SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "(WFRF:(Gustavsson Per M. 1965 )) "

Search: (WFRF:(Gustavsson Per M. 1965 ))

  • Result 1-17 of 17
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Sjöberg, Mats, 1965-, et al. (author)
  • Infliximab or cyclosporine as rescue therapy in hospitalized patients with steroid-refractory ulcerative colitis : a retrospective observational study
  • 2012
  • In: Inflammatory Bowel Diseases. - : John Wiley & Sons. - 1078-0998 .- 1536-4844. ; 18:2, s. 212-218
  • Journal article (peer-reviewed)abstract
    • Background: Cyclosporine (CsA) or infliximab (IFX) are used as rescue therapies in steroid-refractory, severe attacks of ulcerative colitis (UC). There are no data comparing the efficacy of these two alternatives. Methods: Outcome of rescue therapy was retrospectively studied in two cohorts of patients hospitalized due to steroid-refractory moderate to severe UC: 1) a Swedish-Danish cohort (n 49) treated with a single infusion of IFX; 2) an Austrian cohort (n 43) treated with intravenous CsA. After successful rescue therapy, maintenance immunomodulator treatment was given to 27/33 (82%) of IFX patients and to 31/40 (78%) of CsA patients. Endpoints were colectomy-free survival at 3 and 12 months. Kaplan-Meier and Cox regression models were used to evaluate the association between treatment groups and colectomy. Results: At 15 days, colectomy-free survival in the IFX cohort was 36/49 (73%) versus 41/43 (95%) in the CsA cohort (P = 0.005), at 3 months 33/49 (67%) versus 40/43 (93%) (P = 0.002), and at 12 months 28/49 (57%) versus 33/43 (77%) (P = 0.034). After adjusting for potential confounding factors, Cox regression analysis yielded adjusted hazard ratios for risk of colectomy in IFX-treated patients of 11.2 (95% confidence interval [CI] 2.4-53.1, P = 0.002) at 3 months and of 3.0 (95% CI 1.1-8.2, P = 0.030) at 12 months in comparison with CsA-treated patients. There were no opportunistic infections or mortality. Conclusions: Colectomy frequencies were significantly lower after rescue therapy with CsA than with a single infusion of IFX both at 3 and 12 months' follow-up. The superiority of CsA was seen principally during the first 15 days.
  •  
2.
  • Pozzer, Cesar, et al. (author)
  • Imprecise Computation as an Enabler for Complex and Time Critical HLA Simulation Networks
  • 2014
  • In: Proceedings of Simulation Interoperability Workshop. - 9781634393898 ; , s. 171-179
  • Conference paper (peer-reviewed)abstract
    • A trend over the past years is that simulation systems for training are being connected in simulation networks, allowing the interaction of teams spread in distributed sites. By combining interconnected simulation systems the simulation complexity increases and may affect time-critical simulation tasks in a negative way. As a consequence, the training simulation objectives may not be met. The same problem may occur when performing, for example, mission rehearsal on site, since available computation resources are usually very limited in this scenario, or for a joint fires scenario, where the large and complex functional chain (including intelligence, C2, forward observer, pilots, etc.) may overload existing resources. In this work, the technique of imprecise computation in real-time systems (ICRS) to preserve time-critical simulation tasks is presented. The ICRS technique allows time-critical tasks to produce quicker solutions for approximate results and saves computational resources. This paper discusses the main advantages of theICRS technique by a review of the commonly used optimization concepts built upon imprecise computation field. Thepaper ends with presenting a work-in-progress: an architectural solution for aligning ICRS with the High Level Architecture (HLA), standardized as the IEEE 1516-series.
  •  
3.
  • Amorim, Joni A., et al. (author)
  • Awareness and training : Identification of relevant security skills and competencies
  • 2014
  • In: Engineering Education in a Technology-Dependent World. - Guimarães : INTERTECH. - 9788565992282 - 9788566680287 ; , s. 37-
  • Conference paper (peer-reviewed)abstract
    • In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.
  •  
4.
  • Amorim, Joni A., et al. (author)
  • Privacy and Security in Cyberspace : Training Perspectives on the Personal Data Ecosystem
  • 2013
  • In: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD. - : IEEE conference proceedings. - 9780769550626 ; , s. 139-142
  • Conference paper (peer-reviewed)abstract
    • There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.
  •  
5.
  • Atif, Yacine, 1967-, et al. (author)
  • Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
  • 2017
  • Conference paper (peer-reviewed)abstract
    • Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 
  •  
6.
  • Blais, Curtis, et al. (author)
  • An Architecture for Demonstrating the Interplay of Emerging SISO standards
  • 2006
  • In: Fall Simulation Interoperability Workshop (FallSIW). - 1930638450 - 9781622761425 ; , s. 441-451
  • Conference paper (other academic/artistic)abstract
    • The Simulation Interoperability Standards Organization (SISO) focuses on facilitating simulation interoperability across government and non-government applications worldwide. A number of standards are emerging that will individually have great impact on the development and operation of simulation systems, as well as interoperation across simulation systems and command and control systems. More importantly, when these standards are applied together, they represent a set of capabilities and technologies which can revolutionize the simulation industry, radically improving the way we develop and deliver interoperable systems.Each of the following standards addresses specific needs that have been shortcomings in M&S interoperability in the past: (1) the Coalition Battle Management Language (C-BML) provides a way to represent the coalition battle management doctrine within a Command and Control environment to enable unambiguous expression of plans and orders for live, constructive, and robotic forces; (2) the Military Scenario Definition Language (MSDL) provides a common way to describe a scenario, including initialization information, that can be shared across multiple systems; (3) the Base Object Model (BOM) standard provides a way to identify piece parts of a simulation or model that can be used as building blocks for composing larger model sets; (4) the Simulation Reference Markup Language (SRML) provides a platform-independent way to represent behavior models which can be rendered quickly and easily (at runtime) by a simulation; and (5) the Distributed Interactive Simulation Extensible Markup Language (DIS-XML) initiative provides a way to represent DIS Protocol Data Units using XML to enhance interchange of dynamic entity state and entity interactions across diverse systems.This paper gives a brief overview of these key standardization efforts, and explores how each standard can interplay with other standards. The paper lays out an abstract architecture for demonstration of the composition of prototype versions of these products to show the community how they will be employed in the future and what benefits will accrue. The paper proposes a plan of action to implement the architecture for demonstration and discussion at the Spring 2007 Simulation Interoperability Workshop.
  •  
7.
  • Devarakonda, Sravani, et al. (author)
  • Low-grade intestinal inflammation two decades after pelvic radiotherapy.
  • 2023
  • In: EBioMedicine. - 2352-3964. ; 94
  • Journal article (peer-reviewed)abstract
    • Radiotherapy is effective in the treatment of cancer but also causes damage to non-cancerous tissue. Pelvic radiotherapy may produce chronic and debilitating bowel symptoms, yet the underlying pathophysiology is still undefined. Most notably, although pelvic radiotherapy causes an acute intestinal inflammation there is no consensus on whether the late-phase pathophysiology contains an inflammatory component or not. To address this knowledge gap, we examined the potential presence of a chronic inflammation in mucosal biopsies from irradiated pelvic cancer survivors.We biopsied 24 cancer survivors two to 20 years after pelvic radiotherapy, and four non-irradiated controls. Using tandem mass tag (TMT) mass spectrometry and mRNA sequencing (mRNA-seq), we charted proteomic and transcriptomic profiles of the mucosal tissue previously exposed to a high or a low/no dose of radiation. Changes in the immune cell populations were determined with flow cytometry. The integrity of the protective mucus layers were determined by permeability analysis and 16S rRNA bacterial detection.942 proteins were differentially expressed in mucosa previously exposed to a high radiation dose compared to a low radiation dose. The data suggested a chronic low-grade inflammation with neutrophil activity, which was confirmed by mRNA-seq and flow cytometry and further supported by findings of a weakened mucus barrier with bacterial infiltration.Our results challenge the idea that pelvic radiotherapy causes an acute intestinal inflammation that either heals or turns fibrotic without progression to chronic inflammation. This provides a rationale for exploring novel strategies to mitigate chronic bowel symptoms in pelvic cancer survivors.This study was supported by the King Gustav V Jubilee Clinic Cancer Foundation (CB), The Adlerbertska Research Foundation (CB), The Swedish Cancer Society (GS), The Swedish State under the ALF agreement (GS and CB), Mary von Sydow's foundation (MA and VP).
  •  
8.
  •  
9.
  • Gustavsson, Per M., 1965-, et al. (author)
  • Expanding the management language smorgasbord towards standardization of Coalition - Crisis Management Language (C-CML)
  • 2006
  • In: Spring SIW 2006. - : SISO - Simulation Interoperability Standards Organization. - 9781615671731 ; , s. 1-12, s. 1-14
  • Conference paper (other academic/artistic)abstract
    • Just as the present revolution in military affairs has formed the thoughts of joint and coalition forces between national and international militaries, a future revolution is also facing civilian authorities and agencies. Exchanging commander intent and collecting, fusing, and sharing a common operational picture between commanders and grassroots from various civilian authorities/agencies is not easily done. Laws prohibit information exchange, systems are not intended to share information and there is no or little formal training between authorities/agencies.For both simulated and real world operations, an unambiguous language to describe a commander's intent in Crisis Management is needed. The resemblance with the ongoing standardization of the Coalition Battle Management Language (C-BML) is striking. In this paper the idea to form a CML aligned with C-BML is presented. The ongoing standardization effort of a Societal Security1 standard within the frame of ISO/TC-223 and the Emergency Data Exchange Language (EDXL) is introduced. The authors identifies some potential research topics and propose that the work in defining a Crisis Management Language, which is aligned with and benefits from the accomplishments of the ongoing C-BML standardization, is performed under the embracement of SISO.
  •  
10.
  • Gustavsson, Per M., 1965-, et al. (author)
  • Formalizing operations intent and effects for network-centric applications
  • 2009
  • In: Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. - : IEEE Computer Society. - 9780769534503
  • Conference paper (peer-reviewed)abstract
    • A Network-Centric approach enables systems to be interconnected in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments require commanders to plan for more flexible missions that allow organizations from various nations and agencies to join or separate from the teams performing the missions, depending on the situation. The uncertainty inherent in an actual mission, and the variety of potential organizations that support the mission after it is underway, makes Command Intent (CI) a critical concept for the mission team. Both humans and computerized decision support services need to have the ability to communicate and interpret a shared CI. This paper presents the Operations Intent and Effects Model (OIEM) - a model that relates CI to Effects, and supports both traditional military planning and Effects Based Operation. In the provided example the suggested Command and Control Language is used to express Operations Intent and Effects. © 2009 IEEE.
  •  
11.
  • Gustavsson, Per M., 1965-, et al. (author)
  • Machine Interpretable Representation of Commander's Intent
  • 2008
  • In: Proceedings of the 13th International Command and Control Research and Technology Symposium (13th ICCRTS).
  • Conference paper (peer-reviewed)abstract
    • The Network-Centric approach envisioned in the Global Information Grid enables the interconnection of systems in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments require commanders to plan for missions that allow organizations from various nations and agencies to join or separate from the teams performing the missions, depending on the situation, as missions unfold. The uncertainty within an actual mission, and the variety of potential organizations that support the mission after it is underway, makes Command Intent (CI) a critical concept for the mission team. With new and innovative information technologies, CI can now be made available to the team of organizations in a coalition environment. Using a flexible and linguistically based approach for representing CI allows Intent to be interpreted and processed by all participants – both humans and machines. CI representations need to be able to express mission team’s purpose, the anticipated End-State of the mission and desired key tasks. In this work, the expression of CI is developed to enable the structure and dynamics of collaboration support.
  •  
12.
  • Gustavsson, Per M., 1965-, et al. (author)
  • Operations Intent and Effects Model
  • 2011
  • In: The Journal of Defence Modeling and Simulation. - : Sage Publications. - 1548-5129 .- 1557-380X. ; 8:1, s. 37-59
  • Journal article (peer-reviewed)abstract
    • Military missions in the 21st century are characterized by combinations of traditional symmetric conventional warfare, irregular warfare, and operations other than war. The inherent uncertainty in an actual mission and the variety of potential organizations (e.g. multi-agency, non-governmental, private volunteer, international, international corporations) from several countries that support the mission makes collaboration and co-ordination a key capability for command and control. The ability to communicate and automatically process intent and effects is vital in order for a commander to cooperate with other organizations and agencies and lead subordinates in such a way that the overall mission is completed in the best possible way, including exploitation of fleeting opportunities, i.e. enable for self-synchronization amongst teams and allow for subordinate initiatives. However, intent and effects are often absent in the current and forthcoming digitalized information models, and if intent and effects are present it is likely to be found that the representations are made as free-text fields based on natural language. However, such messages are very difficult to disambiguate, particularly for automated machine systems. The overall objective for the Operations Intent and Effects Model is to support operational and simulated systems by a conceptual intent and effects model and a formalism that is human and machine interpretable.
  •  
13.
  • Gustavsson, Per M., 1965-, et al. (author)
  • Towards Service Oriented Simulations
  • 2004
  • In: Fall Simulation Interoperability Workshop 2004. ; , s. 219-229
  • Conference paper (other academic/artistic)abstract
    • In the effort to provide simulation support to the future Network Based Defence (NBD)1 that are currently being applied by the Swedish Armed Forces (SwAF), the authors opinion is that simulation should be treated as any other services and use the same architectural requirements addressed in the SwAF Enterprise Architecture (FMA)2 and in subsidiary documents.The choice so far for simulation is the High Level Architecture (HLA). During the author’s participation in ongoing work supporting NBD, questions have gradually been raised if HLA is the simulation path to walk. In the Core Enterprise Services (CES) and FMA Services IT-Kernel, core services are specified and HLA do address a lot of non-simulation specific services giving unwanted redundancy. However, the services already defined may with some enhancements deliver the same services addressed within CES and FMA Services IT-Kernel. Furthermore, HLA also comes with the Federation Development and Execution Process (FEDEP) that introduce process methodology to build HLA federations. Basically FEDEP is a software development process for distributed systems. The Next Generation HLA could be more than just a simulation standard if it utilizes the FMA ideas and avoids the green HLA elephant3.In this paper the authors present the ongoing work, as it stands today, with Service Oriented Simulations, that is an outlook for simulation using the architectural structuring, services, components and infrastructures concepts evolving in FMA and with the Global Information Grid (GIG) Enterprise Services (GES) in mind. The focus is to identify simulation services that encapsulate the core features of simulation. Thereby reducing redundancy in methodology and service as well as enabling interoperable simulation support for the whole system lifecycle – Acquisition, Development, Training, Planning, In-the-Field decision support, System removal – within NBD, entailing that the architecture for simulation is uniform regardless of its application and giving end-users the capability to focus on what to simulate instead of how to simulate.
  •  
14.
  • Lagervik, Charlie, et al. (author)
  • A System Theoretical Approach to Situation Awareness : A Holistic View of Purposeful Elements
  • 2006
  • In: 9th International Conference on Information Fusion. - : IEEE. - 9781424409532 ; , s. 1-7
  • Conference paper (other academic/artistic)abstract
    • This paper executes a comparison of the theories by Ackoff and Bedny & Meister for situation awareness (SA). The comparison gives a conceptual design for the common part of SA, a design that involves concepts like conscious and unconscious processes, gnostic activity, active and passive memory and dynamic processes. The design captures the ideas presented by Ackoff for adoption and learning, and is intended to work with social systems as described by Ackoff. The aim of the paper is to fill the need of conceptual general designs for SA systems. As result a definition of SA is presented, the result of the comparison of theories is presented, discussed and summarized in a conceptual design
  •  
15.
  • Mellin, Jonas, et al. (author)
  • Using Imprecise Computation for Virtual and Constructive Simulations
  • 2014
  • In: Proceedings of the 2014 Winter Simulation Conference. - : IEEE Press. - 9781479974863 ; , s. 4043-4044
  • Conference paper (peer-reviewed)abstract
    • In this work, we raise three critical questions that must be investigated to ameliorate composability ofvirtual simulation models and to enable adoption of systematic and stringent real-time techniques toenable more scalable simulation models for virtual and constructive simulation. The real-time techniquesin question enable us to separate between policies and mechanisms and, thus, the simulation engine candecide dynamically how to run the simulation given the existing resources (e.g., processor) and the goalsof the simulation (e.g., sufficient fidelity in terms of timing and accuracy). The three critical questionsare: (i) how to design efficient and effective algorithms for making dynamic simulation model designdecisions during simulation; (ii) how to map simulation entities (e.g., agents) into (real-time) tasks; and(iii) how to enable a divide and conquer approach to validating simulation models.
  •  
16.
  • Niklasson, Lars, et al. (author)
  • Extending the scope of Situation Analysis
  • 2008
  • In: Proceedings of the 11th International Conference on Information Fusion (FUSION 2008)<em></em>, Cologne, Germany, June 30–July 3, 2008. - : IEEE Press. - 9783000248832 ; , s. 454-461
  • Conference paper (peer-reviewed)abstract
    • The use of technology to assist human decision making has been around for quite some time now. In the literature, models of both technological and human aspects of this support can be identified. However, we argue that there is a need for a unified model which synthesizes and extends existing models. In this paper, we give two perspectives on situation analysis: a technological perspective and a human perspective. These two perspectives are merged into a unified situation analysis model for semi-automatic, automatic and manual decision support (SAM)2. The unified model can be applied to decision support systems with any degree of automation. Moreover, an extension of the proposed model is developed which can be used for discussing important concepts such as common operational picture and common situation awareness.
  •  
17.
  • Yano, Edgar Toshiro, et al. (author)
  • A framework to support the development of Cyber Resiliency with Situational Awareness Capability
  • 2015
  • In: 20th ICCRTS Proceedings. - : International Command and Control Institute.
  • Conference paper (peer-reviewed)abstract
    • Cybersecurity success is essentially the result of an effective risk management process. However, this process is being challenged by the inherent complexity of systems, developed with vulnerable components and protocols, and the crescent sophistication of attackers, now backed by well-resourced criminal organizations and nations. With this scenario of uncertainties and high volume of events, it is essential the ability of cyber resiliency. Cyber resiliency is the ability of a system, organization, mission, or business process to anticipate, withstand, recover from, and adapt capabilities in the face of adversary conditions, stresses, or attacks on the cyber resources it needs to function. In the present work, it is presented a framework for cyber resiliency where a segmentation strategy and the Intrusion Kill Chain (IKC) attack model, developed by Lockheed-Martin, are central elements. Segmentation allows the construction of a layered defense, where the highest-priority assets are in the inner layers and the attackers are forced to surpass several layers to reach them. The IKC attack model is a model of seven phases that the attackers must perform to achieve their goals. Each segment is supposed to be designed with the best efforts to prevent, detect and contain an IKC. According to the Situational Awareness (SA) model of Endsley, the Level of Perception is achieved through sensors connected to the controls of prevention, detection and containment of IKC in different segments. The Level of Understanding is obtained by identifying the segments impacted by the attackers, and the Level of Projection by the identification of the next segments to be attacked and defense actions required to contain this advance. The use of the framework leads to the development of a structured set of defense mechanisms, and supports the development of SA capability to allow defenders to make correct decisions in order to maintain the mission even under a heavy attack
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-17 of 17
Type of publication
conference paper (14)
journal article (3)
Type of content
peer-reviewed (12)
other academic/artistic (5)
Author/Editor
Gustavsson, Per M., ... (15)
Brax, Christoffer (4)
Moore, Philip (3)
Amorim, Joni A. (3)
Åhlfeldt, Rose-Mhari ... (3)
Andler, Sten F. (3)
show more...
Niklasson, Lars (2)
Niklasson, Lars, 196 ... (2)
Heldal, Ilona (2)
Magnuson, Anders (1)
Johansson, Fredrik (1)
Atif, Yacine, 1967- (1)
Verbaan, Hans (1)
Halfvarson, Jonas, 1 ... (1)
Steineck, Gunnar, 19 ... (1)
Thorsell, Annika, 19 ... (1)
Hellström, Per M. (1)
Skokic, Viktor, 1982 (1)
Sjöberg, F. (1)
Bull, Cecilia, 1977 (1)
Bergmark, Karin, 196 ... (1)
Yrlid, Ulf, 1971 (1)
Ziemke, Tom (1)
Hedenström, Per (1)
Al Masri, Mohammad, ... (1)
Hellström, Per M., 1 ... (1)
Ström, Magnus (1)
Falkman, Göran, 1968 (1)
Devarakonda, Sravani (1)
Hertervig, Erik (1)
Johansson, Malin E V ... (1)
Yano, Edgar T. (1)
Perkins, Rosie, 1965 (1)
Fagman, Henrik, 1975 (1)
Kalm, Marie, 1981 (1)
Tysk, Curt, 1949- (1)
Mellin, Jonas (1)
Planstedt, Tomas (1)
Gustavsson, Karin (1)
Dahlbom, Anders (1)
Birchenough, George ... (1)
Lindström, Birgitta (1)
Ding, Jianguo (1)
Jeusfeld, Manfred (1)
Yuning, Jiang (1)
Mellin, Jonas, 1965- (1)
Blomquist, Lars (1)
Friis Liby, Ingalill (1)
Yano, Edgar Toshiro (1)
Blais, Curtis (1)
show less...
University
University of Skövde (15)
Karolinska Institutet (2)
University of Gothenburg (1)
Uppsala University (1)
Örebro University (1)
Linköping University (1)
show more...
Jönköping University (1)
Lund University (1)
Blekinge Institute of Technology (1)
show less...
Language
English (17)
Research subject (UKÄ/SCB)
Natural sciences (14)
Engineering and Technology (4)
Medical and Health Sciences (2)
Social Sciences (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view