SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "AMNE:(TEKNIK OCH TEKNOLOGIER Elektroteknik och elektronik Datorsystem) "

Sökning: AMNE:(TEKNIK OCH TEKNOLOGIER Elektroteknik och elektronik Datorsystem)

  • Resultat 1-50 av 6303
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Blanch, Krister, 1991 (författare)
  • Beyond-application datasets and automated fair benchmarking
  • 2023
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Beyond-application perception datasets are generalised datasets that emphasise the fundamental components of good machine perception data. When analysing the history of perception datatsets, notable trends suggest that design of the dataset typically aligns with an application goal. Instead of focusing on a specific application, beyond-application datasets instead look at capturing high-quality, high-volume data from a highly kinematic environment, for the purpose of aiding algorithm development and testing in general. Algorithm benchmarking is a cornerstone of autonomous systems development, and allows developers to demonstrate their results in a comparative manner. However, most benchmarking systems allow developers to use their own hardware or select favourable data. There is also little focus on run time performance and consistency, with benchmarking systems instead showcasing algorithm accuracy. By combining both beyond-application dataset generation and methods for fair benchmarking, there is also the dilemma of how to provide the dataset to developers for this benchmarking, as the result of a high-volume, high-quality dataset generation is a significant increase in dataset size when compared to traditional perception datasets. This thesis presents the first results of attempting the creation of such a dataset. The dataset was built using a maritime platform, selected due to the highly dynamic environment presented on water. The design and initial testing of this platform is detailed, as well as as methods of sensor validation. Continuing, the thesis then presents a method of fair benchmarking, by utilising remote containerisation in a way that allows developers to present their software to the dataset, instead of having to first locally store a copy. To test this dataset and automatic online benchmarking, a number of reference algorithms were required for initial results. Three algorithms were built, using the data from three different sensors captured on the maritime platform. Each algorithm calculates vessel odometry, and the automatic benchmarking system was utilised to show the accuracy and run-time performance of these algorithms. It was found that the containerised approach alleviated data management concerns, prevented inflated accuracy results, and demonstrated precisely how computationally intensive each algorithm was.
  •  
2.
  • Shafiq, ur Réhman, 1978-, et al. (författare)
  • Using Vibrotactile Language for Multimodal Human Animals Communication and Interaction
  • 2014
  • Ingår i: Proceedings of the 2014 Workshops on Advances in Computer Entertainment Conference, ACE '14. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450333146 ; , s. 1:1-1:5
  • Konferensbidrag (refereegranskat)abstract
    • In this work we aim to facilitate computer mediated multimodal communication and interaction between human and animal based on vibrotactile stimuli. To study and influence the behavior of animals, usually researchers use 2D/3D visual stimuli. However we use vibrotactile pattern based language which provides the opportunity to communicate and interact with animals. We have performed experiment with a vibrotactile based human-animal multimodal communication system to study the effectiveness of vibratory stimuli applied to the animal skin along with audio and visual stimuli. The preliminary results are encouraging and indicate that low-resolution tactual displays are effective in transmitting information.
  •  
3.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
4.
  • Ribeiro, Luis, et al. (författare)
  • Industrial Agents for the Fast Deployment of Evolvable Assembly Systems
  • 2015. - 1st ed.
  • Ingår i: Industrial Agents. - Amsterdam, Netherlands : Elsevier. - 9780128003411 ; , s. 301-321, s. 301-322
  • Bokkapitel (refereegranskat)abstract
    • The current manufacturing scenario is characterized by high market unpredictability. Agility is therefore a central challenge for modern companies that need to understand and be proactive towards their product offer in respect to “what is offered, when it is offered, where, how and by whom” (Brown & Bessant 2003).The “what” and the “when” are particularly relevant to the research in emerging paradigms as they account for variety, customization and volume; and timing, speed and seasonality (Brown & Bessant 2003).In this scenario, several design approaches and models have been proposed in the last decade to enable re-configurability and subsequently enhance the companies’ ability to adjust their offer in nature and time.From a paradigmatic point of view research has concentrated on the organizational structure of the shop-floor and the associated controls aspects. Concepts like Reconfigurable Manufacturing Systems (RMS) (Koren & Shpitalni 2010) and Fractal Factories (FF) (Montreuil 1999) support the physical construction of production systems by regulating their layout and making a few assumptions on their logical organization. On the other hand, concepts like Bionic Manufacturing Systems (BMS)(Ueda 1992), Holonic Manufacturing Systems (HMS)(Van Brussel et al. 1998), Evolvable Assembly Systems (Ribeiro et al. 2010) essentially provide the theoretical guidelines for the logical/computational organization of the system (see (Tharumarajah 1996) for a comparison between BMS, HMS and FF and (Setchi & Lagos 2004) for the rationale supporting the shift from Dedicated Lines to Flexible Manufacturing System and finally RMS).While these paradigms provide the conceptual framework and the main design guidelines their actual interpretation and implementation has led to a wider set of architectures (Monostori, Váncza & Kumara 2006; Leitão 2009; Parunak 2000; Pěchouček & Mařík 2008).These architectures align the high-level principles with the technological offer and limitations while seeking to address the re-configurability requirements of (Mehrabi, Ulsoy & Koren 2000; Rösiö & Säfsten 2013):module mobility – modules are easy and quick to move and install;“diagnosability” – it is quick to identify the sources of quality and reliability problems;“integrability” – modules are easy to integrate into the rest of the system.“convertibility” – it is easy and quick to switch between existing products and it is easy to adapt the system to future products;scalability – it is easy to enlarge and downsize the production system;“automatibility” – a dynamic level of automation is enabled;modularity – all system elements are designed to be modular;customization – the capability and flexibility of the production system is designed according to the products to be produced in the system.Instant deployment, as addressed in the present chapter directly addresses mobility, “integrability”, “convertibility”, scalability and customization. Mechatronic modularity is a prerequisite and is enforced by the proposed architecture and the considered modular design. “Diagnosability” was not specifically tackled.In this context, the chapter analyses the agent-based architecture related with the Instantly Deployable Evolvable Assembly System (IDEAS) project that is inspired by the Evolvable Assembly System (EAS) paradigm (Ribeiro et al. 2010) as a mechanism to enable fast deployment of mechatronic modules. EAS advocates the use of process-oriented modules and envisions the production system as a collection of processes and the associated interacting agents.The architecture and the related test cases are used to draw the main lessons learned in respect to technological and conceptual implications.In this context, the remainder of this text is organized as follows: section 1.1 discusses the main deployment challenges, section 1.2 details the reference architecture and associated concepts, section 1.3 presents the principal implementation decisions, section 1.4 features the main lessons learned, sections 1.5 discusses the benefits of the proposed approach and finally section 1.6 reflects on the main conclusions.
  •  
5.
  • Bengtsson, Lars, 1963 (författare)
  • Mikrodatorteknik
  • 1995
  • Bok (övrigt vetenskapligt/konstnärligt)abstract
    • Första delen behandlar Microchips "Base-line"-kretsar och andra delen behandlar "Midrange"-kretsarna. De flesta funktioner belyses med konstruktionsexempel. Exempel och övningar är mycket hårdvarunära och boken behandlar konstruktion av mikrodatorer från grunden. Boken är avsedd för kurser i mikrodatorteknik på högskolan eller annan högre teknisk utbildning, men kan även användas som självstudiematerial eftersom de flesta exempel ges med detaljerade och verifierade lösningar av såväl hård- som mjukvaran. Tidigare erfarenhet av assemblerprogrammering är inte nödvändig men grundläggande kunskaper i digitalteknik förutsätts. Boken kan med fördel också läsas av rutinerade assemblerprogrammerare som vill veta hur prestanda hos de nya RISC-baserade PIC-controllerna står sig i konkurrensen med de mer etablerade enchipscontrollerna, t ex HC11 och 8751, som bygger på traditionell CISC-arkitektur.
  •  
6.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
7.
  • Jang, Jeong Keun, et al. (författare)
  • Area-efficient scheduling scheme based FFT processor for various OFDM systems
  • 2018
  • Ingår i: 2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018). - : IEEE. - 9781538682401 ; , s. 338-341
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents an area-efficient fast Fouriertransform (FFT) processor for orthogonal frequency-division multiplexing systems based on multi-path delay commutator architecture. This paper proposes a data scheduling scheme to reduce the number of complex constant multipliers. The proposed mixed-radix multi-path delay commutator FFT processor can support 128-, 256-, and 512-point FFT sizes. The proposed processor was synthesized using the Samsung 65-nm CMOS standard cell library. The proposed processor with eight parallel data paths can achieve a high throughput rate of up to 2.64 GSample/s at 330 MHz.
  •  
8.
  • Al Nahas, Beshr, 1985, et al. (författare)
  • Low-power listening goes multi-channel
  • 2014
  • Ingår i: Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. ; , s. 2-9
  • Konferensbidrag (refereegranskat)abstract
    • Exploiting multiple radio channels for communication has been long known as a practical way to mitigate interference in wireless settings. In Wireless Sensor Networks, however, multi-channel solutions have not reached their full potential: the MAC layers included in TinyOS or the Contiki OS for example are mostly single-channel. The literature offers a number of interesting solutions, but experimental results were often too few to build confidence. We propose a practical extension of low-power listening, MiCMAC, that performs channel hopping, operates in a distributed way, and is independent of upper layers of the protocol stack. The above properties make it easy to deploy in a variety of scenarios, without any extra configuration/scheduling/channel selection hassle. We implement our solution in Contiki and evaluate it in a 97-node~testbed while running a complete, out-of-the-box low-power IPv6 communication stack (UDP/RPL/6LoWPAN). Our experimental results demonstrate increased resilience to emulated WiFi interference (e.g., data yield kept above 90% when Contiki MAC drops in the 40% range). In noiseless environments, MiCMAC keeps the overhead low in comparison to Contiki MAC, achieving performance as high as 99% data yield along with sub-percent duty cycle and sub-second latency for a 1-minute inter-packet interval data collection. © 2014 IEEE.
  •  
9.
  • Behdadi, Dorna, 1988, et al. (författare)
  • A Normative Approach to Artificial Moral Agency
  • 2020
  • Ingår i: Minds and Machines. - : Springer Science and Business Media LLC. - 0924-6495 .- 1572-8641. ; 30:2, s. 195-218
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper proposes a methodological redirection of the philosophical debate on artificial moral agency (AMA) in view of increasingly pressing practical needs due to technological development. This “normative approach” suggests abandoning theoretical discussions about what conditions may hold for moral agency and to what extent these may be met by artificial entities such as AI systems and robots. Instead, the debate should focus on how and to what extent such entities should be included in human practices normally assuming moral agency and responsibility of participants. The proposal is backed up by an analysis of the AMA debate, which is found to be overly caught in the opposition between so-called standard and functionalist conceptions of moral agency, conceptually confused and practically inert. Additionally, we outline some main themes of research in need of attention in light of the suggested normative approach to AMA.
  •  
10.
  • Di Orio, Giovanni, et al. (författare)
  • The PRIME Semantic Language: Plug and Produce in Standard- based Manufacturing Production Systems
  • 2015
  • Ingår i: Proceedings of the Flexible Automation and Intelligent Manufacturing Conference.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Nowadays manufacturing production systems are becoming more and more responsive in order to succeed in ahighly unstable environment. The capability of a production system to effectively and efficiently adapt and evolveto face the changing requirements – imposed by volatile and dynamic global markets – is a necessary conditionto enable manufacturing enterprises to be agile. Since the agility of a manufacturing enterprise is always limitedby the agility of its own building blocks than it needs to be spread over the whole enterprise including the operationand information technologies (OT/IT). Turning to production systems, one of the significant challenges isrepresented by the possibility to provide easy and rapid (re-)configuration of their internal components and/orprocesses. Innovative technologies and paradigms have been explored during the years that combined with theincreasing advancement in manufacturing technologies enable the implementation of the “plug and produce”paradigm. The “plug and produce” paradigm is the foundation of any agile production system, since to be agile itis inevitably required to reduce the installation and (re-)engineering activities time – changing/adapting the systemto new requirements – while promoting configuration rather than programming. Therefore, the “plug andproduce” paradigm is a necessary but not sufficient condition for implementing agile production systems. Modernproduction systems are typically known for their plethora of heterogeneous component/equipment. In this complexscenario, the implementation of the “plug and produce” paradigm implies the existence of a well-definedontological model to support components/equipment abstraction with the objective to allow interactions,collaboration and knowledge sharing between them. The PRIME semantic language specifies the semanticstructure for the knowledge models and overall system communication language.
  •  
11.
  • Eklund, Johan, 1966-, et al. (författare)
  • Tuning SCTP failover for carrier grade telephony signaling
  • 2010
  • Ingår i: Computer Networks. - : Elsevier BV. - 1389-1286 .- 1872-7069. ; 54:1, s. 133-149
  • Tidskriftsartikel (refereegranskat)abstract
    • The Stream Control Transmission Protocol (SCTP) has not only been selected as the signaling transport protocol of choice in IETF SIGTRAN, the architecture that bridges circuit-switched and IP-based mobile core networks, but also plays a pivotal role in SAE/LTE, the next-generation UMTS/HSPA networks. To meet the redundancy requirements of telecom signaling traffic, SCTP includes a failover mechanism that enables rerouting of traffic from an unreachable network path to a backup path. However, the recommendations provided by IETF on how to configure the SCTP failover mechanism to meet telecom signaling requirements are kept quite general and leave much of the tuning to the telecom equipment vendor and/or operator. Several works by us and others have been carried out to study the effect of different SCTP parameters on the failover performance. The main contribution of this paper is that it gives a coherent treatment of how to configure the SCTP failover mechanism for carrier-grade telephony signaling, and provides practically usable configuration recommendations. The paper also discusses an alternate or complementary way of optimizing the SCTP failover mechanism by relaxing the exponential backoff that foregoes a retransmission timeout in SCTP. Some results showing significantly reduced failover times by use of this mechanism, with only marginal deteriorating effects on a signaling network, are discussed and analyzed in the paper. (C) 2009 Elsevier B.V. All rights reserved.
  •  
12.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
13.
  • Ranisch, Robert, et al. (författare)
  • Ethics of digital contact tracing apps for the Covid-19 pandemic response
  • 2020
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • There is a growing interest in contact tracing apps (CT apps) for pandemic man- agement. These apps raise significant moral concerns. It is therefore crucial to consider ethical requirements before and while implementing such apps. Public trust is of major importance for population uptake of contact tracing apps. Hasty, ill-prepared or badly communicated implementations of CT apps will likely under- mine public trust, and as such, risk impeding general effectiveness. In response to these demands, to meet ethical requirements and find a basis for justified trust, this background introduces an ethical framework for a responsible design and implementation of CT apps. However, even prudently chosen measures of digital contact tracing carry moral costs, which makes it necessary address different trade-offs. This background paper aims to inform developers, researchers and decision-makers be- fore and throughout the process of implementing contact tracing apps.
  •  
14.
  • Bengtsson, Lars, 1963 (författare)
  • Single-Chip Implementation of Level-Crossing ADC for ECG sampling
  • 2017
  • Ingår i: Journal of Electrical & Electronic Systems. - : OMICS Publishing Group. - 2332-0796. ; 6:1
  • Tidskriftsartikel (refereegranskat)abstract
    • This work demonstrates for the first time the implementation of a level-crossing analog-to-digital converter (LC-ADC) in a single, commercially available IC (that costs less than $2). The implementation utilizes adaptive threshold levels in order to prevent overload distortions for fast-changing signals. The entire design is based on a 20-pin PIC16F1769 microcontroller from Microchip and no external components are required. In fact, the only external circuitry required is a single jumper wire. This is due to the fact that the new generation of microcontrollers have integrated core-independent hardware, analog as well as digital. This design takes full advantage of the core-independent logic and analog blocks in a PIC16F17xx circuit to implement the LC-ADC technique that so far has required multiple-circuit designs or ASIC implementation. The design is demonstrated on a standard electrocardiogram (ECG) signal.
  •  
15.
  • Åkerberg, Johan, et al. (författare)
  • Design challenges and objectives in industrial wireless sensor networks
  • 2017
  • Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. - Boca Raton : CRC Press. - 9781466500525 - 9781466500518 ; , s. 79-100
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the advances in wireless sensor networks have grown exponentially and WSNs have been deployed in diverse application areas such as agriculture, disaster management, intelligent transport systems, and industrial automation. In industrial automation, wireless sensor networks have so far mostly been considered within building automation, factory automation, and process automation in order to save cost in cable reduction and maintenance but also improved flexibility [14]. Recently, wireless sensor networks for smart grid applications have been discussed. Several market forecasts have recently predicted exponential growths in the sensor market over the next few years, resulting in a multi-billion dollar market in the near future. For instance, ABI research [18] predicts that in 2015 around 645 million IEEE 802.15.4 chipsets will be shipped and that the worldwide market for automation systems in process industries will grow to roughly $150 billion.
  •  
16.
  • Bengtsson, Lars, 1963 (författare)
  • Embedded Measurement Systems
  • 2013
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The subject of Embedded Measurement Systems (EMS) is the merging of embedded systems and electrical measurement systems. This indicates that EMSs are hardware-software systems dedicated to measuring one or a few physical quantities. Applications are numerous; EMSs measure the temperature in refrigerators, freezers, irons, ovens and automobile combustion engines, they sense vibrations in tilt alarms and game consoles, they measure airflow in engines and ventilation systems, they measure shock impact in crash detectors and are used as shock and temperature loggers for transport goods, they measure air pressure in airplane cabins, humidity in air-conditioned environments, they measure liquid levels in fuel tanks, they detect smoke in fire alarms, they measure the viscosity of lubricant oil in engines, they measure the rotation speed of spinning wheels (in any engine), they measure torque in engines and are used as heart rate and ECG detectors in medicine etc. The commercial demand for ever cheaper products and worldwide environmental legislations force vendors to continuously look for more cost-efficient and less power-consuming solutions for their embedded measurement systems. This thesis is concerned most of all with the implementation of cost-efficient/low-power measurement systems in embedded controllers. This includes some novel ideas in voltage, time and resistance measurements with embedded controllers and it will demonstrate how these quantities, analog in nature, can be measured accurately and precisely by inherently digital embedded controllers.
  •  
17.
  • Theorin, Alfred, et al. (författare)
  • An event-driven manufacturing information system architecture for Industry 4.0
  • 2017
  • Ingår i: International Journal of Production Research. - : Taylor & Francis. - 0020-7543 .- 1366-588X. ; 55:5, s. 1297-1311
  • Forskningsöversikt (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They need to make better use of plant data, ideally utilising all data from the entire plant. Low-level data should be refined to real-time information for decision-making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture (LISA), is presented in this paper. It is an event-driven architecture featuring loose coupling, a prototype-oriented information model and formalised transformation services. LISA is designed to enable flexible factory integration and data utilisation. The focus of LISA is on integration of devices and services on all levels, simplifying hardware changes and integration of new smart services as well as supporting continuous improvements on information visualisation and control. The architecture has been evaluated on both real industrial data and industrial demonstrators and it is also being installed at a large automotive company. This article is an extended and revised version of the paper presented at the 2015 IFAC Symposium on Information Control in Manufacturing (INCOM 2015). The paper has been restructured in regards to the order and title of the chapters, and additional information about the integration between devices and services aspects have been added. The introduction and the general structure of the paper now better highlight the contributions of the paper and the uniqueness of the framework.
  •  
18.
  • Lv, Zhihan, Dr. 1984-, et al. (författare)
  • Editorial : 5G for Augmented Reality
  • 2022
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153.
  • Tidskriftsartikel (refereegranskat)
  •  
19.
  • Homem, Irvin, 1985- (författare)
  • Advancing Automation in Digital Forensic Investigations
  • 2018
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. Industry standard tools are evidence-centric, automate only a few precursory tasks (E.g. Parsing and Indexing) and have limited capabilities of integration from multiple evidence sources. Furthermore, these tools are always human-driven.These challenges are exacerbated in the increasingly computerized and highly networked environment of today. Volumes of digital evidence to be collected and analyzed have increased, and so has the diversity of digital evidence sources involved in a typical case. This further handicaps digital forensics practitioners, labs and law enforcement agencies, causing delays in investigations and legal systems due to backlogs of cases. Improved efficiency of the digital investigation process is needed, in terms of increasing the speed and reducing the human effort expended. This study aims at achieving this time and effort reduction, by advancing automation within the digital forensic investigation process.Using a Design Science research approach, artifacts are designed and developed to address these practical problems. Summarily, the requirements, and architecture of a system for automating digital investigations in highly networked environments are designed. The architecture initially focuses on automation of the identification and acquisition of digital evidence, while later versions focus on full automation and self-organization of devices for all phases of the digital investigation process. Part of the remote evidence acquisition capability of this system architecture is implemented as a proof of concept. The speed and reliability of capturing digital evidence from remote mobile devices over a client-server paradigm is evaluated. A method for the uniform representation and integration of multiple diverse evidence sources for enabling automated correlation, simple reasoning and querying is developed and tested. This method is aimed at automating the analysis phase of digital investigations. Machine Learning (ML)-based triage methods are developed and tested to evaluate the feasibility and performance of using such techniques to automate the identification of priority digital evidence fragments. Models from these ML methods are evaluated in identifying network protocols within DNS tunneled network traffic. A large dataset is also created for future research in ML-based triage for identifying suspicious processes for memory forensics.From an ex ante evaluation, the designed system architecture enables individual devices to participate in the entire digital investigation process, contributing their processing power towards alleviating the burden on the human analyst. Experiments show that remote evidence acquisition of mobile devices over networks is feasible, however a single-TCP-connection paradigm scales poorly. A proof of concept experiment demonstrates the viability of the automated integration, correlation and reasoning over multiple diverse evidence sources using semantic web technologies. Experimentation also shows that ML-based triage methods can enable prioritization of certain digital evidence sources, for acquisition or analysis, with up to 95% accuracy.The artifacts developed in this study provide concrete ways to enhance automation in the digital forensic investigation process to increase the investigation speed and reduce the amount of costly human intervention needed. 
  •  
20.
  • Gülgün, Ziya, et al. (författare)
  • Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests
  • 2021
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 166382-166394
  • Tidskriftsartikel (refereegranskat)abstract
    • We consider Global Navigation Satellite Systems (GNSS) spoofing attacks and devise a countermeasure appropriate for mobile GNSS receivers. Our approach is to design detectors that, operating after the signal acquisition, enable the victim receiver to determine with high probability whether it is under a spoofing attack or not. Namely, the binary hypothesis is that either the GNSS receiver tracks legitimate satellite signals, H-0, or spoofed signals, H-1. We assume that there exists an unknown number of multiple spoofers in the environment and the attack strategy (which legitimate signals are spoofed by which spoofers) is not known to the receiver. Based on these assumptions, we propose an algorithm that identifies the number of spoofers and clusters the spoofing data by using Bayesian information criterion (BIC) rule. Depending on the estimated and clustered data we propose a detector, called as generalized likelihood ratio (GLRT)-like detector. We compare the performance of the GLRT-like detector with a genie-aided detector in which the attack strategy and the number of spoofers is known by the receiver. In addition to this, we extend the GLRT-like detector for the case where the noise variance is also unknown and present the performance results.
  •  
21.
  • Nielsen, Stig Anton, 1981, et al. (författare)
  • Propositional Architecture using Induced Representation
  • 2014
  • Ingår i: What’s the Matter? Materiality and Materialism at the Age of Computation. - 9789608932067 ; , s. 297-312
  • Konferensbidrag (refereegranskat)abstract
    • The paper describes a method and an approach to using sensor data, machine-learning and pattern recognition for proposing and guiding immediate modifications to the existing built environment. The proposed method; Induced Representation, consists of a few steps which we have identified as crucial for such an approach. The steps are A: data collection from the environment, B: machine cognition, learning, prediction, and, c: proposition, visualization, and embodied representations for quick implementation. In the paper we outline the factual and theoretical basis for this approach, and we present and discuss three experiments that each deal with the steps A, B and C.
  •  
22.
  • Rosenstatter, Thomas, et al. (författare)
  • Modelling the Level of Trust in a Cooperative Automated Vehicle Control System
  • 2018
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - Piscataway, NJ : IEEE Press. - 1524-9050 .- 1558-0016. ; 19:4, s. 1267-1247
  • Tidskriftsartikel (refereegranskat)abstract
    • Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. In addition, this technology also allows detection and recognition of objects that are out-of-sight. This paper presents a trust system that allows a cooperative and automated vehicle to make more reliable and safe decisions. The system evaluates the current situation and generates a trust index indicating the level of trust in the environment, the ego vehicle, and the surrounding vehicles. This research goes beyond secure communication and concerns the verification of the received data on a system level. The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.
  •  
23.
  • Chen, Jiajia (författare)
  • 5G Transport networks : Capacity, latency and cost (invited)
  • 2019
  • Ingår i: Optics InfoBase Conference Papers. - : OSA - The Optical Society. - 9781557528209 ; Part F133-Networks 2019
  • Konferensbidrag (refereegranskat)abstract
    • This paper summarizes recent research on 5G transport networks addressing challenges on capacity, service migration and techno-economics that are brought by 5G new attributes, e.g., cloud radio access networks, diverse usage scenarios and heterogeneous deployments.
  •  
24.
  • Khan, Muhammad Sikandar Lal, 1988- (författare)
  • Presence through actions : theories, concepts, and implementations
  • 2017
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • During face-to-face meetings, humans use multimodal information, including verbal information, visual information, body language, facial expressions, and other non-verbal gestures. In contrast, during computer-mediated-communication (CMC), humans rely either on mono-modal information such as text-only, voice-only, or video-only or on bi-modal information by using audiovisual modalities such as video teleconferencing. Psychologically, the difference between the two lies in the level of the subjective experience of presence, where people perceive a reduced feeling of presence in the case of CMC. Despite the current advancements in CMC, it is still far from face-to-face communication, especially in terms of the experience of presence.This thesis aims to introduce new concepts, theories, and technologies for presence design where the core is actions for creating presence. Thus, the contribution of the thesis can be divided into a technical contribution and a knowledge contribution. Technically, this thesis details novel technologies for improving presence experience during mediated communication (video teleconferencing). The proposed technologies include action robots (including a telepresence mechatronic robot (TEBoT) and a face robot), embodied control techniques (head orientation modeling and virtual reality headset based collaboration), and face reconstruction/retrieval algorithms. The introduced technologies enable action possibilities and embodied interactions that improve the presence experience between the distantly located participants. The novel setups were put into real experimental scenarios, and the well-known social, spatial, and gaze related problems were analyzed.The developed technologies and the results of the experiments led to the knowledge contribution of this thesis. In terms of knowledge contribution, this thesis presents a more general theoretical conceptual framework for mediated communication technologies. This conceptual framework can guide telepresence researchers toward the development of appropriate technologies for mediated communication applications. Furthermore, this thesis also presents a novel strong concept – presence through actions - that brings in philosophical understandings for developing presence- related technologies. The strong concept - presence through actions is an intermediate-level knowledge that proposes a new way of creating and developing future 'presence artifacts'. Presence- through actions is an action-oriented phenomenological approach to presence that differs from traditional immersive presence approaches that are based (implicitly) on rationalist, internalist views.
  •  
25.
  • Yin, Hang, et al. (författare)
  • Policy Learning with Embedded Koopman Optimal Control
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • Embedding an optimization process has been explored for imposing efficient and flexible policy structures. Existing work often build upon nonlinear optimization with explicitly unrolling of iteration steps, making policy inference prohibitively expensive for online learning and real-time control. Our approach embeds a linear-quadratic-regulator (LQR) formulation with a Koopman representation, thus exhibiting the tractability from a closed-form solution and richness from a non-convex neural network. We use a few auxiliary objectives and reparameterization to enforce optimality conditions of the policy that can be easily integrated to standard gradient-based learning. Our approach is shown to be effective for learning policies rendering an optimality structure and efficient reinforcement learning, including simulated pendulum control, 2D and 3D walking, and manipulation for both rigid and deformable objects. We also demonstrate real world application in a robot pivoting task.
  •  
26.
  • Bengtsson, Lars, 1963 (författare)
  • Embedded FPGA systems : VHDL programming and soft CPU systems
  • 2018
  • Bok (övrigt vetenskapligt/konstnärligt)abstract
    • This textbook introduces the reader to VHDL which is a Hardware Description Language, i.e. a means to describe digital electronic circuits in a text editor and how to compile this text into electronics. The first part is concluded by writing VHDL code for a simple CPU (a "soft CPU"). In the second part, a commercial soft CPU is downloaded to the FPGA target circuit and programmed in C.
  •  
27.
  • Bengtsson, Lars, 1963 (författare)
  • RISC-baserad 50 MHz räknare med alfanumerisk display
  • 1995
  • Ingår i: Allt om elektronik. ; 6, s. 35-37
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)abstract
    • Denna artikel presenterar en konstruktion som använder en RISC-kontroller (PIC16C54) som frekvensräknare. Frekvensen räknas på controllerns RTCC-ingång och signalfrekvensen, uttryckt i kHz visas på en alfanumerisk display.
  •  
28.
  • Jiang, Yuning, 1993- (författare)
  • Vulnerability Analysis for Critical Infrastructures
  • 2022
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. Therefore, the need to improve cybersecurity expectations of CIs through vulnerability assessments cannot be overstated. Yet, CI cybersecurity has intrinsic challenges due to the convergence of information technology (IT) and operational technology (OT) as well as the crosslayer dependencies that are inherent to CPS based CIs. Different IT and OT security terminologies also lead to ambiguities induced by knowledge gaps in CI cybersecurity. Moreover, current vulnerability-assessment processes in CIs are mostly subjective and human-centered. The imprecise nature of manual vulnerability assessment operations and the massive volume of data cause an unbearable burden for security analysts. Latest advances in machine-learning (ML) based cybersecurity solutions promise to shift such burden onto digital alternatives. Nevertheless, the heterogeneity, diversity and information gaps in existing vulnerability data repositories hamper accurate assessments anticipated by these ML-based approaches. Therefore, a comprehensive approach is envisioned in this thesis to unleash the power of ML advances while still involving human operators in assessing cybersecurity vulnerabilities within deployed CI networks.Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level of automation in vulnerability analysis. The proposed methodology follows design science research principles to support the development and validation of scientifically-sound artifacts. More specifically, the proposed data-driven cybersecurity architecture orchestrates a range of modules that include: (i) a vulnerability data model that captures a variety of publicly accessible cybersecurity-related data sources; (ii) an ensemble-based ML pipeline method that self-adjusts to the best learning models for given cybersecurity tasks; and (iii) a knowledge taxonomy and its instantiated power grid and manufacturing models that capture CI common semantics of cyberphysical functional dependencies across CI networks in critical societal domains. This research contributes data-driven vulnerability analysis approaches that bridge the knowledge gaps among different security functions, such as vulnerability management through related reports analysis. This thesis also correlates vulnerability analysis findings to coordinate mitigation responses in complex CIs. More specifically, the vulnerability data model expands the vulnerability knowledge scope and curates meaningful contexts for vulnerability analysis processes. The proposed ML methods fill information gaps in vulnerability repositories using curated data while further streamlining vulnerability assessment processes. Moreover, the CI security taxonomy provides disciplined and coherent support to specify and group semanticallyrelated components and coordination mechanisms in order to harness the notorious complexity of CI networks such as those prevalent in power grids and manufacturing infrastructures. These approaches learn through interactive processes to proactively detect and analyze vulnerabilities while facilitating actionable insights for security actors to make informed decisions.
  •  
29.
  • Selvaraj, Yuvaraj, 1990 (författare)
  • On Provably Correct Decision-Making for Automated Driving
  • 2020
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The introduction of driving automation in road vehicles can potentially reduce road traffic crashes and significantly improve road safety. Automation in road vehicles also brings several other benefits such as the possibility to provide independent mobility for people who cannot and/or should not drive. Many different hardware and software components (e.g. sensing, decision-making, actuation, and control) interact to solve the autonomous driving task. Correctness of such automated driving systems is crucial as incorrect behaviour may have catastrophic consequences. Autonomous vehicles operate in complex and dynamic environments, which requires decision-making and planning at different levels. The aim of such decision-making components in these systems is to make safe decisions at all times. The challenge of safety verification of these systems is crucial for the commercial deployment of full autonomy in vehicles. Testing for safety is expensive, impractical, and can never guarantee the absence of errors. In contrast, formal methods , which are techniques that use rigorous mathematical models to build hardware and software systems can provide a mathematical proof of the correctness of the system. The focus of this thesis is to address some of the challenges in the safety verification of decision-making in automated driving systems. A central question here is how to establish formal verification as an efficient tool for automated driving software development. A key finding is the need for an integrated formal approach to prove correctness and to provide a complete safety argument. This thesis provides insights into how three different formal verification approaches, namely supervisory control theory, model checking, and deductive verification differ in their application to automated driving and identifies the challenges associated with each method. It identifies the need for the introduction of more rigour in the requirement refinement process and presents one possible solution by using a formal model-based safety analysis approach. To address challenges in the manual modelling process, a possible solution by automatically learning formal models directly from code is proposed.
  •  
30.
  • Mubeen, Saad, et al. (författare)
  • How to Design Source Routing for Mesh Topology Network on Chip?
  • 2012
  • Ingår i: Introduction to Routing Issues. - : iConcept Press Ltd.. - 9781461098713
  • Bokkapitel (refereegranskat)abstract
    • This chapter discusses a step-by-step method to design source routing for Network on Chip, especially for platforms with small sizes and regular topologies like mesh. The design steps include routing algorithm selection, path computation, link load analysis, load balancing, path encoding, simulation and performance evaluation.
  •  
31.
  • Rosenstatter, Thomas, 1992, et al. (författare)
  • Extending AUTOSAR's Counter-based Solution for Freshness of Authenticated Messages in Vehicles
  • 2019
  • Ingår i: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. - 1541-0110. ; 2019-December, s. 1-109
  • Konferensbidrag (refereegranskat)abstract
    • Nowadays vehicles have an internal network consisting of more than 100 microcontrollers, so-called Electronic Control Units (ECUs), which control core functionalities, active safety, diagnostics, comfort and infotainment. The Controller Area Network (CAN) bus is one of the most widespread bus technologies in use, and thus is a primary target for attackers. AUTOSAR, an open system platform for vehicles, introduced in version 4.3 SecOC Profile 3, a counter-based solution to provide freshness in authenticated messages to protect the system against replay attacks. In this paper, we analyse and assess this method regarding safety constraints and usability, and discuss design considerations when implementing such a system. Furthermore, we propose a novel security profile addressing the identified deficiencies which allows faster resynchronisation when only truncated counter values are transmitted. Finally, we evaluate our solution in an experimental setup in regard to communication overhead and time to synchronise the freshness counter.
  •  
32.
  •  
33.
  • Fallgren, Mikael, et al. (författare)
  • Multicast and Broadcast Enablers for High-Performing Cellular V2X Systems
  • 2019
  • Ingår i: IEEE Transactions on Broadcasting. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 0018-9316 .- 1557-9611. ; 65:2, s. 454-463
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper focuses on capabilities enabled by 5G connectivity in the cooperative, connected and autonomous cars, and elaborates on two technical enablers. One of the technical enablers consists of a beamformed broadcast/multicast technology that builds on adaptive and robust beam management techniques at the air interface. The other proposed technical component aims to improve the end-to-end architectural design of 5G networks to enable efficient broadcast and multicast transmissions for vehicle-to-anything services. Finally, the key results of multicast and broadcast technical components are described and ongoing and future areas of work and research are detailed.
  •  
34.
  • Karlsson, Marcus, 1988- (författare)
  • Aspects of Massive MIMO
  • 2016
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Next generation cellular wireless technology faces tough demands: increasing the throughput and reliability without consuming more resources, be it spectrum or energy. Massive mimo (Multiple-Input Multiple-Output) has proven, both in theory and practice, that it is up for the challenge. Massive mimo can offer uniformly good service to many users using low-end hardware, simultaneously, without increasing the radiated power compared to contemporary system. In Massive mimo, the base stations are equipped with hundreds of antennas. This abundance of antennas brings many new, interesting aspects compared to single-user mimo and multi-user mimo. Some issues of older technologies are nonexistent in massive mimo, while new issues in need of solutions arise. This thesis considers two aspects, and how these aspects differ in a massive mimo context: physical layer security and transmission of system information. First, it is shown that a jammer with a large number of antennas can outperform a traditional, single-antenna jammer in degrading the legitimate link. The excess of antennas gives the jammer opportunity to find and exploit structure in signals to improve its jamming capability. Second, for transmission of system information, the vast number of antennas prove useful even when the base station does not have any channel state information, because of the increased availability of space-time coding. We show how transmission without channel state information can be done in massive mimo by using a fixed precoding matrix to reduce the pilot overhead and simultaneously apply space-time block coding to use the excess of antennas for spatial diversity.
  •  
35.
  • Lin, Hsuan-Yin, et al. (författare)
  • An MDS-PIR Capacity-Achieving Protocol for Distributed Storage Using Non-MDS Linear Codes
  • 2018
  • Ingår i: IEEE International Symposium on Information Theory - Proceedings. - 2157-8095. ; 2018-June, s. 966-970
  • Konferensbidrag (refereegranskat)abstract
    • We propose a private information retrieval (PIR) protocol for distributed storage systems (DSSs) with noncolluding nodes where data is stored using an arbitrary linear code. An expression for the PIR rate, i.e., the ratio of the amount of retrieved stored data per unit of downloaded data, is derived, and a necessary and a sufficient condition for codes to achieve the PIR capacity are given. The necessary condition is based on the generalized Hamming weights of the storage code, while the sufficient condition is based on code automorphisms. We show that cyclic codes and Reed-Muller codes satisfy the sufficient condition and are thus PIR capacity-achieving.
  •  
36.
  • Ortiz Morales, Daniel, 1984-, et al. (författare)
  • Path-constrained motion analysis : an algorithm to understand human performance on hydraulic manipulators
  • 2015
  • Ingår i: IEEE Transactions on Human-Machine Systems. - 2168-2291. ; 45:2, s. 187-199
  • Tidskriftsartikel (refereegranskat)abstract
    • We propose a novel method to analyze how human operators use hydraulic manipulators of heavy-duty equipment. The approach is novel in the sense that it applies knowledge of motion planning and optimization techniques used in robotics. As an example, we consider the case of operating a forestry crane. To that end, we use motion data that has been recorded during standard operation with the help of sensors and a data acquisition unit. The data backs up the notion that operators work by performing repeatable patterns observed in the trajectories of the manipulator's joints. We show how this nominal behavior is computed, and consequently this allow us to present the following: 1) an analytical procedure to analyze motions, 2) how to represent the "performance" of the operator in a 2D plot, 3) an example of how to use this information to suggest customized control settings, and 4) some complementary ideas needed for improving efficiency through automation.
  •  
37.
  • Sundman, Dennis, et al. (författare)
  • Parallel pursuit for distributed compressed sensing
  • 2013
  • Ingår i: 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. - : IEEE conference proceedings. - 9781479902484 ; , s. 783-786
  • Konferensbidrag (refereegranskat)abstract
    • We develop a greedy (pursuit) algorithm for a distributed compressed sensing problem where multiple sensors are connected over a de-centralized network. The algorithm is referred to as distributed parallel pursuit and it solves the distributed compressed sensing problem in two stages; first by a distributed estimation stage and then an information fusion stage. Along with worst case theoretical analysis for the distributed algorithm, we also perform simulation experiments in a controlled manner. We show that the distributed algorithm performs significantly better than the stand-alone (disconnected) solution and close to a centralized (fully connected to a central point) solution.
  •  
38.
  • Kontopoulos, E., et al. (författare)
  • Deliverable 4.5: Context-aware Content Interpretation
  • 2016
  • Rapport (refereegranskat)abstract
    • The current deliverable summarises the work conducted within task T4.5 of WP4, presenting our proposed approaches for contextualised content interpretation, aimed at gaining insightful contextualised views on content semantics. This is achieved through the adoption of appropriate context-aware semantic models developed within the project, and via enriching the semantic descriptions with background knowledge, deriving thus higher level contextualised content interpretations that are closer to human perception and appraisal needs. More specifically, the main contributions of the deliverable are the following: A theoretical framework using physics as a metaphor to develop different models of evolving semantic content. A set of proof-of-concept models for semantic drifts due to field dynamics, introducing two methods to identify quantum-like (QL) patterns in evolving information searching behaviour, and a QL model akin to particle-wave duality for semantic content classification. Integration of two specific tools, Somoclu for drift detection and Ncpol2spda for entanglement detection. An “energetic” hypothesis accounting for contextualized evolving semantic structures over time. A proposed semantic interpretation framework, integrating (a) an ontological inference scheme based on Description Logics (DL), (b) a rule-based reasoning layer built on SPARQL Inference Notation (SPIN), (c) an uncertainty management framework based on non-monotonic logics. A novel scheme for contextualized reasoning on semantic drift, based on LRM dependencies and OWL’s punning mechanism. An implementation of SPIN rules for policy and ecosystem change management, with the adoption of LRM preconditions and impacts. Specific use case scenarios demonstrate the context under development and the efficiency of the approach. Respective open-source implementations and experimental results that validate all the above.All these contributions are tightly interlinked with the other PERICLES work packages: WP2 supplies the use cases and sample datasets for validating our proposed approaches, WP3 provides the models (LRM and Digital Ecosystem models) that form the basis for our semantic representations of content and context, WP5 provides the practical application of the technologies developed to preservation processes, while the tools and algorithms presented in this deliverable can be deployed in combination with test scenarios, which will be part of the WP6 test beds.
  •  
39.
  • Maronidis, A., et al. (författare)
  • PERICLES Deliverable 4.3: Content Semantics and Use Context Analysis Techniques
  • 2016
  • Rapport (refereegranskat)abstract
    • The current deliverable summarises the work conducted within task T4.3 of WP4, focusing on the extraction and the subsequent analysis of semantic information from digital content, which is imperative for its preservability. More specifically, the deliverable defines content semantic information from a visual and textual perspective, explains how this information can be exploited in long-term digital preservation and proposes novel approaches for extracting this information in a scalable manner. Additionally, the deliverable discusses novel techniques for retrieving and analysing the context of use of digital objects. Although this topic has not been extensively studied by existing literature, we believe use context is vital in augmenting the semantic information and maintaining the usability and preservability of the digital objects, as well as their ability to be accurately interpreted as initially intended.
  •  
40.
  • Munthe, Christian, 1962 (författare)
  • Mellan genialitet och galenskap: Recension av Benjamin Labatuts roman "MANIAC"
  • 2023
  • Ingår i: Tidskriften Alba. - 1403-5448.
  • Recension (övrigt vetenskapligt/konstnärligt)abstract
    • John von Neumann var ett för de allra flesta okänt ungerskt underbarn av judisk härkomst som sedermera flydde undan nazisterna till USA, där han dog 1957. Han var ett matematiskt universalgeni som gav viktiga, för att inte säga avgörande, bidrag till fysikens, biologins, data- och samhällsvetenskapens och meteorologins (och därmed klimatvetenskapens) utveckling under 1900-talet. Vid sidan av den mer allmänt kände Alan Turing föranstaltade han det som vi idag lär känna som A.I. och teoretiserade tidigt om hur man kunde tänka på maskiner som livsformer analogt med biologiska – en idé som idag ingår både i evolutionsbiologiska verktygslådor liksom i visioner och mardrömsscenarier om en teknologisk singularitet bortom vilken generella A.I. dominerar och, i värsta fall, tränger ut människoarten. Det är denne märkliga och skrämmande person Benjamín Labatuts välskrivna roman sätter i centrum för en berättelse om gränslandet mellan genialitet och galenskap, vetenskap och teknik från förra sekelskiftet till nu, logikseminariernas tankelekar och konkret global politisk utveckling på liv och död. Romanen är pärlande klart översatt av Anna Petronella Foultier. Man behöver nog ha ett visst intresse för vetenskap, teknik och/eller global politik för att uppskatta den fullt ut, men mycket sådant förklaras under hand på ett skenbart enkelt vis, så jättestora kunskaper behövs inte.
  •  
41.
  • Waddington, Simon, et al. (författare)
  • PERICLES – Digital Preservation through Management of Change in Evolving Ecosystems.
  • 2016
  • Ingår i: The Success of European Projects Using New Information and Communication Technologies. - Setubal, Portugal. - 9789897581762 ; , s. 51-74
  • Konferensbidrag (refereegranskat)abstract
    • Management of change is essential to ensure the long-term reusabilityof digital assets. Change can be brought about in many ways, includingthrough technological, user community and policy factors. Motivated by casestudies in space science and time-based media, we consider the impact ofchange on complex digital objects comprising multiple interdependent entities,such as files, software and documentation. Our approach is based on modellingof digital ecosystems, in which abstract representations are used to assess risksto sustainability and support tasks such as appraisal. The paper is based onwork of the EU FP7 PERICLES project on digital preservation, and presentssome general concepts as well as a description of selected research areas underinvestigation by the project.
  •  
42.
  •  
43.
  • Bengtsson, Lars, 1963, et al. (författare)
  • LowLevel C programming for Designers
  • 2015
  • Bok (övrigt vetenskapligt/konstnärligt)abstract
    • This book is concerned with C programming from an embedded systems engieer's point of view. That inlcudes writing device drivers for hardware with limited resources in terms of available instruction and data memory. A 32-bit soft CPU is implemented on an FPGA and theory is illustrated by detailed examples and cases.
  •  
44.
  • Haubro, Martin, et al. (författare)
  • TSCH-over-LoRA: Long Range and Reliable IPv6 Multi-hopNetworks for the Internet of Things
  • 2020
  • Ingår i: Internet Technology Letters. - : Wiley. - 2476-1508.
  • Tidskriftsartikel (refereegranskat)abstract
    • TSCH-over-LoRa is a long range and reliable IPv6 multi-hop solution that aims atcombining the reliability of TSCH (Time-Slotted, Channel Hopping) together withthe long range capabilities of LoRa. TSCH-over-LoRa brings mesh IPv6 network-ing to LoRa devices, enabling the use of standard protocols (such as RPL, UDP, andCoAP) and long range operation to TSCH/6TiSCH industrial wireless IoT networks.We design, implement, and integrate TSCH-over-LoRa into the TSCH/6TiSCH net-working stack of the Contiki-NG operating system and experimentally demonstrateits compatibility with higher-level protocols and its resilience to interference.
  •  
45.
  • Krook, Jonas, 1986 (författare)
  • Formal Methods and Safety for Automated Vehicles: Modeling, Abstractions, and Synthesis of Tactical Planners
  • 2022
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • One goal of developing automated road vehicles is to completely free people from driving tasks. Automated vehicles with no human driver must handle all traffic situations that human drivers are expected to handle, possibly more. Though human drivers cause a lot of traffic accidents, they still have a very low accident and failure rate that automated vehicles must match. Tactical planners are responsible for making discrete decisions for the coming seconds or minutes. As with all subsystems in an automated vehicle, these planners need to be supported with a credible and convincing argument of their correctness. The planners interact with other road users in a feedback loop, so their correctness depends on their behavior in relation to other drivers and road users over time. One way to ascertain their correctness is to test the vehicles in real traffic. But to be sufficiently certain that a tactical planner is safe, it has to be tested on 255 million miles with no accidents. Formal methods can, in contrast to testing, mathematically prove that given requirements are fulfilled. Hence, these methods are a promising alternative for making credible arguments for tactical planners’ correctness. The topic of this thesis is the use of formal methods in the automotive industry to design safe tactical planners. What is interesting is both how automotive systems can be modeled in formal frameworks, and how formal methods can be used practically within the automotive development process. The main findings of this thesis are that it is viable to formally express desired properties of tactical planners, and to use formal methods to prove their correctness. However, the difficulty to anticipate and inspect the interaction of several desired properties is found to be an obstacle. Model Checking, Reactive Synthesis, and Supervisory Control Theory have been used in the design and development process of tactical planners, and these methods have their benefits, depending on the application. To be feasible and useful, these methods need to operate on both a high and a low level of abstraction, and this thesis contributes an automatic abstraction method that bridges this divide. It is also found that artifacts from formal methods tools may be used to convincingly argue that a realization of a tactical planner is safe, and that such an argument puts formal requirements on the vehicle’s other subsystems and its surroundings.
  •  
46.
  • Saget, Sylvie (författare)
  • Language as a Tool: Acceptance-Based Pragmatics
  • 2018
  • Ingår i: Workshop on Next Generation Human-Agent Interaction (NGHAI), 6th annual International Conference on Human-Agent Interaction (HAI 2018), Southampton, UK, 15-18th December 2018.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • In this research, the communicative level of dialog or interaction is seen as the co-construction of a linguistic tool by dialog part- ners. The background mental attitude enabling such a practical reasoning is acceptance [3, 4]. The distinction between belief and acceptance is here based on their functional role: truth-oriented versus goal-oriented [8] - that is – by extension – encapsulating facts (declarative knowledge) versus tools (procedural knowledge). In order to precisely define this new mental attitude which is accep- tance, its relationship with belief and communicative action, this research aims at developing a rational model of dialog [13] as well as specifying a cognitive architecture. This approach contributes to the explanation of human behavior by refashioning the notion of cooperative speaker. This enables to mix reasoning-based approaches and reuse-based approach of collaborative view of dialog. Additionally, the notion of Acceptance and more especially its social counterpart - Collective Acceptance respects the properties of co-constructed linguistic tools. Enabling a system to both rely different perspectives (its own point of view, their addresses one or common/shared beliefs) or on existing linguistic tools built during the preceding interactions enhances system’s flexibility and rationality [5, 14].
  •  
47.
  • Ribeiro, Luis (författare)
  • The design, deployment, and assessment of industrial agent systems
  • 2015. - 1st ed.
  • Ingår i: Industrial Agents. - Amsterdam, Netherlands : Elsevier. - 9780128003411 ; , s. 45-63
  • Bokkapitel (refereegranskat)abstract
    • Agent based systems have been explored, if not practically, at least conceptually, in a wide range of domains. The notion of agent has taken, also, many shapes and meanings according to the application area. These have ranged from pure computational applications, such as UNIX daemons, Internet crawlers, optimization algorithms, etc; to embodied agents as in mobile robotics. The notion of cyber-physical system has been very recently coined to denote the next generation of embedded systems. Unlike an embedded system, a cyber-physical system is designed from scratch to promote the symbiosis and fusion between a physical element, its controller, and its abstract or logical representation/existence. To an enormous extent the concept echoes the idea of embodiment (Pfeifer, Lungarella & Iida 2007), whereby the body shapes the cognitive abilities of its control gear, and self-organization (Holland & Melhuish 1999), in the sense that a resilient whole results from the collective interactions of many parts. Some rather similar principles have been the basis for Holonic Manufacturing Systems (HMS) (Bussmann & Mcfarlane 1999), Bionic Manufacturing Systems (BMS) (Ueda 1992), Evolvable Assembly Systems (EAS) (Onori 2002) and an overwhelming number of industrial agent based architectures that have followed them (Van Brussel et al. 1998; Leitao, Colombo & Restivo 2005; Barata 2003; Lastra 2004; Shen et al. 2006; Marik & Lazansky 2007; Vrba et al. 2011; Leitão 2009; Monostori, Váncza & Kumara 2006).It is therefore safe to assert that industrial agent systems are a preceding, probably more restricted, case of cyber-physical systems.Although each application area has its specific challenges arguably, the design, deployment and assessment of industrial agent systems are particularly complex. Given the multidisciplinary nature of today's industrial systems, their cyber-physical realization entails challenges that range from pure computer science and embedded controller design to production optimization and sustainability.The main challenges comprising the design, deployment and assessment of industrial agent-based systems are therefore examined.Multiagent Systems (MAS) have been widely known as the base for inherent robust and available systems and there are many characteristics (Wooldridge & Jennings 1994; Wooldridge & Jennings 1995) such as autonomy, social-ability, proactive response, reactivity, self-organization, etc; which have been identified as core ingredients for the MAS reliability.However, to call "agent" to a software abstraction and create a system based on these abstractions is not a guarantee that the system will exhibit the expected characteristics. Unfortunately this misconception is quite common.There have been significant international and industrial efforts in addressing the different design, deployment and assessment challenges. The reader is naturally referred to the contents of this book to learn about the latest results and technical details. Previous international projects are not limited to but include: SIRENA - early development of a devices profiles for web services (DPWS) stack (Jammes & Smit 2005; Bohn, Bobek & Golatowski 2006) and subsequent project SODA - focusing on the development of a service based ecosystem using DPWS, Inlife - focusing in service oriented diagnosis of distributed intelligent systems (Barata, Ribeiro & Colombo 2007), SOCRADES - investigating the creation of new methodologies, technologies and tools for the modelling, design, implementation and operation of networked hardware/software systems embedded in smart physical objects (De Souza et al. 2008), AESOP - tackling web service-oriented process monitoring and control (Karnouskos et al. 2010), GRACE - exploring process and quality control integration using a MAS framework (Stroppa et al. 2012) and IDEAS - focusing in instant deployment of agentified components (Ribeiro et al. 2011a).      The subsequent details are therefore organized to first highlight the commonest structural arrangements considered in current agent architectures and more specifically on bringing some context on their potential applications and limitations. Secondly, since emerging architectures are increasingly inspired by concepts and methods from the complexity sciences, the gaps between them and the concrete instantiation of industrial MAS are discussed. The presentation of the design challenges and opportunities follows as well as the conventional deployment approaches. Finally, the impact of MAS design is discussed from a system validation perspective.
  •  
48.
  • Aramrattana, Maytheewat (författare)
  • Modelling and Simulation for Evaluation of Cooperative Intelligent Transport System Functions
  • 2016
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Future vehicles are expected to be equipped with wireless communication technology, that enables them to be “connected” to each others and road infrastructures. Complementing current autonomous vehicles and automated driving systems, the wireless communication allows the vehicles to interact, cooperate, and be aware of its surroundings beyond their own sensors’ range. Such sys- tems are often referred to as Cooperative Intelligent Transport Systems (C-ITS), which aims to provide extra safety, efficiency, and sustainability to transporta- tion systems. Several C-ITS applications are under development and will require thorough testing and evaluation before their deployment in the real-world. C- ITS depend on several sub-systems, which increase their complexity, and makes them difficult to evaluate.Simulations are often used to evaluate many different automotive applications, including C-ITS. Although they have been used extensively, simulation tools dedicated to determine all aspects of C-ITS are rare, especially human factors aspects, which are often ignored. The majority of the simulation tools for C-ITS rely heavily on different combinations of network and traffic simulators. The human factors issues have been covered in only a few C-ITS simulation tools, that involve a driving simulator. Therefore, in this thesis, a C-ITS simulation framework that combines driving, network, and traffic simulators is presented. The simulation framework is able to evaluate C-ITS applications from three perspectives; a) human driver; b) wireless communication; and c) traffic systems.Cooperative Adaptive Cruise Control (CACC) and its applications are chosen as the first set of C-ITS functions to be evaluated. Example scenarios from CACC and platoon merging applications are presented, and used as test cases for the simulation framework, as well as to elaborate potential usages of it. Moreover, approaches, results, and challenges from composing the simulation framework are presented and discussed. The results shows the usefulness of the proposed simulation framework.
  •  
49.
  • Balador, Ali, et al. (författare)
  • A Reliable Token-Based MAC Protocol for V2V Communication in Urban VANET
  • 2016
  • Ingår i: 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC). - Piscataway : IEEE. - 9781509032549 - 9781509032556 ; , s. 1586-1591
  • Konferensbidrag (refereegranskat)abstract
    • Safety applications developed for vehicular environments require every vehicle to periodically broadcast its status information (beacon) to all other vehicles, thereby avoiding the risk of car accidents in the road. Due to the high requirements on timing and reliability posed by traffic safety applications, the current IEEE 802.11p standard, which uses a random access Medium Access Control (MAC) protocol, faces difficulties to support timely and reliable data dissemination in vehicular environments where no acknowledgement or RTS/CTS (Request-to-Send/Clear-to-Send) mechanisms are adopted. In this paper, we propose the Dynamic Token-Based MAC (DTB-MAC) protocol. It implements a token passing approach on top of a random access MAC protocol to prevent channel contention as much as possible, thereby improving the reliability of safety message transmissions. Our proposed protocol selects one of the neighbouring nodes as the next transmitter; this selection accounts for the need to avoid beacon lifetime expiration. Therefore, it automatically offers retransmission opportunities to allow vehicles to successfully transmit their beacons before the next beacon is generated whenever time and bandwidth are available. Based on simulation experiments, we show that the DTB-MAC protocol can achieve better performance than IEEE 802.11p in terms of channel utilization and beacon delivery ratio for urban scenarios.
  •  
50.
  • Dima, Elijs, et al. (författare)
  • View position impact on QoE in an immersive telepresence system for remote operation
  • 2019
  • Ingår i: 2019 11th International Conference on Quality of Multimedia Experience, QoMEX 2019. - Berlin, Germany : Institute of Electrical and Electronics Engineers Inc.. - 9781538682128
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we investigate how different viewing positions affect a user's Quality of Experience (QoE) and performance in an immersive telepresence system. A QoE experiment has been conducted with 27 participants to assess the general subjective experience and the performance of remotely operating a toy excavator. Two view positions have been tested, an overhead and a ground-level view, respectively, which encourage reliance on stereoscopic depth cues to different extents for accurate operation. Results demonstrate a significant difference between ground and overhead views: the ground view increased the perceived difficulty of the task, whereas the overhead view increased the perceived accomplishment as well as the objective performance of the task. The perceived helpfulness of the overhead view was also significant according to the participants. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-50 av 6303
Typ av publikation
konferensbidrag (3629)
tidskriftsartikel (1593)
doktorsavhandling (277)
licentiatavhandling (203)
bokkapitel (193)
rapport (184)
visa fler...
annan publikation (103)
forskningsöversikt (40)
proceedings (redaktörskap) (29)
samlingsverk (redaktörskap) (20)
bok (19)
patent (10)
recension (3)
konstnärligt arbete (2)
visa färre...
Typ av innehåll
refereegranskat (5057)
övrigt vetenskapligt/konstnärligt (1199)
populärvet., debatt m.m. (45)
Författare/redaktör
Nolte, Thomas (95)
Mubeen, Saad (79)
Elmroth, Erik (75)
Gallina, Barbara (71)
Lundqvist, Kristina (65)
Maki, Atsuto (61)
visa fler...
Björkman, Mats (52)
Papadopoulos, Alessa ... (51)
Daneshtalab, Masoud (49)
Bosch, Jan, 1967 (49)
Punnekkat, Sasikumar (48)
Hayashi, Masaki, 195 ... (48)
Behnam, Moris, 1973- (47)
Carlson, Jan (47)
Hansson, Hans (46)
Sjödin, Mikael (46)
Afzal, Wasif (45)
Brorsson, Mats (45)
Behnam, Moris (42)
Papatriantafilou, Ma ... (42)
Voigt, Thiemo (41)
Lisper, Björn (41)
Cicchetti, Antonio (41)
Taha, Walid, 1971- (41)
Seceleanu, Cristina, ... (40)
Ciccozzi, Federico, ... (39)
Gulisano, Vincenzo M ... (37)
Sjödin, Mikael, 1971 ... (37)
Flammini, Francesco, ... (36)
Ashjaei, Seyed Moham ... (36)
Schelén, Olov (36)
Uhlemann, Elisabeth, ... (36)
Enoiu, Eduard Paul, ... (35)
Sundmark, Daniel (33)
Almgren, Magnus, 197 ... (33)
Bucaioni, Alessio, 1 ... (33)
Bodin, Ulf (33)
Axelsson, Jakob (32)
Kaxiras, Stefanos (31)
Kihl, Maria (31)
Pericas, Miquel, 197 ... (31)
Sirjani, Marjan (31)
Staron, Miroslaw, 19 ... (30)
Vyatkin, Valeriy (30)
Brunstrom, Anna, 196 ... (30)
Torra, Vicenç (30)
Saadatmand, Mehrdad (29)
Åkerberg, Johan (29)
Vlassov, Vladimir (28)
Vlassov, Vladimir, 1 ... (28)
visa färre...
Lärosäte
Mälardalens universitet (1421)
Chalmers tekniska högskola (1285)
Kungliga Tekniska Högskolan (1243)
Uppsala universitet (499)
Linköpings universitet (364)
RISE (330)
visa fler...
Umeå universitet (327)
Luleå tekniska universitet (251)
Göteborgs universitet (216)
Lunds universitet (202)
Linnéuniversitetet (183)
Högskolan i Halmstad (180)
Karlstads universitet (163)
Blekinge Tekniska Högskola (139)
Högskolan i Skövde (127)
Stockholms universitet (86)
Mittuniversitetet (83)
Malmö universitet (75)
Örebro universitet (74)
Högskolan Dalarna (50)
Jönköping University (44)
Högskolan Väst (26)
Karolinska Institutet (19)
Högskolan Kristianstad (18)
Högskolan i Borås (18)
VTI - Statens väg- och transportforskningsinstitut (17)
Sveriges Lantbruksuniversitet (11)
Försvarshögskolan (6)
Högskolan i Gävle (3)
Riksantikvarieämbetet (2)
Handelshögskolan i Stockholm (1)
Södertörns högskola (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (6247)
Svenska (28)
Japanska (22)
Franska (2)
Italienska (2)
Finska (1)
visa fler...
Kroatiska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (6299)
Naturvetenskap (1882)
Samhällsvetenskap (182)
Humaniora (87)
Medicin och hälsovetenskap (69)
Lantbruksvetenskap (5)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy