SwePub
Sök i SwePub databas

  Utökad sökning

AND är defaultoperator och kan utelämnas

Träfflista för sökning "AMNE:(ENGINEERING AND TECHNOLOGY) AMNE:(Electrical Engineering Electronic Engineering Information Engineering) AMNE:(Communication Systems) "

Sökning: AMNE:(ENGINEERING AND TECHNOLOGY) AMNE:(Electrical Engineering Electronic Engineering Information Engineering) AMNE:(Communication Systems)

  • Resultat 1-50 av 7506
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Rosenstatter, Thomas, et al. (författare)
  • Modelling the Level of Trust in a Cooperative Automated Vehicle Control System
  • 2018
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - Piscataway, NJ : IEEE Press. - 1524-9050 .- 1558-0016. ; 19:4, s. 1267-1247
  • Tidskriftsartikel (refereegranskat)abstract
    • Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. In addition, this technology also allows detection and recognition of objects that are out-of-sight. This paper presents a trust system that allows a cooperative and automated vehicle to make more reliable and safe decisions. The system evaluates the current situation and generates a trust index indicating the level of trust in the environment, the ego vehicle, and the surrounding vehicles. This research goes beyond secure communication and concerns the verification of the received data on a system level. The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.
  •  
2.
  • Shafiq, ur Réhman, 1978-, et al. (författare)
  • Using Vibrotactile Language for Multimodal Human Animals Communication and Interaction
  • 2014
  • Ingår i: Proceedings of the 2014 Workshops on Advances in Computer Entertainment Conference, ACE '14. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450333146 ; , s. 1:1-1:5
  • Konferensbidrag (refereegranskat)abstract
    • In this work we aim to facilitate computer mediated multimodal communication and interaction between human and animal based on vibrotactile stimuli. To study and influence the behavior of animals, usually researchers use 2D/3D visual stimuli. However we use vibrotactile pattern based language which provides the opportunity to communicate and interact with animals. We have performed experiment with a vibrotactile based human-animal multimodal communication system to study the effectiveness of vibratory stimuli applied to the animal skin along with audio and visual stimuli. The preliminary results are encouraging and indicate that low-resolution tactual displays are effective in transmitting information.
  •  
3.
  • Lian, Mengke, et al. (författare)
  • What Can Machine Learning Teach Us about Communications
  • 2018
  • Ingår i: IEEE International Symposium on Information Theory - Proceedings. - 2157-8095. ; 15 January 2019
  • Konferensbidrag (refereegranskat)abstract
    • Rapid improvements in machine learning over the past decade are beginning to have far-reaching effects. For communications, engineers with limited domain expertise can now use off-the-shelf learning packages to design high-performance systems based on simulations. Prior to the current revolution in machine learning, the majority of communication engineers were quite aware that system parameters (such as filter coefficients) could be learned using stochastic gradient descent. It was not at all clear, however, that more complicated parts of the system architecture could be learned as well. In this paper, we discuss the application of machine-learning techniques to two communications problems and focus on what can be learned from the resulting systems. We were pleasantly surprised that the observed gains in one example have a simple explanation that only became clear in hindsight. In essence, deep learning discovered a simple and effective strategy that had not been considered earlier.
  •  
4.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
5.
  • Jiang, W., et al. (författare)
  • Implementation of an internet-based remote controller with guaranteed exponential stabilization
  • 2008
  • Ingår i: Proceedings of the World Congress on Intelligent Control and Automation (WCICA). - 9781424421145 ; , s. 4063-4068
  • Konferensbidrag (refereegranskat)abstract
    • In this article, an Internet-based remote control system is designed and implemented. The communication is based on the Master-Slave structure. The Master PC communicates with the Slave from about 40km away by UDP protocol. In order to guarantee the Master and Slave clocks to be synchronized, the NTP (Network Time Protocol) is used in both sides. The packets are sent together with time-stamps. The controller design (master) relies on a remote observer that achieves a state prediction of the application (slave), despite the variable communication delays. The Slave comprises a PC and a robot Miabot of Merlin company. The protocol Bluetooth is used between the local PC and the robot. Internet-based remote systems are subject to variable time delays (including communication and data-sampling delays) and data packets losses (due to the unstable Internet network). We have continuously tested the RTT (round-trip-time) between the two PCs in the daytime and nighttime by the protocol ICMP (Internet Control Message). From these tests, an evaluation of the maximal time delay is obtained. Our structure allows one to guarantee an exponential stabilization performance, which is proven via a Lyapunov-Krassovski functional technique and involves the estimated delay upperbound. This means that the guaranteed decay rate is computed (via some LMI optimization) in relation to some maximal value of the communication delays. Of course, for greater delay values, the performance cannot be guaranteed anymore and an alternative solution has to be considered. In our system, we give a command for the robot to stop until the communication comes back to a sufficient quality.
  •  
6.
  • Ivanov, Mikhail, 1986, et al. (författare)
  • Unequal Error Protection in Coded Slotted ALOHA
  • 2016
  • Ingår i: IEEE Wireless Communications Letters. - : Institute of Electrical and Electronics Engineers (IEEE). - 2162-2345 .- 2162-2337. ; 5:5, s. 536-539
  • Tidskriftsartikel (refereegranskat)abstract
    • We analyze the performance of coded slotted ALOHA systems for a scenario where users have different error protection requirements and correspondingly can be divided into user classes. The main goal is to design the system so that the requirements for each class are satisfied. To that end, we derive analytical error floor approximations of the packet loss rate for each class in the finite frame length regime, as well as the density evolution in the asymptotic case. Based on this analysis, we propose a heuristic approach for the optimization of the degree distributions to provide the required unequal error protection. In addition, we analyze the decoding delay for users in different classes and show that better protected users experience a smaller average decoding delay.
  •  
7.
  • Yanggratoke, Rerngvit, 1983-, et al. (författare)
  • Predicting real-time service-level metrics from device statistics
  • 2015
  • Ingår i: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. - : Institute of Electrical and Electronics Engineers Inc.. - 9783901882760 ; , s. 414-422
  • Konferensbidrag (refereegranskat)abstract
    • While real-time service assurance is critical for emerging telecom cloud services, understanding and predicting performance metrics for such services is hard. In this paper, we pursue an approach based upon statistical learning whereby the behavior of the target system is learned from observations. We use methods that learn from device statistics and predict metrics for services running on these devices. Specifically, we collect statistics from a Linux kernel of a server machine and predict client-side metrics for a video-streaming service (VLC). The fact that we collect thousands of kernel variables, while omitting service instrumentation, makes our approach service-independent and unique. While our current lab configuration is simple, our results, gained through extensive experimentation, prove the feasibility of accurately predicting client-side metrics, such as video frame rates and RTP packet rates, often within 10-15% error (NMAE), also under high computational load and across traces from different scenarios.
  •  
8.
  • Nopchinda, Dhecha, 1991 (författare)
  • mm-Wave Data Transmission and Measurement Techniques: A Holistic Approach
  • 2019
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The ever-increasing demand on data services places unprecedented technical requirements on networks capacity. With wireless systems having significant roles in broadband delivery, innovative approaches to their development are imperative. By leveraging new spectral resources available at millimeter-wave (mm-wave) frequencies, future systems can utilize new signal structures and new system architectures in order to achieve long-term sustainable solutions. This thesis proposes the holistic development of efficient and cost-effective techniques and systems which make high-speed data transmission at mm-wave feasible. In this paradigm, system designs, signal processing, and measurement techniques work toward a single goal; to achieve satisfactory system level key performance indicators (KPIs). Two intimately-related objectives are simultaneously addressed: the realization of efficient mm-wave data transmission and the development of measurement techniques to enable and assist the design and evaluation of mm-wave circuits. The standard approach to increase spectral efficiency is to increase the modulation order at the cost of higher transmission power. To improve upon this, a signal structure called spectrally efficient frequency division multiplexing (SEFDM) is utilized. SEFDM adds an additional dimension of continuously tunable spectral efficiency enhancement. Two new variants of SEFDM are implemented and experimentally demonstrated, where both variants are shown to outperform standard signals. A low-cost low-complexity mm-wave transmitter architecture is proposed and experimentally demonstrated. A simple phase retarder predistorter and a frequency multiplier are utilized to successfully generate spectrally efficient mm-wave signals while simultaneously mitigating various issues found in conventional mm-wave systems. A measurement technique to characterize circuits and components under antenna array mutual coupling effects is proposed and demonstrated. With minimal setup requirement, the technique effectively and conveniently maps prescribed transmission scenarios to the measurement environment and offers evaluations of the components in terms of relevant KPIs in addition to conventional metrics. Finally, a technique to estimate transmission and reflection coefficients is proposed and demonstrated. In one variant, the technique enables the coefficients to be estimated using wideband modulated signals, suitable for implementation in measurements performed under real usage scenarios. In another variant, the technique enhances the precision of noisy S-parameter measurements, suitable for characterizations of wideband mm-wave components.
  •  
9.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
10.
  • Homem, Irvin, 1985- (författare)
  • Advancing Automation in Digital Forensic Investigations
  • 2018
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. Industry standard tools are evidence-centric, automate only a few precursory tasks (E.g. Parsing and Indexing) and have limited capabilities of integration from multiple evidence sources. Furthermore, these tools are always human-driven.These challenges are exacerbated in the increasingly computerized and highly networked environment of today. Volumes of digital evidence to be collected and analyzed have increased, and so has the diversity of digital evidence sources involved in a typical case. This further handicaps digital forensics practitioners, labs and law enforcement agencies, causing delays in investigations and legal systems due to backlogs of cases. Improved efficiency of the digital investigation process is needed, in terms of increasing the speed and reducing the human effort expended. This study aims at achieving this time and effort reduction, by advancing automation within the digital forensic investigation process.Using a Design Science research approach, artifacts are designed and developed to address these practical problems. Summarily, the requirements, and architecture of a system for automating digital investigations in highly networked environments are designed. The architecture initially focuses on automation of the identification and acquisition of digital evidence, while later versions focus on full automation and self-organization of devices for all phases of the digital investigation process. Part of the remote evidence acquisition capability of this system architecture is implemented as a proof of concept. The speed and reliability of capturing digital evidence from remote mobile devices over a client-server paradigm is evaluated. A method for the uniform representation and integration of multiple diverse evidence sources for enabling automated correlation, simple reasoning and querying is developed and tested. This method is aimed at automating the analysis phase of digital investigations. Machine Learning (ML)-based triage methods are developed and tested to evaluate the feasibility and performance of using such techniques to automate the identification of priority digital evidence fragments. Models from these ML methods are evaluated in identifying network protocols within DNS tunneled network traffic. A large dataset is also created for future research in ML-based triage for identifying suspicious processes for memory forensics.From an ex ante evaluation, the designed system architecture enables individual devices to participate in the entire digital investigation process, contributing their processing power towards alleviating the burden on the human analyst. Experiments show that remote evidence acquisition of mobile devices over networks is feasible, however a single-TCP-connection paradigm scales poorly. A proof of concept experiment demonstrates the viability of the automated integration, correlation and reasoning over multiple diverse evidence sources using semantic web technologies. Experimentation also shows that ML-based triage methods can enable prioritization of certain digital evidence sources, for acquisition or analysis, with up to 95% accuracy.The artifacts developed in this study provide concrete ways to enhance automation in the digital forensic investigation process to increase the investigation speed and reduce the amount of costly human intervention needed. 
  •  
11.
  • Kebande, Victor R., 1985-, et al. (författare)
  • A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles
  • 2021
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 21:18
  • Tidskriftsartikel (refereegranskat)abstract
    • Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
12.
  • Khanzadi, M Reza, 1983, et al. (författare)
  • Calculation of the Performance of Communication Systems from Measured Oscillator Phase Noise
  • 2014
  • Ingår i: IEEE Transactions on Circuits and Systems I: Regular Papers. - 1549-8328 .- 1558-0806. ; 61:5, s. 1553-1565
  • Tidskriftsartikel (refereegranskat)abstract
    • Oscillator phase noise (PN) is one of the major problems that affect the performance of communication systems. In this paper, a direct connection between oscillator measurements, in terms of measured single-side band PN spectrum, and the optimal communication system performance, in terms of the resulting error vector magnitude (EVM) due to PN, is mathematically derived and analyzed. First, a statistical model of the PN, considering the effect of white and colored noise sources, is derived. Then, we utilize this model to derive the modified Bayesian Cramer-Rao bound on PN estimation, and use it to find an EVM bound for the system performance. Based on our analysis, it is found that the influence from different noise regions strongly depends on the communication bandwidth, i.e., the symbol rate. For high symbol rate communication systems, cumulative PN that appears near carrier is of relatively low importance compared to the white PN far from carrier. Our results also show that 1/f^3 noise is more predictable compared to 1/f^2 noise and in a fair comparison it affects the performance less.
  •  
13.
  • Pérez-Penichet, Carlos, et al. (författare)
  • Poster abstract : Augmenting WSNs with interoperable 802.15.4 sensor tags
  • 2017
  • Ingår i: SenSys 2017 - Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems. - New York, NY, USA : Association for Computing Machinery, Inc. - 9781450354592
  • Konferensbidrag (refereegranskat)abstract
    • The sensing capabilities of most sensor networks are fixed at the time of deployment. Adding new sensing capabilities to such networks is a costly and cumbersome process. We present Passive Sensor Tags, battery-free sensing devices that could be used to extend the sensing capabilities of an existing network. Sensor tags feature our new 802.15.4 receiver design which is suitable for micro-power operation, making battery-free tags possible. Because our tags can both transmit and receive 802.15.4 frames there is no need for any modification to the deployed hardware. We present preliminary measurements of transmission and reception range. 
  •  
14.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
15.
  • Åkerberg, Johan, et al. (författare)
  • Design challenges and objectives in industrial wireless sensor networks
  • 2017
  • Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. - Boca Raton : CRC Press. - 9781466500525 - 9781466500518 ; , s. 79-100
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the advances in wireless sensor networks have grown exponentially and WSNs have been deployed in diverse application areas such as agriculture, disaster management, intelligent transport systems, and industrial automation. In industrial automation, wireless sensor networks have so far mostly been considered within building automation, factory automation, and process automation in order to save cost in cable reduction and maintenance but also improved flexibility [14]. Recently, wireless sensor networks for smart grid applications have been discussed. Several market forecasts have recently predicted exponential growths in the sensor market over the next few years, resulting in a multi-billion dollar market in the near future. For instance, ABI research [18] predicts that in 2015 around 645 million IEEE 802.15.4 chipsets will be shipped and that the worldwide market for automation systems in process industries will grow to roughly $150 billion.
  •  
16.
  • Wang, Chao, et al. (författare)
  • On the Degrees of Freedom of Parallel Relay Networks
  • 2010
  • Ingår i: 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010. - 1930-529X. - 9781424456383 - 9781424456369
  • Konferensbidrag (refereegranskat)abstract
    • We study the degrees of freedom (DOF) of a single-antenna M-user time-varying parallel relay network, where the communications between M pairs of unconnected sources and destinations are provided by a large number of half-duplex decode-and-forward (DF) relays. Unlike the conventional relaying strategy which demands all the relays to simultaneously assist the sources, we divide the relays into two clusters and permit them to take turns forwarding the source messages. With appropriate interference alignment design, it is proved that the M-user time-varying relay network has M DOF, provided that the number of relays is infinitely large.
  •  
17.
  • Mahdavi, Mojtaba (författare)
  • Baseband Processing for 5G and Beyond: Algorithms, VLSI Architectures, and Co-design
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the number of connected devices and the demand for high data-rates have been significantly increased. This enormous growth is more pronounced by the introduction of the Internet of things (IoT) in which several devices are interconnected to exchange data for various applications like smart homes and smart cities. Moreover, new applications such as eHealth, autonomous vehicles, and connected ambulances set new demands on the reliability, latency, and data-rate of wireless communication systems, pushing forward technology developments. Massive multiple-input multiple-output (MIMO) is a technology, which is employed in the 5G standard, offering the benefits to fulfill these requirements. In massive MIMO systems, base station (BS) is equipped with a very large number of antennas, serving several users equipments (UEs) simultaneously in the same time and frequency resource. The high spatial multiplexing in massive MIMO systems, improves the data rate, energy and spectral efficiencies as well as the link reliability of wireless communication systems. The link reliability can be further improved by employing channel coding technique. Spatially coupled serially concatenated codes (SC-SCCs) are promising channel coding schemes, which can meet the high-reliability demands of wireless communication systems beyond 5G (B5G). Given the close-to-capacity error correction performance and the potential to implement a high-throughput decoder, this class of code can be a good candidate for wireless systems B5G. In order to achieve the above-mentioned advantages, sophisticated algorithms are required, which impose challenges on the baseband signal processing. In case of massive MIMO systems, the processing is much more computationally intensive and the size of required memory to store channel data is increased significantly compared to conventional MIMO systems, which are due to the large size of the channel state information (CSI) matrix. In addition to the high computational complexity, meeting latency requirements is also crucial. Similarly, the decoding-performance gain of SC-SCCs also do come at the expense of increased implementation complexity. Moreover, selecting the proper choice of design parameters, decoding algorithm, and architecture will be challenging, since spatial coupling provides new degrees of freedom in code design, and therefore the design space becomes huge. The focus of this thesis is to perform co-optimization in different design levels to address the aforementioned challenges/requirements. To this end, we employ system-level characteristics to develop efficient algorithms and architectures for the following functional blocks of digital baseband processing. First, we present a fast Fourier transform (FFT), an inverse FFT (IFFT), and corresponding reordering scheme, which can significantly reduce the latency of orthogonal frequency-division multiplexing (OFDM) demodulation and modulation as well as the size of reordering memory. The corresponding VLSI architectures along with the application specific integrated circuit (ASIC) implementation results in a 28 nm CMOS technology are introduced. In case of a 2048-point FFT/IFFT, the proposed design leads to 42% reduction in the latency and size of reordering memory. Second, we propose a low-complexity massive MIMO detection scheme. The key idea is to exploit channel sparsity to reduce the size of CSI matrix and eventually perform linear detection followed by a non-linear post-processing in angular domain using the compressed CSI matrix. The VLSI architecture for a massive MIMO with 128 BS antennas and 16 UEs along with the synthesis results in a 28 nm technology are presented. As a result, the proposed scheme reduces the complexity and required memory by 35%–73% compared to traditional detectors while it has better detection performance. Finally, we perform a comprehensive design space exploration for the SC-SCCs to investigate the effect of different design parameters on decoding performance, latency, complexity, and hardware cost. Then, we develop different decoding algorithms for the SC-SCCs and discuss the associated decoding performance and complexity. Also, several high-level VLSI architectures along with the corresponding synthesis results in a 12 nm process are presented, and various design tradeoffs are provided for these decoding schemes.
  •  
18.
  • Kleyko, Denis, et al. (författare)
  • Vehicle Classification using Road Side Sensors and Feature-free Data Smashing Approach
  • 2016
  • Ingår i: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). - Piscataway : IEEE. - 9781509018895 - 9781509018888 - 9781509018901 ; , s. 1988-1993
  • Konferensbidrag (refereegranskat)abstract
    • The main contribution of this paper is a study of the applicability of data smashing - a recently proposed data mining method - for vehicle classification according to the "Nordic system for intelligent classification of vehicles" standard, using measurements of road surface vibrations and magnetic field disturbances caused by passing vehicles. The main advantage of the studied classification approach is that it, in contrast to the most of traditional machine learning algorithms, does not require the extraction of features from raw signals. The proposed classification approach was evaluated on a large dataset consisting of signals from 3074 vehicles. Hence, a good estimate of the actual classification rate was obtained. The performance was compared to the previously reported results on the same problem for logistic regression. Our results show the potential trade-off between classification accuracy and classification method's development efforts could be achieved.
  •  
19.
  • Pelliccione, Patrizio, 1975, et al. (författare)
  • Beyond connected cars: A systems of systems perspective
  • 2020
  • Ingår i: Science of Computer Programming. - Amsterdam : Elsevier BV. - 0167-6423 .- 1872-7964. ; 191
  • Tidskriftsartikel (refereegranskat)abstract
    • The automotive domain is rapidly changing in the last years. Among the different challenges OEMs (i.e. the vehicle manufacturers) are facing, vehicles are evolving into systems of systems. In fact, over the last years vehicles have evolved from disconnected and “blind” systems to systems that are (i) able to sense the surrounding environment and (ii) connected with other vehicles, the city, pedestrians, cyclists, etc. Future transportation systems can be seen as a System of Systems (SoS). In an SoS, constituent systems, i.e. the units that compose an SoS, can act as standalone systems, but their cooperation enables new emerging and promising scenarios. While this trend creates new opportunities, it also poses a risk to compromise key qualities such as safety, security, and privacy. In this paper we focus on the automotive domain and we investigate how to engineer and architect cars in order to build them as constituents of future transportation systems. Our contribution is an architectural viewpoint for System of Systems, which we demonstrate based on an automotive example. Moreover, we contribute a functional reference architecture for cars as constituents of an SoS. This reference architecture can be considered as an imprinting for the implementations that would be devised in specific projects and contexts. We also point out the necessity for a collaboration among different OEMs and with other relevant stakeholders, such as road authorities and smart cities, to properly engineer systems of systems composed of cars, trucks, roads, pedestrians, etc. This work is realized in the context of two Swedish projects coordinated by Volvo Cars and involving some universities and research centers in Sweden and many suppliers of the OEM, including Autoliv, Arccore, Combitech, Cybercom, Knowit, Prevas, ÅF-Technology, Semcom, and Qamcom.
  •  
20.
  • Theorin, Alfred, et al. (författare)
  • An event-driven manufacturing information system architecture for Industry 4.0
  • 2017
  • Ingår i: International Journal of Production Research. - : Taylor & Francis. - 0020-7543 .- 1366-588X. ; 55:5, s. 1297-1311
  • Forskningsöversikt (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They need to make better use of plant data, ideally utilising all data from the entire plant. Low-level data should be refined to real-time information for decision-making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture (LISA), is presented in this paper. It is an event-driven architecture featuring loose coupling, a prototype-oriented information model and formalised transformation services. LISA is designed to enable flexible factory integration and data utilisation. The focus of LISA is on integration of devices and services on all levels, simplifying hardware changes and integration of new smart services as well as supporting continuous improvements on information visualisation and control. The architecture has been evaluated on both real industrial data and industrial demonstrators and it is also being installed at a large automotive company. This article is an extended and revised version of the paper presented at the 2015 IFAC Symposium on Information Control in Manufacturing (INCOM 2015). The paper has been restructured in regards to the order and title of the chapters, and additional information about the integration between devices and services aspects have been added. The introduction and the general structure of the paper now better highlight the contributions of the paper and the uniqueness of the framework.
  •  
21.
  • Khanzadi, M Reza, 1983 (författare)
  • Modeling and Estimation of Phase Noise in Oscillators with Colored Noise Sources
  • 2013
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The continuous increase in demand for higher data rates due to applications with massive number of users motivates the design of faster and more spectrum efficient communication systems. In theory, the current communication systems must be able to operate close to Shannon capacity bounds. However, the real systems perform below capacity limits, mainly due to channel estimation error and hardware impairments that have been neglected by idealistic or simplistic assumptions on the imperfections. Oscillator phase noise is one of the hardware impairments that is becoming a limiting factor in high data rate digital communication systems. Phase noise severely limits the performance of systems that employ dense constellations. Moreover, the level of phase noise (at a given off-set frequency) increases with carrier frequency which means that the problem of phase noise may be even more severe in systems with high carrier frequency.The focus of this thesis is on finding accurate statistical models of phase noise, as well as the design of efficient algorithms to mitigate the effect of this phenomenon on the performance of modern communication systems. First we derive the statistics of phase noise with white and colored noise sources in free-running and phase-locked-loop-stabilized oscillators. We investigate the relation between real oscillator phase noise measurements and the performance of communication systems by means of the proposed model. Our findings can be used by hardware and frequency generator designers to better understand the effect of phase noise with different sources on the system performance and optimize their design criteria respectively. Then, we study the design of algorithms for estimation of phase noise with colored noise sources. A soft-input maximum a posteriori phase noise estimator and a modified soft-input extended Kalman smoother are proposed. The performance of the proposed algorithms is compared against that of those studied in the literature, in terms of mean square error of phase noise estimation, and symbol error rate of the considered communication system. The comparisons show that considerable performance gains can be achieved by designing estimators that employ correct knowledge of the phase noise statistics. The performance improvement is more significant in low-SNR or low-pilot density scenarios.
  •  
22.
  • Steinmetz, Erik, et al. (författare)
  • Theoretical Limits on Cooperative Positioning in Mixed Traffic
  • 2019
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers Inc.. - 2169-3536. ; 7, s. 49712-49725
  • Tidskriftsartikel (refereegranskat)abstract
    • A promising solution to meet the demands on accurate positioning and real-time situational awareness in future intelligent transportation systems (ITSs) is cooperative positioning, where vehicles share sensor information over the wireless channel. However, the sensing and communication technologies required for this will be gradually introduced into the market, and it is, therefore, important to understand what performance we can expect from cooperative positioning systems as we transition to a more modern vehicle fleet. In this paper, we study what effects a gradual market penetration has on cooperative positioning applications, through a Fisher information analysis. The simulation results indicate that solely introducing a small fraction of automated vehicles with high-end sensors significantly improves the positioning quality but is not enough to meet the stringent demands posed by safety critical ITS applications. Furthermore, we find that retrofitting vehicles with low-cost satellite navigation receivers and communication have marginal impact when the positioning requirements are stringent and that the longitudinal road position can be estimated more accurately than lateral. © 2013 IEEE.
  •  
23.
  • Al Nahas, Beshr, 1985, et al. (författare)
  • Low-power listening goes multi-channel
  • 2014
  • Ingår i: Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. ; , s. 2-9
  • Konferensbidrag (refereegranskat)abstract
    • Exploiting multiple radio channels for communication has been long known as a practical way to mitigate interference in wireless settings. In Wireless Sensor Networks, however, multi-channel solutions have not reached their full potential: the MAC layers included in TinyOS or the Contiki OS for example are mostly single-channel. The literature offers a number of interesting solutions, but experimental results were often too few to build confidence. We propose a practical extension of low-power listening, MiCMAC, that performs channel hopping, operates in a distributed way, and is independent of upper layers of the protocol stack. The above properties make it easy to deploy in a variety of scenarios, without any extra configuration/scheduling/channel selection hassle. We implement our solution in Contiki and evaluate it in a 97-node~testbed while running a complete, out-of-the-box low-power IPv6 communication stack (UDP/RPL/6LoWPAN). Our experimental results demonstrate increased resilience to emulated WiFi interference (e.g., data yield kept above 90% when Contiki MAC drops in the 40% range). In noiseless environments, MiCMAC keeps the overhead low in comparison to Contiki MAC, achieving performance as high as 99% data yield along with sub-percent duty cycle and sub-second latency for a 1-minute inter-packet interval data collection. © 2014 IEEE.
  •  
24.
  • Chen, Dongliang, et al. (författare)
  • The Scanner of Heterogeneous Traffic Flow in Smart Cities by an Updating Model of Connected and Automated Vehicles
  • 2022
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - : IEEE. - 1524-9050 .- 1558-0016. ; 23:12, s. 25361-25370
  • Tidskriftsartikel (refereegranskat)abstract
    • The problems of traditional traffic flow detection and calculation methods include limited traffic scenes, high system costs, and lower efficiency over detecting and calculating. Therefore, in this paper, we presented the updating Connected and Automated Vehicles (CAVs) model as the scanner of heterogeneous traffic flow, which uses various sensors to detect the characteristics of traffic flow in several traffic scenes on the roads. The model contains the hardware platform, software algorithm of CAV, and the analysis of traffic flow detection and simulation by Flow Project, where the driving of vehicles is mainly controlled by Reinforcement Learning (RL). Finally, the effectiveness of the proposed model and the corresponding swarm intelligence strategy is evaluated through simulation experiments. The results showed that the traffic flow scanning, tracking, and data recording performed continuously by CAVs are effective. The increase in the penetration rate of CAVs in the overall traffic flow has a significant effect on vehicle detection and identification. In addition, the vehicle occlusion rate is independent of the CAV lane position in all cases. The complete street scanner is a new technology that realizes the perception of the human settlement environment with the help of the Internet of Vehicles based on 5G communications and sensors. Although there are some shortcomings in the experiment, it still provides an experimental reference for the development of smart vehicles.
  •  
25.
  • Ivashina, Marianna, 1975, et al. (författare)
  • Antenna Technologies for Beyond-5G Wireless Communication : Challenges and Opportunities
  • 2021
  • Ingår i: 2021 International Symposium on Antennas and Propagation, ISAP 2021. - : Institute of Electrical and Electronics Engineers (IEEE).
  • Konferensbidrag (refereegranskat)abstract
    • This paper provides an overview of the Sweden-Taiwan collaborative research framework project 'Antenna Technologies for Beyond-5G Wireless Communication' that has been recently established to develop robust and energy-efficient integrated antenna solutions for frequencies beyond 100 GHz as future enabling technologies for the 5G+ applications. Technological challenges in manufacturing and integration with electronics as well as available opportunities are discussed.
  •  
26.
  • Kruglov, Dmitrii, 1994, et al. (författare)
  • Enhancing mmWave On-Chip-Antennas Using In-Package Electromagnetic Bandgap Structures
  • 2021
  • Ingår i: European Microwave Conference. - 1527-3342 .- 1557-9581. - 9782874870637 ; , s. 885-888
  • Konferensbidrag (refereegranskat)abstract
    • We propose a silicon on-Chip-in-Package antenna design featuring a simulated radiation efficiency of > 70% and an S11 matching better than −10 dB in the 112–125 GHz frequency range. High radiation performance is achieved by: (i) thinning the silicon substrate down to 100 μm through wafer-level grinding; (ii) embedding the IC in-between two PCBs, one of which forms an electromagnetic bandgap structure that attenuates the EM leakage inside the silicon substrate. Furthermore, since the die-embedding concept employs the gap-waveguide packaging technology, a universal contactless waveguide interconnect is realized between the IC and the radiating gap waveguide in the package. This will also enable modular antenna designs.
  •  
27.
  • Westin, Jonathan, 1980, et al. (författare)
  • Digitising Sensitive Heritage Monuments In Antarctica
  • 2024
  • Ingår i: The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XLVIII-2/W4-2024. 10th International Workshop 3D-ARCH "3D Virtual Reconstruction and Visualization of Complex Architectures, 21–23 February 2024, Siena, Italy / editor(s): S. Campana, F. Fassi, and F. Remondino. - : International Society for Photogrammetry and Remote Sensing. - 1682-1750.
  • Konferensbidrag (refereegranskat)abstract
    • During the Antarctica expedition CHAQ2020, several cultural heritage sites – remains from the Swedish South Polar Expedition (1901–1903) – were documented using a range of different techniques and technologies. These physical monuments and environments are for all intents and purposes unavailable for most researchers due to their remote location and are also threatened by the effects of climate change. Hence, the deployed documentation techniques and technologies were selected both as a consequence of the inherently difficult conditions in Antarctica, where their reliance, durability, and speed were key considerations, but also for their perceived ability to document the unique and fragile environment. The documentation was carried out with the double intention of both allowing for observations in situ through processes of analytical drawings and data capture, but also capturing the environment as broadly and deeply as possible, in essence making a copy of it open for studies of unknown unknowns, that could serve as a source material for research questions still undefined. Hence, with the documentation of the winter station on Snow Hill Island as a case study, and with a perspective on documentation as a method through which to process, preserve, and disseminate information, this article serves to critically detail, compare, and evaluate the digital techniques and technologies that the expedition deployed to capture architectural elements and spatial contexts, and the data that could be obtained through these.
  •  
28.
  • Dima, Elijs, et al. (författare)
  • View position impact on QoE in an immersive telepresence system for remote operation
  • 2019
  • Ingår i: 2019 11th International Conference on Quality of Multimedia Experience, QoMEX 2019. - Berlin, Germany : Institute of Electrical and Electronics Engineers Inc.. - 9781538682128
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we investigate how different viewing positions affect a user's Quality of Experience (QoE) and performance in an immersive telepresence system. A QoE experiment has been conducted with 27 participants to assess the general subjective experience and the performance of remotely operating a toy excavator. Two view positions have been tested, an overhead and a ground-level view, respectively, which encourage reliance on stereoscopic depth cues to different extents for accurate operation. Results demonstrate a significant difference between ground and overhead views: the ground view increased the perceived difficulty of the task, whereas the overhead view increased the perceived accomplishment as well as the objective performance of the task. The perceived helpfulness of the overhead view was also significant according to the participants. 
  •  
29.
  • Pang, Xiaodan, Dr., et al. (författare)
  • Bridging the Terahertz Gap : Photonics-assisted Free-Space Communications from the Submillimeter-Wave to the Mid-Infrared
  • 2022
  • Ingår i: Journal of Lightwave Technology. - : Institute of Electrical and Electronics Engineers Inc.. - 0733-8724 .- 1558-2213. ; 40:10, s. 3149-3162
  • Tidskriftsartikel (refereegranskat)abstract
    • Since about one and half centuries ago, at the dawn of modern communications, the radio and the optics have been two separate electromagnetic spectrum regions to carry data. Differentiated by their generation/detection methods and propagation properties, the two paths have evolved almost independently until today. The optical technologies dominate the long-distance and high-speed terrestrial wireline communications through fiber-optic telecom systems, whereas the radio technologies have mainly dominated the short- to medium-range wireless scenarios. Now, these two separate counterparts are both facing a sign of saturation in their respective roadmap horizons, particularly in the segment of free-space communications. The optical technologies are extending into the mid-wave and long-wave infrared (MWIR and LWIR) regimes to achieve better propagation performance through the dynamic atmospheric channels. Radio technologies strive for higher frequencies like the millimeter-wave (MMW) and sub-terahertz (sub-THz) to gain broader bandwidth. The boundary between the two is becoming blurred and intercrossed. During the past few years, we witnessed technological breakthroughs in free-space transmission supporting very high data rates, many achieved with the assistance of photonics. This paper focuses on such photonics-assisted free-space communication technologies in both the lower and upper sides of the THz gap and provides a detailed review of recent research and development activities on some of the key enabling technologies. Our recent experimental demonstrations of high-speed free-space transmissions in both frequency regions are also presented as examples to show the system requirements for device characteristics and digital signal processing (DSP) performance.
  •  
30.
  • Jang, Jeong Keun, et al. (författare)
  • Area-efficient scheduling scheme based FFT processor for various OFDM systems
  • 2018
  • Ingår i: 2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018). - : IEEE. - 9781538682401 ; , s. 338-341
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents an area-efficient fast Fouriertransform (FFT) processor for orthogonal frequency-division multiplexing systems based on multi-path delay commutator architecture. This paper proposes a data scheduling scheme to reduce the number of complex constant multipliers. The proposed mixed-radix multi-path delay commutator FFT processor can support 128-, 256-, and 512-point FFT sizes. The proposed processor was synthesized using the Samsung 65-nm CMOS standard cell library. The proposed processor with eight parallel data paths can achieve a high throughput rate of up to 2.64 GSample/s at 330 MHz.
  •  
31.
  • Theorin, Alfred, et al. (författare)
  • An Event-Driven Manufacturing Information System Architecture
  • 2015
  • Ingår i: 15th IFAC Symposium onInformation Control Problems inManufacturing - INCOM 2015. - : Elsevier BV. ; 48:3, s. 547-554
  • Konferensbidrag (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They also need to make better use of plant data, ideally utilizing all data from the entire plant. Low-level data should be refined to real-time information for decision making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture, LISA, is designed to enable flexible factory integration and data utilization. In LISA, international standards and established off-the-shelf technologies have been combined with the main objective to be industrially applicable. LISA is an event-driven architecture with a prototype-oriented information model and formalized transformation services. It features loose coupling, flexibility, and ease of retrofitting legacy devices. The architecture has been evaluated on both real industrial data and industrial demonstrators and is also being installed at a large automotive company.
  •  
32.
  • Grabowski, Alexander, 1993 (författare)
  • VCSEL Equivalent Circuits and Silicon Photonics Integration
  • 2022
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The vertical-cavity surface-emitting laser (VCSEL) is a light source of great importance for numerous industrial and consumer products. The main application areas are datacom and sensing. The datacom industry uses GaAs-based VCSELs for optical interconnects, the short-reach fiber optical communication links used to transfer large amounts of data at high rates between units within data centers and supercomputers. In the area of sensing, VCSELs are largely used in consumer products such as smart phones (e.g. face ID and camera auto focus), computer mice, and automobiles (e.g. gesture recognition and LIDAR for autonomous driving). In this work, an advanced physics-based equivalent circuit model for datacom VCSELs has been developed. The model lends itself to co-design and co-optimization with driver and receiver ICs, thereby enabling higher data rate transceivers with bandwidth limited VCSELs and photodiodes. The model also facilitates an understanding of how each physical process within the VCSEL affects the VCSEL static and dynamic performance. It has been applied to study the impact of carrier transport and capture on VCSEL dynamics. The work also includes micro-transfer-printing of GaAs-based single-mode VCSELs on silicon nitride photonic integrated circuits (PICs). Such PICs are increasingly used for e.g. compact and highly functional bio-photonic sensors. Transfer printing of VCSELs enables the much-needed on-PIC integration of power efficient light sources. The bottom-emitting VCSELs are printed above grating couplers on the PIC and optical feedback is used to control the polarization for efficient coupling to the silicon nitride waveguide. Wavelength tuning, as required by the bio-sensing application, is achieved by direct current modulation.
  •  
33.
  • Liu, Yang, et al. (författare)
  • A Study Towards Enhanced Reliability Performance of Remote Control and Monitoring Application Over Commercial Wireless Communication Networks
  • 2006
  • Ingår i: 2006 International Conference on Wireless Communications, Networking and Mobile Computing. - : Institute of Electrical and Electronics Engineers (IEEE). - 1424405173 - 1424405173 ; , s. 1-4
  • Konferensbidrag (refereegranskat)abstract
    • Remote control and monitoring systems provide many useful operating advantages in industrial automation and demand highly reliable and secure communication means. Their widespread use is, however, limited because of the high cost of current communications in use making them economically infeasible. Hence, there is a need to develop new low cost communication and control concepts by making such solutions economically feasible. In this paper, we present a scheme for implementing reliable wireless communication links for application of remote control and monitoring system based on current available commercial wireless communication networks, e.g. GPRS/EDGE/UMTS. The reliability enhancement over wireless networks has been proposed and its performance has been studied. This paper examines the proposed solution by means of both analytical and numerical evaluation, and has shown that the demanded reliability performance can be met by using only commercial wireless communication networks.
  •  
34.
  • Ranisch, Robert, et al. (författare)
  • Ethics of digital contact tracing apps for the Covid-19 pandemic response
  • 2020
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • There is a growing interest in contact tracing apps (CT apps) for pandemic man- agement. These apps raise significant moral concerns. It is therefore crucial to consider ethical requirements before and while implementing such apps. Public trust is of major importance for population uptake of contact tracing apps. Hasty, ill-prepared or badly communicated implementations of CT apps will likely under- mine public trust, and as such, risk impeding general effectiveness. In response to these demands, to meet ethical requirements and find a basis for justified trust, this background introduces an ethical framework for a responsible design and implementation of CT apps. However, even prudently chosen measures of digital contact tracing carry moral costs, which makes it necessary address different trade-offs. This background paper aims to inform developers, researchers and decision-makers be- fore and throughout the process of implementing contact tracing apps.
  •  
35.
  • Lakhan, Abdullah, et al. (författare)
  • Dynamic application partitioning and task-scheduling secure schemes for biosensor healthcare workload in mobile edge cloud
  • 2021
  • Ingår i: Electronics. - 2079-9292. ; 10:22, s. 1-30
  • Tidskriftsartikel (refereegranskat)abstract
    • Currently, the use of biosensor-enabled mobile healthcare workflow applications in mobile edge-cloud-enabled systems is increasing progressively. These applications are heavyweight and divided between a thin client mobile device and a thick server edge cloud for execution. Application partitioning is a mechanism in which applications are divided based on resource and energy parameters. However, existing application-partitioning schemes widely ignore security aspects for healthcare applications. This study devises a dynamic application-partitioning workload task-scheduling-secure (DAPWTS) algorithm framework that consists of different schemes, such as min-cut algorithm, searching node, energy-enabled scheduling, failure scheduling, and security schemes. The goal is to minimize the energy consumption of nodes and divide the application between local nodes and edge nodes by applying the secure min-cut algorithm. Furthermore, the study devises the secure-min-cut algorithm, which aims to migrate data between nodes in a secure form during application partitioning in the system. After partitioning the applications, the node-search algorithm searches optimally to run applications under their deadlines. The energy and failure schemes maintain the energy consumption of the nodes and the failure of the system. Simulation results show that DAPWTS outperforms existing baseline approaches by 30% in terms of energy consumption, deadline, and failure of applications in the system.
  •  
36.
  • Wang, W., et al. (författare)
  • Packet priority assignment for wireless control systems of multiple physical systems
  • 2019
  • Ingår i: Proceedings - 2019 IEEE 22nd International Symposium on Real-Time Distributed Computing, ISORC 2019. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728101507 ; , s. 143-150
  • Konferensbidrag (refereegranskat)abstract
    • Wireless control systems (WCSs) have gained much attention lately, due to their easy deployment and flexibility compared to wired control systems. However, this comes at the cost of possibly increased network delay and packet losses, that can significantly impact the control system performance, and possibly its stability. Such problems become even more relevant if the network is shared among different control systems, and thus becomes a scarce resource, like in Industrial Internet of Things applications. In this paper, we describe how to assign packet priorities dynamically when there are many physical systems sharing a given network, aiming at minimizing the performance degradation of the WCS. Towards that, we present a network model including both delay and packet losses, both of which are very important for the control system performance. Our solution is evaluated over two different use cases to show the generality of the approach: the WCS for a set of inverted pendula, and the WCS for small modular reactors in a nuclear power plant. The results show that the proposed approach allows for a more stable performance even in presence of highly nonlinear systems, sensitive to time-varying delays, as well as in presence of high network interference.
  •  
37.
  • Bencheikh Lehocine, Chouaib, 1993, et al. (författare)
  • Robust Analog Beamforming for Periodic Broadcast V2V Communication
  • 2022
  • Ingår i: IEEE Transactions on Intelligent Transportation Systems. - 1524-9050 .- 1558-0016. ; 23:10, s. 18404-18422
  • Tidskriftsartikel (refereegranskat)abstract
    • We generalize an existing low-cost analog signal processing concept that takes advantage of the periodicity of vehicle-to-vehicle broadcast service to the transmitter side. In particular, we propose to process multiple antennas using either an analog beamforming network (ABN) of phase shifters, or an antenna switching network (ASN) that periodically alternates between the available antennas, to transmit periodic messages to receivers that have an analog combining network (ACN) of phase shifters, which has been proposed in earlier work. To guarantee robustness, we aim to minimize the burst error probability for the worst receiving vehicular user, in a scenario of bad propagation condition that is modeled by a single dominant path between the communicating vehicles. In absence of any form of channel knowledge, we analytically derive the optimal parameters of both ABN and ASN. The ABN beamforming vector is found to be optimal for all users and not only for the worst receiving user. Further, we demonstrate that Alamouti scheme for the special case of two transmit antennas yields similar performance to ABN and ASN. At last, we show that the derived parameters of the two proposed transmission strategies are also optimal when hybrid ACN-maximal ratio combining is used at the receiver.
  •  
38.
  • Malik, Mateen, et al. (författare)
  • Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
  • 2023
  • Ingår i: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. - : IEEE Computer Society. - 1541-0110. ; 2023, s. 23-29
  • Konferensbidrag (refereegranskat)abstract
    • A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification.
  •  
39.
  • Lv, Zhihan, Dr. 1984-, et al. (författare)
  • Editorial : 5G for Augmented Reality
  • 2022
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153.
  • Tidskriftsartikel (refereegranskat)
  •  
40.
  • Behdadi, Dorna, 1988, et al. (författare)
  • A Normative Approach to Artificial Moral Agency
  • 2020
  • Ingår i: Minds and Machines. - : Springer Science and Business Media LLC. - 0924-6495 .- 1572-8641. ; 30:2, s. 195-218
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper proposes a methodological redirection of the philosophical debate on artificial moral agency (AMA) in view of increasingly pressing practical needs due to technological development. This “normative approach” suggests abandoning theoretical discussions about what conditions may hold for moral agency and to what extent these may be met by artificial entities such as AI systems and robots. Instead, the debate should focus on how and to what extent such entities should be included in human practices normally assuming moral agency and responsibility of participants. The proposal is backed up by an analysis of the AMA debate, which is found to be overly caught in the opposition between so-called standard and functionalist conceptions of moral agency, conceptually confused and practically inert. Additionally, we outline some main themes of research in need of attention in light of the suggested normative approach to AMA.
  •  
41.
  • Björnson, Emil, et al. (författare)
  • DISTRIBUTED MASSIVE MIMO IN CELLULAR NETWORKS: IMPACT OF IMPERFECT HARDWARE AND NUMBER OF OSCILLATORS
  • 2015
  • Ingår i: 2015 23rd European Signal Processing Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 2076-1465. - 9780992862633 ; , s. 2436-2440
  • Konferensbidrag (refereegranskat)abstract
    • Distributed massive multiple-input multiple-output (MIMO) combines the array gain of coherent MIMO processing with the proximity gains of distributed antenna setups. In this paper, we analyze how transceiver hardware impairments affect the downlink with maximum ratio transmission. We derive closed-form spectral efficiencies expressions and study their asymptotic behavior as the number of the antennas increases. We prove a scaling law on the hardware quality, which reveals that massive MIMO is resilient to additive distortions, while multiplicative phase noise is a limiting factor. It is also better to have separate oscillators at each antenna than one per BS.
  •  
42.
  • Panigrahi, Smruti Ranjan, 1983-, et al. (författare)
  • A Study of Delay and Doppler Spreads at 24 GHz ISM band
  • 2020
  • Ingår i: 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). - : Institute of Electrical and Electronics Engineers (IEEE). - 9781728197227 ; , s. 1-6
  • Konferensbidrag (refereegranskat)abstract
    • This article investigates the wide-band channel characteristics at 24 GHz ISM band in a mobile radio environment. The mobility in the test environment is achieved by attaching the transmit antenna to a KUKA robot's arm. The radio measurements were carried out inside the robotics lab at the University of Gävle, Sweden. The radio channel measurements were carried out at various situations, e.g., line of sight (LOS), non-line of sight (NLOS), regular lab environment, reflective environment, and different velocities of the robot's arm. The influence of these situations on the power delay profile, Doppler spectral density, root mean square (RMS) delay spread, RMS Doppler spread, coherence bandwidth and coherence time, has been studied.
  •  
43.
  • ur Réhman, Shafiq, 1978- (författare)
  • Expressing emotions through vibration for perception and control
  • 2010
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This thesis addresses a challenging problem: “how to let the visually impaired ‘see’ others emotions”. We, human beings, are heavily dependent on facial expressions to express ourselves. A smile shows that the person you are talking to is pleased, amused, relieved etc. People use emotional information from facial expressions to switch between conversation topics and to determine attitudes of individuals. Missing emotional information from facial expressions and head gestures makes the visually impaired extremely difficult to interact with others in social events. To enhance the visually impaired’s social interactive ability, in this thesis we have been working on the scientific topic of ‘expressing human emotions through vibrotactile patterns’. It is quite challenging to deliver human emotions through touch since our touch channel is very limited. We first investigated how to render emotions through a vibrator. We developed a real time “lipless” tracking system to extract dynamic emotions from the mouth and employed mobile phones as a platform for the visually impaired to perceive primary emotion types. Later on, we extended the system to render more general dynamic media signals: for example, render live football games through vibration in the mobile for improving mobile user communication and entertainment experience. To display more natural emotions (i.e. emotion type plus emotion intensity), we developed the technology to enable the visually impaired to directly interpret human emotions. This was achieved by use of machine vision techniques and vibrotactile display. The display is comprised of a ‘vibration actuators matrix’ mounted on the back of a chair and the actuators are sequentially activated to provide dynamic emotional information. The research focus has been on finding a global, analytical, and semantic representation for facial expressions to replace state of the art facial action coding systems (FACS) approach. We proposed to use the manifold of facial expressions to characterize dynamic emotions. The basic emotional expressions with increasing intensity become curves on the manifold extended from the center. The blends of emotions lie between those curves, which could be defined analytically by the positions of the main curves. The manifold is the “Braille Code” of emotions. The developed methodology and technology has been extended for building assistive wheelchair systems to aid a specific group of disabled people, cerebral palsy or stroke patients (i.e. lacking fine motor control skills), who don’t have ability to access and control the wheelchair with conventional means, such as joystick or chin stick. The solution is to extract the manifold of the head or the tongue gestures for controlling the wheelchair. The manifold is rendered by a 2D vibration array to provide user of the wheelchair with action information from gestures and system status information, which is very important in enhancing usability of such an assistive system. Current research work not only provides a foundation stone for vibrotactile rendering system based on object localization but also a concrete step to a new dimension of human-machine interaction.
  •  
44.
  • Mårtensson, Jonas, 1976-, et al. (författare)
  • The development of a cooperative heavy-duty vehicle for the GCDC 2011: Team Scoop
  • 2012
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - : IEEE Press. - 1524-9050 .- 1558-0016. ; 13:3, s. 1033-1049
  • Tidskriftsartikel (refereegranskat)abstract
    • The first edition of the Grand Cooperative Driving Challenge (GCDC) was held in the Netherlands in May 2011. Nine international teams competed in urban and highway platooning scenarios with prototype vehicles using cooperative adaptive cruise control. Team Scoop, a collaboration between KTH Royal Institute of Technology, Stockholm, Sweden, and Scania CV AB, Sodertalje, Sweden, participated at the GCDC with a Scania R-series tractor unit. This paper describes the development and design of Team Scoop's prototype system for the GCDC. In particular, we present considerations with regard to the system architecture, state estimation and sensor fusion, and the design and implementation of control algorithms, as well as implementation issues with regard to the wireless communication. The purpose of the paper is to give a broad overview of the different components that are needed to develop a cooperative driving system: from architectural design, workflow, and functional requirement descriptions to the specific implementation of algorithms for state estimation and control. The approach is more pragmatic than scientific; it collects a number of existing technologies and gives an implementation-oriented view of a cooperative vehicle. The main conclusion is that it is possible, with a modest effort, to design and implement a system that can function well in cooperation with other vehicles in realistic traffic scenarios.
  •  
45.
  • Shankar, N. U., et al. (författare)
  • Assistive communication device for cognitive disability and spastic children
  • 2011
  • Ingår i: Proceedings - 2011 IEEE Global Humanitarian Technology Conference, GHTC 2011. - 9780769545950 ; , s. 7-10
  • Konferensbidrag (refereegranskat)abstract
    • Communication has been a major problem for children with cognitive disabilities and spastic children. They are unable to effectively communicate their needs to their parents and caretakers. Modern advancements in communication technology, with increased capabilities of mobile phones, provide scope to design assistive technologies for these children. In this paper, we describe the design of a smartphone based communication device for children with cognitive disabilities and spastic children. We also present early findings on how it was successful in increased engagement between the children and caretakers, along with further r capabilities that the device can cater to.
  •  
46.
  • Shirazinia, Amirpasha, et al. (författare)
  • Dynamic source-channel coding for estimation and control over binary symmetric channels
  • 2015
  • Ingår i: IET Control Theory & Applications. - : Institution of Engineering and Technology (IET). - 1751-8644 .- 1751-8652. ; 9:9, s. 1444-1454
  • Tidskriftsartikel (refereegranskat)abstract
    • The authors study causal dynamic source-channel codes for mean-square stabilisation of a linear plant with random initial state, over binary symmetric channels (BSCs). A binary expansion source coding scheme and two types of channel coding schemes are investigated: (i) dynamic repetition encoding under sequential majority logic decoding, and (ii) dynamic Fountain encoding under sequential BP decoding. The coding schemes are first analysed for an open-loop system, where the goal is to transmit a real-valued source over BSCs with the objective of minimising end-to-end mean-square error distortion. They derive upper- and lower bounds on the achievable distortion which is a function of time. Based on these distortion bounds, they show that the dynamic Fountain codes are able to stabilise (in mean-square sense) an unstable linear plant over BSCs.
  •  
47.
  • Wang, Jia, et al. (författare)
  • Industry-friendly engineering tools for wireless home automation devices
  • 2015
  • Ingår i: Proceeding - 2015 IEEE International Conference on Industrial Informatics, INDIN 2015. - Piscataway, NJ : IEEE conference proceedings. - 9781479966493 ; , s. 1174-1179
  • Konferensbidrag (refereegranskat)abstract
    • Although home automation (HA) systems in the wired domain are widely accepted by consumers, in today's industry, the mega trend is steering HA systems along a wireless way. Theoretically, wireless solutions are able to provide HA systems with more flexibility and thus reducing engineering costs. In practice, however, deploying wireless HA systems actually requires more costs and efforts due to the lack of versatile software tools to support the whole engineering process. This paper defines and evaluates the engineering workflow and architecture for home automation systems. The proposed architecture is studied and implemented based on web technologies and graphical configuration environments, with the aim of reducing workloads of HA engineers at every stage. A prototype has been implemented to demonstrate the technical feasibility of the proposed architecture.
  •  
48.
  • Jiang, Yuning, 1993- (författare)
  • Vulnerability Analysis for Critical Infrastructures
  • 2022
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. Therefore, the need to improve cybersecurity expectations of CIs through vulnerability assessments cannot be overstated. Yet, CI cybersecurity has intrinsic challenges due to the convergence of information technology (IT) and operational technology (OT) as well as the crosslayer dependencies that are inherent to CPS based CIs. Different IT and OT security terminologies also lead to ambiguities induced by knowledge gaps in CI cybersecurity. Moreover, current vulnerability-assessment processes in CIs are mostly subjective and human-centered. The imprecise nature of manual vulnerability assessment operations and the massive volume of data cause an unbearable burden for security analysts. Latest advances in machine-learning (ML) based cybersecurity solutions promise to shift such burden onto digital alternatives. Nevertheless, the heterogeneity, diversity and information gaps in existing vulnerability data repositories hamper accurate assessments anticipated by these ML-based approaches. Therefore, a comprehensive approach is envisioned in this thesis to unleash the power of ML advances while still involving human operators in assessing cybersecurity vulnerabilities within deployed CI networks.Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level of automation in vulnerability analysis. The proposed methodology follows design science research principles to support the development and validation of scientifically-sound artifacts. More specifically, the proposed data-driven cybersecurity architecture orchestrates a range of modules that include: (i) a vulnerability data model that captures a variety of publicly accessible cybersecurity-related data sources; (ii) an ensemble-based ML pipeline method that self-adjusts to the best learning models for given cybersecurity tasks; and (iii) a knowledge taxonomy and its instantiated power grid and manufacturing models that capture CI common semantics of cyberphysical functional dependencies across CI networks in critical societal domains. This research contributes data-driven vulnerability analysis approaches that bridge the knowledge gaps among different security functions, such as vulnerability management through related reports analysis. This thesis also correlates vulnerability analysis findings to coordinate mitigation responses in complex CIs. More specifically, the vulnerability data model expands the vulnerability knowledge scope and curates meaningful contexts for vulnerability analysis processes. The proposed ML methods fill information gaps in vulnerability repositories using curated data while further streamlining vulnerability assessment processes. Moreover, the CI security taxonomy provides disciplined and coherent support to specify and group semanticallyrelated components and coordination mechanisms in order to harness the notorious complexity of CI networks such as those prevalent in power grids and manufacturing infrastructures. These approaches learn through interactive processes to proactively detect and analyze vulnerabilities while facilitating actionable insights for security actors to make informed decisions.
  •  
49.
  • Mao, Yadong, et al. (författare)
  • Decentralized Training of 3D Lane Detection with Automatic Labeling Using HD Maps
  • 2023
  • Ingår i: IEEE Vehicular Technology Conference. - 1550-2252. ; 2023-June
  • Konferensbidrag (refereegranskat)abstract
    • To have competent 3D lane detection for real-world driving, a massive amount of data from all over the world is needed, but data collection and manual annotation are costly and time-consuming. The diversity of data collected by developmental cars might still be limited compared to the data collected by a large fleet of customer cars. Federated learning enables training models on edge without transferring data out of devices. However, training supervised learning tasks at the edge is directly tied to having access to high-quality labels, which is limited at the edge. In this paper, we propose a fully automatic method to generate 3D lane labels at the edge using a pre-recorded HD map to enable the federated training of the 3D lane detection model. As a reference, a semi-automatic method is applied for creating a 3D-lane dataset used as ground truth. Our experimental results show that the model can achieve comparable performance when training on the same dataset in both a centralized and a decentralized manner. And the models trained on semi-automatic labeled datasets slightly outperform those trained on fully-automatically labeled datasets. This study shows that a well-performing 3D lane detection model can be trained in a supervised and fully decentralized manner, and most importantly, data privacy at the edge is guaranteed.
  •  
50.
  • Khan, Muhammad Sikandar Lal, 1988- (författare)
  • Presence through actions : theories, concepts, and implementations
  • 2017
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • During face-to-face meetings, humans use multimodal information, including verbal information, visual information, body language, facial expressions, and other non-verbal gestures. In contrast, during computer-mediated-communication (CMC), humans rely either on mono-modal information such as text-only, voice-only, or video-only or on bi-modal information by using audiovisual modalities such as video teleconferencing. Psychologically, the difference between the two lies in the level of the subjective experience of presence, where people perceive a reduced feeling of presence in the case of CMC. Despite the current advancements in CMC, it is still far from face-to-face communication, especially in terms of the experience of presence.This thesis aims to introduce new concepts, theories, and technologies for presence design where the core is actions for creating presence. Thus, the contribution of the thesis can be divided into a technical contribution and a knowledge contribution. Technically, this thesis details novel technologies for improving presence experience during mediated communication (video teleconferencing). The proposed technologies include action robots (including a telepresence mechatronic robot (TEBoT) and a face robot), embodied control techniques (head orientation modeling and virtual reality headset based collaboration), and face reconstruction/retrieval algorithms. The introduced technologies enable action possibilities and embodied interactions that improve the presence experience between the distantly located participants. The novel setups were put into real experimental scenarios, and the well-known social, spatial, and gaze related problems were analyzed.The developed technologies and the results of the experiments led to the knowledge contribution of this thesis. In terms of knowledge contribution, this thesis presents a more general theoretical conceptual framework for mediated communication technologies. This conceptual framework can guide telepresence researchers toward the development of appropriate technologies for mediated communication applications. Furthermore, this thesis also presents a novel strong concept – presence through actions - that brings in philosophical understandings for developing presence- related technologies. The strong concept - presence through actions is an intermediate-level knowledge that proposes a new way of creating and developing future 'presence artifacts'. Presence- through actions is an action-oriented phenomenological approach to presence that differs from traditional immersive presence approaches that are based (implicitly) on rationalist, internalist views.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-50 av 7506
Typ av publikation
konferensbidrag (4008)
tidskriftsartikel (2494)
doktorsavhandling (307)
licentiatavhandling (197)
bokkapitel (117)
rapport (113)
visa fler...
annan publikation (101)
patent (73)
forskningsöversikt (31)
bok (25)
proceedings (redaktörskap) (25)
samlingsverk (redaktörskap) (13)
konstnärligt arbete (6)
recension (1)
visa färre...
Typ av innehåll
refereegranskat (6405)
övrigt vetenskapligt/konstnärligt (997)
populärvet., debatt m.m. (101)
Författare/redaktör
Wymeersch, Henk, 197 ... (273)
Vinel, Alexey, 1983- (206)
Svensson, Tommy, 197 ... (162)
Larsson, Erik G (147)
Agrell, Erik, 1965 (132)
Wosinska, Lena, 1951 ... (115)
visa fler...
Björnson, Emil, Prof ... (112)
Graell i Amat, Alexa ... (105)
Karlsson, Magnus, 19 ... (104)
Skoglund, Mikael (100)
Tufvesson, Fredrik (98)
Monti, Paolo, 1973- (92)
Eriksson, Thomas, 19 ... (92)
Voigt, Thiemo (91)
Gidlund, Mikael, 197 ... (89)
Fischione, Carlo (87)
Durisi, Giuseppe, 19 ... (86)
Chen, Jiajia (85)
Pang, Xiaodan, Dr. (84)
Maguire Jr., Gerald ... (81)
Gross, James, 1975- (76)
Kihl, Maria (70)
Popov, Sergei (70)
Cavdar, Cicek, 1977- (69)
Ozolins, Oskars (68)
Xiao, Ming, 1975- (67)
Ottersten, Björn, 19 ... (64)
Wosinska, Lena (63)
Zander, Jens (63)
Larsson, Peter, 1966 (63)
Andrekson, Peter, 19 ... (61)
Yuan, Di (60)
Pioro, Michal (60)
Ström, Erik, 1965 (59)
Vyatkin, Valeriy (58)
Pappas, Nikolaos (58)
Makki, Behrooz, 1980 (58)
Edfors, Ove (57)
Papadimitratos, Pana ... (54)
Natalino Da Silva, C ... (49)
Yu, Xianbin (49)
Fager, Christian, 19 ... (48)
Dán, György (47)
Uz Zaman, Ashraf, 19 ... (47)
He, Zhongxia Simon, ... (47)
Häger, Christian, 19 ... (47)
Sung, Ki Won (47)
Pang, Xiaodan, 1986- (46)
Ivashina, Marianna, ... (45)
Mahmood, Aamir, 1980 ... (45)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (2915)
Chalmers tekniska högskola (1938)
Linköpings universitet (659)
Lunds universitet (618)
Uppsala universitet (474)
RISE (371)
visa fler...
Högskolan i Halmstad (349)
Mittuniversitetet (246)
Luleå tekniska universitet (208)
Mälardalens universitet (167)
Karlstads universitet (122)
Blekinge Tekniska Högskola (121)
Umeå universitet (72)
Högskolan i Gävle (33)
Linnéuniversitetet (33)
Göteborgs universitet (28)
Stockholms universitet (28)
Högskolan Kristianstad (23)
Malmö universitet (23)
Örebro universitet (22)
Högskolan i Borås (9)
VTI - Statens väg- och transportforskningsinstitut (9)
Jönköping University (8)
Högskolan Väst (7)
Högskolan i Skövde (7)
Sveriges Lantbruksuniversitet (6)
Handelshögskolan i Stockholm (5)
Karolinska Institutet (3)
Södertörns högskola (2)
Försvarshögskolan (2)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (7476)
Svenska (23)
Italienska (2)
Tyska (1)
Franska (1)
Norska (1)
visa fler...
Polska (1)
Kinesiska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (7505)
Naturvetenskap (1321)
Samhällsvetenskap (112)
Medicin och hälsovetenskap (35)
Humaniora (17)
Lantbruksvetenskap (7)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy