SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem) "

Sökning: hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem)

  • Resultat 1-10 av 6079
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
2.
  • Blanch, Krister, 1991 (författare)
  • Beyond-application datasets and automated fair benchmarking
  • 2023
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Beyond-application perception datasets are generalised datasets that emphasise the fundamental components of good machine perception data. When analysing the history of perception datatsets, notable trends suggest that design of the dataset typically aligns with an application goal. Instead of focusing on a specific application, beyond-application datasets instead look at capturing high-quality, high-volume data from a highly kinematic environment, for the purpose of aiding algorithm development and testing in general. Algorithm benchmarking is a cornerstone of autonomous systems development, and allows developers to demonstrate their results in a comparative manner. However, most benchmarking systems allow developers to use their own hardware or select favourable data. There is also little focus on run time performance and consistency, with benchmarking systems instead showcasing algorithm accuracy. By combining both beyond-application dataset generation and methods for fair benchmarking, there is also the dilemma of how to provide the dataset to developers for this benchmarking, as the result of a high-volume, high-quality dataset generation is a significant increase in dataset size when compared to traditional perception datasets. This thesis presents the first results of attempting the creation of such a dataset. The dataset was built using a maritime platform, selected due to the highly dynamic environment presented on water. The design and initial testing of this platform is detailed, as well as as methods of sensor validation. Continuing, the thesis then presents a method of fair benchmarking, by utilising remote containerisation in a way that allows developers to present their software to the dataset, instead of having to first locally store a copy. To test this dataset and automatic online benchmarking, a number of reference algorithms were required for initial results. Three algorithms were built, using the data from three different sensors captured on the maritime platform. Each algorithm calculates vessel odometry, and the automatic benchmarking system was utilised to show the accuracy and run-time performance of these algorithms. It was found that the containerised approach alleviated data management concerns, prevented inflated accuracy results, and demonstrated precisely how computationally intensive each algorithm was.
  •  
3.
  • Jang, Jeong Keun, et al. (författare)
  • Area-efficient scheduling scheme based FFT processor for various OFDM systems
  • 2018
  • Ingår i: 2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018). - : IEEE. - 9781538682401 ; , s. 338-341
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents an area-efficient fast Fouriertransform (FFT) processor for orthogonal frequency-division multiplexing systems based on multi-path delay commutator architecture. This paper proposes a data scheduling scheme to reduce the number of complex constant multipliers. The proposed mixed-radix multi-path delay commutator FFT processor can support 128-, 256-, and 512-point FFT sizes. The proposed processor was synthesized using the Samsung 65-nm CMOS standard cell library. The proposed processor with eight parallel data paths can achieve a high throughput rate of up to 2.64 GSample/s at 330 MHz.
  •  
4.
  • Bengtsson, Lars, 1963 (författare)
  • Mikrodatorteknik
  • 1995
  • Bok (övrigt vetenskapligt/konstnärligt)abstract
    • Första delen behandlar Microchips "Base-line"-kretsar och andra delen behandlar "Midrange"-kretsarna. De flesta funktioner belyses med konstruktionsexempel. Exempel och övningar är mycket hårdvarunära och boken behandlar konstruktion av mikrodatorer från grunden. Boken är avsedd för kurser i mikrodatorteknik på högskolan eller annan högre teknisk utbildning, men kan även användas som självstudiematerial eftersom de flesta exempel ges med detaljerade och verifierade lösningar av såväl hård- som mjukvaran. Tidigare erfarenhet av assemblerprogrammering är inte nödvändig men grundläggande kunskaper i digitalteknik förutsätts. Boken kan med fördel också läsas av rutinerade assemblerprogrammerare som vill veta hur prestanda hos de nya RISC-baserade PIC-controllerna står sig i konkurrensen med de mer etablerade enchipscontrollerna, t ex HC11 och 8751, som bygger på traditionell CISC-arkitektur.
  •  
5.
  • Gülgün, Ziya, et al. (författare)
  • Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests
  • 2021
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 166382-166394
  • Tidskriftsartikel (refereegranskat)abstract
    • We consider Global Navigation Satellite Systems (GNSS) spoofing attacks and devise a countermeasure appropriate for mobile GNSS receivers. Our approach is to design detectors that, operating after the signal acquisition, enable the victim receiver to determine with high probability whether it is under a spoofing attack or not. Namely, the binary hypothesis is that either the GNSS receiver tracks legitimate satellite signals, H-0, or spoofed signals, H-1. We assume that there exists an unknown number of multiple spoofers in the environment and the attack strategy (which legitimate signals are spoofed by which spoofers) is not known to the receiver. Based on these assumptions, we propose an algorithm that identifies the number of spoofers and clusters the spoofing data by using Bayesian information criterion (BIC) rule. Depending on the estimated and clustered data we propose a detector, called as generalized likelihood ratio (GLRT)-like detector. We compare the performance of the GLRT-like detector with a genie-aided detector in which the attack strategy and the number of spoofers is known by the receiver. In addition to this, we extend the GLRT-like detector for the case where the noise variance is also unknown and present the performance results.
  •  
6.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
7.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
8.
  • Chen, Jiajia (författare)
  • 5G Transport networks : Capacity, latency and cost (invited)
  • 2019
  • Ingår i: Optics InfoBase Conference Papers. - : OSA - The Optical Society. - 9781557528209 ; Part F133-Networks 2019
  • Konferensbidrag (refereegranskat)abstract
    • This paper summarizes recent research on 5G transport networks addressing challenges on capacity, service migration and techno-economics that are brought by 5G new attributes, e.g., cloud radio access networks, diverse usage scenarios and heterogeneous deployments.
  •  
9.
  • Khan, Muhammad Sikandar Lal, 1988- (författare)
  • Presence through actions : theories, concepts, and implementations
  • 2017
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • During face-to-face meetings, humans use multimodal information, including verbal information, visual information, body language, facial expressions, and other non-verbal gestures. In contrast, during computer-mediated-communication (CMC), humans rely either on mono-modal information such as text-only, voice-only, or video-only or on bi-modal information by using audiovisual modalities such as video teleconferencing. Psychologically, the difference between the two lies in the level of the subjective experience of presence, where people perceive a reduced feeling of presence in the case of CMC. Despite the current advancements in CMC, it is still far from face-to-face communication, especially in terms of the experience of presence.This thesis aims to introduce new concepts, theories, and technologies for presence design where the core is actions for creating presence. Thus, the contribution of the thesis can be divided into a technical contribution and a knowledge contribution. Technically, this thesis details novel technologies for improving presence experience during mediated communication (video teleconferencing). The proposed technologies include action robots (including a telepresence mechatronic robot (TEBoT) and a face robot), embodied control techniques (head orientation modeling and virtual reality headset based collaboration), and face reconstruction/retrieval algorithms. The introduced technologies enable action possibilities and embodied interactions that improve the presence experience between the distantly located participants. The novel setups were put into real experimental scenarios, and the well-known social, spatial, and gaze related problems were analyzed.The developed technologies and the results of the experiments led to the knowledge contribution of this thesis. In terms of knowledge contribution, this thesis presents a more general theoretical conceptual framework for mediated communication technologies. This conceptual framework can guide telepresence researchers toward the development of appropriate technologies for mediated communication applications. Furthermore, this thesis also presents a novel strong concept – presence through actions - that brings in philosophical understandings for developing presence- related technologies. The strong concept - presence through actions is an intermediate-level knowledge that proposes a new way of creating and developing future 'presence artifacts'. Presence- through actions is an action-oriented phenomenological approach to presence that differs from traditional immersive presence approaches that are based (implicitly) on rationalist, internalist views.
  •  
10.
  • Åkerberg, Johan, et al. (författare)
  • Design challenges and objectives in industrial wireless sensor networks
  • 2017
  • Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. - Boca Raton : CRC Press. - 9781466500525 - 9781466500518 ; , s. 79-100
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the advances in wireless sensor networks have grown exponentially and WSNs have been deployed in diverse application areas such as agriculture, disaster management, intelligent transport systems, and industrial automation. In industrial automation, wireless sensor networks have so far mostly been considered within building automation, factory automation, and process automation in order to save cost in cable reduction and maintenance but also improved flexibility [14]. Recently, wireless sensor networks for smart grid applications have been discussed. Several market forecasts have recently predicted exponential growths in the sensor market over the next few years, resulting in a multi-billion dollar market in the near future. For instance, ABI research [18] predicts that in 2015 around 645 million IEEE 802.15.4 chipsets will be shipped and that the worldwide market for automation systems in process industries will grow to roughly $150 billion.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 6079
Typ av publikation
konferensbidrag (3488)
tidskriftsartikel (1539)
doktorsavhandling (273)
licentiatavhandling (199)
bokkapitel (187)
rapport (179)
visa fler...
annan publikation (102)
forskningsöversikt (35)
proceedings (redaktörskap) (27)
bok (19)
samlingsverk (redaktörskap) (18)
patent (10)
konstnärligt arbete (3)
recension (3)
visa färre...
Typ av innehåll
refereegranskat (4858)
övrigt vetenskapligt/konstnärligt (1176)
populärvet., debatt m.m. (43)
Författare/redaktör
Nolte, Thomas (95)
Mubeen, Saad (77)
Elmroth, Erik (74)
Gallina, Barbara (71)
Lundqvist, Kristina (65)
Maki, Atsuto (61)
visa fler...
Björkman, Mats (51)
Papadopoulos, Alessa ... (51)
Bosch, Jan, 1967 (49)
Punnekkat, Sasikumar (48)
Hayashi, Masaki, 195 ... (48)
Sjödin, Mikael (46)
Hansson, Hans (45)
Carlson, Jan (45)
Behnam, Moris, 1973- (45)
Daneshtalab, Masoud (45)
Afzal, Wasif (45)
Brorsson, Mats (45)
Behnam, Moris (42)
Lisper, Björn (41)
Cicchetti, Antonio (41)
Voigt, Thiemo (40)
Papatriantafilou, Ma ... (40)
Seceleanu, Cristina, ... (40)
Ciccozzi, Federico, ... (39)
Kihl, Maria (37)
Flammini, Francesco, ... (36)
Sjödin, Mikael, 1971 ... (36)
Uhlemann, Elisabeth, ... (36)
Enoiu, Eduard Paul, ... (35)
Ashjaei, Seyed Moham ... (34)
Lv, Zhihan, Dr. 1984 ... (34)
Gulisano, Vincenzo M ... (34)
Almgren, Magnus, 197 ... (33)
Sundmark, Daniel (32)
Bucaioni, Alessio, 1 ... (32)
Kaxiras, Stefanos (31)
Sirjani, Marjan (31)
Brunstrom, Anna, 196 ... (30)
Staron, Miroslaw, 19 ... (29)
Saadatmand, Mehrdad (29)
Torra, Vicenç (29)
Pericas, Miquel, 197 ... (29)
Vlassov, Vladimir (28)
Åkerberg, Johan (28)
Vyatkin, Valeriy (27)
Vlassov, Vladimir, 1 ... (27)
Axelsson, Jakob (27)
Nieves, Juan Carlos (27)
Bachelder, Steven (27)
visa färre...
Lärosäte
Mälardalens universitet (1407)
Chalmers tekniska högskola (1230)
Kungliga Tekniska Högskolan (1218)
Uppsala universitet (495)
Linköpings universitet (349)
RISE (323)
visa fler...
Umeå universitet (305)
Göteborgs universitet (213)
Lunds universitet (192)
Högskolan i Halmstad (180)
Linnéuniversitetet (175)
Luleå tekniska universitet (165)
Karlstads universitet (160)
Blekinge Tekniska Högskola (137)
Högskolan i Skövde (124)
Stockholms universitet (85)
Mittuniversitetet (83)
Örebro universitet (71)
Malmö universitet (69)
Högskolan Dalarna (48)
Jönköping University (44)
Högskolan Kristianstad (38)
Högskolan Väst (26)
Karolinska Institutet (18)
Högskolan i Borås (17)
VTI - Statens väg- och transportforskningsinstitut (17)
Sveriges Lantbruksuniversitet (9)
Försvarshögskolan (6)
Högskolan i Gävle (3)
Riksantikvarieämbetet (2)
Handelshögskolan i Stockholm (1)
Södertörns högskola (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (6023)
Svenska (28)
Japanska (22)
Franska (2)
Italienska (2)
Finska (1)
visa fler...
Kroatiska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (6071)
Naturvetenskap (1747)
Samhällsvetenskap (174)
Humaniora (82)
Medicin och hälsovetenskap (66)
Lantbruksvetenskap (4)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy