SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "db:Swepub ;conttype:(scientificother);lar1:(kth)"

Sökning: db:Swepub > Övrigt vetenskapligt/konstnärligt > Kungliga Tekniska Högskolan

  • Resultat 31-40 av 27865
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
31.
  • Abarca, R. R. M., et al. (författare)
  • Metals toxic pollutants in the environment : Anthropogenic and geological causes and remediation
  • 2019
  • Ingår i: Current Trends and Future Developments on (Bio-) Membranes: Membranes in Environmental Applications. - : Elsevier Inc.. ; , s. 109-124
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Heavy metals are naturally present in nature, but if their concentration is higher than the normal accepted threshold levels, they constitute one of the pollutants that is more difficult to remove and also to rehabilitate the contaminated site by them. There are many heavy-metal pollutants-the most common among them are arsenic (As), chromium (Cr), lead (Pb), mercury (Hg), cadmium (Cd), cobalt (Co), copper (Cu), iron (Fe), magnesium (Mg), manganese (Mn), molybdenum (Mo), nickel (Ni), selenium (Se), and zinc (Zn), along with the less common ones, which produced, for example, by the nuclear process, such as uranium (U)-in different configuration; hence, many possibilities of contamination in the world exist, and they are more difficult to remove.Thus heavy-metal pollution is more and more becoming one of the principal issues of the global interest, because it is common to both industrialized countries and developing countries. These issues are getting hard to be recognized and cannot be followed the simple rules concerning safety and environmental protection, thus fall into the same errors of the already industrialized countries. At the same time, new environment-remediation techniques are developed in the last decade, especially, in these last years. Some of these technologies concern physical or chemical process or effects, such as ion exchanges, flotations, and photocatalysis, while other technologies concern the use of membrane process, especially ultrafiltration or membrane integrated process or hybrid systems, where membranes are generally submerged and used together with another process.In this chapter a review of this problem and some example of technologies for removing and remediation of the environment are reported. 
  •  
32.
  • Abas, Riad Abdul (författare)
  • Property measurements towards understanding process phenomena
  • 2005
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The main objective of this industrially important work was to gain an increasing understanding of the properties of materials such as CMSX-4 nickel base super alloy, mould powder used in continuous casting of steel and coke used in blast furnace, with special reference to the thermal diffusivities. The measurements were carried out in a wide temperature range, solid, liquid, glassy and crystalline states. For CMSX-4 alloy, the thermal conductivities were calculated from the experimental thermal diffusivities. Both the diffusivities and conductivities were found to increase with increasing temperature. Microscopic analysis showed the presence of intermetallic phases such as NiTi and NiTi2 below 1253 K. In this region, the mean free path of the phonons is likely to be limited by scattering against lattice defects. Between 1253 K and solidus temperature, these phases dissolved in the alloy adding to the impurities in the matrix, which, in turn, caused a decrease in the thermal diffusivity. This effect was confirmed by annealing the samples at 1573 K. The thermal diffusivities of the annealed samples measured at 1277, 1403 and 1531 K were found to be lower than the thermal diffusivities of non-annealed samples and the values did not show any noticeable change with time. It could be related to the attainment of equilibrium with the completion of the dissolution of γ and γ´ phases during the annealing process. Liquid CMSX-4 does not show any change of thermal diffusivity with temperature. It may be attributed to the decreasing the mean free path being shorter than characteristic distance between two neighbouring atoms. On the other hand thermal diffusivities of mould powder having glassy and crystalline states decrease with increasing temperature at lower temperature and are constant at higher temperature except for one glassy sample. Analogously, the thermal diffusivity measurements of mould powder did not show any significant change with temperature in liquid state. It is likely to be due to the silicate network being largely broken down. The thermal diffusivity is increased with increasing crystallisation degree of mould powder, which is expected from theoretical considerations. The coke sample, taken from deeper level of the blast furnace, is found to have larger thermal diffusivity. This could be correlated to the average crystallite size along the structural c-axis, Lc, which is indicative of the higher degree of graphitisation. This was also confirmed by XRD measurements of the different coke samples. The degree of graphitisation was found to increase with increasing temperature. Further, XRD measurements of coke samples taken from different levels in the shaft of the blast furnace show that the graphitisation of coke was instantaneous between room temperature and 1473 K.
  •  
33.
  • Abasahl, B., et al. (författare)
  • Towards Low-Power Reconfigurable Photonic ICs Based on MEMS Technology
  • 2018
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • With the progress and industrialization of photonic integrated circuits (PIC) in the past few decades, there is a strong urge towards design and prototyping in a fast, low-cost and reliable manner. In electronics, this demand is met through field programmable gate arrays (FPGA). In the Horizon 2020 MORPHIC (MEMS-based zerO-power Reconfigurable Photonic ICs) project, we are developing a reconfigurable PIC platform to address this demand in the field of photonics and to facilitate the path from idea towards realization for PIC designers and manufacturers.
  •  
34.
  •  
35.
  • Abbas, Haider, 1979- (författare)
  • Options-Based Security-Oriented Framework for Addressing Uncerainty Issues in IT Security
  • 2010
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Continuous development and innovation in Information Technology introduces novel configuration methods, software development tools and hardware components. This steady state of flux is very desirable as it improves productivity and the overall quality of life in societies. However, the same phenomenon also gives rise to unseen threats, vulnerabilities and security concerns that are becoming more critical with the passage of time. As an implication, technological progress strongly impacts organizations’ existing information security methods, policies and techniques, making obsolete existing security measures and mandating reevaluation, which results in an uncertain IT infrastructure. In order to address these critical concerns, an options-based reasoning borrowed from corporate finance is proposed and adapted for evaluation of security architecture and decision- making to handle them at organizational level. Options theory has provided significant guidance for uncertainty management in several domains, such as Oil & Gas, government R&D and IT security investment projects. We have applied options valuation technique in a different context to formalize optimal solutions in uncertain situations for three specific and identified uncertainty issues in IT security. In the research process, we formulated an adaptation model for expressing options theory in terms useful for IT security which provided knowledge to formulate and propose a framework for addressing uncertainty issues in information security. To validate the efficacy of this proposed framework, we have applied this approach to the SHS (Spridnings- och Hämtningssystem) and ESAM (E-Society) systems used in Sweden. As an ultimate objective of this research, we intend to develop a solution that is amenable to automation for the three main problem areas caused by technological uncertainty in information security: i) dynamically changing security requirements, ii) externalities caused by a security system, iii) obsoleteness of evaluation. The framework is general and capable of dealing with other uncertainty management issues and their solutions, but in this work we primarily deal with the three aforementioned uncertainty problems. The thesis presents an in-depth background and analysis study for a proposed options-based security-oriented framework with case studies for SHS and ESAM systems. It has also been assured that the framework formulation follows the guidelines from industry best practices criteria/metrics. We have also proposed how the whole process can be automated as the next step in development.
  •  
36.
  •  
37.
  • Abbas, Zainab (författare)
  • Scalable Streaming Graph and Time Series Analysis Using Partitioning and Machine Learning
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Recent years have witnessed a massive increase in the amount of data generated by the Internet of Things (IoT) and social media. Processing huge amounts of this data poses non-trivial challenges in terms of the hardware and performance requirements of modern-day applications. The data we are dealing with today is of massive scale, high intensity and comes in various forms. MapReduce was a popular and clever choice of handling big data using a distributed programming model, which made the processing of huge volumes of data possible using clusters of commodity machines. However, MapReduce was not a good fit for performing complex tasks, such as graph processing, iterative programs and machine learning. Modern data processing frameworks, that are being popularly used to process complex data and perform complex analysis tasks, overcome the shortcomings of MapReduce. Some of these popular frameworks include Apache Spark for batch and stream processing, Apache Flink for stream processing and Tensor Flow for machine learning.In this thesis, we deal with complex analytics on data modeled as time series, graphs and streams. Time series are commonly used to represent temporal data generated by IoT sensors. Analysing and forecasting time series, i.e. extracting useful characteristics and statistics of data and predicting data, is useful for many fields that include, neuro-physiology, economics, environmental studies, transportation, etc. Another useful data representation we work with, are graphs. Graphs are complex data structures used to represent relational data in the form of vertices and edges. Graphs are present in various application domains, such as recommendation systems, road traffic analytics, web analysis, social media analysis. Due to the increasing size of graph data, a single machine is often not sufficient to process the complete graph. Therefore, the computation, as well as the data, must be distributed. Graph partitioning, the process of dividing graphs into subgraphs, is an essential step in distributed graph processing of large scale graphs because it enables parallel and distributed processing.The majority of data generated from IoT and social media originates as a continuous stream, such as series of events from a social media network, time series generated from sensors, financial transactions, etc. The stream processing paradigm refers to the processing of data streaming that is continuous and possibly unbounded. Combining both graphs and streams leads to an interesting and rather challenging domain of streaming graph analytics. Graph streams refer to data that is modelled as a stream of edges or vertices with adjacency lists representing relations between entities of continuously evolving data generated by a single or multiple data sources. Streaming graph analytics is an emerging research field with great potential due to its capabilities of processing large graph streams with limited amounts of memory and low latency. In this dissertation, we present graph partitioning techniques for scalable streaming graph and time series analysis. First, we present and evaluate the use of data partitioning to enable data parallelism in order to address the challenge of scale in large spatial time series forecasting. We propose a graph partitioning technique for large scale spatial time series forecasting of road traffic as a use-case. Our experimental results on traffic density prediction for real-world sensor dataset using Long Short-Term Memory Neural Networks show that the partitioning-based models take 12x lower training time when run in parallel compared to the unpartitioned model of the entire road infrastructure. Furthermore, the partitioning-based models have 2x lower prediction error (RMSE) compared to the entire road model. Second, we showcase the practical usefulness of streaming graph analytics for large spatial time series analysis with the real-world task of traffic jam detection and reduction. We propose to apply streaming graph analytics by performing useful analytics on traffic data stream at scale with high throughput and low latency. Third, we study, evaluate, and compare the existing state-of-the-art streaming graph partitioning algorithms. We propose a uniform analysis framework built using Apache Flink to evaluate and compare partitioning features and characteristics of streaming graph partitioning methods. Finally, we present GCNSplit, a novel ML-driven streaming graph partitioning solution, that uses a small and constant in-memory state (bounded state) to partition (possibly unbounded) graph streams. Our results demonstrate that \ours provides high-throughput partitioning and can leverage data parallelism to sustain input rates of 100K edges/s. GCNSplit exhibits a partitioning quality, in terms of graph cuts and load balance, that matches that of the state-of-the-art HDRF (High Degree Replicated First) algorithm while storing three orders of magnitude smaller partitioning state.
  •  
38.
  • Abbasalizadeh, A., et al. (författare)
  • Rare Earth Extraction from NdFeB Magnets and Rare Earth Oxides Using Aluminum Chloride/Fluoride Molten Salts
  • 2015
  • Ingår i: Rare Earths Industry. - : Elsevier. - 9780128023280 ; , s. 357-373
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In the current research, the feasibility of the recovery of neodymium and dysprosium from spent NdFeB magnets (about 6wt% Dy) was investigated using molten salt processes. The salt bath consisted of a eutectic composition of an NaCl-KCl-LiCl mixture. To enable the efficient dissolution of metal in the molten salt phase, AlCl3 was used as a chlorinating agent. Iron-free electrodeposition was carried out successfully. Energy-dispersive spectroscopic analysis of the electrodeposit revealed that co-deposition of the dysprosium occurs along with neodymium at the cathode. The process shows that this method is well suited for recovering rare earth metals from magnetic scrap containing these metals.Furthermore, the setup design for recovery of neodymium and dysprosium from their oxides was investigated with regard to previous studies on the neodymium magnets. The stability of different fluoride and chloride salts was studied by means of thermodynamic calculation. Aluminum fluoride-based molten salt systems were studied in detail as the electrolyte for electrochemical extraction of rare earth oxides into rare earth metal elements with Al.
  •  
39.
  • Abbasi, Abdul Ghafoor, 1977- (författare)
  • CryptoNET : Generic Security Framework for Cloud Computing Environments
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that -               our system is guaranteed to be secure, -               it is verifiable to provide the complete set of security services, -               we prove that it always functions correctly, and -               we justify our claim that it can not be compromised without user neglect and/or consent.   We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security. In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate. At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications. Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then -               its software modules are not vulnerable to malware and viruses, -               its data are not vulnerable to illegal reading and theft, -               all messages exchanged in a networking environment are strongly protected, and -               all other resources of an application are also strongly protected.   Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use. Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems. By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications. Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected. Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently. We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system. Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions. Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure A
  •  
40.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 31-40 av 27865
Typ av publikation
doktorsavhandling (6425)
annan publikation (4783)
tidskriftsartikel (3556)
rapport (3368)
konferensbidrag (3316)
licentiatavhandling (3272)
visa fler...
bokkapitel (2232)
bok (421)
recension (250)
samlingsverk (redaktörskap) (143)
konstnärligt arbete (79)
proceedings (redaktörskap) (77)
forskningsöversikt (22)
visa färre...
Typ av innehåll
Författare/redaktör
Sörlin, Sverker (279)
Hansson, Sven Ove (158)
Uhlén, Mathias (126)
Wågberg, Lars, 1956- (112)
Schlatter, Philipp (110)
Trillkott, Stefan (98)
visa fler...
Wågberg, Lars (95)
Silfwerbrand, Johan (93)
Jönsson, Pär (92)
Johansson, Börje (89)
Lundeberg, Joakim (78)
Jönsson, Pär, Profes ... (77)
Nilsson, Peter (74)
Ramström, Olof (74)
Finnveden, Göran (74)
Ågren, Hans (73)
Kari, Leif (72)
Malmström, Eva (71)
Westlund, Hans (68)
Frichot, Hélène, 197 ... (66)
Ansell, Anders (65)
Ceccato, Vania, Prof ... (65)
Henningson, Dan S. (65)
Albertsson, Ann-Chri ... (62)
Avango, Dag, 1965- (62)
Jenelius, Erik, Doce ... (62)
Lopez Arteaga, Ines (60)
Johansson, Mats (59)
Lundell, Fredrik (57)
Ban, Yifang (57)
Mörtberg, Ulla (56)
Brismar, Hjalmar (55)
Nelldal, Bo-Lennart (54)
Ottersten, Björn, 19 ... (53)
Näsman, Per (53)
Löfblom, John (51)
Wang, Lihui (50)
Fröidh, Oskar (50)
Maguire Jr., Gerald ... (49)
Stemme, Göran (49)
Brandt, Luca (48)
Söder, Lennart (48)
Luo, Yi (48)
Wormbs, Nina, 1968- (48)
Flötteröd, Gunnar (47)
Holmberg, Jan-Erik (47)
Wennersten, Ronald (47)
Lindbergh, Göran (46)
Rauhut, Daniel, 1968 ... (46)
Renman, Gunno (46)
visa färre...
Lärosäte
Karolinska Institutet (334)
Uppsala universitet (211)
Chalmers tekniska högskola (145)
Högskolan i Gävle (136)
Linköpings universitet (130)
visa fler...
Stockholms universitet (115)
RISE (106)
Lunds universitet (99)
Mälardalens universitet (91)
Jönköping University (85)
VTI - Statens väg- och transportforskningsinstitut (73)
Umeå universitet (69)
Luleå tekniska universitet (60)
Högskolan Dalarna (48)
Mittuniversitetet (47)
Göteborgs universitet (45)
Södertörns högskola (43)
Högskolan i Borås (36)
Karlstads universitet (36)
Försvarshögskolan (31)
Örebro universitet (21)
Konstfack (21)
Linnéuniversitetet (21)
Sveriges Lantbruksuniversitet (20)
Högskolan Väst (15)
Malmö universitet (15)
Naturvårdsverket (10)
Röda Korsets Högskola (10)
Handelshögskolan i Stockholm (7)
Blekinge Tekniska Högskola (7)
Marie Cederschiöld högskola (6)
Högskolan Kristianstad (5)
Högskolan i Skövde (5)
IVL Svenska Miljöinstitutet (5)
Riksantikvarieämbetet (2)
Stockholms konstnärliga högskola (2)
Högskolan i Halmstad (1)
Institutet för språk och folkminnen (1)
visa färre...
Språk
Engelska (24825)
Svenska (2895)
Tyska (45)
Norska (13)
Franska (12)
Spanska (12)
visa fler...
Italienska (11)
Portugisiska (11)
Danska (10)
Odefinierat språk (5)
Ryska (4)
Polska (3)
Nederländska (3)
Japanska (3)
Nygrekiska (3)
Finska (2)
Kinesiska (2)
Ukrainska (2)
Estniska (1)
Persiska (1)
Mongoliskt språk (1)
Iriska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (11629)
Naturvetenskap (6766)
Samhällsvetenskap (2805)
Humaniora (1917)
Medicin och hälsovetenskap (1060)
Lantbruksvetenskap (124)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy