 24th International ITG Workshop on Smart Antennas, Berlin: VDE Verlag GmbH, 2020Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This work presents an approach for radio-based localization in non-line-of-sight (NLOS) environments by leveraging a dual-polarization antenna array. By estimating the polarization of the received signal, it is possible to estimate the angle of reflection of a NLOS signal. An estimate of the position of the transmitter concerning the receiver can be obtained based on a joint estimation of the reflection angle of several NLOS signals together with their respective directions of arrival (DOAs) and time differences of arrival (TDOAs). A set of numerical simulations is used to assess the performance of the proposed method. © VDE VERLAG GMBH. Berlin. Offenbach

  • 267.
    Marinho, Marco A. M.
    et al.
    University of Brasília (UnB), Brasília, Brazil & German Aerospace Center (DLR), Cologne, Germany.
    da Costa, João Paulo C. L.
    University of Brasília (UnB), Brasília, Brazil; llmenau University of Technology, Ilmenau, Germany & Fraunhofer Institute for Integrated Circuits IIS, Erlangen, Germany.
    Antreich, Felix
    German Aerospace Center (DLR), Cologne, Germany.
    de Almeida, André L. F.
    Federal University of Ceará (UFC), Fortaleza, Brazil.
    Del Galdo, Giovanni
    llmenau University of Technology, Ilmenau, Germany & Fraunhofer Institute for Integrated Circuits IIS, Erlangen, Germany.
    de Freitas, Edison Pignaton
    University of Brasília (UnB), Brasília, Brazil & Informatics Institute, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Array interpolation based on multivariate adaptive regression splines2016Inngår i: 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Many important signal processing techniques such as Spatial Smoothing, Forward Backward Averaging and Root-MUSIC, rely on antenna arrays with specific and precise structures. Arrays with such ideal structures, such as a centro-hermitian structure, are often hard to build in practice. Array interpolation is used to enable the usage of these techniques with imperfect (not having a centro-hermitian structure) arrays. Most interpolation methods rely on methods based on least squares (LS) to map the output of a perfect virtual array based on the real array. In this work, the usage of Multivariate Adaptive Regression Splines (MARS) is proposed instead of the traditional LS to interpolate arrays with responses largely different from the ideal.

  • 268.
    Marinho, Marco A. M.
    et al.
    University of Brasilia, Brasilia, Brazil.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Antreich, Felix
    Federal University of Ceara, Fortaleza, Brazil.
    da Costa, João Paulo Carvalho Lustosa
    University of Brasilia, Brasilia, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Antenna Array Based Localization Scheme for Vehicular Networks2017Inngår i: 2017 IEEE International Conference on Computer and Information Technology (CIT) / [ed] Lisa O’Conner, Los Alamitos: IEEE Computer Society, 2017, s. 142-146Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Vehicular ad hoc networks (VANETs) are emerging as the possible solution for multiple concerns in road traffic such as mobility and safety. One of the main concerns present in VANETs is the localization and tracking of vehicles. This work presents a passive vehicle localization and tracking method based on direction of arrival (DOA) estimation. The proposed method does not rely on external sources of information such as Global Navigation Satellite Systems (GNSS) and can be used to mitigate the possibility of spoofing or to provide a second independent source of position estimation for integrity purposes. The proposed algorithm uses array signal processing techniques to estimate not only the position but also the direction of other vehicles in network. Furthermore, it is a fully passive method and can alleviate the network load since it does not require any location based data exchange and can be performed by any listening vehicle using the signal of any data transmission. A set of numerical simulations is used to validate the proposed method and the results are shown to be more precise than the average accuracy of Global Position System (GPS) receivers. © Copyright 2017 IEEE

  • 269.
    Marinho, Marco A. M.
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi. University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Tufvesson, Fredrik
    Department of Electrical and Information Technology, Lund University, Lund, Sweden.
    Antreich, Felix
    Department of Teleinformatics Engineering - Federal University of Ceará (UFC), Fortaleza, Brazil.
    Da Costa, João Paulo C.L.
    University of Brasília (UnB), Department of Electrical Engineering (ENE), Brasília, Brazil.
    Performance Assessment for Distributed Broadband Radio Localization2018Inngår i: 2018 52nd Asilomar Conference on Signals, Systems, and Computers, Washington, DC: IEEE, 2018, s. 20-23Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Various emerging technologies, such as autonomous vehicles and fully autonomous flying, require precision positioning. This work presents a localization and tracking method based on joint direction of arrival (DOA), time delay, and range estimation using the SAGE algorithm. The proposed method does not rely on external sources of information such as global navigation satellite systems (GNSS). The method is opportunistic and does not require any location-based data exchange. A set of numerical simulations is presented to assess the performance of the proposed method.

  • 270.
    Marrocco, G.
    et al.
    FTW, Österrike.
    Wolkerstorfer, M.
    FTW, Österrike.
    Nordström, Tomas
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Statovci, D.
    FTW, Österrike.
    Energy- Efficient DSL using Vectoring2011Konferansepaper (Fagfellevurdert)
    Abstract [en]

    A multi-user signal coordination scheme known as Vectoring will play a crucial role in next generation digital subscriber lines (DSL). Previous studies have demonstrated that vectoring increases the bitrate of DSL systems due to its ability to mitigate the interference. In this work we show how Vectoring improves the energy-efficiency of DSL over state-of-the-art spectrum balancing methods. In addition we investigate the impact of channel-state information errors and low-complexity implementations on the performance of Vectoring. We find that Vectoring yields large energy savings in terms of line-driver power consumption even under high channel estimation errors. © 2011 IEEE.

  • 271.
    Masood, Jawad
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Philippsen, Roland
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Duracz, Jan
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston, Texas, USA.
    Eriksson, Henrik
    SP Technical Research Institute, Borås, Sweden.
    Grante, Christian
    Volvo Group Trucks Technology, Göteborg, Sweden.
    Domain Analysis for Standardised Functional Safety: A Case Study on Design-Time Verification of Automatic Emergency Breaking2014Inngår i: FISITA World Automotive Congress 2014: Maastricht, The Netherlands 2-6 June 2014: Volume 2 of 5, Hague: Royal Netherlands Society of Engineers (KIVI) , 2014, s. 845-854Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Simulation traditionally computes individual trajectories, which severely limits the assessment of overall system behaviour. To address this fundamental shortcoming, we rely on computing enclosures to determine bounds on system behaviour instead of individual traces. In the present case study, we investigate the enclosures of a generic Automatic Emergency Braking (AEB) system and demonstrate how this creates a direct link between requirement specification and standardized safety criteria as put forward by ISO 26262. The case study strongly supports that a methodology based on enclosures can provide a missing link across the engineering process, from design to compliance testing. This result is highly relevant for ongoing efforts to virtualize testing and create a unified tool-chain for the development of next generation Advanced Driver Assistance Systems.

    Fulltekst (pdf)
    fulltext
  • 272.
    Mecklenbräuker, Christoph
    et al.
    Vienna University of Technology, Vienna, Austria.
    Bernadó, Laura
    FTW Forschungszentrum Telekommunikation Wien, Vienna, Austria.
    Klemp, Oliver
    BMW Forschung und Technik, Munich, Germany.
    Kwoczek, Andreas
    Volkswagen AG, Wolsburg, Germany.
    Paier, Alexander
    Vienna University of Technology, Vienna, Austria.
    Schack, Moritz
    Technische Universität Braunschweig, Braunschweig, Germany.
    Sjöberg, Katrin
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Ström, Erik G.
    Chalmers University of Technology, Gothenburg, Sweden.
    Tufvesson, Fredrik
    Lund University, Lund, Sweden.
    Uhlemann, Elisabeth
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Zemen, Thomas
    FTW Forschungszentrum Telekommunikation Wien, Vienna, Austria.
    Vehicle-to-Vehicle Communications2012Inngår i: Pervasive Mobile and Ambient Wireless Communications: Cost Action 2100 / [ed] Roberto Verdone & Alberto Zanella, London: Springer London, 2012, s. 577-608Kapittel i bok, del av antologi (Annet vitenskapelig)
    Abstract [en]

    This chapter discusses major results and conclusions from Special Interest Group C bringing together various aspects of mobile to mobile communication from all working groups. Vehicle-to-vehicle communication scenarios are emphasized. Traffic telematics applications are currently under intense research and development for making transportation safer, more efficient, and cleaner. Communication systems which provide “always on” connectivity at data rates between 1 and 10 Mb/s to highly mobile surface traffic (cars and trains) are urgently required for developing traffic telematics applications and services. Currently much attention is given to advanced active safety, but the application area also ranges to improved navigation mechanisms and infotainment services. mobile to mobile communications need to be reliable and trusted: Drivers in cars which are equipped with vehicle to vehicle communications need to rely on the accuracy and timeliness of the exchanged data. Automotive manufacturers, road authorities, broadcast companies, and telecom providers are the key players in the value chain for such future systems. These communication systems provide an extended information horizon to warn the driver or the vehicular systems of potentially dangerous situations in an early phase.

  • 273.
    Mendizabal, Jaizki
    et al.
    CEIT and TECNUN, University of Navarra, San Sebastián, Spain.
    Berbineau, MarionIFSTTAR, Villeneuve d’Ascq, France.Vinel, AlexeyHögskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).Pfletschinger, StephanDtsch. Zentrum für Luft- und Raumfahrt, Oberpfaffenhofen, Germany.Bonneville, HervéMitsubishi Electric R&D Centre Europe, Rennes, France.Pirovano, AlainEcole Nationale de l’Aviation Civile, Toulouse, France.Plass, SimonDtsch. Zentrum für Luft- und Raumfahrt, Oberpfaffenhofen, Germany.Scopigno, RiccardoIstituto Superiore Mario Boella, Turin, Italy.Aniss, HasnaaIFSTTAR, Versailles, France.
    Communication Technologies for Vehicles: 10th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2016, San Sebastián, Spain, June 6-7, 2016, Proceedings2016Konferanseproceedings (Fagfellevurdert)
  • 274.
    Moggi, E.
    et al.
    DIBRIS, Genova Univ., v. Dodecaneso 35, Genova, 16146, Italy.
    Farjudian, A.
    University of Nottingham Ningbo, China.
    Duracz, Adam
    Rice University, Houston, TX, United States.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Safe & robust reachability analysis of hybrid systems2018Inngår i: Theoretical Computer Science, ISSN 0304-3975, E-ISSN 1879-2294, Vol. 747, s. 75-99Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Hybrid systems—more precisely, their mathematical models—can exhibit behaviors, like Zeno behaviors, that are absent in purely discrete or purely continuous systems. First, we observe that, in this context, the usual definition of reachability—namely, the reflexive and transitive closure of a transition relation—can be unsafe, i.e., it may compute a proper subset of the set of states reachable in finite time from a set of initial states. Therefore, we propose safe reachability, which always computes a superset of the set of reachable states. Second, in safety analysis of hybrid and continuous systems, it is important to ensure that a reachability analysis is also robust w.r.t. small perturbations to the set of initial states and to the system itself, since discrepancies between a system and its mathematical models are unavoidable. We show that, under certain conditions, the best Scott continuous approximation of an analysis A is also its best robust approximation. Finally, we exemplify the gap between the set of reachable states and the supersets computed by safe reachability and its best robust approximation. © 2018 The Authors

  • 275.
    Moggi, E.
    et al.
    DIBRIS, Genova Univ., Genova, Italy.
    Farjudian, A.
    Univ. of Nottingham, Ningbo, China.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    System analysis and robustness2019Inngår i: CEUR Workshop Proceedings: Volume 2504, CEUR-WS , 2019, s. 1-7Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Software is increasingly embedded in a variety of physical contexts. This imposes new requirements on tools that support the design and analysis of systems. For instance, modeling embedded and cyberphysical systems needs to blend discrete mathematics, which is suitable for modeling digital components, with continuous mathematics, used for modeling physical components. This blending of continuous and discrete creates challenges that are absent when the discrete or the continuous setting are considered in isolation. We consider robustness, that is, the ability of an analysis of a model to cope with small amounts of imprecision in the model. Formally, we identify analyses with monotonic maps between complete lattices (a mathematical framework used for abstract interpretation and static analysis) and define robustness for monotonic maps between complete lattices of closed subsets of a metric space. Copyright © 2019 for this paper by its authors.

  • 276.
    Moggi, Eugenio
    et al.
    DIBRIS - Department of Computer Science, Bioengineering, Robotics and Systems Engineering, Genova University, Genova, Italy.
    Amin, Farjudian
    University of Nottingham, Ningbo, China.
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    System Analysis and Robustness2019Inngår i: Models, Mindsets, Meta: The What, the How, and the Why Not?: Essays Dedicated to Bernhard Steffen on the Occasion of His 60th Birthday / [ed] Tiziana Margaria, Susanne Graf & Kim G. Larsen, Cham: Springer, 2019, s. 36-44Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Software is increasingly embedded in a variety of physical contexts. This imposes new requirements on tools that support the design and analysis of systems. For instance, modeling embedded and cyber-physical systems needs to blend discrete mathematics, which is suitable for modeling digital components, with continuous mathematics, used for modeling physical components. This blending of continuous and discrete creates challenges that are absent when the discrete or the continuous setting are considered in isolation. We consider robustness, that is, the ability of an analysis of a model to cope with small amounts of imprecision in the model. Formally, we identify analyses with monotonic maps between complete lattices (a mathematical framework used for abstract interpretation and static analysis) and define robustness for monotonic maps between complete lattices of closed subsets of a metric space. © Springer Nature Switzerland AG 2019

  • 277.
    Mohaqeqi, Morteza
    et al.
    Department of Information Technology, Uppsala University, Uppsala, Sweden.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Sound Test-Suites for Cyber-Physical Systems2016Inngår i: Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering (TASE 2016), Piscataway: IEEE Computer Society, 2016, s. 42-48, artikkel-id 7541884Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Conformance testing is a formal and structured approach to verifying system correctness. We propose a conformance testing algorithm for cyber-physical systems, based on the notion of hybrid conformance by Abbas and Fainekos. We show how the dynamics of system specification and the sampling rate play an essential role in making sound verdicts. We specify and prove error bounds that lead to sound test-suites for a given specification and a given sampling rate. © 2016 IEEE.

    Fulltekst (pdf)
    fulltext
  • 278.
    Mohaqeqi, Morteza
    et al.
    Uppsala University, Uppsala, Sweden.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Towards an Approximate Conformance Relation for Hybrid I/O Automata2016Inngår i: Proceedings of the The First Workshop on Verification and Validation of Cyber-Physical Systems / [ed] Mehdi Kargahi & Ashutosh Trivedi, Sydney: Open Publishing Association , 2016, Vol. 232, s. 53-64Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Several notions of conformance have been proposed for checking the behavior of cyber-physical systems against their hybrid systems models. In this paper, we explore the initial idea of a notion of approximate conformance that allows for comparison of both observable discrete actions and (sampled) continuous trajectories. As such, this notion will consolidate two earlier notions, namely the notion of Hybrid Input-Output Conformance (HIOCO) by M. van Osch and the notion of Hybrid Conformance by H. Abbas and G.E. Fainekos. We prove that our proposed notion of conformance satisfies a semi-transitivity property, which makes it suitable for a step-wise proof of conformance or refinement.

    Fulltekst (pdf)
    fulltext
  • 279.
    Mohaqeqi, Morteza
    et al.
    School of Electrical and Computer Engineering, University of Tehran, Tehran, Iran.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Taha, Walid
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Rice University, Houston, Texas, USA.
    Conformance Testing of Cyber-Physical Systems: A Comparative Study2014Inngår i: Proceedings of the 14th International Workshop on Automated Verification of Critical Systems (AVoCS 2014) / [ed] Marieke Huisman, Jaco van de Pol, Tiziana Margaria, Julia Padberg & Gabriele Taentzer, Berlin: European Association of Software Science and Technology , 2014Konferansepaper (Fagfellevurdert)
    Abstract [en]

    For systematic and automatic testing of cyber-physical systems, in which a set of test cases is generated based on a formal specification, a number of notions of conformance testing have been proposed. In this paper, we review two existing theories of conformance testing for cyber-physical systems and compare them. We point out their fundamental differences, and prove under which assumptions they coincide.

    Fulltekst (pdf)
    fulltext
  • 280.
    Molchanov, Pavlo
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Tampere University of Technology, Tampere, Finland.
    Astola, Jaakko
    Tampere University of Technology, Tampere, Finland.
    Egiazarian, Karen
    Tampere University of Technology, Tampere, Finland.
    Radar frequency band invariant pedestrian classification2013Inngår i: International Radar Symposium, IRS 2013: Proceedings, Volume II / [ed] Hermann Rohling, Göttingen, Germany: Cuvillier Verlag, 2013, s. 740-745Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The problem of pedestrian classification by radars with different operating bands is considered. The proposed solutions are based on two observations of relation between Doppler spectrums collected within different frequency bands. According to the first observation the Doppler spectrum obtained from the radars with lower operating frequency is an approximate scaled version of the Doppler spectrum obtained within radar with higher operating frequency. According to the second observation the Doppler spectrum of lower operating frequency is similar to the Doppler spectrum of higher operating frequency at specific aspect angle. Two new approaches are proposed for pedestrian classification based on the observations. The first proposed approach deals with new features called local binary mask. The second approach is based on higher order spectral invariants estimated from the Doppler spectrum. The approaches are tested on real 24 GHz radar measurements and simulated 77 GHz radar measurements and show the robustness to operating frequency of the radar. © 2013 German Inst of Navigation.

  • 281.
    Monaghan, Thomas
    et al.
    Ministry of Defence Abbey Wood, Bristol, United Kingdom.
    Harding, Matthew J.
    School of Chemical and Bioprocess Engineering, University College Dublin, Dublin, Ireland.
    Christie, Steven D. R.
    Department of Chemistry, Loughborough University, Loughborough, United Kingdom.
    Friel, R. J.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    In-situ time resolved spectrographic measurement using an additively manufactured metallic micro-fluidic analysis platform2019Inngår i: PLoS ONE, ISSN 1932-6203, E-ISSN 1932-6203, Vol. 14, nr 11, artikkel-id e0224492Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Introduction

    Microfluidic reactionware allows small volumes of reagents to be utilized for highly controlled flow chemistry applications. By integrating these microreactors with onboard analytical systems, the devices change from passive ones to active ones, increasing their functionality and usefulness. A pressing application for these active microreactors is the monitoring of reaction progress and intermediaries with respect to time, shedding light on important information about these real-time synthetic processes.

    Objective

    In this multi-disciplinary study the objective was to utilise advanced digital fabrication to research metallic, active microreactors with integrated fibre optics for reaction progress monitoring of solvent based liquids, incompatible with previously researched polymer devices, in combination with on-board Ultraviolet-visible spectroscopy for real-time reaction monitoring.

    Method

    A solid-state, metal-based additive manufactured system (Ultrasonic Additive Manufacturing) combined with focussed ion beam milling, that permitted the accurate embedment of delicate sensory elements directly at the point of need within aluminium layers, was researched as a method to create active, metallic, flow reactors with on-board sensing. This outcome was then used to characterise and correctly identify concentrations of UV-active water-soluble B-vitamin nicotinamide and fluorescein. A dilution series was formed from 0.01–1.75 mM; which was pumped through the research device and monitored using UV-vis spectroscopy.

    Results

    The results uniquely showed the in-situ ion milling of ultrasonically embedded optical fibres resulted in a metallic microfluidic reaction and monitoring device capable of measuring solvent solutions from 18 μM to 18 mM of nicotinamide and fluorescein, in real time. This level of accuracy highlights that the researched device and methods are capable of real-time spectrographic analysis of a range of chemical reactions outside of those possible with polymer devices.

    Fulltekst (pdf)
    fulltext
  • 282. Mors, Niklas
    et al.
    Pettersson, Anders
    Jonsson, Magnus
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    A Ethernet based Metropolitan Area Open Access Architecture2003Inngår i: IASTED International Multi-Conference on Applied Informatics: Volume 21, IASTED/ACTA Press , 2003, s. 571-576Konferansepaper (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    Quality of Service (QoS) has become increasingly important in metropolitan area networks and even more important in open access networks where service providers should be able to offer their services on equal terms. This paper present a network architecture with a hierarchical star-mesh topology, which provides the scalability and redundancy required for future open access networks. To support QoS a combination of Ethernet and Multiprotocol Label Switching (MPLS) is proposed. With the use of a switch, on the highest level, based on micro electromechanical system (MEMS) technology this proposed architecture could reach aggregated bitrates above 10 Tbit/s. IPSec is proposed for solving the security issues in the network that emerges when different service providers share the same network and future applications are developed.

  • 283.
    Mostowski, Wojciech
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). University of Twente, Enschede, The Netherlands.
    Dynamic Frames Based Verification Method for Concurrent Java Programs2016Inngår i: Verified Software: Theories, Tools, and Experiments: 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Revised Selected Papers / [ed] Arie Gurfinkel & Sanjit A. Seshia, New York: Springer International Publishing Switzerland , 2016, Vol. 9593, s. 124-141Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper we discuss a verification method for concurrent Java programs based on the concept of dynamic frames. We build on our earlier work that proposes a new, symbolic permission system for concurrent reasoning and we provide the following new contributions. First, we describe our approach for proving program specifications to be self-framed w.r.t. permissions, which is a necessary condition to maintain soundness in concurrent reasoning. Second, we show how we use predicates to provide modular and reusable specifications for program synchronisation points, like locks or forked threads. Our work primarily targets the KeY verification system with its specification language JML* and symbolic execution proving method. Hence, we also give the current status of the work on implementation and we discuss some examples that are verifiable with KeY. © Springer International Publishing Switzerland 2016

    Fulltekst (pdf)
    fulltext
  • 284.
    Mostowski, Wojciech
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Model-based fault injection for testing gray-box systems2019Inngår i: The Journal of logical and algebraic methods in programming, ISSN 2352-2208, E-ISSN 2352-2216, Vol. 103, s. 31-45Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Motivated by applications in the automotive domain, particularly the Autosar basic software standard, we present a technique to improve model-based testing by allowing model-level fault injections. These models are plugged into a larger system as executable components to test it for general tolerance to slightly varying, possibly faulty components or library implementations. Such model execution is possible through applying an automated mocking mechanism and model cross-referencing. Systematic modelling and testing is possible by having comprehensive fault models which both simulate faults and guide the model-based testing procedure towards quicker discovery of these faults. We show the principles of our method on an illustrative example and discuss how it is implemented in a commercial model-based testing tool QuickCheck and applied to a more realistic case study. More generally, this work explores multi-purpose (or meta) modelling – an approach where one parametric model is used for different test targets, like functional testing or safety testing.

    Fulltekst (pdf)
    fulltext
  • 285.
    Mostowski, Wojciech
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Verifying Java Card Programs2016Inngår i: Deductive Software Verification – The KeY Book: From Theory to Practice / [ed] Wolfgang Ahrendt, Bernhard Beckert, Richard Bubel, Reiner Hähnle, Peter H. Schmitt & Mattias Ulbrich, Heidelberg: Springer, 2016, s. 353-380Kapittel i bok, del av antologi (Annet vitenskapelig)
    Abstract [en]

    This chapter presents the extension of KeY and JavaDL to handle a particular and peculiar dialect of Java, namely Java Card, for programming smart cards. The necessary extensions to the logic and the specification language are discussed, followed by a number of small case studies. The chapter is concluded with applications of the ideas presented here to on-going and future research, in particular in reasoning about concurrent Java programs. © Springer International Publishing AG 2016

  • 286.
    Mostowski, Wojciech
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Arts, Thomas
    QuviQ AB, Göteborg, Sweden.
    Hughes, John
    Chalmers University of Technology, Göteborg, Sweden & QuviQ AB, Göteborg, Sweden.
    Modelling of Autosar Libraries for Large Scale Testing2017Inngår i: 2nd Workshop on Models for Formal Analysis of Real Systems (MARS 2017) / [ed] Holger Hermanns & Peter Höfner, 2017, Vol. 244, s. 184-199Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We demonstrate a specific method and technology for model-based testing of large software projects with the QuickCheck tool using property-based specifications. Our specifications are very precise, state-full models of the software under test (SUT). In our approach we define (a) formal descriptions of valid function call sequences (public API), (b) postconditions that check the validity of each call, and (c) call-out specifications that define and validate external system interactions (SUT calling external API). The QuickCheck tool automatically generates and executes tests from these specifications. Commercially, this method and tool have been used to test large parts of the industrially developed automotive libraries based on the Autosar standard. In this paper, we exemplify our approach with a circular buffer specified by Autosar, to demonstrate the capabilities of the model-based testing method of QuickCheck. Our example is small compared to the commercial QuickCheck models, but faithfully addresses many of the same challenges. © W. Mostowski, T. Arts, J. Hughes.

    Fulltekst (pdf)
    fulltext
  • 287.
    Mostowski, Wojciech
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ulbrich, Mattias
    Karlsruhe Institute of Technology, Karlsruhe, Germany.
    Dynamic Dispatch for Method Contracts Through Abstract Predicates2016Inngår i: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 9800, s. 238-267Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Dynamic method dispatch is a core feature of object-oriented programming by which the executed implementation for a polymorphic method is only chosen at runtime. In this paper, we present a specification and verification methodology which extends the concept of dynamic dispatch to design-by-contract specifications.

    The formal specification language JML has only rudimentary means for polymorphic abstraction in expressions. We promote these to fully flexible specification-only query methods called model methods that can, like ordinary methods, be overridden to give specifications a new semantics in subclasses in a transparent and modular fashion. Moreover, we allow them to refer to more than one program state which give us the possibility to fully abstract and encapsulate two-state specification contexts, i.e., history constraints and method postconditions. Finally, we provide an elegant and flexible mechanism to specify restrictions on specifications in subtypes. Thus behavioural subtyping can be enforced, yet it still allows for other specification paradigms.

    We provide the semantics for model methods by giving a translation into a first order logic and according proof obligations. We fully implemented this framework in the KeY program verifier and successfully verified relevant examples. We have also implemented an extension to KeY to support permission-based verification of concurrent Java programs. In this context model methods provide a modular specification method to treat code synchronisation through API methods. © The Author(s) 2016.

  • 288.
    Motter, P.
    et al.
    Department of Electrical Engineering Federal University of Rio Grande do Sul Porto Alegre, Brazil.
    Allgayer, R. S.
    Department of Electrical Engineering Federal University of Rio Grande do Sul Porto Alegre, Brazil.
    Muller, I.
    Department of Electrical Engineering Federal University of Rio Grande do Sul Porto Alegre, Brazil.
    Pereira, C. E.
    Pignaton de Freitas, Edison
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Practical issues in Wireless Sensor Network localization systems using received signal strength indication2011Inngår i: Sensors Applications Symposium (SAS), 2011 IEEE, New York: IEEE Computer Society , 2011, s. 227-232Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    The emergence of Wireless Sensor Networks brought many benefits in different application domains such as collaborative tasks, lower costs, equipment's autonomy and higher tolerance to failures. These advantages made the number of applications that use this kind of network grow in the past few years. Meanwhile, the possibility of employing these systems to trace the movement of an object, which can be part of the network itself, is of great utility. The present work aims at the study and development of a localization system of mobile nodes for Wireless Sensor Networks. Different methods to obtain the distances between network nodes are studied and received signal strength algorithms are developed to synthesize the data and to show the location of the nodes. Finally, simulations and experiments are presented in order to analyze the viability of the developed proposal.

  • 289.
    Mousavi, Mohammad Reza
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). University of Leicester, Leicester, United Kingdom.
    Combining Epistemic and Operational Aspects in Compositional Verification of Protocols2017Inngår i: EPTCS 259: Proceedings 2nd International Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies. Uppsala, Sweden, 29th April 2017 / [ed] Alex Groce & Stefan Leue, Sydney: Open Publishing Association , 2017, Vol. 259, nr 259Konferansepaper (Fagfellevurdert)
  • 290.
    Mousavi, Mohammad Reza
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Pang, Jun
    Faculty of Science, Technology and Communication, University of Luxembourg.
    Special issue: Software verification and testing2013Inngår i: Innovations in Systems and Software Engineering, ISSN 1614-5046, Vol. 9, nr 2, s. 57-58Artikkel i tidsskrift (Fagfellevurdert)
  • 291.
    Mousavi, Mohammad Reza
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Pang, Jun
    University of Luxembourg, Luxembourg, Luxembourg.
    Special section on Software Verification and Testing2014Inngår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 95, Part 3, s. 273-274Artikkel i tidsskrift (Annet vitenskapelig)
  • 292.
    Mousavi, Mohammad Reza
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Ravara, Antonio
    Department of Informatics, Faculty of Sciences and Technology, New University of Lisbon, Portugal.
    Foreword: Special issue on the 10th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2011)2014Inngår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 89, s. 68s. 1-1Artikkel i tidsskrift (Annet vitenskapelig)
  • 293.
    Mousavi, Mohammad Reza
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Univ Leicester, Leicester, United Kingdom.
    van Glabbeek, Rob
    CSIRO, Sydney, NSW, Australia.
    Dubslaff, Clemens
    Baier, Christel
    Bruni, Roberto
    Melgratti, Hernan
    Montanari, Ugo
    Proceedings Combined 24th International Workshop on Expressiveness in Concurrency and 14th Workshop on Structural Operational Semantics Berlin, Germany, 4th September 2017: Preface2017Inngår i: Electronic Proceedings in Theoretical Computer Science, ISSN 2075-2180, E-ISSN 2075-2180, nr 255Artikkel i tidsskrift (Annet vitenskapelig)
  • 294.
    Mousavi, Mohammad Reza
    et al.
    University of Leicester, Leicester, England.
    Varshosaz, Mahsa
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Telling Lies in Process Algebra2018Inngår i: Proceedings. 2018 12th International Symposium on Theoretical Aspects of Software Engineering: TASE 2018. Guangzhou, China. 29-31 August 2018, Guangzhou: Institute of Electrical and Electronics Engineers (IEEE), 2018, s. 116-123Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Epistemic logic is a powerful formalism for reasoning about communication protocols, particularly in the setting with dishonest agents and lies. Operational frameworks such as algebraic process calculi, on the other hand, are powerful formalisms for specifying the narrations of communication protocols. We bridge these two powerful formalisms by presenting a process calculus in which lies can be told. A lie in our framework is a communicated message that is pretended to be a different message (or nothing at all). In our formalism, we focus on what credulous rational agents can infer about a particular run if they know the protocol beforehand. We express the epistemic properties of such specifications in a rich extension of modal mu-calculus with the belief modality and define the semantics of our operational models in the semantic domain of our logic. We formulate and prove criteria that guarantee belief consistency for credulous agents. ©2018 IEEE

  • 295.
    Müller, Ivan
    et al.
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Cavalcante, André
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil & Electronics and Telecommunication Department, Federal University of Amazonas, Brazil.
    Pignaton de Freitas, Edison
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Allgayer, Rodrigo
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil.
    Pereira, Carlos
    Electrical Engineering Department, Federal University of Rio Grande do Sul, Brazil & Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Larsson, Tony
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Evaluation of RTSJ-Based Distributed Control System2011Inngår i: Smart Spaces and Next Generation Wired/Wireless Networking / [ed] Baladin, S Koucheryavy, Y & Hu, H, Heidelberg: Springer Berlin/Heidelberg, 2011, Vol. 6869, s. 295-303Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper an analysis of a distributed control system based on Java is presented. A classical PID controlled system is implemented simulating each part of a real control system running in different computers connected to a local area network. The communication message time periods and their jitter are measured running the system in different computer environments and the results are presented and discussed at the end. Real time specification for Java is used in the implemented software and the results are compared to other implementations. © Springer-Verlag Berlin Heidelberg 2011.

  • 296.
    Nelson, Christian
    et al.
    Lund University, Lund, Sweden.
    Lyamin, Nikita
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Gustafson, Carl
    Lund University, Lund, Sweden.
    Tufvesson, Fredrik
    Lund University, Lund, Sweden.
    Geometry Based Channel Models with Cross- and Autocorrelation for Vehicular Network Simulations2018Inngår i: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Piscataway, NJ: IEEE, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Realistic network simulations are necessary to assess the performance of any communication system. In this paper, we describe an implementation of a channel model for vehicle-to-vehicle (V2V) communication in the OMNeT++/Plexe simulation environment. The model is based on previous extensive measurements in a V2V multilink highway scenario and cover line-of-sight (LOS) as well as obstructed LOS (OLOS) scenarios, which occurs when one or more vehicles obstruct the LOS component. The implementation captures both the temporal autocorrelation and the joint multilink cross-correlation processes to achieve a realistic behavior. Preliminary results show that the implementation now generates stochastic large-scale fading with an autocorrelation function that agrees well with measured data. A representation of the cross-correlation process is now implemented through proper channel model selection since the geometry and location of objects are known in Plexe. We also show the impact of the suggested V2V physical layer (PHY) on the performance evaluation results observed at the facilities layer. As a metric, we use the data age, which is a measure how old the information about a vehicle is. When considering the autocorrelation in simulations, the experienced data-age increases. Examples show an increase of the 10% percentile data-age from 0.1s to 1.5s, which may affect the application performance significantly in critical situations. © 2018 IEEE.

  • 297.
    Ng, Robin
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Efficient Implementation of Histogram Dimension Reduction using Deep Learning: The project focuses on implementing deep learning algorithms on the state of the art Nvidia Drive PX GPU platform to achieve high performance.2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Fulltekst (pdf)
    fulltext
  • 298.
    Ni, Yuanzhi
    et al.
    School of Internet of Things Engineering, Jiangnan University, Wuxi, China.
    Cai, Lin
    Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada.
    He, Jianping
    Department of Automation, Shanghai Jiao Tong University, Shanghai, China.
    Vinel, Alexey
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES). Department of Electrical Engineering, Western Norway University of Applied Sciences, Bergen, Norway.
    Li, Yue
    Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada.
    Mosavat-Jahromi, Hamed
    Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada.
    Pan, Jianping
    Department of Computer Science, University of Victoria, Victoria, Canada.
    Toward Reliable and Scalable Internet-of-Vehicles: Performance Analysis and Resource Management2020Inngår i: Proceedings of the IEEE, ISSN 0018-9219, E-ISSN 1558-2256, Vol. 108, nr 2, s. 324-340Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Reliable and scalable wireless transmissions for Internet-of-Vehicles (IoV) are technically challenging. Each vehicle, from driver-assisted to automated one, will generate a flood of information, up to thousands of times of that by a person. Vehicle density may change drastically over time and location. Emergency messages and real-time cooperative control messages have stringent delay constraints while infotainment applications may tolerate a certain degree of latency. On a congested road, thousands of vehicles need to exchange information badly, only to find that service is limited due to the scarcity of wireless spectrum. Considering the service requirements of heterogeneous IoV applications, service guarantee relies on an in-depth understanding of network performance and innovations in wireless resource management leveraging the mobility of vehicles, which are addressed in this article. For single-hop transmissions, we study and compare the performance of vehicle-to-vehicle (V2V) beacon broadcasting using random access-based (IEEE 802.11p) and resource allocation-based (cellular vehicle-to-everything) protocols, and the enhancement strategies using distributed congestion control. For messages propagated in IoV using multihop V2V relay transmissions, the fundamental network connectivity property of 1-D and 2-D roads is given. To have a message delivered farther away in a sparse, disconnected V2V network, vehicles can carry and forward the message, with the help of infrastructure if possible. The optimal locations to deploy different types of roadside infrastructures, including storage-only devices and roadside units with Internet connections, are analyzed. © 2019 IEEE

  • 299.
    Nilsson, Björn
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bengtsson, Lars
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Svensson, Bertil
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    A snoozing frequency binary tree protocol2010Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper we describe and evaluate anenhanced version of an active RFID wake-up and tag IDextraction radio communication protocol. The enhancedprotocol further reduces the transponders’ power consumption(prolonging their battery lifetime). The protocol uses afrequency binary tree method for extracting the identificationnumber of each transponder. This protocol is enhanced byextending it with a framed slotted medium access controlmethod which decreases the number of activations of eachtransponder during tag ID extractions. Using this medium accessmethod, the average number of transponder activations isdecreased with a factor of 2.5 compared to the original protocol.The resulting increase in ID read-out delay is 0.9%, on average.

    Fulltekst (pdf)
    FULLTEXT01
  • 300.
    Nilsson, Björn
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Bengtsson, Lars
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Svensson, Bertil
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    An application dependent medium access protocol for active RFID using dynamic tuning of the back-off algorithm2009Inngår i: Proceedings of the 2009 IEEE International Conference on RFID (RFID 2009), Piscataway, N.J.: IEEE Press, 2009, s. 72-79Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Active Radio Frequency Identification (A-RFID) is a technology where the tags (transponders) carry an on-board energy source for powering the radio, processor circuits, and sensors. Besides offering longer working distance between RFID reader and tag than passive RFID, this also enables the tags to do sensor measurements, calculations and storage even when no RFID-reader is in the vicinity of the tags. In this paper we introduce a medium access data communication protocol which dynamically adjusts its back-off algorithm to best suit the actual active RFID application at hand. Based on a simulation study of the effect on tag energy cost, readout delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) A-RFID protocol, we conclude that, by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We also present specific guidelines on how parameters should be selected under various application constraints (viz. maximum readout delay; and the number of tags passing).

    Fulltekst (pdf)
    fulltext
3456789 251 - 300 of 484
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf