SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem) ;mspu:(researchreview)"

Sökning: hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem) > Forskningsöversikt

  • Resultat 1-10 av 40
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Theorin, Alfred, et al. (författare)
  • An event-driven manufacturing information system architecture for Industry 4.0
  • 2017
  • Ingår i: International Journal of Production Research. - : Taylor & Francis. - 0020-7543 .- 1366-588X. ; 55:5, s. 1297-1311
  • Forskningsöversikt (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They need to make better use of plant data, ideally utilising all data from the entire plant. Low-level data should be refined to real-time information for decision-making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture (LISA), is presented in this paper. It is an event-driven architecture featuring loose coupling, a prototype-oriented information model and formalised transformation services. LISA is designed to enable flexible factory integration and data utilisation. The focus of LISA is on integration of devices and services on all levels, simplifying hardware changes and integration of new smart services as well as supporting continuous improvements on information visualisation and control. The architecture has been evaluated on both real industrial data and industrial demonstrators and it is also being installed at a large automotive company. This article is an extended and revised version of the paper presented at the 2015 IFAC Symposium on Information Control in Manufacturing (INCOM 2015). The paper has been restructured in regards to the order and title of the chapters, and additional information about the integration between devices and services aspects have been added. The introduction and the general structure of the paper now better highlight the contributions of the paper and the uniqueness of the framework.
  •  
2.
  • Andreasson, Joakim, 1973, et al. (författare)
  • Molecules for security measures: From keypad locks to advanced communication protocols
  • 2018
  • Ingår i: Chemical Society Reviews. - : Royal Society of Chemistry (RSC). - 1460-4744 .- 0306-0012. ; 47:7, s. 2266-2279
  • Forskningsöversikt (refereegranskat)abstract
    • The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.
  •  
3.
  • Shokry, Mostafa, et al. (författare)
  • Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
  • 2022
  • Ingår i: Future Generation Computer Systems. - : Elsevier. - 0167-739X .- 1872-7115. ; 136, s. 358-377
  • Forskningsöversikt (refereegranskat)abstract
    • There is a paradigm shift from traditional power distribution systems to smart grids (SGs) due to advances in information and communication technology. An advanced metering infrastructure (AMI) is one of the main components in an SG. Its relevance comes from its ability to collect, process, and transfer data through the internet. Although the advances in AMI and SG techniques have brought new operational benefits, they introduce new security and privacy challenges. Security has emerged as an imperative requirement to protect an AMI from attack. Currently, ensuring security is a major challenge in the design and deployment of an AMI. This study provides a systematic survey of the security of AMI systems from diverse perspectives. It focuses on attacks, mitigation approaches, and future visions. The contributions of this article are fourfold: First, the vulnerabilities that may exist in all components of an AMI are described and analyzed. Second, it considers attacks that exploit these vulnerabilities and the impact they can have on the performance of individual components and the overall AMI system. Third, it discusses various countermeasures that can protect an AMI system. Fourth, it presents the open challenges relating to AMI security as well as future research directions. The uniqueness of this review is its comprehensive coverage of AMI components with respect to their security vulnerabilities, attacks, and countermeasures. The future vision is described at the end.
  •  
4.
  • Blackburn, Landen D., et al. (författare)
  • Dynamic machine learning-based optimization algorithm to improve boiler efficiency
  • 2022
  • Ingår i: Journal of Process Control. - : Elsevier BV. - 0959-1524. ; 120, s. 129-149
  • Forskningsöversikt (refereegranskat)abstract
    • With decreasing computational costs, improvement in algorithms, and the aggregation of large industrial and commercial datasets, machine learning is becoming a ubiquitous tool for process and business innovations. Machine learning is still lacking applications in the field of dynamic optimization for real-time control. This work presents a novel framework for performing constrained dynamic optimization using a recurrent neural network model combined with a metaheuristic optimizer. The framework is designed to augment an existing control system and is purely data-driven, like most industrial Model Predictive Control applications. Several recurrent neural network models are compared as well as several metaheuristic optimizers. Hyperparameters and optimizer parameters are tuned with parameter sweeps, and the resulting values are reported. The best parameters for each optimizer and model combination are demonstrated in closed-loop control of a dynamic simulation, and several recommendations are made for generalizing this framework to other systems. Up to 0.953% improvement is realized over the non-optimized case for a simulated coal-fired boiler. While this is not a large improvement in percentage, the total economic impact is $991,000 per year, and this study builds a foundation for future machine learning with dynamic optimization.
  •  
5.
  • Buehrer, R. Michael, et al. (författare)
  • Collaborative Sensor Network Localization: Algorithms and Practical Issues
  • 2018
  • Ingår i: Proceedings of the IEEE. - 1558-2256 .- 0018-9219. ; 106:6, s. 1089-1114
  • Forskningsöversikt (refereegranskat)abstract
    • Emerging communication network applications including fifth-generation (5G) cellular and the Internet-of-Things (IoT) will almost certainly require location information at as many network nodes as possible. Given the energy requirements and lack of indoor coverage of Global Positioning System (GPS), collaborative localization appears to be a powerful tool for such networks. In this paper, we survey the state of the art in collaborative localization with an eye toward 5G cellular and IoT applications. In particular, we discuss theoretical limits, algorithms, and practical challenges associated with collaborative localization based on range-based as well as range-angle-based techniques.
  •  
6.
  • Butun, Ismail, 1981, et al. (författare)
  • Hardware security of fog end-devices for the internet of things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:20, s. 1-28
  • Forskningsöversikt (refereegranskat)abstract
    • The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
  •  
7.
  • Heskebeck, Frida, et al. (författare)
  • Multi-Armed Bandits in Brain-Computer Interfaces
  • 2022
  • Ingår i: Frontiers in Human Neuroscience. - : Frontiers Media S.A.. - 1662-5161. ; 16
  • Forskningsöversikt (refereegranskat)abstract
    • The multi-armed bandit (MAB) problem models a decision-maker that optimizes its actions based on current and acquired new knowledge to maximize its reward. This type of online decision is prominent in many procedures of Brain-Computer Interfaces (BCIs) and MAB has previously been used to investigate, e.g., what mental commands to use to optimize BCI performance. However, MAB optimization in the context of BCI is still relatively unexplored, even though it has the potential to improve BCI performance during both calibration and real-time implementation. Therefore, this review aims to further describe the fruitful area of MABs to the BCI community. The review includes a background on MAB problems and standard solution methods, and interpretations related to BCI systems. Moreover, it includes state-of-the-art concepts of MAB in BCI and suggestions for future research.
  •  
8.
  • Boyraz Baykas, Pinar, 1981, et al. (författare)
  • An overview of novel actuators for soft robotics
  • 2018
  • Ingår i: Actuators. - : MDPI AG. - 2076-0825. ; 7:3
  • Forskningsöversikt (refereegranskat)abstract
    • In this systematic survey, an overview of non-conventional actuators particularly used in soft-robotics is presented. The review is performed by using well-defined performance criteria with a direction to identify the exemplary and potential applications. In addition to this, initial guidelines to compare the performance and applicability of these novel actuators are provided. The meta-analysis is restricted to five main types of actuators: shape memory alloys (SMAs), fluidic elastomer actuators (FEAs), shape morphing polymers (SMPs), dielectric electro-activated polymers (DEAPs), and magnetic/electro-magnetic actuators (E/MAs). In exploring and comparing the capabilities of these actuators, the focus was on eight different aspects: compliance, topology-geometry, scalability-complexity, energy efficiency, operation range, modality, controllability, and technological readiness level (TRL). The overview presented here provides a state-of-the-art summary of the advancements and can help researchers to select the most convenient soft actuators using the comprehensive comparison of the suggested quantitative and qualitative criteria.
  •  
9.
  • Salles, Arleen, et al. (författare)
  • Neuroethics and AI ethics : a proposal for collaboration
  • 2024
  • Ingår i: BMC Neuroscience. - : BioMed Central (BMC). - 1471-2202. ; 25:1
  • Forskningsöversikt (refereegranskat)abstract
    • The scientific relationship between neuroscience and artificial intelligence is generally acknowledged, and the role that their long history of collaboration has played in advancing both fields is often emphasized. Beyond the important scientific insights provided by their collaborative development, both neuroscience and AI raise a number of ethical issues that are generally explored by neuroethics and AI ethics. Neuroethics and AI ethics have been gaining prominence in the last few decades, and they are typically carried out by different research communities. However, considering the evolving landscape of AI-assisted neurotechnologies and the various conceptual and practical intersections between AI and neuroscience—such as the increasing application of AI in neuroscientific research, the healthcare of neurological and mental diseases, and the use of neuroscientific knowledge as inspiration for AI—some scholars are now calling for a collaborative relationship between these two domains. This article seeks to explore how a collaborative relationship between neuroethics and AI ethics can stimulate theoretical and, ideally, governance efforts. First, we offer some reasons for calling for the collaboration of the ethical reflection on neuroscientific innovations and AI. Next, we explore some dimensions that we think could be enhanced by the cross-fertilization between these two subfields of ethics. We believe that considering the pace and increasing fusion of neuroscience and AI in the development of innovations, broad and underspecified calls for responsibility that do not consider insights from different ethics subfields will only be partially successful in promoting meaningful changes in both research and applications.
  •  
10.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Research Challenges and Opportunities in Drone Forensics Models
  • 2021
  • Ingår i: Electronics. - Switzerland : MDPI. - 2079-9292. ; 10:13
  • Forskningsöversikt (refereegranskat)abstract
    • The emergence of unmanned aerial vehicles (also referred to as drones) has transformed the digital landscape of surveillance and supply chain logistics, especially in terrains where such was previously deemed unattainable. Moreover, the adoption of drones has further led to the proliferation of diverse drone types and drone-related criminality, which has introduced a myriad of security and forensics-related concerns. As a step towards understanding the state-of-the-art research into these challenges and potential approaches to mitigation, this study provides a detailed review of existing digital forensic models using the Design Science Research method. The outcome of this study generated in-depth knowledge of the research challenges and opportunities through which an effective investigation can be carried out on drone-related incidents. Furthermore, a potential generic investigation model has been proposed. The findings presented in this study are essentially relevant to forensic researchers and practitioners towards a guided methodology for drone-related event investigation. Ultimately, it is important to mention that this study presents a background for the development of international standardization for drone forensics.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 40
Typ av publikation
Typ av innehåll
refereegranskat (38)
övrigt vetenskapligt/konstnärligt (2)
Författare/redaktör
Wymeersch, Henk, 197 ... (2)
Lv, Zhihan, Dr. 1984 ... (2)
Ljungqvist, Olle, 19 ... (1)
Svensson, Tommy, 197 ... (1)
Abd-Ellah, Mahmoud K ... (1)
Awad, Ali Ismail (1)
visa fler...
Khalaf, Ashraf A.M. (1)
Lieder, Michael (1)
Wik, Torsten, 1968 (1)
Penzenstadler, Birgi ... (1)
Seco-Granados, G. (1)
Delsing, Jerker, 195 ... (1)
Kerkhoven, Eduard, 1 ... (1)
Bernhardsson, Bo (1)
Johnsson, Charlotta (1)
Chitchyan, Ruzanna (1)
Kebande, Victor R. (1)
Johansson, Richard, ... (1)
Lennartson, Bengt, 1 ... (1)
Gorschek, Tony, 1972 ... (1)
Gurtov, Andrei (1)
Aziz, Imran (1)
Mahmood, Anzar (1)
Wang, Wei (1)
Andersson, Klas, 197 ... (1)
Al-Dhaqm, Arafat (1)
Ikuesan, Richard A. (1)
Shukor, Razak (1)
Ghabban, Fahad M. (1)
Karim, Ramin, 1964- (1)
Vosoogh, Abbas (1)
Bengtsson, Kristofer ... (1)
Petersen, Kai (1)
Alexandre, Rui Carlo ... (1)
Martins, Luiz Eduard ... (1)
Minhas, Nasir Mehmoo ... (1)
Falkman, Göran, 1968 (1)
Siewers, Verena, 197 ... (1)
Gebresenbet, Girma (1)
Zhang, Lei (1)
Andler, Sten F. (1)
Gellerstedt, Martin, ... (1)
Andreasson, Joakim, ... (1)
Bencomo, Nelly (1)
Åhlund, Christer (1)
Pischel, U. (1)
Boyraz Baykas, Pinar ... (1)
Avgouleas, Ioannis (1)
Suresh, Rahul (1)
Kuklin, Artem V. (1)
visa färre...
Lärosäte
Chalmers tekniska högskola (12)
Luleå tekniska universitet (6)
Uppsala universitet (5)
Blekinge Tekniska Högskola (4)
Kungliga Tekniska Högskolan (3)
Lunds universitet (3)
visa fler...
Högskolan i Skövde (3)
Umeå universitet (2)
Linköpings universitet (2)
Mittuniversitetet (2)
Göteborgs universitet (1)
Högskolan i Halmstad (1)
Högskolan Väst (1)
Örebro universitet (1)
RISE (1)
Karolinska Institutet (1)
Sveriges Lantbruksuniversitet (1)
visa färre...
Språk
Engelska (40)
Forskningsämne (UKÄ/SCB)
Teknik (40)
Naturvetenskap (15)
Medicin och hälsovetenskap (2)
Humaniora (2)
Lantbruksvetenskap (1)
Samhällsvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy