Change search
Refine search result
45678910 301 - 350 of 17910
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 301.
    Ahnlund, Josefin
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP.
    Statistical Analysis of Conductor-Musician Interaction: With a Focus on Musical Expression2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The kind of interaction occurring between a conductor and musicians while performing a musical piece together is an unique instance of human non-verbal communication. This Musical Production Process (MPP) thus provides an interesting area of research, both from a communication perspective and by its own right. The long term goal of this project is to model the MPP with machine learning methods, for which large amounts of data are required. Since the amount of data available to this master thesis stems from a single recording session (collected at KTH May 2014) a direct modeling of the MPP is unfeasible. As such the thesis can instead be considered as a pilot project which examines pre-requisites for modeling of the MPP. The main aim of the thesis is to investigate how musical expression can be captured in the modeling of the MPP. Two experiments, as well as a theoretical investigation of the MPP, are performed to this end. The first experiment consists of a HMM classification of sound represented by expressive tone parameters extracted by the CUEX algorithm, and labeled by four emotions. This experiment complements the previous classification of conducting gesture in GP-LVM representation performed by Kelly Karipidou on the same data set. The result of the classification implicitly proves that expression has been transferred from conductor to musicians. As the first experiment considers expression over the musical piece as a whole, the second experiment investigates the transfer of expression from conductor to musician on a local level. To this end local representations of the sound and conducting gesture are extracted, the separability of the four emotions are calculated for both representations by use of the Bhattacharyya distance and the results are compared in search for correlation. Some indications of correlation between the representations of sound and gesture are found. The conclusion is nevertheless that the utilized representations of conducting gesture do not capture musical expression to a sufficient extent.

  • 302.
    Ahnstedt, Linda
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Johansson, Susanna
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Basmobilen2003Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Dagens mobiltelefoner får fler och fler funktioner, det är inte längre ovanligt om det går att koppla upp sig mot Internet eller ta kort med mobiltelefonen. Men frågan som ställs i detta arbete är om mobiltelefonanvändarna är intresserade av dessa nya funktioner. Finns det de som är intresserade av vad som i detta arbete kallas basmobilen, vars funktioner är följande: telefonsamtal, SMS, telefonbok, samtalslista, alarm och möjligheten att kunna byta ringsignal. Efter en historisk inblick i mobiltelefonens utveckling ges en beskrivning av vad basmobilen motsvarar. Med hjälp av en enkätundersökning, intervjuer och insamlade dagböcker besvaras frågan vad mobiltelefonanvändarna är intresserade av. Resultatet visar att basmobilen inte är ointressant för enkätbesvararna, men det finns även en del som saknar funktioner. Detta tas sedan upp i diskussionsavsnittet, där det även finns ett förslag på hur mobiltelefoner ska byggas upp för att passa en så bred användargrupp som möjligt.

  • 303.
    Ahonen-Jonnarth, Ulla
    et al.
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management, Computer science.
    Odelstad, Jan
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management, Computer science.
    Simulation as a tool for the evaluation of forest management treatments2010In: ESM'2010 - The 2010 European Simulation and Modelling Conference / [ed] Gerrit K. Janssens, Katrien Ramaekers and An Caris, Ghent: EUROSIS-ETI , 2010, p. 426-433Conference paper (Refereed)
    Abstract [en]

    Cleaning of young forest stands is a multicriteria problem with conflicting goals. This kind of forest management treatment is performed by human beings but it is possible that this work may be performed by artificial agents in the future. The artificial agents need detailed information about how to clean a forest stand and/or what are the goals for cleaning. One problem in development of cleaning rules for artificial cleaning agents is that explicit knowledge about good cleaning results is not detailed. In this paper we present a tool for developing and testing rules and judging evaluation functions for cleaning. We illustrate this tool by presenting examples of some ways to clean forest stands in a computer environment and we present how the cleaning results can be evaluated. In order to obtain material for experiments it is also possible to simulate forest stands using this tool.

  • 304.
    Ahrenberg, Lars
    Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, NLPLAB - Natural Language Processing Laboratory.
    Codified Close Translation as a Standard for MT2005In: Conference of the European Association for Machine Translation,2005, Budapest: EAMT , 2005, p. 13-Conference paper (Refereed)
  • 305.
    Ahrenberg, Lars
    Linköping University, Department of Computer and Information Science, NLPLAB - Natural Language Processing Laboratory. Linköping University, The Institute of Technology.
    LinES: An English-Swedish Parallel Treebank2007In: Proceedings of 16th Nordic Conference of Computational Linguistics Nodalida,2007 / [ed] Joakim Nivre, Heiki-Jaan Kaalep, Kadri Muischnek, Mare Koit, Tartu, Estonia: University of Tartu , 2007, p. 270-273Conference paper (Refereed)
    Abstract [en]

    This paper presents an English-Swedish Parallel Treebank, LinES, that is currently under development. LinES is intended as a resource for the study of variation in translation of common syntactic constructions from English to Swedish. For this reason, annotation in LinES is syntactically oriented, multi-level, complete and manually reviewed according to guidelines. Another aim of LinES is to support queries made in terms of types of translation shifts.

  • 306.
    Ahrenberg, Lars
    Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, NLPLAB - Natural Language Processing Laboratory.
    Searching Parallel Treebanks for Translation Relations2008In: Resourceful Language Technology: Festschrift in Honor of Anna Sågvall Hein, Uppsala: Acta Universitatis Upsaliensis , 2008, 1, p. 11-20Chapter in book (Other academic)
    Abstract [en]

    As the first holder of the first chair in computational linguistics in Sweden, Anna Sågvall Hein has played a central role in the development of computational linguistics and language technology both in Sweden and on the international scene. Besides her valuable contributions to research, which include work on machine translation, syntactic parsing, grammar checking, word prediction, and corpus linguistics, she has been instrumental in establishing a national graduate school in language technology as well as an undergraduate program in language technology at Uppsala University. It is with great pleasure that we present her with this Festschrift to honor her lasting contributions to the field and to commemorate her retirement from the chair in computational linguistics at Uppsala University. The contributions to the Festschrift come from Anna’s friends and colleagues around the world and deal with many of the topics that are dear to her heart. A common theme in many of the articles, as well as in Anna’s own scientific work, is the design, development and use of adequate language technology resources, epitomized in the title Resourceful Language Technology.

  • 307.
    Ahrenberg, Lars
    et al.
    Linköping University, Department of Computer and Information Science, NLPLAB - Natural Language Processing Laboratory. Linköping University, The Institute of Technology.
    Andersson, Mikael
    Merkel, Magnus
    Linköping University, Department of Computer and Information Science, NLPLAB - Natural Language Processing Laboratory. Linköping University, The Institute of Technology.
    A System for Incremental and Interactive Word Linking2002In: In Third International Conference on Language Resources and Evaluation (LREC 2002), Las Palmas, 29-31 May 2002., European Language Resources Association (ELRA) , 2002, p. 485-490Conference paper (Refereed)
    Abstract [en]

    Aligned parallel corpora constitute a critical information resource for a great number of linguistic and technological endeavors. Automatic sentence alignment has reached a level whereby large parallel documents can be fully aligned with the aid of interactive post-editing tools. Word alignment systems have not yet reached the same level of performance, but are good enough to support full word alignment if embedded in an interactive system. In this paper we describe a system for fast and accurate word alignment currently under development at our department, where the user can review and improve the output from an automatic system in an incremental fashion.

  • 308.
    Ahsan, Naveed
    et al.
    Linköping University, Department of Electrical Engineering, Electronic Devices. Linköping University, The Institute of Technology.
    Ouacha, Aziz
    Linköping University, Department of Electrical Engineering, Electronic Devices. Linköping University, The Institute of Technology.
    Dabrowski, Jerzy
    Linköping University, Department of Electrical Engineering, Electronic Devices. Linköping University, The Institute of Technology.
    Samuelsson, Carl
    Swedish Defence Research Agency (FOI), P.O. Box 1165, SE-581 11 Linköping, Sweden.
    Dual Band Tunable LNA for Flexible RF Front End2007In: Proceedings of the IEEE International Bhurban Conference on Applied Sciences & Technology (IBCAST 2007), January 8-11, 2007, Islamabad, Pakistan, IEEE Explore , 2007, p. 19-22Conference paper (Refereed)
    Abstract [en]

    This paper presents a dual band LNA that can be switched between two bands (2.4 GHz & 5.2 GHz) for IEEE 802.1 la/b/g WLAN applications. The LNA is also tunable within each band and the tuning is incorporated by on-chip varactors. The test chip consists of two fully integrated narrow-band tunable LNAs along with SPDT switch. For power saving one LNA can be switched off. The technology process is 0.2 mum GaAs offered by OMMIC. The LNA can achieve a relatively good performance over the two bands as demonstrated by simulation. With a 3V supply, the LNA has a gain of 26.2 dB at 2.4 GHz and 21.8 dB at 5.2 GHz and the corresponding NF varies between 2.07 dB and 1.84 dB, respectively. The LNA has an IIP3 of -7 dBm at 2.4 GHz and -1.6 dBm at 5.2 GHz.

  • 309.
    Ahsan, Naveed
    et al.
    Linköping University, Department of Electrical Engineering, Electronic Devices. Linköping University, The Institute of Technology.
    Ouacha, Aziz
    Linköping University, Department of Electrical Engineering, Electronic Devices. Linköping University, The Institute of Technology.
    Samuelsson, Carl
    Swedish Defence Research Agency (FOI), P.O. Box 1165, SE-581 11 Linköping, Sweden.
    Boman, Tomas
    Swedish Defence Research Agency (FOI), P.O. Box 1165, SE-581 11 Linköping, Sweden.
    Applications of Programmable Microwave Function Array (PROMFA)2007In: Proceedings of the IEEE European Conference on Circuit Theory and Design (ECCTD 2007), August 26-30, 2007, Seville, Spain, IEEE , 2007, p. 164 -167Conference paper (Refereed)
    Abstract [en]

    This paper describes the use of programmable microwave function array (PROMFA) for different microwave application. The PROMFA concept is based on an array of generic cells, in which a number of different functions can be realized. Each PROMFA cell is a four-port circuit, that can either be programmed independently or collectively according to a specific need. Specifically, the phase shift capability in a single PROMFA cell, useful for a new type of phase shifter design is discussed. The paper also presents the functionality of this new architecture as a beamforming network. As an example case an active corporate feed network and a tunable recursive filter is demonstrated. Simulated and measured results are presented.

  • 310.
    Ahsant, Mehran
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    On-demand Restricted Delegation: A Framework for Dynamic, Context-Aware, Least-Privilege Delegation in Grids2009Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    In grids, delegation is a key facility that can be used to authenticate and authorize requests on behalf of disconnected users. In current grid systems,delegation is either performed dynamically, in an unrestricted manner, or by a secure but static method. Unfortunately, the former compromises security and the latter cannot satisfy the requirements of dynamic grid application execution. Therefore, development of a delegation framework that enables a restricted and flexible delegation mechanism becomes increasingly urgent as grids are adopted by new communities and grow in size. The main barriers in development of such a mechanism are the requirements for dynamic execution of grid applications, which make it difficult to anticipate required access rights for completing tasks in advance.

    Another significant architectural requirement in grids is federated security and trust. A considerable barrier to achieving this is cross-organizational authentication and identification. Organizations participating in Virtual Organizations (VOs) may use different security infrastructures that implement different protocols for authentication and identification; thus, there exists a need to provide an architectural mechanism for lightweight, rapid and interoperable translation of security credentials from an original format to a format understandable by recipients.

    This thesis contributes the development of a delegation framework that utilizes a mechanism for determining and acquiring only required rights and credentials for completing a task, when they are needed. This is what we call an on-demand delegation framework that realizes a bottom-up delegation model and provides a just-in-time acquisition of rights for restricted and dynamic delegation.

    In this thesis, we further contribute the development of a credential mapping mechanism using off-the-shelf standards and technologies. This mechanism provides support for an on-the-fly exchange of different types of security credentials used by the security mechanisms of existing grids.

  • 311.
    Ahsant, Mehran
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Basney, Jim
    Workflows in Dynamic and Restricted Delegation2009In: 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), New York: IEEE , 2009, p. 17-24Conference paper (Refereed)
    Abstract [en]

    Delegation is a key facility in dynamic, distributed and collaborative environments like e rids and enables an effective use of a wide range of dynamic applications. Traditional delegation frameworks approach a top-down model of delegation for delegating rights from a superior to a subordinate in advance before a delegate starts off a delegated task. However, a top-down model of delegation cannot meet all the requirements of dynamic execution of distributed applications, as in such environments. required access rights for completing a task cannot easily be anticipated in advance. Delegating fewer rights than required for completing a task may cause the task execution to fail while delegating more rights than needed may threaten abuse by malicious parties. It is therefore reasonable and more robust to utilize a mechanism that allows determining and acquiring only required rights and credentials for completing a task, when they are needed. This is what we call an on-demand delegation framework, which realizes a bottom-up delegation model and provides a just-in-time acquisition of rights for a restricted and dynamic delegation. In this paper we elaborate the concept of bottom-up delegation and describe how an on-demand delegation framework can leverage workflows to meet the requirements of the least privileges principle. We also discuss the vital need for dynamic and adaptive scientific workflows to support an on-demand delegation framework. We present three different models or bottom-up delegation, which cover a wide range or usage scenarios in Grids and dynamic collaborative environments. Using a standard RBAC authorization model and a graph-based workflow model (DAG), we define and analyze a formal model of our proposed bottom-up delegation approach.

  • 312.
    Ahsant, Mehran
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Basney, Jim
    Johnsson, Lennart
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Dynamic, Context-Aware, Least-Privilege Grid Delegation2007In: 8th IEEE/ACM International Conference on Grid Computing, New York: IEEE , 2007, p. 209-216Conference paper (Refereed)
    Abstract [en]

    Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. In dynamic environments like Grids, on one hand, delegating a restricted set of rights reduces exposure to attack but also limits the flexibility and dynamism of the application; on the other hand, delegating all rights provides maximum flexibility but increases exposure. This issue has not yet been adequately addressed by current Grid security mechanisms and is becoming a very challenging and crucial issue for future Grid development. Therefore, providing an effective delegation mechanism which meets the requirements of the least privilege principle is becoming an essential need. Furthermore, we are witnessing a phenomenal increase in the automation of organizational tasks and decision making, as well as the computerization of information related services, requiring automated delegation mechanisms. In order to meet these requirements we introduce an Active Delegation Framework which extends our previous work on on-demand delegation, making it context-aware. The framework provides a just-in-time, restricted and dynamic delegation mechanism for Grids. In this paper we describe the development of this framework and its implementation and integration with the Globus Toolkit.

  • 313.
    Ahsant, Mehran
    et al.
    KTH, Superseded Departments, Numerical Analysis and Computer Science, NADA.
    Mulmo, Olle
    KTH, Superseded Departments, Numerical Analysis and Computer Science, NADA.
    Basney, Jim
    University of Illinois.
    Grid Delegation Protocol2004In: Workshop on Grid Security Practice and Experience, 2004, p. 81-91Conference paper (Refereed)
    Abstract [en]

    We propose a delegation protocol based on the WS-Trust specification, which is applicablefor a wide range of Grid applications. The protocol is independent of underlying securitymechanisms and is therefore applicable to all security mechanisms of common use in Gridenvironments, such as X.509 proxy certificates, Kerberos based delegation, and SAML assertions.We emphasize that this is work in progress. In this paper, we document our thoughtsand current strategy, and we solicit comments and feedback on our approach.

  • 314.
    Ahsant, Mehran
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Mulmo, Olle
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Johnsson, Lennart
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Basney, Jim
    Lee, Adam J.
    Toward An On-demand Restricted Delegation Mechanism for Grids2006In: 2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, New York: IEEE , 2006, p. 152-159Conference paper (Refereed)
    Abstract [en]

    Grids are intended to enable cross-organizationalinteractions which makes Grid security a challenging and nontrivialissue. In Grids, delegation is a key facility that canbe used to authenticate and authorize requests on behalf ofdisconnected users. In current Grid systems there is a tradeoffbetween flexibility and security in the context of delegation.Applications must choose between limited or full delegation: onone hand, delegating a restricted set of rights reduces exposure toattack but also limits the flexibility/dynamism of the application;on the other hand, delegating all rights provides maximumflexibility but increases exposure. In this paper, we propose anon-demand restricted delegation mechanism, aimed at addressingthe shortcomings of current delegation mechanisms by providingrestricted delegation in a flexible fashion as needed for Grid applications.This mechanism provides an ontology-based solutionfor tackling one the most challenging issues in security systems,which is the principle of least privileges. It utilizes a callbackmechanism, which allows on-demand provisioning of delegatedcredentials in addition to observing, screening, and auditingdelegated rights at runtime. This mechanism provides supportfor generating delegation credentials with a very limited andwell-defined range of capabilities or policies, where a delegatoris able to grant a delegatee a set of restricted and limited rights,implicitly or explicitly.

  • 315.
    Ahsant, Mehran
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Mulmo, Olle
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Nefedova, V.
    Ananthakrishnan, R.
    Liming, L.
    Madduri, R.
    Pearlman, L.
    Siebenlist, F.
    Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service2006In: Journal of Grid Computing, ISSN 1572-9814, Vol. 4, no 2, p. 135-144Article in journal (Refereed)
    Abstract [en]

    Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Registration Service (PURSE), a set of tools for automating user registration, credential creation, and credential management tasks. PURSE provides the system developer with a set of customizable components, suitable for integration with portals, that can be used to address the full lifecycle of Grid credential management. We describe the PURSE design and its use in portals for two systems, the Earth System Grid data access system and the Swegrid computational Grid. In both cases, the user is entirely freed from the need to create or manage public key credentials, thus simplifying the Grid experience and reducing opportunities for error. We argue that this capturing of common use cases in a reusable ‘solution’ can be a model for how Grid ease-of-use can be addressed in other domains as well.

  • 316.
    Ahsant, Mehran
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Talavera González, Esteban
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for High Performance Computing, PDC.
    Basney, Jim
    Security Credential Mapping in Grids2009In: 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), New York: IEEE , 2009, p. 481-486Conference paper (Refereed)
    Abstract [en]

    Federating security and trust is one of the most significant architectural requirements in grids. In this regard, one challenging issue is the cross-organizational authentication and identification. Organizations participated in Virtual Organizations (VOs) may use different security infrastructures that implement different authentication and identification protocols. Thus, arises an architectural need to provide a mechanism for a lightweight, rapid and interoperable translation of security credentials from an original format to a format understandable by recipients. In this paper, we describe the development and the implementation of an architecture for credential mapping in grids using off-the-shelf technologies and standard specifications. Our open-source implementation of this architecture provides support for an on-the-fly exchange for different types of security credentials used by diverse grid security infrastructures'.

  • 317.
    Ahtiainen, Juhana
    et al.
    Department of Electrical Engineering and Automation, Aalto University, Espoo, Finland.
    Stoyanov, Todor
    Örebro University, School of Science and Technology.
    Saarinen, Jari
    GIM Ltd., Espoo, Finland.
    Normal Distributions Transform Traversability Maps: LIDAR-Only Approach for Traversability Mapping in Outdoor Environments2017In: Journal of Field Robotics, ISSN 1556-4959, E-ISSN 1556-4967, Vol. 34, no 3, p. 600-621Article in journal (Refereed)
    Abstract [en]

    Safe and reliable autonomous navigation in unstructured environments remains a challenge for field robots. In particular, operating on vegetated terrain is problematic, because simple purely geometric traversability analysis methods typically classify dense foliage as nontraversable. As traversing through vegetated terrain is often possible and even preferable in some cases (e.g., to avoid executing longer paths), more complex multimodal traversability analysis methods are necessary. In this article, we propose a three-dimensional (3D) traversability mapping algorithm for outdoor environments, able to classify sparsely vegetated areas as traversable, without compromising accuracy on other terrain types. The proposed normal distributions transform traversability mapping (NDT-TM) representation exploits 3D LIDAR sensor data to incrementally expand normal distributions transform occupancy (NDT-OM) maps. In addition to geometrical information, we propose to augment the NDT-OM representation with statistical data of the permeability and reflectivity of each cell. Using these additional features, we train a support-vector machine classifier to discriminate between traversable and nondrivable areas of the NDT-TM maps. We evaluate classifier performance on a set of challenging outdoor environments and note improvements over previous purely geometrical traversability analysis approaches.

  • 318. Aichholzer, Oswin
    et al.
    Biro, Michael
    Demaine, Erik
    Demaine, Martin
    Eppstein, David
    Fekete, Sándor P.
    Hesterberg, Adam
    Kostitsyna, Irina
    Schmidt, Christiane
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering.
    Folding Polyominoes into (Poly)CubesIn: International journal of computational geometry and applications, ISSN 0218-1959Article in journal (Refereed)
  • 319. Aichroth, Patrick
    et al.
    Weigel, Christian
    Kurz, Thomas
    Stadler, Horst
    Drewes, Frank
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Björklund, Johanna
    Umeå University, Faculty of Science and Technology, Department of Computing Science.
    Schlegel, Kai
    Berndl, Emanuel
    Perez, Antonio
    Bowyer, Alex
    Volpini, Andrea
    MICO - MEDIA IN CONTEXT2015In: 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2015Conference paper (Refereed)
    Abstract [en]

    The abundance of digital content requires cost-effective technologies to extract the hidden meaning from media objects. However, current approaches fail to deal with the challenges related to cross-media analysis, metadata publishing, querying and recommendation that are necessary to overcome this challenge. In this paper, we describe the EU project MICO (Media in Context) which aims to provide the necessary technologies based on open-source software (OSS) core components.

  • 320.
    Aidemark, Jan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Investigating Concepts for an Interconnected Socio/Technical KM Planning Approach2009In: Proceedings of the 10th European conference on Knowledge Management: ECKM 2009 - Università Degli Studi Di Padoava, Vicenza, Italy, 3-4 September 2009 / [ed] . Bolisani, E. and Scarso, E., Reading, England: Academic Publising Ltd , 2009, p. 1-9Conference paper (Refereed)
  • 321.
    Aidemark, Jan
    et al.
    Linnaeus University.
    Askenäs, Linda
    Linnaeus University.
    Nygårdh, Annette
    Jönköping University, School of Health and Welfare, HHJ, Dep. of Nursing Science. Jönköping University, School of Health and Welfare, The Jönköping Academy for Improvement of Health and Welfare.
    Strömberg, Anna
    Linköping University.
    User involvement in the co-design of self-care support systems for heart failure patients2015In: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 64, p. 118-124Article in journal (Refereed)
    Abstract [en]

    In this paper the nature of user involvement in a co-design process will be explored. The outlines of a research project aiming at developing support systems for self-care inpatients suffering from chronic heart failure will be presented. The project is planned to perform a co-design effort where users (patients and healthcare professionals) will be given the opportunity to influence the development of support systems. We will discuss a number of possibilities and challenges that lie in the design of this kind of project and also some findings from its early stages. This report presents the experiences of users’ input, which are discussed in the context of previous research on benefits of user contributions in systems development.

  • 322.
    Airola, Rasmus
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hager, Kristoffer
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Image Classification, Deep Learning and Convolutional Neural Networks: A Comparative Study of Machine Learning Frameworks2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The use of machine learning and specifically neural networks is a growing trend in software development, and has grown immensely in the last couple of years in the light of an increasing need to handle big data and large information flows. Machine learning has a broad area of application, such as human-computer interaction, predicting stock prices, real-time translation, and self driving vehicles. Large companies such as Microsoft and Google have already implemented machine learning in some of their commercial products such as their search engines, and their intelligent personal assistants Cortana and Google Assistant.

    The main goal of this project was to evaluate the two deep learning frameworks Google TensorFlow and Microsoft CNTK, primarily based on their performance in the training time of neural networks. We chose to use the third-party API Keras instead of TensorFlow's own API when working with TensorFlow. CNTK was found to perform better in regards of training time compared to TensorFlow with Keras as frontend. Even though CNTK performed better on the benchmarking tests, we found Keras with TensorFlow as backend to be much easier and more intuitive to work with. In addition, CNTKs underlying implementation of the machine learning algorithms and functions differ from that of the literature and of other frameworks. Therefore, if we had to choose a framework to continue working in, we would choose Keras with TensorFlow as backend, even though the performance is less compared to CNTK.

  • 323.
    Aitenbichler, Erwin
    et al.
    Technische Universität Darmstadt, Germany.
    Behring, Alexander
    Technische Universität Darmstadt, Germany.
    Bradler, Dirk
    Technische Universität Darmstadt, Germany.
    Hartmann, Melanie
    Technische Universität Darmstadt, Germany.
    Martucci, Leonardo
    Technische Universität Darmstadt, Germany.
    Mühlhäuser, Max
    Technische Universität Darmstadt, Germany.
    Ries, Sebastian
    Technische Universität Darmstadt, Germany.
    Schnelle-Walka, Dirk
    Technische Universität Darmstadt, Germany.
    Schreiber, Daniel
    Technische Universität Darmstadt, Germany.
    Steimle, Jürgen
    Technische Universität Darmstadt, Germany.
    Strufe, Thorsten
    Technische Universität Darmstadt, Germany.
    Shaping the Future Internet2009In: Proceedings of the 3rd International CompanionAble Workshop IoPTS, Brussels, 2. December 2009., The CompanionAble , 2009Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) and the Internet of Services (IoS) are two well-knownexemplars of the emerging ‘Internet variants’. These variants will be tightlyinterwoven yet specific with respect to the supporting technologies needed. Thepresent paper discusses the five variants identified as essential by the authors: IoT,IoS, Internet-of-Humans, Internet-of-Crowds, and Internet-of-Clouds. For eachvariant, a non-comprehensive set of research challenges is cited and related to thestate of the art and to ongoing projects of the lab.

  • 324.
    Ajegunma, Solomon
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Onoberhie, Kennedy
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Pasupathy, Ramadevi
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Exploring the Integration of Enterprise Systems Solutions Within A Supply Chian2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Over the decades, as organizations begin to move globally there has been a sporadic flow of information in their supply chain. Competition today is forcing companies to integrate tightly with their suppliers and customers, in order to reduce the time available to flex the supply chain (SC) (Koh S.C, Saad S, Arunachalam S, 2006). The integration of firms and departments and information is getting more and more complicated. Regardless of enterprise system solutions being introduced as “integrated suites” they have failed to accomplish application and supply chain integration (Themistocleous, M. Irani, Z. O‟Keefe, and R. 2001). Therefore, this thesis aims to explore, gain better understanding and to explain the balance that may occur between the challenges and benefits gained from integrating enterprise resource planning and supply chain management.Our topic of interest could be view from both developers and user perspective. Developer/consultant‟s perspective is based on the viewpoint of those involved in and responsible for developing enterprise solutions. User‟s perspective, this perspective gives insight to how the integration process is perceived by organisations actually using the solutions. We chose the User perspective because we consider the user to be the direct beneficiary of whatever outcome is gotten from both the business solutions and its integration.In order to achieve a purposeful thesis. We decided to use an interpretive perspective which focus on exploring and gaining insight into issues of integrating enterprise system solution. We used both the inductive and the deductive approaches in our research. This would be advantageous due to the nature of our research topic, as there is little existing knowledge about the integration of enterprise systems solution within supply chain and there are lots of literatures related to the enterprise system solutions (ERP and SCM) been observed. The inductive approach would guide us to choose one or a few specific interactions to explore in-depth, while the deductive approach would aid us when making an hypothesis, since we would be collecting ideas about previous research and theories in order to guide us and make comparison.Conclusively, we found that the balance between challenges and benefits of ERP and SCM are unequivocal, as the benefits surpass the challenges and the effect of challenges on organisation‟s benefit is that it prolongs the short term benefit.

  • 325.
    Ajma, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Furdek, Marija
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden / Faculty of Electrical Engineering and Computing, Dept. of Telecommunications, University of Zagreb, Croatia.
    Monti, Paolo
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden.
    Wosinska, Lena
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Dynamic provisioning utilizing redundant modules in elastic optical networks based on architecture on demand nodes2014In: European Conference on Optical Communication (ECOC), 2014, IEEE , 2014, p. 1-3Conference paper (Refereed)
    Abstract [en]

    Survivable synthetic ROADMs are equipped with redundant switching modules to support failure recovery. The paper proposes a dynamic connection provisioning strategy which exploits these idle redundant modules to provision regular traffic resulting in a substantial improvement in the blocking performance.

  • 326.
    Ajmal, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Cavdar, Cicek
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Wosinska, Lena
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Trading Quality of Transmission for Improved Blocking Performance in All-Optical Networks2013In: Asia Communications and Photonics Conference 2013, 2013, p. AF4E.5-Conference paper (Refereed)
    Abstract [en]

    We propose a connection provisioning strategy in dynamic all-optical networks, which exploit the possibility to allow a tolerable signal quality degradation during a small fraction of holding-time resulting in a significant improvement of blocking performance.

  • 327.
    Ajmal, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Furdek, Marija
    Royal Institute of Technology, KTH, Stockholm, Sweden / Dept. of Telecommunications, University of Zagreb, Croatia.
    Monti, Paolo
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Wosinska, Lena
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    An Optimization Model for Dynamic Bulk Provisioning in Elastic Optical Networks2014In: Asia Communications and Photonics Conference 2014, Optics Info Base, Optical Society of America, 2014, p. AF3E.6-Conference paper (Refereed)
    Abstract [en]

    We investigate benefits of setup-delay tolerance in elastic optical networks and propose an optimization model for dynamic and concurrent connection provisioning. Simulation shows that the proposed strategy offers significant improvement of the network blocking performance.

  • 328.
    Akan, Batu
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Planning and Sequencing Through Multimodal Interaction for Robot Programming2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Over the past few decades the use of industrial robots has increased the efficiency as well as the competitiveness of several sectors. Despite this fact, in many cases robot automation investments are considered to be technically challenging. In addition, for most small and medium-sized enterprises (SMEs) this process is associated with high costs. Due to their continuously changing product lines, reprogramming costs are likely to exceed installation costs by a large margin. Furthermore, traditional programming methods of industrial robots are too complex for most technicians or manufacturing engineers, and thus assistance from a robot programming expert is often needed. The hypothesis is that in order to make the use of industrial robots more common within the SME sector, the robots should be reprogrammable by technicians or manufacturing engineers rather than robot programming experts. In this thesis, a novel system for task-level programming is proposed. The user interacts with an industrial robot by giving instructions in a structured natural language and by selecting objects through an augmented reality interface. The proposed system consists of two parts: (i) a multimodal framework that provides a natural language interface for the user to interact in which the framework performs modality fusion and semantic analysis, (ii) a symbolic planner, POPStar, to create a time-efficient plan based on the user's instructions. The ultimate goal of this work in this thesis is to bring robot programming to a stage where it is as easy as working together with a colleague.This thesis mainly addresses two issues. The first issue is a general framework for designing and developing multimodal interfaces. The general framework proposed in this thesis is designed to perform natural language understanding, multimodal integration and semantic analysis with an incremental pipeline. The framework also includes a novel multimodal grammar language, which is used for multimodal presentation and semantic meaning generation. Such a framework helps us to make interaction with a robot easier and more natural. The proposed language architecture makes it possible to manipulate, pick or place objects in a scene through high-level commands. Interaction with simple voice commands and gestures enables the manufacturing engineer to focus on the task itself, rather than the programming issues of the robot. The second issue addressed is due to inherent characteristics of communication with the use of natural language; instructions given by a user are often vague and may require other actions to be taken before the conditions for applying the user's instructions are met. In order to solve this problem a symbolic planner, POPStar, based on a partial order planner (POP) is proposed. The system takes landmarks extracted from user instructions as input, and creates a sequence of actions to operate the robotic cell with minimal makespan. The proposed planner takes advantage of the partial order capabilities of POP to execute actions in parallel and employs a best-first search algorithm to seek the series of actions that lead to a minimal makespan. The proposed planner can also handle robots with multiple grippers, parallel machines as well as scheduling for multiple product types.

  • 329.
    Akay, Altug
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Dragomir, A
    Erlandsson, Björn-Erik
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care2015In: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 19, no 1, p. 210-218Article in journal (Refereed)
    Abstract [en]

    Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare outcomes and reduce costs using consumer-generated opinion. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users' forum posts, and identifies user communities (modules) and influential users for the purpose of ascertaining user opinion of cancer treatment. We used a self-organizing map to analyze word frequency data derived from users' forum posts. We then introduced a novel network-based approach for modeling users' forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and identify influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide rapid, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.

  • 330.
    Akay, Altug
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Dragomir, Andrei
    Erlandsson, Björn-Erik
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Assessing Antidepressants Using Intelligent Data Monitoring and Mining of Online Fora2016In: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 20, no 4, p. 977-986Article in journal (Refereed)
    Abstract [en]

    Depression is a global health concern. Social networks allow the affected population to share their experiences. These experiences, when mined, extracted, and analyzed, can be converted into either warnings to recall drugs (dangerous side effects), or service improvement (interventions, treatment options) based on observations derived from user behavior in depression-related social networks. Our aim was to develop a weighted network model to represent user activity on social health networks. This enabled us to accurately represent user interactions by relying on the data's semantic content. Our three-step method uses the weighted network model to represent user's activity, and network clustering and module analysis to characterize user interactions and extract further knowledge from user's posts. The network's topological properties reflect user activity such as posts' general topic as well as timing, while weighted edges reflect the posts semantic content and similarities among posts. The result, a synthesis from word data frequency, statistical analysis of module content, and the modeled health network's properties, has allowed us to gain insight into consumer sentiment of antidepressants. This approach will allow all parties to participate in improving future health solutions of patients suffering from depression.

  • 331. Akbarzadeh, Sara
    et al.
    Combes, Richard
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Altman, Zwi
    Self-organizing femtocell offloading at the flow level2013In: International Journal of Network Management, ISSN 1055-7148, E-ISSN 1099-1190, Vol. 23, no 4, p. 259-271Article in journal (Refereed)
    Abstract [en]

    Femtocell technology is expected to be fully self-managed, empowered by self-organizing network functionalities. This paper proposes a solution for self-optimized offloading of macrocell traffic towards open/hybrid-access femtocells. A heterogeneous network comprising macro- and femtocells is modeled as parallel queues. The coverage area of the femtocells is self-optimized by dynamically adapting their pilot powers. A simple update equation for the pilot power is given and its convergence is studied using stochastic approximation techniques. The algorithm balances the load among the cells to improve network capacity. Simulation results illustrate the important performance gains brought about by the proposed scheme, using a dynamic network simulator.

  • 332.
    Akhlaq, Faisal
    et al.
    Linköping University, Department of Computer and Information Science.
    Loganathan, Sumathi
    Linköping University, Department of Computer and Information Science.
    Assembler Generator and Cycle-Accurate Simulator Generator for NoGAP2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    System-on-Chip is increasingly built using ASIP(Application  Specific Instruction set Processor) due to the flexibility and efficiency obtained from ASIPs. NoGAP (Novel Generator of Accelerator and Processor framework) is an innovative approach for  ASIP design, which provides the advantage of both ADL (Architecture  Description Language) and HDL (Hardware Description Language) to the  designer.

    For the processors designed using NoGAP, software tools need to be automatically generated, to aid the  designer in programming and verifying the processor. As part of the master thesis work, we have developed two generators namely Assembler generator and Cycle-Accurate Simulator generator for NoGAP using C++. The Assembler generator automatically generates an assembler, which is used to convert the assembly code written by a programmer into relocatable binary code. The Cycle-Accurate Simulator generator automatically generates a cycle-accurate simulator to model the behavior of the designed processor. Both these generators are static, and can be used to generate the tools for any processor created using NoGAP.

    In this report, we have detailed the concepts behind the generators,and the implementation details of the generators. We have listed the results obtained from running assembler and cycle-accurate simulator on a test processor created using NoGAP.

  • 333.
    Akhlaq, Muhammad
    Blekinge Institute of Technology, School of Computing.
    A Smart-Dashboard: Augmenting safe & smooth driving2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Annually, road accidents cause more than 1.2 million deaths, 50 million injuries, and US$ 518 billion of economic cost globally. About 90% of the accidents occur due to human errors such as bad awareness, distraction, drowsiness, low training, fatigue etc. These human errors can be minimized by using advanced driver assistance system (ADAS) which actively monitors the driving environment and alerts a driver to the forthcoming danger, for example adaptive cruise control, blind spot detection, parking assistance, forward collision warning, lane departure warning, driver drowsiness detection, and traffic sign recognition etc. Unfortunately, these systems are provided only with modern luxury cars because they are very expensive due to numerous sensors employed. Therefore, camera-based ADAS are being seen as an alternative because a camera has much lower cost, higher availability, can be used for multiple applications and ability to integrate with other systems. Aiming at developing a camera-based ADAS, we have performed an ethnographic study of drivers in order to find what information about the surroundings could be helpful for drivers to avoid accidents. Our study shows that information on speed, distance, relative position, direction, and size & type of the nearby vehicles & other objects would be useful for drivers, and sufficient for implementing most of the ADAS functions. After considering available technologies such as radar, sonar, lidar, GPS, and video-based analysis, we conclude that video-based analysis is the fittest technology that provides all the essential support required for implementing ADAS functions at very low cost. Finally, we have proposed a Smart-Dashboard system that puts technologies – such as camera, digital image processor, and thin display – into a smart system to offer all advanced driver assistance functions. A basic prototype, demonstrating three functions only, is implemented in order to show that a full-fledged camera-based ADAS can be implemented using MATLAB.

  • 334. Akhlaq, Muhammad
    et al.
    Sheltami, Tarek
    Helgeson, Bo
    Blekinge Institute of Technology, School of Computing.
    Shakshuki, Elhadi
    Designing an integrated driver assistance system using image sensors2012In: Journal of Intelligent Manufacturing, ISSN 0956-5515, E-ISSN 1572-8145, Vol. January, p. 1-24Article in journal (Refereed)
    Abstract [en]

    Road accidents cause a great loss to human lives and assets. Most of the accidents occur due to human errors, such as bad awareness, distraction, drowsiness, low training, and fatigue. Advanced driver assistance system (ADAS) can reduce the human errors by keeping an eye on the driving environment and warning a driver to the upcoming danger. However, these systems come only with modern luxury cars because of their high cost and complexity due to several sensors employed. Therefore, camera-based ADAS are becoming an option due to their lower cost, higher availability, numerous applications and ability to combine with other systems. Targeting at designing a camera-based ADAS, we have conducted an ethnographic study of drivers to know what information about the driving environment would be useful in preventing accidents. It turned out that information on speed, distance, relative position, direction, and size and type of the nearby objects would be useful and enough for implementing most of the ADAS functions. Several camera-based techniques are available for capturing the required information. We propose a novel design of an integrated camera-based ADAS that puts technologies-such as five ordinary CMOS image sensors, a digital image processor, and a thin display-into a smart system to offer a dozen advanced driver assistance functions. A basic prototype is also implemented using MATLAB. Our design and the prototype testify that all the required technologies are now available for implementing a full-fledged camera-based ADAS.

  • 335.
    Akhlaq, Usman
    et al.
    Blekinge Institute of Technology, School of Computing.
    Yousaf, Muhammad Usman
    Blekinge Institute of Technology, School of Computing.
    Impact of Software Comprehension in Software Maintenance and Evolution2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The need of change is essential for a software system to reside longer in the market. Change implementation is only done through the maintenance and successful software maintenance gives birth to a new software release that is a refined form of the previous one. This phenomenon is known as the evolution of the software. To transfer software from lower to upper or better form, maintainers have to get familiar with the particular aspects of software i.e. source code and documentation. Due to the poor quality of documentation maintainers often have to rely on source code. So, thorough understanding of source code is necessary for effective change implementation. This study explores the code comprehension problems discussed in the literature and prioritizes them according to their severity level given by maintenance personnel in the industry. Along with prioritizing the problems, study also presents the maintenance personnel suggested methodologies for improving code comprehension. Consideration of these suggestions in development might help in shortening the maintenance and evolution time.

  • 336.
    Akhtar, Jawad
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Virtual reality: Effective surroundings, Enormous demonstration and mediator system in the games, industrial design and manufacturing2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this thesis, the concept of virtual reality has been elaborated in the context of games, industrial design and manufacturing. The main purpose of this master’s thesis is to create a virtual environment for games that are near to the reality and according to the human nature through aspects like better interface, simulation, lights, shadow effects and their types. The importance of these aspects regarding realistic virtual environment is complemented through the comparison between two environments i.e. desktop and CAVE on a flight simulation program.

  • 337.
    Akhtar, Naeem
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Alzghoul, Ahmad
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Time performance comparison in determining the weak parts in wooden logs2009Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The steadily increasing demand of wood forces sawmills to increase the efficiency and effectiveness of their equipments. The weak parts and the twist in wooden logs have been documented as the most common and crucial defect in sawn lumber.

    In this thesis we are going to implement a program which is able to determine the weak parts in wooden logs. The implementation will be in two languages C++ and Matlab. Parts of the program are going to be implemented sometimes by C++ and sometimes by Matlab therefore different designs are going to be tested. The aim of this thesis is to check whether these designs will meet the real time bound of 10 m/s.

    The result shows that there is a huge difference in time performance for the different designs. Therefore, different discretization levels were used in order to meet the deadline of 10m/s. We found that in order to get better speed one should calculate the matrix for the function F and the Jacobian function J by using C++ not by Matlab. Also we found that when we called functions from one language to another an extra time is added.

  • 338.
    Akhter, Tahmina
    KTH, School of Computer Science and Communication (CSC).
    Implementation of Conduction Delay and Collective Communication in a Parallel Spiking Neural Network Simulator.2011Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Tahmina Akther

    Implementation of conduction delay and collective communication in a parallel spiking neural network simulator

    As we know neural networks have a parallel structure and it is well suited for implementations in a parallel environment. The Bayesian Confidence Propagation Neural Network (BCPNN) which has been developed past thirty years is the main subject this thesis. An important issue is the implementation of communications between the processors. The aim of this thesis is to investigate point to point and collective communication methods and check how it works in real time. A second goal is to introduce time delay in point-to-point communication. These schemes have been implemented on Blue Gene Supercomputer using Message Passing Interface (MPI). At the end of thesis, the comparison between the two communication methods and the results of the two different models are shown.

  • 339.
    Akin, H. Levent
    et al.
    Bogazici University, Turkey.
    Ito, Nobuhiro
    Aichi Institute of Technology, Japan.
    Jacoff, Adam
    National Institute of Standards, USA.
    Kleiner, Alexander
    Linköping University, Department of Computer and Information Science, Artificial Intelligence and Intergrated Computer systems. Linköping University, The Institute of Technology.
    Pellenz, Johannes
    V&R Vision & Robotics GmbH, Germany.
    Visser, Arnoud
    University of Amsterdam, Holland.
    RoboCup Rescue Robot and Simulation Leagues2013In: The AI Magazine, ISSN 0738-4602, Vol. 34, no 1Article in journal (Refereed)
    Abstract [en]

    The RoboCup Rescue Robot and Simulation competitions have been held since 2000. The experience gained during these competitions has increased the maturity level of the field, which allowed deploying robots after real disasters (e.g. Fukushima Daiichi nuclear disaster). This article provides an overview of these competitions and highlights the state of the art and the lessons learned.

  • 340.
    Akinwande, Gbenga Segun
    Blekinge Institute of Technology, School of Computing.
    Signaling Over Protocols Gateways in Next-Generation Networks2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In this thesis, I examined various signalling both in wired and mobile networks, with more emphasis on SIGTRAN. The SIGTRAN is the protocol suite applicable in the current new generation and next-generation networks, most especially as it enables service provider to be able to interpolate both wireline and wireless services within the same architecture. This concept is an important component in today’s Triple-play communication, and hence this thesis has provided a broad view on Signalling and Protocol Gateways in Traditional and Next Generations Networks. Signal flow in a typical new generation network was examined by carrying out discrete event simulation of UMTS network using OPNET modeller 14.5. Through both Packet-Switching (PS) and Circuit-Switching (CS) signalling, I was able to examine the QoS on a UMTS. Precisely, I looked at throughput on UMTS network by implementing WFQ and MDRR scheduling schemes.

  • 341.
    Akkaya, Deniz
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Thalgott, Fabien
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Honeypots in network security2010Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

  • 342. Akkermans, Hans
    et al.
    Gustavsson, Rune
    Ygge, Fredrik
    An Integrated Structured Analysis Approach to Intelligent Agent Communication1998Report (Other academic)
    Abstract [en]

    Intelligent multi-agent systems offer promising approaches for knowledge-intensive distributed applications. Now that such systems are becoming applied on a wider industrial scale, there is a practical need for structured analysis and design methods, similarly as exist for more conventional information and knowledge systems. This is still lacking for intelligent agent software. In this paper, we describe how the process of agent communication specification can be carried out through a structured analysis approach. The structured analysis approach we propose is an integrated extension of the CommonKADS methodology, a widely used standard for knowledge analysis and systems development. Our approach is based on and illustrated by a large-scale multi-agent application for distributed energy load management in industries and households, called Homebots, which is discussed as an extensive industrial case study.

  • 343. Akkermans, Hans
    et al.
    Gustavsson, Rune
    Ygge, Fredrik
    Pragmatics of Agent Communication1998Report (Other academic)
    Abstract [en]

    The process of agent communication modeling has not yet received much attention in the knowledge systems area. Conventional knowledge systems are rather simple with respect to their communication structure: often it is a straightforward question-and-answer sequence between system and end user. However, this is different in recent intelligent multi-agent systems. Therefore, agent communication aspects are now in need of a much more advanced treatment in knowledge management, acquisition and modeling. In general, a much better integration between the respective achievements of multi-agent and knowledge-based systems modeling is an important research goal. In this paper, we describe how agent communications can be specified as an extension of well-known knowledge modeling techniques. The emphasis is on showing how a structured process of communication requirements analysis proceeds, based on existing results from agent communication languages. The guidelines proposed are illustrated by and based on a large-scale industrial multi-agent application for distributed energy load management in industries and households, called Homebots. Homebots enable cost savings in energy consumption by coordinating their actions through an auction mechanism.

  • 344. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Smart Software as Costumer Assistant in Large-Scale Distributed Load Management1997Conference paper (Refereed)
  • 345. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Gustavsson, Rune
    Homebots: Intelligent Decentralized Services for Energy Management1996Report (Other academic)
    Abstract [en]

    The deregulation of the European energy market, combined with emerging ad-vanced capabilities of information technology, provides strategic opportunities for new knowledge-oriented services on the power grid. HOMEBOTS is the name we have coined for one of these innovative services: decentralized power load management at the customer side, automatically carried out by a ‘society’ of interactive house-hold, industrial and utility equipment. They act as independent intelligent agents that communicate and negotiate in a computational market economy. The knowl-edge and competence aspects of this application are discussed, using an improved version of task analysis according to the COMMONKADS knowledge methodology. Illustrated by simulation results, we indicate how customer knowledge can be mo-bilized to achieve joint goals of cost and energy savings. General implications for knowledge creation and its management are discussed.

  • 346. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Gustavsson, Rune
    HOMEBOTS: Intelligent Decentralized Services for Energy Management1996Conference paper (Refereed)
  • 347.
    Akram, Saad Ullah
    KTH, School of Computer Science and Communication (CSC).
    Visual Recognition of Isolated Swedish Sign Language Signs.2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Visual Recognition of Isolated Swedish Sign Language Signs

    Saad Ullah Akram saadua@kth.se

    Abstract:

    Deaf people face serious challenges when communicating with people who have hearing capability, vast majority of whom do not have any sign language skills. Deaf people in these situations have to rely on written language which is usually not their primary language. Most of the deaf children are born to hearing parents who usually have very rudimentary sign language skills, these children do not get enough opportunity to practice and improve their signing skills outside the school environment. This puts these children at a disadvantage as they take more time to be able to communicate complex ideas with others.

    This project proposes a method for recognition of Isolated Swedish Sign Language signs in a natural environment using Kinect sensor with only one important restriction that signer must wear a full-sleeved non-skin colored clothing. An adaptive histogram based skin color model and motion information are used to segment hands. 3D position of the hands relative to the torso are used as a cue together with the hand shape, and HMMs (Hidden Markov Models) trained with this input are used for classification. This project also presents a method which is able to solve one (hand over face) of the two common (other being hand over hand) occlusions encountered in sign language.

    The results obtained show that Sign Language Recognition problem for very challenging medium sized (94 signs) vocabulary can be solved with very good performance (92% recognition accuracy) in signer dependent case and with reasonable performance (42% recognition accuracy) in signer independent case.

  • 348.
    Akser, M.
    et al.
    Ulster University, GBR.
    Bridges, B.
    Ulster University, GBR.
    Campo, G.
    Ulster University, GBR.
    Cheddad, Abbas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Curran, K.
    Ulster University, GBR.
    Fitzpatrick, L.
    Ulster University, GBR.
    Hamilton, L.
    Ulster University, GBR.
    Harding, J.
    Ulster University, GBR.
    Leath, T.
    Ulster University, GBR.
    Lunney, T.
    Ulster University, GBR.
    Lyons, F.
    Ulster University, GBR.
    Ma, M.
    University of Huddersfield, GBR.
    Macrae, J.
    Ulster University, GBR.
    Maguire, T.
    Ulster University, GBR.
    McCaughey, A.
    Ulster University, GBR.
    McClory, E.
    Ulster University, GBR.
    McCollum, V.
    Ulster University, GBR.
    Mc Kevitt, P.
    Ulster University, GBR.
    Melvin, A.
    Ulster University, GBR.
    Moore, P.
    Ulster University, GBR.
    Mulholland, E.
    Ulster University, GBR.
    Muñoz, K.
    BijouTech, CoLab, Letterkenny, Co., IRL.
    O’Hanlon, G.
    Ulster University, GBR.
    Roman, L.
    Ulster University, GBR.
    SceneMaker: Creative technology for digital storytelling2017In: Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng. / [ed] Brooks A.L.,Brooks E., Springer Verlag , 2017, Vol. 196, p. 29-38Conference paper (Refereed)
    Abstract [en]

    The School of Creative Arts & Technologies at Ulster University (Magee) has brought together the subject of computing with creative technologies, cinematic arts (film), drama, dance, music and design in terms of research and education. We propose here the development of a flagship computer software platform, SceneMaker, acting as a digital laboratory workbench for integrating and experimenting with the computer processing of new theories and methods in these multidisciplinary fields. We discuss the architecture of SceneMaker and relevant technologies for processing within its component modules. SceneMaker will enable the automated production of multimodal animated scenes from film and drama scripts or screenplays. SceneMaker will highlight affective or emotional content in digital storytelling with particular focus on character body posture, facial expressions, speech, non-speech audio, scene composition, timing, lighting, music and cinematography. Applications of SceneMaker include automated simulation of productions and education and training of actors, screenwriters and directors. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017.

  • 349.
    Aktan, Mikael
    University of Gävle, Department of Mathematics, Natural and Computer Sciences.
    Dynamic hair effects2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Creating three dimensional hair is still one of the hardest elements when creating characters. Problems occur because of the constant changes in the software every few years. A major goal is to create as realistic hair as possible in Autodesk Maya and to supply this detailed information on to other 3D artist. Techniques are researched and reviewed on how different hair systems are created, as well as how dynamic effects react on the moving hair.

  • 350.
    Akterhall, Joakim
    University of Skövde, School of Humanities and Informatics.
    Artificiell intelligens - ANN och evolution i shooterspel2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Detta arbete undersöker hur två olika nätverksarkitekturer för artificiella neurala nätverk fungerar i en testmiljö av shooter-karaktär. De två arkitekturer som undersöks är ett feedforward-nätverk samt ett elman-nätverk som tränas med hjälp av evolutionära algoritmer. Skillnaden på de två valda nätverksarkitekturerna är att det sistnämnda har ett korttidsminne.

    Resultaten visar att det i den testmiljö som använts inte är någon skillnad på de två nätverksarkitekturerna, utan de uppnår i princip samma resultat. Dock så har de beteenden som nätverken uppnått visat på att det är möjligt att använda agenter som är skapade av artificiella neurala nätverk i ett shooter-spel och att de kan generera bra resultat.

    Något som inte fokuserats på i detta arbete men som skulle vara intressant att kolla vidare på, är till exempel förändring av storleken på nätverken eller att undersöka om ett långtidsminne på det rekurrenta nätverket hade förändrat resultatet.

45678910 301 - 350 of 17910
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf