SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Medieteknik) ;pers:(Andersson Karl)"

Search: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Medieteknik) > Andersson Karl

  • Result 1-10 of 151
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Hossain, Mohammad Shahadat, 1968-, et al. (author)
  • A belief rule-based expert system to assess suspicion of acute coronary syndrome (ACS) under uncertainty
  • 2018
  • In: Soft Computing - A Fusion of Foundations, Methodologies and Applications. - : Springer. - 1432-7643 .- 1433-7479. ; 22:22, s. 7571-7586
  • Journal article (peer-reviewed)abstract
    • Acute coronary syndrome (ACS) is responsible for the obstruction of coronary arteries, resulting in the loss of lives. The onset of ACS can be determined by looking at the various signs and symptoms of a patient. However, the accuracy of ACS determination is often put into question since there exist different types of uncertainties with the signs and symptoms. Belief rule-based expert systems (BRBESs) are widely used to capture uncertain knowledge and to accomplish the task of reasoning under uncertainty by employing belief rule base and evidential reasoning. This article presents the process of developing a BRBES to determine ACS predictability. The BRBES has been validated against the data of 250 patients suffering from chest pain. It is noticed that the outputs created from the BRBES are more dependable than that of the opinion of cardiologists as well as other two expert system tools, namely artificial neural networks and support vector machine. Hence, it can be argued that the BRBES is capable of playing an important role in decision making as well as in avoiding costly laboratory investigations. A procedure to train the system, allowing its enhancement of performance, is also presented.
  •  
2.
  • Abedin, Md. Zainal, et al. (author)
  • An Interoperable IP based WSN for Smart Irrigation Systems
  • 2017
  • Conference paper (peer-reviewed)abstract
    • Wireless Sensor Networks (WSN) have been highly developed which can be used in agriculture to enable optimal irrigation scheduling. Since there is an absence of widely used available methods to support effective agriculture practice in different weather conditions, WSN technology can be used to optimise irrigation in the crop fields. This paper presents architecture of an irrigation system by incorporating interoperable IP based WSN, which uses the protocol stacks and standard of the Internet of Things paradigm. The performance of fundamental issues of this network is emulated in Tmote Sky for 6LoWPAN over IEEE 802.15.4 radio link using the Contiki OS and the Cooja simulator. The simulated results of the performance of the WSN architecture presents the Round Trip Time (RTT) as well as the packet loss of different packet size. In addition, the average power consumption and the radio duty cycle of the sensors are studied. This will facilitate the deployment of a scalable and interoperable multi hop WSN, positioning of border router and to manage power consumption of the sensors.
  •  
3.
  • Abedin, Md. Zainal, et al. (author)
  • Performance Analysis of Anomaly Based Network Intrusion Detection Systems
  • 2018
  • In: Proveedings of the 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops). - Piscataway, NJ : IEEE Computer Society. ; , s. 1-7
  • Conference paper (peer-reviewed)abstract
    • Because of the increased popularity and fast expansion of the Internet as well as Internet of things, networks are growing rapidly in every corner of the society. As a result, huge amount of data is travelling across the computer networks that lead to the vulnerability of data integrity, confidentiality and reliability. So, network security is a burning issue to keep the integrity of systems and data. The traditional security guards such as firewalls with access control lists are not anymore enough to secure systems. To address the drawbacks of traditional Intrusion Detection Systems (IDSs), artificial intelligence and machine learning based models open up new opportunity to classify abnormal traffic as anomaly with a self-learning capability. Many supervised learning models have been adopted to detect anomaly from networks traffic. In quest to select a good learning model in terms of precision, recall, area under receiver operating curve, accuracy, F-score and model built time, this paper illustrates the performance comparison between Naïve Bayes, Multilayer Perceptron, J48, Naïve Bayes Tree, and Random Forest classification models. These models are trained and tested on three subsets of features derived from the original benchmark network intrusion detection dataset, NSL-KDD. The three subsets are derived by applying different attributes evaluator’s algorithms. The simulation is carried out by using the WEKA data mining tool.
  •  
4.
  • Ahmed, Faisal, et al. (author)
  • An Evolutionary Belief Rule-Based Clinical Decision Support System to Predict COVID-19 Severity under Uncertainty
  • 2021
  • In: Applied Sciences. - Basel, Switzerland : MDPI. - 2076-3417. ; 11:13
  • Journal article (peer-reviewed)abstract
    • Accurate and rapid identification of the severe and non-severe COVID-19 patients is necessary for reducing the risk of overloading the hospitals, effective hospital resource utilization, and minimizing the mortality rate in the pandemic. A conjunctive belief rule-based clinical decision support system is proposed in this paper to identify critical and non-critical COVID-19 patients in hospitals using only three blood test markers. The experts’ knowledge of COVID-19 is encoded in the form of belief rules in the proposed method. To fine-tune the initial belief rules provided by COVID-19 experts using the real patient’s data, a modified differential evolution algorithm that can solve the constraint optimization problem of the belief rule base is also proposed in this paper. Several experiments are performed using 485 COVID-19 patients’ data to evaluate the effectiveness of the proposed system. Experimental result shows that, after optimization, the conjunctive belief rule-based system achieved the accuracy, sensitivity, and specificity of 0.954, 0.923, and 0.959, respectively, while for disjunctive belief rule base, they are 0.927, 0.769, and 0.948. Moreover, with a 98.85% AUC value, our proposed method shows superior performance than the four traditional machine learning algorithms: LR, SVM, DT, and ANN. All these results validate the effectiveness of our proposed method. The proposed system will help the hospital authorities to identify severe and non-severe COVID-19 patients and adopt optimal treatment plans in pandemic situations.
  •  
5.
  • Alam, Md. Eftekhar, et al. (author)
  • An IoT-Belief Rule Base Smart System to Assess Autism
  • 2018
  • In: Proceedings of the 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018). - : IEEE. - 9781538682791 - 9781538682807 ; , s. 671-675
  • Conference paper (peer-reviewed)abstract
    • An Internet-of-Things (IoT)-Belief Rule Base (BRB) based hybrid system is introduced to assess Autism spectrum disorder (ASD). This smart system can automatically collect sign and symptom data of various autistic children in realtime and classify the autistic children. The BRB subsystem incorporates knowledge representation parameters such as rule weight, attribute weight and degree of belief. The IoT-BRB system classifies the children having autism based on the sign and symptom collected by the pervasive sensing nodes. The classification results obtained from the proposed IoT-BRB smart system is compared with fuzzy and expert based system. The proposed system outperformed the state-of-the-art fuzzy system and expert system.
  •  
6.
  • Alizadeh, Morteza, 1987-, et al. (author)
  • A Survey of Secure Internet of Things in Relation to Blockchain
  • 2020
  • In: Journal of Internet Services and Information Security (JISIS). - Seoul, ​Republic of Korea : Innovative Information Science & Technology Research Group (ISYOU). - 2182-2069 .- 2182-2077. ; 10:3, s. 47-75
  • Journal article (peer-reviewed)abstract
    • Distributed ledgers and blockchain technologies can improve system security and trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list of blocks containing digitally signed transactions, a cryptographic hash of the previous block, and a timestamp stored in a decentralized and distributed network. The Internet of Things (IoT) is one of the application domains in which security based on blockchain is discussed. In this article, we review the structure and architectures of distributed IoT systems and explain the motivations, challenges, and needs of blockchain to secure such systems. However, there are substantial threats and attacks to blockchain that must be understood, as well as suitable approaches to mitigate them. We, therefore, survey the most common attacks to blockchain systems and the solutions to mitigate them, with the objective of assessing how malicious these attacks are in the IoT context.
  •  
7.
  • Andersson, Ken, et al. (author)
  • Secure Computation on 4G/5G Enabled Internet-of-Things
  • 2019
  • In: Wireless Communications & Mobile Computing. - : Hindawi Limited. - 1530-8669 .- 1530-8677. ; 2019, s. 1-1
  • Journal article (pop. science, debate, etc.)abstract
    • The rapid development of Internet-of-ings (IoT) techniques in G/ G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through G and G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.
  •  
8.
  •  
9.
  • Booth, Todd, 1959-, et al. (author)
  • Stronger Authentication for Password Credential Internet Services
  • 2017
  • In: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV). - Piscataway, NJ : IEEE conference proceedings. - 9781509036325 ; , s. 41-45
  • Conference paper (peer-reviewed)abstract
    • Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or email) and password (ID/PW) credential authentication. However, there are numerous vulnerabilities concerning ID/PW credentials. Scholars and the industry have proposed several improved security solutions, such as MFA, however most of the Internet Services have refused to adopt these solutions. Mobile phones are much more sensitive to these vulnerabilities (so this paper focuses on mobile phones). Many users take advantage of password managers, to keep track of all their Internet Service profiles. However, the Internet Service profiles found in password managers, are normally kept on the PC or mobile phone’s disk, in an encrypted form. Our first contribution is a design guideline, whereby the Internet Service profiles never need to touch the client’s disk. Most users would benefit, if they had the ability to use MFA, to login to a legacy Internet Service, which only supports ID/PW credential authentication. Our second contribution is a design guideline, whereby users can choose, for each legacy ID/PW Internet Service, which specific MFA they wish to use. We have also presenting conceptual design guidelines, showing that both of our contributions are minor changes to existing password managers, which can be implemented easily with low overhead.
  •  
10.
  • Drajic, Dejan, et al. (author)
  • User Engagement for Large Scale Pilots in the Internet of Things
  • 2019
  • In: TELSIKS 2019. - 9781728108780 ; , s. 46-53
  • Conference paper (peer-reviewed)abstract
    • With an expected 50 billion connected devices by 2020, the Internet of Things (IoT) will reshape our environment with great economic opportunities. However, the IoT market evolution will depend directly on the end-user adoption, so it is necessary to support the Large Scale Pilots (LSPs) in order to actively engage end-users in the large scale pilot design, deployment and assessment. In this paper we are presenting end-user engagement methods, including co-creative workshops, crowdsourcing, Living Labs, and developed online tools and resources for end-user engagement, crowdsourcing and personal data protection.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 151
Type of publication
conference paper (83)
journal article (42)
other publication (17)
reports (4)
licentiate thesis (2)
doctoral thesis (1)
show more...
research review (1)
book chapter (1)
show less...
Type of content
peer-reviewed (116)
pop. science, debate, etc. (18)
other academic/artistic (16)
Author/Editor
Andersson, Karl, 197 ... (70)
Hossain, Mohammad Sh ... (53)
Åhlund, Christer (19)
Islam, Raihan Ul, 19 ... (18)
Johansson, Dan (13)
show more...
Elkotob, Muslim (8)
Granlund, Daniel (8)
Rondeau, Eric (8)
Brännström, Robert (8)
Islam, Raihan Ul (7)
Siddiquee, Kazy Noor ... (5)
Schelén, Olov (5)
Kor, Ah-Lian (5)
Hossain, Emam (4)
Hossain, Sazzad (4)
Nahar, Nazmun (4)
Cherkaoui, Soumaya (4)
You, Ilsun (4)
Porras, Jari (4)
Booth, Todd (4)
Abedin, Md. Zainal (3)
Karim, Razuan (3)
Kilinc, Caner (3)
Uddin Ahmed, Tawsin (3)
Ahmed, Faisal (2)
Jamil, Mohammad Newa ... (2)
Zaslavsky, Arkady (2)
Alizadeh, Morteza, 1 ... (2)
Chen, Xiaofeng (2)
Esposito, Christian (2)
Nordberg, Mats (2)
Mostafa, Seraj Al Ma ... (2)
Sharma, Vishal (2)
Palmieri, Francesco (2)
Holmgren, Mikael (2)
Schmidt, Mischa (2)
Börjesson, Mikael (2)
Booth, Todd, 1959- (2)
Monrat, Ahmed Afif, ... (2)
Chowdhury, Rumman Ra ... (2)
Gupta, Dipankar (2)
Rybin, Andrei (2)
Pattinson, Colin (2)
Rahaman, Saifur (2)
Tuj-Johora, Fatema (2)
Kolbe, Hans-Joerg (2)
Monrat, Ahmed Afif (2)
Minovski, Dimitar, 1 ... (2)
Ericson, Mårten (2)
show less...
University
Luleå University of Technology (150)
Umeå University (1)
Stockholm University (1)
Linköping University (1)
Lund University (1)
Language
English (146)
Swedish (5)
Research subject (UKÄ/SCB)
Natural sciences (151)
Engineering and Technology (6)
Social Sciences (6)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view