Change search
Refine search result
45678910 301 - 350 of 17069
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 301.
    Aidemark, Jan
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Investigating Concepts for an Interconnected Socio/Technical KM Planning Approach2009In: Proceedings of the 10th European conference on Knowledge Management: ECKM 2009 - Università Degli Studi Di Padoava, Vicenza, Italy, 3-4 September 2009 / [ed] . Bolisani, E. and Scarso, E., Reading, England: Academic Publising Ltd , 2009, 1-9 p.Conference paper (Refereed)
  • 302.
    Aidemark, Jan
    et al.
    Linnaeus University.
    Askenäs, Linda
    Linnaeus University.
    Nygårdh, Annette
    Jönköping University, School of Health and Welfare, HHJ, Dep. of Nursing Science. Jönköping University, School of Health and Welfare, The Jönköping Academy for Improvement of Health and Welfare.
    Strömberg, Anna
    Linköping University.
    User involvement in the co-design of self-care support systems for heart failure patients2015In: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 64, 118-124 p.Article in journal (Refereed)
    Abstract [en]

    In this paper the nature of user involvement in a co-design process will be explored. The outlines of a research project aiming at developing support systems for self-care inpatients suffering from chronic heart failure will be presented. The project is planned to perform a co-design effort where users (patients and healthcare professionals) will be given the opportunity to influence the development of support systems. We will discuss a number of possibilities and challenges that lie in the design of this kind of project and also some findings from its early stages. This report presents the experiences of users’ input, which are discussed in the context of previous research on benefits of user contributions in systems development.

  • 303.
    Airola, Rasmus
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hager, Kristoffer
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Image Classification, Deep Learning and Convolutional Neural Networks: A Comparative Study of Machine Learning Frameworks2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The use of machine learning and specifically neural networks is a growing trend in software development, and has grown immensely in the last couple of years in the light of an increasing need to handle big data and large information flows. Machine learning has a broad area of application, such as human-computer interaction, predicting stock prices, real-time translation, and self driving vehicles. Large companies such as Microsoft and Google have already implemented machine learning in some of their commercial products such as their search engines, and their intelligent personal assistants Cortana and Google Assistant.

    The main goal of this project was to evaluate the two deep learning frameworks Google TensorFlow and Microsoft CNTK, primarily based on their performance in the training time of neural networks. We chose to use the third-party API Keras instead of TensorFlow's own API when working with TensorFlow. CNTK was found to perform better in regards of training time compared to TensorFlow with Keras as frontend. Even though CNTK performed better on the benchmarking tests, we found Keras with TensorFlow as backend to be much easier and more intuitive to work with. In addition, CNTKs underlying implementation of the machine learning algorithms and functions differ from that of the literature and of other frameworks. Therefore, if we had to choose a framework to continue working in, we would choose Keras with TensorFlow as backend, even though the performance is less compared to CNTK.

  • 304. Aitenbichler, Erwin
    et al.
    Behring, Alexander
    Bradler, Dirk
    Hartmann, Melanie
    Martucci, Leonardo
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mühlhäuser, Max
    Ries, Sebastian
    Schnelle-Walka, Dirk
    Schreiber, Daniel
    Steimle, Jürgen
    Strufe, Thorsten
    Shaping the Future Internet2009In: Shaping the Future Internet, 2009Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) and the Internet of Services (IoS) are two well-knownexemplars of the emerging ‘Internet variants’. These variants will be tightlyinterwoven yet specific with respect to the supporting technologies needed. Thepresent paper discusses the five variants identified as essential by the authors: IoT,IoS, Internet-of-Humans, Internet-of-Crowds, and Internet-of-Clouds. For eachvariant, a non-comprehensive set of research challenges is cited and related to thestate of the art and to ongoing projects of the lab.

  • 305.
    Ajegunma, Solomon
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Onoberhie, Kennedy
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Pasupathy, Ramadevi
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Exploring the Integration of Enterprise Systems Solutions Within A Supply Chian2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Over the decades, as organizations begin to move globally there has been a sporadic flow of information in their supply chain. Competition today is forcing companies to integrate tightly with their suppliers and customers, in order to reduce the time available to flex the supply chain (SC) (Koh S.C, Saad S, Arunachalam S, 2006). The integration of firms and departments and information is getting more and more complicated. Regardless of enterprise system solutions being introduced as “integrated suites” they have failed to accomplish application and supply chain integration (Themistocleous, M. Irani, Z. O‟Keefe, and R. 2001). Therefore, this thesis aims to explore, gain better understanding and to explain the balance that may occur between the challenges and benefits gained from integrating enterprise resource planning and supply chain management.Our topic of interest could be view from both developers and user perspective. Developer/consultant‟s perspective is based on the viewpoint of those involved in and responsible for developing enterprise solutions. User‟s perspective, this perspective gives insight to how the integration process is perceived by organisations actually using the solutions. We chose the User perspective because we consider the user to be the direct beneficiary of whatever outcome is gotten from both the business solutions and its integration.In order to achieve a purposeful thesis. We decided to use an interpretive perspective which focus on exploring and gaining insight into issues of integrating enterprise system solution. We used both the inductive and the deductive approaches in our research. This would be advantageous due to the nature of our research topic, as there is little existing knowledge about the integration of enterprise systems solution within supply chain and there are lots of literatures related to the enterprise system solutions (ERP and SCM) been observed. The inductive approach would guide us to choose one or a few specific interactions to explore in-depth, while the deductive approach would aid us when making an hypothesis, since we would be collecting ideas about previous research and theories in order to guide us and make comparison.Conclusively, we found that the balance between challenges and benefits of ERP and SCM are unequivocal, as the benefits surpass the challenges and the effect of challenges on organisation‟s benefit is that it prolongs the short term benefit.

  • 306.
    Ajma, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Furdek, Marija
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden / Faculty of Electrical Engineering and Computing, Dept. of Telecommunications, University of Zagreb, Croatia.
    Monti, Paolo
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden.
    Wosinska, Lena
    School of Information and Communication Technology, KTH Royal Institute of Technology, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Dynamic provisioning utilizing redundant modules in elastic optical networks based on architecture on demand nodes2014In: European Conference on Optical Communication (ECOC), 2014, IEEE , 2014, 1-3 p.Conference paper (Refereed)
    Abstract [en]

    Survivable synthetic ROADMs are equipped with redundant switching modules to support failure recovery. The paper proposes a dynamic connection provisioning strategy which exploits these idle redundant modules to provision regular traffic resulting in a substantial improvement in the blocking performance.

  • 307.
    Ajmal, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Cavdar, Cicek
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Wosinska, Lena
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Trading Quality of Transmission for Improved Blocking Performance in All-Optical Networks2013In: Asia Communications and Photonics Conference 2013, 2013, AF4E.5- p.Conference paper (Refereed)
    Abstract [en]

    We propose a connection provisioning strategy in dynamic all-optical networks, which exploit the possibility to allow a tolerable signal quality degradation during a small fraction of holding-time resulting in a significant improvement of blocking performance.

  • 308.
    Ajmal, Muhammad
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Furdek, Marija
    Royal Institute of Technology, KTH, Stockholm, Sweden / Dept. of Telecommunications, University of Zagreb, Croatia.
    Monti, Paolo
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Wosinska, Lena
    Royal Institute of Technology, KTH, Stockholm, Sweden.
    Forchheimer, Robert
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    An Optimization Model for Dynamic Bulk Provisioning in Elastic Optical Networks2014In: Asia Communications and Photonics Conference 2014, Optics Info Base, Optical Society of America, 2014, AF3E.6- p.Conference paper (Refereed)
    Abstract [en]

    We investigate benefits of setup-delay tolerance in elastic optical networks and propose an optimization model for dynamic and concurrent connection provisioning. Simulation shows that the proposed strategy offers significant improvement of the network blocking performance.

  • 309.
    Akan, Batu
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Planning and Sequencing Through Multimodal Interaction for Robot Programming2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Over the past few decades the use of industrial robots has increased the efficiency as well as the competitiveness of several sectors. Despite this fact, in many cases robot automation investments are considered to be technically challenging. In addition, for most small and medium-sized enterprises (SMEs) this process is associated with high costs. Due to their continuously changing product lines, reprogramming costs are likely to exceed installation costs by a large margin. Furthermore, traditional programming methods of industrial robots are too complex for most technicians or manufacturing engineers, and thus assistance from a robot programming expert is often needed. The hypothesis is that in order to make the use of industrial robots more common within the SME sector, the robots should be reprogrammable by technicians or manufacturing engineers rather than robot programming experts. In this thesis, a novel system for task-level programming is proposed. The user interacts with an industrial robot by giving instructions in a structured natural language and by selecting objects through an augmented reality interface. The proposed system consists of two parts: (i) a multimodal framework that provides a natural language interface for the user to interact in which the framework performs modality fusion and semantic analysis, (ii) a symbolic planner, POPStar, to create a time-efficient plan based on the user's instructions. The ultimate goal of this work in this thesis is to bring robot programming to a stage where it is as easy as working together with a colleague.This thesis mainly addresses two issues. The first issue is a general framework for designing and developing multimodal interfaces. The general framework proposed in this thesis is designed to perform natural language understanding, multimodal integration and semantic analysis with an incremental pipeline. The framework also includes a novel multimodal grammar language, which is used for multimodal presentation and semantic meaning generation. Such a framework helps us to make interaction with a robot easier and more natural. The proposed language architecture makes it possible to manipulate, pick or place objects in a scene through high-level commands. Interaction with simple voice commands and gestures enables the manufacturing engineer to focus on the task itself, rather than the programming issues of the robot. The second issue addressed is due to inherent characteristics of communication with the use of natural language; instructions given by a user are often vague and may require other actions to be taken before the conditions for applying the user's instructions are met. In order to solve this problem a symbolic planner, POPStar, based on a partial order planner (POP) is proposed. The system takes landmarks extracted from user instructions as input, and creates a sequence of actions to operate the robotic cell with minimal makespan. The proposed planner takes advantage of the partial order capabilities of POP to execute actions in parallel and employs a best-first search algorithm to seek the series of actions that lead to a minimal makespan. The proposed planner can also handle robots with multiple grippers, parallel machines as well as scheduling for multiple product types.

  • 310.
    Akay, Altug
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Dragomir, A
    Erlandsson, Björn-Erik
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care2015In: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 19, no 1, 210-218 p.Article in journal (Refereed)
    Abstract [en]

    Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare outcomes and reduce costs using consumer-generated opinion. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users' forum posts, and identifies user communities (modules) and influential users for the purpose of ascertaining user opinion of cancer treatment. We used a self-organizing map to analyze word frequency data derived from users' forum posts. We then introduced a novel network-based approach for modeling users' forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and identify influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide rapid, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.

  • 311.
    Akay, Altug
    et al.
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Dragomir, Andrei
    Erlandsson, Björn-Erik
    KTH, School of Technology and Health (STH), Health Systems Engineering, Systems Safety and Management.
    Assessing Antidepressants Using Intelligent Data Monitoring and Mining of Online Fora2016In: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 20, no 4, 977-986 p.Article in journal (Refereed)
    Abstract [en]

    Depression is a global health concern. Social networks allow the affected population to share their experiences. These experiences, when mined, extracted, and analyzed, can be converted into either warnings to recall drugs (dangerous side effects), or service improvement (interventions, treatment options) based on observations derived from user behavior in depression-related social networks. Our aim was to develop a weighted network model to represent user activity on social health networks. This enabled us to accurately represent user interactions by relying on the data's semantic content. Our three-step method uses the weighted network model to represent user's activity, and network clustering and module analysis to characterize user interactions and extract further knowledge from user's posts. The network's topological properties reflect user activity such as posts' general topic as well as timing, while weighted edges reflect the posts semantic content and similarities among posts. The result, a synthesis from word data frequency, statistical analysis of module content, and the modeled health network's properties, has allowed us to gain insight into consumer sentiment of antidepressants. This approach will allow all parties to participate in improving future health solutions of patients suffering from depression.

  • 312. Akbarzadeh, Sara
    et al.
    Combes, Richard
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Altman, Zwi
    Self-organizing femtocell offloading at the flow level2013In: International Journal of Network Management, ISSN 1055-7148, E-ISSN 1099-1190, Vol. 23, no 4, 259-271 p.Article in journal (Refereed)
    Abstract [en]

    Femtocell technology is expected to be fully self-managed, empowered by self-organizing network functionalities. This paper proposes a solution for self-optimized offloading of macrocell traffic towards open/hybrid-access femtocells. A heterogeneous network comprising macro- and femtocells is modeled as parallel queues. The coverage area of the femtocells is self-optimized by dynamically adapting their pilot powers. A simple update equation for the pilot power is given and its convergence is studied using stochastic approximation techniques. The algorithm balances the load among the cells to improve network capacity. Simulation results illustrate the important performance gains brought about by the proposed scheme, using a dynamic network simulator.

  • 313.
    Akhlaq, Faisal
    et al.
    Linköping University, Department of Computer and Information Science.
    Loganathan, Sumathi
    Linköping University, Department of Computer and Information Science.
    Assembler Generator and Cycle-Accurate Simulator Generator for NoGAP2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    System-on-Chip is increasingly built using ASIP(Application  Specific Instruction set Processor) due to the flexibility and efficiency obtained from ASIPs. NoGAP (Novel Generator of Accelerator and Processor framework) is an innovative approach for  ASIP design, which provides the advantage of both ADL (Architecture  Description Language) and HDL (Hardware Description Language) to the  designer.

    For the processors designed using NoGAP, software tools need to be automatically generated, to aid the  designer in programming and verifying the processor. As part of the master thesis work, we have developed two generators namely Assembler generator and Cycle-Accurate Simulator generator for NoGAP using C++. The Assembler generator automatically generates an assembler, which is used to convert the assembly code written by a programmer into relocatable binary code. The Cycle-Accurate Simulator generator automatically generates a cycle-accurate simulator to model the behavior of the designed processor. Both these generators are static, and can be used to generate the tools for any processor created using NoGAP.

    In this report, we have detailed the concepts behind the generators,and the implementation details of the generators. We have listed the results obtained from running assembler and cycle-accurate simulator on a test processor created using NoGAP.

  • 314.
    Akhlaq, Muhammad
    Blekinge Institute of Technology, School of Computing.
    A Smart-Dashboard: Augmenting safe & smooth driving2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Annually, road accidents cause more than 1.2 million deaths, 50 million injuries, and US$ 518 billion of economic cost globally. About 90% of the accidents occur due to human errors such as bad awareness, distraction, drowsiness, low training, fatigue etc. These human errors can be minimized by using advanced driver assistance system (ADAS) which actively monitors the driving environment and alerts a driver to the forthcoming danger, for example adaptive cruise control, blind spot detection, parking assistance, forward collision warning, lane departure warning, driver drowsiness detection, and traffic sign recognition etc. Unfortunately, these systems are provided only with modern luxury cars because they are very expensive due to numerous sensors employed. Therefore, camera-based ADAS are being seen as an alternative because a camera has much lower cost, higher availability, can be used for multiple applications and ability to integrate with other systems. Aiming at developing a camera-based ADAS, we have performed an ethnographic study of drivers in order to find what information about the surroundings could be helpful for drivers to avoid accidents. Our study shows that information on speed, distance, relative position, direction, and size & type of the nearby vehicles & other objects would be useful for drivers, and sufficient for implementing most of the ADAS functions. After considering available technologies such as radar, sonar, lidar, GPS, and video-based analysis, we conclude that video-based analysis is the fittest technology that provides all the essential support required for implementing ADAS functions at very low cost. Finally, we have proposed a Smart-Dashboard system that puts technologies – such as camera, digital image processor, and thin display – into a smart system to offer all advanced driver assistance functions. A basic prototype, demonstrating three functions only, is implemented in order to show that a full-fledged camera-based ADAS can be implemented using MATLAB.

  • 315. Akhlaq, Muhammad
    et al.
    Sheltami, Tarek
    Helgeson, Bo
    Blekinge Institute of Technology, School of Computing.
    Shakshuki, Elhadi
    Designing an integrated driver assistance system using image sensors2012In: Journal of Intelligent Manufacturing, ISSN 0956-5515, E-ISSN 1572-8145, Vol. January, 1-24 p.Article in journal (Refereed)
    Abstract [en]

    Road accidents cause a great loss to human lives and assets. Most of the accidents occur due to human errors, such as bad awareness, distraction, drowsiness, low training, and fatigue. Advanced driver assistance system (ADAS) can reduce the human errors by keeping an eye on the driving environment and warning a driver to the upcoming danger. However, these systems come only with modern luxury cars because of their high cost and complexity due to several sensors employed. Therefore, camera-based ADAS are becoming an option due to their lower cost, higher availability, numerous applications and ability to combine with other systems. Targeting at designing a camera-based ADAS, we have conducted an ethnographic study of drivers to know what information about the driving environment would be useful in preventing accidents. It turned out that information on speed, distance, relative position, direction, and size and type of the nearby objects would be useful and enough for implementing most of the ADAS functions. Several camera-based techniques are available for capturing the required information. We propose a novel design of an integrated camera-based ADAS that puts technologies-such as five ordinary CMOS image sensors, a digital image processor, and a thin display-into a smart system to offer a dozen advanced driver assistance functions. A basic prototype is also implemented using MATLAB. Our design and the prototype testify that all the required technologies are now available for implementing a full-fledged camera-based ADAS.

  • 316.
    Akhlaq, Usman
    et al.
    Blekinge Institute of Technology, School of Computing.
    Yousaf, Muhammad Usman
    Blekinge Institute of Technology, School of Computing.
    Impact of Software Comprehension in Software Maintenance and Evolution2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The need of change is essential for a software system to reside longer in the market. Change implementation is only done through the maintenance and successful software maintenance gives birth to a new software release that is a refined form of the previous one. This phenomenon is known as the evolution of the software. To transfer software from lower to upper or better form, maintainers have to get familiar with the particular aspects of software i.e. source code and documentation. Due to the poor quality of documentation maintainers often have to rely on source code. So, thorough understanding of source code is necessary for effective change implementation. This study explores the code comprehension problems discussed in the literature and prioritizes them according to their severity level given by maintenance personnel in the industry. Along with prioritizing the problems, study also presents the maintenance personnel suggested methodologies for improving code comprehension. Consideration of these suggestions in development might help in shortening the maintenance and evolution time.

  • 317.
    Akhtar, Jawad
    Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
    Virtual reality: Effective surroundings, Enormous demonstration and mediator system in the games, industrial design and manufacturing2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In this thesis, the concept of virtual reality has been elaborated in the context of games, industrial design and manufacturing. The main purpose of this master’s thesis is to create a virtual environment for games that are near to the reality and according to the human nature through aspects like better interface, simulation, lights, shadow effects and their types. The importance of these aspects regarding realistic virtual environment is complemented through the comparison between two environments i.e. desktop and CAVE on a flight simulation program.

  • 318.
    Akhtar, Naeem
    et al.
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Alzghoul, Ahmad
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Time performance comparison in determining the weak parts in wooden logs2009Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The steadily increasing demand of wood forces sawmills to increase the efficiency and effectiveness of their equipments. The weak parts and the twist in wooden logs have been documented as the most common and crucial defect in sawn lumber.

    In this thesis we are going to implement a program which is able to determine the weak parts in wooden logs. The implementation will be in two languages C++ and Matlab. Parts of the program are going to be implemented sometimes by C++ and sometimes by Matlab therefore different designs are going to be tested. The aim of this thesis is to check whether these designs will meet the real time bound of 10 m/s.

    The result shows that there is a huge difference in time performance for the different designs. Therefore, different discretization levels were used in order to meet the deadline of 10m/s. We found that in order to get better speed one should calculate the matrix for the function F and the Jacobian function J by using C++ not by Matlab. Also we found that when we called functions from one language to another an extra time is added.

  • 319.
    Akhter, Tahmina
    KTH, School of Computer Science and Communication (CSC).
    Implementation of Conduction Delay and Collective Communication in a Parallel Spiking Neural Network Simulator.2011Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Tahmina Akther

    Implementation of conduction delay and collective communication in a parallel spiking neural network simulator

    As we know neural networks have a parallel structure and it is well suited for implementations in a parallel environment. The Bayesian Confidence Propagation Neural Network (BCPNN) which has been developed past thirty years is the main subject this thesis. An important issue is the implementation of communications between the processors. The aim of this thesis is to investigate point to point and collective communication methods and check how it works in real time. A second goal is to introduce time delay in point-to-point communication. These schemes have been implemented on Blue Gene Supercomputer using Message Passing Interface (MPI). At the end of thesis, the comparison between the two communication methods and the results of the two different models are shown.

  • 320.
    Akin, H. Levent
    et al.
    Bogazici University, Turkey.
    Ito, Nobuhiro
    Aichi Institute of Technology, Japan.
    Jacoff, Adam
    National Institute of Standards, USA.
    Kleiner, Alexander
    Linköping University, Department of Computer and Information Science, Artificial Intelligence and Intergrated Computer systems. Linköping University, The Institute of Technology.
    Pellenz, Johannes
    V&R Vision & Robotics GmbH, Germany.
    Visser, Arnoud
    University of Amsterdam, Holland.
    RoboCup Rescue Robot and Simulation Leagues2013In: The AI Magazine, ISSN 0738-4602, Vol. 34, no 1Article in journal (Refereed)
    Abstract [en]

    The RoboCup Rescue Robot and Simulation competitions have been held since 2000. The experience gained during these competitions has increased the maturity level of the field, which allowed deploying robots after real disasters (e.g. Fukushima Daiichi nuclear disaster). This article provides an overview of these competitions and highlights the state of the art and the lessons learned.

  • 321.
    Akinwande, Gbenga Segun
    Blekinge Institute of Technology, School of Computing.
    Signaling Over Protocols Gateways in Next-Generation Networks2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In this thesis, I examined various signalling both in wired and mobile networks, with more emphasis on SIGTRAN. The SIGTRAN is the protocol suite applicable in the current new generation and next-generation networks, most especially as it enables service provider to be able to interpolate both wireline and wireless services within the same architecture. This concept is an important component in today’s Triple-play communication, and hence this thesis has provided a broad view on Signalling and Protocol Gateways in Traditional and Next Generations Networks. Signal flow in a typical new generation network was examined by carrying out discrete event simulation of UMTS network using OPNET modeller 14.5. Through both Packet-Switching (PS) and Circuit-Switching (CS) signalling, I was able to examine the QoS on a UMTS. Precisely, I looked at throughput on UMTS network by implementing WFQ and MDRR scheduling schemes.

  • 322.
    Akkaya, Deniz
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Thalgott, Fabien
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Honeypots in network security2010Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

  • 323. Akkermans, Hans
    et al.
    Gustavsson, Rune
    Ygge, Fredrik
    An Integrated Structured Analysis Approach to Intelligent Agent Communication1998Report (Other academic)
    Abstract [en]

    Intelligent multi-agent systems offer promising approaches for knowledge-intensive distributed applications. Now that such systems are becoming applied on a wider industrial scale, there is a practical need for structured analysis and design methods, similarly as exist for more conventional information and knowledge systems. This is still lacking for intelligent agent software. In this paper, we describe how the process of agent communication specification can be carried out through a structured analysis approach. The structured analysis approach we propose is an integrated extension of the CommonKADS methodology, a widely used standard for knowledge analysis and systems development. Our approach is based on and illustrated by a large-scale multi-agent application for distributed energy load management in industries and households, called Homebots, which is discussed as an extensive industrial case study.

  • 324. Akkermans, Hans
    et al.
    Gustavsson, Rune
    Ygge, Fredrik
    Pragmatics of Agent Communication1998Report (Other academic)
    Abstract [en]

    The process of agent communication modeling has not yet received much attention in the knowledge systems area. Conventional knowledge systems are rather simple with respect to their communication structure: often it is a straightforward question-and-answer sequence between system and end user. However, this is different in recent intelligent multi-agent systems. Therefore, agent communication aspects are now in need of a much more advanced treatment in knowledge management, acquisition and modeling. In general, a much better integration between the respective achievements of multi-agent and knowledge-based systems modeling is an important research goal. In this paper, we describe how agent communications can be specified as an extension of well-known knowledge modeling techniques. The emphasis is on showing how a structured process of communication requirements analysis proceeds, based on existing results from agent communication languages. The guidelines proposed are illustrated by and based on a large-scale industrial multi-agent application for distributed energy load management in industries and households, called Homebots. Homebots enable cost savings in energy consumption by coordinating their actions through an auction mechanism.

  • 325. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Smart Software as Costumer Assistant in Large-Scale Distributed Load Management1997Conference paper (Refereed)
  • 326. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Gustavsson, Rune
    Homebots: Intelligent Decentralized Services for Energy Management1996Report (Other academic)
    Abstract [en]

    The deregulation of the European energy market, combined with emerging ad-vanced capabilities of information technology, provides strategic opportunities for new knowledge-oriented services on the power grid. HOMEBOTS is the name we have coined for one of these innovative services: decentralized power load management at the customer side, automatically carried out by a ‘society’ of interactive house-hold, industrial and utility equipment. They act as independent intelligent agents that communicate and negotiate in a computational market economy. The knowl-edge and competence aspects of this application are discussed, using an improved version of task analysis according to the COMMONKADS knowledge methodology. Illustrated by simulation results, we indicate how customer knowledge can be mo-bilized to achieve joint goals of cost and energy savings. General implications for knowledge creation and its management are discussed.

  • 327. Akkermans, Hans
    et al.
    Ygge, Fredrik
    Gustavsson, Rune
    HOMEBOTS: Intelligent Decentralized Services for Energy Management1996Conference paper (Refereed)
  • 328.
    Akram, Saad Ullah
    KTH, School of Computer Science and Communication (CSC).
    Visual Recognition of Isolated Swedish Sign Language Signs.2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Visual Recognition of Isolated Swedish Sign Language Signs

    Saad Ullah Akram saadua@kth.se

    Abstract:

    Deaf people face serious challenges when communicating with people who have hearing capability, vast majority of whom do not have any sign language skills. Deaf people in these situations have to rely on written language which is usually not their primary language. Most of the deaf children are born to hearing parents who usually have very rudimentary sign language skills, these children do not get enough opportunity to practice and improve their signing skills outside the school environment. This puts these children at a disadvantage as they take more time to be able to communicate complex ideas with others.

    This project proposes a method for recognition of Isolated Swedish Sign Language signs in a natural environment using Kinect sensor with only one important restriction that signer must wear a full-sleeved non-skin colored clothing. An adaptive histogram based skin color model and motion information are used to segment hands. 3D position of the hands relative to the torso are used as a cue together with the hand shape, and HMMs (Hidden Markov Models) trained with this input are used for classification. This project also presents a method which is able to solve one (hand over face) of the two common (other being hand over hand) occlusions encountered in sign language.

    The results obtained show that Sign Language Recognition problem for very challenging medium sized (94 signs) vocabulary can be solved with very good performance (92% recognition accuracy) in signer dependent case and with reasonable performance (42% recognition accuracy) in signer independent case.

  • 329.
    Akser, M.
    et al.
    Ulster University, GBR.
    Bridges, B.
    Ulster University, GBR.
    Campo, G.
    Ulster University, GBR.
    Cheddad, Abbas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Curran, K.
    Ulster University, GBR.
    Fitzpatrick, L.
    Ulster University, GBR.
    Hamilton, L.
    Ulster University, GBR.
    Harding, J.
    Ulster University, GBR.
    Leath, T.
    Ulster University, GBR.
    Lunney, T.
    Ulster University, GBR.
    Lyons, F.
    Ulster University, GBR.
    Ma, M.
    University of Huddersfield, GBR.
    Macrae, J.
    Ulster University, GBR.
    Maguire, T.
    Ulster University, GBR.
    McCaughey, A.
    Ulster University, GBR.
    McClory, E.
    Ulster University, GBR.
    McCollum, V.
    Ulster University, GBR.
    Mc Kevitt, P.
    Ulster University, GBR.
    Melvin, A.
    Ulster University, GBR.
    Moore, P.
    Ulster University, GBR.
    Mulholland, E.
    Ulster University, GBR.
    Muñoz, K.
    BijouTech, CoLab, Letterkenny, Co., IRL.
    O’Hanlon, G.
    Ulster University, GBR.
    Roman, L.
    Ulster University, GBR.
    SceneMaker: Creative technology for digital storytelling2017In: Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng. / [ed] Brooks A.L.,Brooks E., Springer Verlag , 2017, Vol. 196, 29-38 p.Conference paper (Refereed)
    Abstract [en]

    The School of Creative Arts & Technologies at Ulster University (Magee) has brought together the subject of computing with creative technologies, cinematic arts (film), drama, dance, music and design in terms of research and education. We propose here the development of a flagship computer software platform, SceneMaker, acting as a digital laboratory workbench for integrating and experimenting with the computer processing of new theories and methods in these multidisciplinary fields. We discuss the architecture of SceneMaker and relevant technologies for processing within its component modules. SceneMaker will enable the automated production of multimodal animated scenes from film and drama scripts or screenplays. SceneMaker will highlight affective or emotional content in digital storytelling with particular focus on character body posture, facial expressions, speech, non-speech audio, scene composition, timing, lighting, music and cinematography. Applications of SceneMaker include automated simulation of productions and education and training of actors, screenwriters and directors. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017.

  • 330.
    Aktan, Mikael
    University of Gävle, Department of Mathematics, Natural and Computer Sciences.
    Dynamic hair effects2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Creating three dimensional hair is still one of the hardest elements when creating characters. Problems occur because of the constant changes in the software every few years. A major goal is to create as realistic hair as possible in Autodesk Maya and to supply this detailed information on to other 3D artist. Techniques are researched and reviewed on how different hair systems are created, as well as how dynamic effects react on the moving hair.

  • 331.
    Akterhall, Joakim
    University of Skövde, School of Humanities and Informatics.
    Artificiell intelligens - ANN och evolution i shooterspel2012Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Detta arbete undersöker hur två olika nätverksarkitekturer för artificiella neurala nätverk fungerar i en testmiljö av shooter-karaktär. De två arkitekturer som undersöks är ett feedforward-nätverk samt ett elman-nätverk som tränas med hjälp av evolutionära algoritmer. Skillnaden på de två valda nätverksarkitekturerna är att det sistnämnda har ett korttidsminne.

    Resultaten visar att det i den testmiljö som använts inte är någon skillnad på de två nätverksarkitekturerna, utan de uppnår i princip samma resultat. Dock så har de beteenden som nätverken uppnått visat på att det är möjligt att använda agenter som är skapade av artificiella neurala nätverk i ett shooter-spel och att de kan generera bra resultat.

    Något som inte fokuserats på i detta arbete men som skulle vara intressant att kolla vidare på, är till exempel förändring av storleken på nätverken eller att undersöka om ett långtidsminne på det rekurrenta nätverket hade förändrat resultatet.

  • 332.
    Akterhall, Pernilla
    University of Skövde, School of Humanities and Informatics.
    Procedurella Texturer: Skapande av en procedurell textur utifrån en referensbild med hjälp av en genetisk algoritm2008Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Då dataspel blir mer grafiskt tilltalande för var år som går innebär detta också att mer utrymme behövs för att få plats med alla bildtexturer. Detta leder till att spel som annars skulle kunnat läggas ut på exempelvis XBOX Live Marketplace är för stora för att få plats där. Genom att byta ut vanliga bildtexturer mot procedurella texturer skulle detta problem kunna undvikas då de senare tar mindre plats än de förstnämnda.

    Denna uppsats tar upp och redovisar en metod för att återskapa bildtexturer som procedurella texturer, där en genetisk algoritm används för att evolvera fram procedurella texturer med visuella likheter med referenstexturen.

  • 333.
    Aktug, Irem
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Algorithmic Verification Techniques for Mobile Code2008Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    Modern computing platforms strive to support mobile code without putting system security at stake. These platforms can be viewed as open systems, as the mobile code adds new components to the running system. Establishing that such platforms function correctly can  be divided into two steps. First, it is shown that the system functions correctly regardless of the mobile components that join it, provided that they satisfy certain assumptions. These assumptions can, for instance, restrict the behavior of the component to ensure that the security policy of the platform is not violated. Second, the mobile component is checked to satisfy its assumptions, before it is allowed to join the system. This thesis presents algorithmic verification techniques to support this methodology. In the first two parts, we present techniques for the verification of open systems relative to the given component assumptions. In the third part, a technique for the  quick certification of mobile code is presented for the case where a particular type of program rewriting is used as a means of enforcing the component assumptions.In the first part of this study, we present a framework for the verification of open systems based on explicit state space representation. We propose Extended Modal Transition Systems (EMTS) as a suitable structure for representing the state space of open systems when assumptions on components are written in the modal μ-calculus. EMTSs are based on the Modal Transition Systems (MTS) of Larsen and provide a formalism for graphical specification and facilitate a thorough understanding of the system by visualization. In interactive verification, this state space representation enables proof reuse and aids the user guiding the verification process. We present a construction of state space representations from process algebraic open system descriptions based on a maximal model construction for the modal μ-calculus. The construction is sound and complete for systems with a single unknown component and sound for those without dynamic process reation. We also suggest a tableau-based proof system for establishing temporal properties of open systems represented as EMTS. The proof system is sound in general and complete for prime formulae.The problem of open system correctness  also arises in compositional verification, where the problem of showing a global property of a system is reduced to showing local properties of components. In the second part, we extend an existing  compositional verification framework for Java bytecode programs. The framework employs control flow graphs with procedures to model component implementations and open systems for the purpose of checking control-flow properties. We generalize these models to capture exceptional and multi-threaded behavior. The resulting control flow graphs are specifically tailored to support the compositional verification principle; however, they are sufficiently intuitive and standard to be useful on their own. We describe how the models can be extracted from program code and give preliminary experimental results for our implementation of the extraction of control flow graphs with exceptions. We also discuss further tool support and practical applications of the method.In the third part of the thesis, we develop a technique for the certification of safe mobile code, by adapting the proof-carrying code scheme of Necula to the case of security policies expressed as security automata. In particular, we describe how proofs of policy compliance can  be automatically generated for  programs that include a monitor for the desired policy. A monitor is an entity that observes the execution of a program and terminates the program if a violation to the property is about to occur. One way to implement such a monitor is by rewriting the program to make it self-monitoring. Given a property, we characterize self-monitoring of Java bytecode programs for this property by an annotation scheme with annotations in the style of Floyd-Hoare logics. The annotations generated by this scheme can be extended in a straightforward way to form a correctness proof in the sense of axiomatic semantics of programs. The proof generated in this manner essentially establishes that the program satisfies the property because it contains a monitor for it. The annotations that comprise the proofs are simple and efficiently checkable, thus facilitate certification of mobile code on devices with restricted computing power such as mobile phones.

  • 334.
    Aktug, Irem
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    State space representation for verification of open systems2006Licentiate thesis, monograph (Other scientific)
    Abstract [en]

    When designing an open system, there might be no implementation available for cer- tain components at verification time. For such systems, verification has to be based on assumptions on the underspecified components. In this thesis, we present a framework for the verification of open systems through explicit state space representation.

    We propose Extended Modal Transition Systems (EMTS) as a suitable structure for representing the state space of open systems when assumptions on components are writ- ten in the modal μ-calculus. EMTSs are based on the Modal Transition Systems (MTS) of Larsen. This representation supports state space exploration based verification tech- niques, and provides an alternative formalism for graphical specification. In interactive verification, it enables proof reuse and facilitates visualization for the user guiding the verification process.

    We present a two-phase construction from process algebraic open system descriptions to such state space representations. The first phase deals with component assumptions, and is essentially a maximal model construction for the modal μ-calculus that makes use of a powerset construction for the fixed point cases. In the second phase, the models obtained are combined according to the structure of the open system to form the complete state space. The construction is sound and complete for systems with a single unknown component and sound for those without dynamic process creation. We suggest a tableau-based proof system for establishing open system properties of the state space representation. The proof system is sound and it is complete for modal μ-calculus formulae with only prime subformulae.

    A complete framework based on the state space representation is offered for the auto- matic verification of open systems. The process begins with specifying the open system by a process algebraic term with assumptions. Then, the state space representation is ex- tracted from this description using the construction described above. Finally, open system properties can be checked on this representation using the proof system.

  • 335.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Dam, Mads
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Gurov, Dilian
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Provably Correct Runtime Monitoring2009In: Journal of Logic and Algebraic Programming, ISSN 1567-8326, E-ISSN 1873-5940, Vol. 78, no 5, 304-339 p.Article in journal (Refereed)
    Abstract [en]

    Runtime monitoring is an established technique to enforce a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has a copy of the given monitor embedded into it. As the main application of these results we sketch a simple inlining algorithm and show how the two-level annotations can be completed to produce a fully annotated program which is valid in the standard sense of Floyd/Hoare logic. This establishes the mediation property that inlined programs are guaranteed to adhere to the intended policy. Furthermore, validity can be checked efficiently using a weakest precondition based annotation checker, thus preparing the ground for on-device checking of policy adherence in a proof-carrying code setting.

  • 336.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Dam, Mads
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Gurov, Dilian
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Provably correct runtime monitoring (extended abstract)2008In: Fm 2008: Formal Methods, Proceedings / [ed] Cuellar, J; Maibaum, T; Sere, K, 2008, Vol. 5014, 262-277 p.Conference paper (Refereed)
    Abstract [en]

    Runtime monitoring is an established technique for enforcing a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has an instance of the given monitor embedded into it, which yields state changes at prescribed points according to the monitor's transition function. As our main application of these results we describe a concrete inliner, and use the annotation scheme to characterize its correctness. For this inliner, correctness of the level II annotations can be decided efficiently by a weakest precondition annotation checker, thus allowing on-device checking of inlining correctness in a proof-carrying code setting.

  • 337.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    Gurov, Dilian
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    State Space Representation for Verification of Open Systems2006In: Algebraic Methodology And Software Technology, Proceedings / [ed] Johnson, M; Vene, V, Berlin: Springer , 2006, 5-20 p.Conference paper (Refereed)
    Abstract [en]

    When designing an open system, there might be no implementation available for certain components at verification time. For such systems, verification has to be based on assumptions on the underspecified components. When component assumptions are expressed in Hennessy-Milner logic (HML), the state space of open systems can be naturally represented with modal transition systems (NITS), a graphical specification language equiexpressive with HML. Having an explicit state space representation supports state space exploration based verification techniques, Besides, it enables proof reuse and facilitates visualization for the user guiding the verification process. in interactive verification. As an intuitive representation of system behavior, it aids debugging when proof generation fails in automatic verification.

    However, HML is not expressive enough to capture temporal assumptions. For this purpose, we extend MTSs to represent the state space of open systems where component assumptions are specified in modal mu-calculus. We present a two-phase construction from process algebraic open system descriptions to such state space representations. The first phase deals with component assumptions, and is essentially a maximal model construction for the modal p-calculus. In the second phase, the models obtained are combined according to the structure of the open system to form the complete state space. The construction is sound and complete for systems with a single unknown component and sound for those-without dynamic process creation. For establishing open system properties based on the representation, we present a proof system which is sound and complete for prime formulae.

  • 338.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Gurov, Dilian
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Towards State Space Exploration Based Verification of Open Systems2005In: 4th International Workshop on Automated Verification of Infinite-State Systems (AVIS’05), April 2005, Edinburgh, Scotland, 2005Conference paper (Refereed)
  • 339.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Naliuka, Katsiaryna
    University of Trento, Italy.
    ConSpec: A Formal Language for Policy Specification2008In: Science of Computer Programming, ISSN 0167-6423, Vol. 74, no 1-2, 2-12 p.Article in journal (Refereed)
    Abstract [en]

    The paper presents ConSpec, an automata-based policy specification language. The language trades off clean semantics to language expressiveness: a formal semantics for the language is provided as security automata. ConSpec specifications can be used at different stages of the application lifecycle, rendering possible the formalization of various Policy enforcement techniques.

  • 340.
    Aktug, Irem
    et al.
    KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.
    Naliuka, Katsiaryna
    University of Trento, Italy.
    ConSpec: A Formal Language for Policy Speci-fication2007In: Proceedings of The First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM’07), 2007, 45-58 p.Conference paper (Other academic)
    Abstract [en]

    The paper presents ConSpec, an automata based policy specification language. The language trades off clean semantics to language expressiveness; a formal semantics for the language is provided as security automata. ConSpec specifications can be used at different stages of the application lifecycle, rendering possible the formalization of various policy enforcement techniques.

  • 341.
    Al Dakkak, O.
    et al.
    Higher Institute of Applied Sciencenand Technology (HIAST).
    Ghneim, N.
    Higher Institute of Applied Sciencenand Technology (HIAST).
    Abou Zliekha, M.
    Damascus University/Faculty of Information Technology.
    Al Moubayed, Samer
    Damascus University/Faculty of Information Technology.
    Emotional Inclusion in An Arabic Text-To-Speech2005In: Proceedings of the 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey, 2005Conference paper (Refereed)
    Abstract [en]

    The goal of this paper is to present an emotional audio-visua lText to speech system for the Arabic Language. The system is based on two entities: un emotional audio text to speech system which generates speech depending on the input text and the desired emotion type, and un emotional Visual model which generates the talking heads, by forming the corresponding visemes. The phonemes to visemes mapping, and the emotion shaping use a 3-paramertic face model, based on the Abstract Muscle Model. We have thirteen viseme models and five emotions as parameters to the face model. The TTS produces the phonemes corresponding to the input text, the speech with the suitable prosody to include the prescribed emotion. In parallel the system generates the visemes and sends the controls to the facial model to get the animation of the talking head in real time.

  • 342.
    Al Dakkak, O.
    et al.
    HIAST, Damascus, Syria.
    Ghneim, N.
    HIAST, Damascus, Syria.
    Abou Zliekha, M.
    Damascus University.
    Al Moubayed, Samer
    Damascus University.
    Prosodic Feature Introduction and Emotion Incorporation in an Arabic TTS2006In: Proceedings of IEEE International Conference on Information and Communication Technologies, Damascus, Syria, 2006, 1317-1322 p.Conference paper (Refereed)
    Abstract [en]

    Text-to-speech is a crucial part of many man-machine communication applications, such as phone booking and banking, vocal e-mail, and many other applications. In addition to many other applications concerning impaired persons, such as: reading machines for blinds, talking machines for persons with speech difficulties. However, the main drawback of most speech synthesizers in the talking machines, are their metallic sounds. In order to sound naturally, we have to incorporate prosodic features, as close as possible to natural prosody, this helps to improve the quality of the synthetic speech. Actual researches in the world are towards better "automatic prosody generation".

  • 343.
    Al Falahi, Kanna
    et al.
    UAE University, United Arab Emirates.
    Atif, Yacine
    UAE University, United Arab Emirates.
    Abraham, Ajith
    VSB-Technical University of Ostrava, Czech Republic.
    Models of Influence in Online Social Networks2014In: International Journal of Intelligent Systems, ISSN 0884-8173, E-ISSN 1098-111X, Vol. 2, no 29, 161-183 p.Article in journal (Refereed)
    Abstract [en]

    Online social networks gained their popularity from relationships users can build with each other. These social ties play an important role in asserting users’ behaviors in a social network. For example, a user might purchase a product that his friend recently bought. Such phenomenon is called social influence, which is used to study users’ behavior when the action of one user can affect the behavior of his neighbors in a social network. Social influence is increasingly investigated nowadays as it can help spreading messages widely, particularly in the context of marketing, to rapidly promote products and services based on social friends’ behavior in the network. This wide interest in social influence raises the need to develop models to evaluate the rate of social influence. In this paper, we discuss metrics used to measure influence probabilities. Then, we reveal means to maximize social influence by identifying and using the most influential users in a social network. Along with these contributions, we also survey existing social influence models, and classify them into an original categorization framework. Then, based on our proposed metrics, we show the results of an experimental evaluation to compare the influence power of some of the surveyed salient models used to maximize social influence.

  • 344. Al Khatib, I.
    et al.
    Maguire, G.Q.
    Ayani, R.
    Forsgren, Daniel
    Wireless LAN Access Point Modeling as a Queuing System2002In: Proceedings of The Communications and Computer Networks 2002 Conference (CCN 2002), MIT, Cambridge, USA, November 4-6, 2002, 2002, 463-468 p.Conference paper (Other academic)
    Abstract [en]

    This paper presents a research study of wireless LAN access points for IEEE 802.11b, where we seek to model the access point as a queuing system. The model can be used to compare performance metrics of different wireless LAN access points and to investigate the QoS of specific applications in the presence of a wireless LAN access point. In this paper, we focus on two parameters: the delay introduced by a wireless LAN access point and the average service time required to serve a packet passing through an access point. A major result is an analytic solution for the average service time of a packet in relationship to payload.

  • 345. Al Khatib, I.
    et al.
    Maguire, G.Q.
    Ayani, R.
    Forsgren, Daniel
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Wireless LAN Access Points as Queuing Systems: Performance Analysis and Service Time2003In: Mobile Computing and Communications Review, ISSN 1559-1662, Vol. 7, no 1, 28-30 p.Article in journal (Refereed)
    Abstract [en]

    Since the approval of the IEEE 802.11b by the IEEE in 1999, the demand for WLAN equipment and networks has been growing quickly. We present a queuing model of wireless LAN (WLAN) access points (APs) for IEEE 802.11b. We use experimentation to obtain the characteristic parameters of our analytic model. The model can be used to compare the performance of different WLAN APs as well as the QoS of different applications in the presence of an AP. We focus on the delay introduced by an AP. The major observations are that the delay to serve a packet going from the WLAN medium to the wired medium (on the uplink) is less than the delay to serve a packet, with identical payload, but travelling from the wired medium to the WLAN medium (on the downlink). A key result is an analytic solution showing that the average service time of a packet is a strictly increasing function of payload.

  • 346.
    Al Khatib, Iyad
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Jantsch, Axel
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Nabiev, Rustam
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    ECG-BIONET: A global biomedical network for human heart monitoring and analysis: Performance needs of an electrocardiogram Telemedicine platform for medical aid at the point-of-need2006In: 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS: VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, New York: IEEE , 2006, 3282-3283 p.Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose a Tele-medicine application platform as a medical aid for patients suffering from Heart malfunction. We focus on heart diseases since they remain by far the major cause of death in the globe. Our solution utilizes the Satellite communication protocol DVB-RCS (Digital Video Broadcast- Return Channel Satellite), Wi-Fi, and the Network-on-Chip (NoC) technology. We utilize the 12-lead ECG biomedical technique to detect heart disorders via the biomedical NoC, which transmits the medical alarm and results via the biomedical network, ECG-BIONET. We do not investigate the DVB-RCS standard or Wi-Fi technology, but rather we try to utilize this technology, and we look at it from a performance point of view for our application by investigating three parameters, namely: delay, packet loss, and reliability. We follow a top down approach by looking at the needs of the application from a performance guarantee for our specific-purpose network.

  • 347.
    Al Moubayed, Samer
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Speech Technology, CTT.
    Prosodic Disambiguation in Spoken Systems Output2009In: Proceedings of Diaholmia'09: 2009 Workshop on the Semantics and Pragmatics of Dialogue / [ed] Jens Edlund, Joakim Gustafson, Anna Hjalmarsson, Gabriel Skantze, Stockholm, Sweden., 2009, 131-132 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents work on using prosody in the output of spoken dialogue systems to resolve possible structural ambiguity of output utterances. An algorithm is proposed to discover ambiguous parses of an utterance and to add prosodic disambiguation events to deliver the intended structure. By conducting a pilot experiment, the automatic prosodic grouping applied to ambiguous sentences shows the ability to deliver the intended interpretation of the sentences.

  • 348.
    Al Moubayed, Samer
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    Towards rich multimodal behavior in spoken dialogues with embodied agents2013In: 4th IEEE International Conference on Cognitive Infocommunications, CogInfoCom 2013 - Proceedings, IEEE Computer Society, 2013, 817-822 p.Conference paper (Refereed)
    Abstract [en]

    Spoken dialogue frameworks have traditionally been designed to handle a single stream of data - the speech signal. Research on human-human communication has been providing large evidence and quantifying the effects and the importance of a multitude of other multimodal nonverbal signals that people use in their communication, that shape and regulate their interaction. Driven by findings from multimodal human spoken interaction, and the advancements of capture devices and robotics and animation technologies, new possibilities are rising for the development of multimodal human-machine interaction that is more affective, social, and engaging. In such face-to-face interaction scenarios, dialogue systems can have a large set of signals at their disposal to infer context and enhance and regulate the interaction through the generation of verbal and nonverbal facial signals. This paper summarizes several design decision, and experiments that we have followed in attempts to build rich and fluent multimodal interactive systems using a newly developed hybrid robotic head called Furhat, and discuss issues and challenges that this effort is facing.

  • 349.
    Al Moubayed, Samer
    et al.
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    Alexanderson, Simon
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH.
    Beskow, Jonas
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    Granström, Björn
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    A robotic head using projected animated faces2011In: Proceedings of the International Conference on Audio-Visual Speech Processing 2011 / [ed] Salvi, G.; Beskow, J.; Engwall, O.; Al Moubayed, S., Stockholm: KTH Royal Institute of Technology, 2011, 71- p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a setup which employs virtual animatedagents for robotic heads. The system uses a laser projector toproject animated faces onto a three dimensional face mask. This approach of projecting animated faces onto a three dimensional head surface as an alternative to using flat, two dimensional surfaces, eliminates several deteriorating effects and illusions that come with flat surfaces for interaction purposes, such as exclusive mutual gaze and situated and multi-partner dialogues. In addition to that, it provides robotic heads with a flexible solution for facial animation which takes into advantage the advancements of facial animation using computer graphics overmechanically controlled heads.

  • 350.
    Al Moubayed, Samer
    et al.
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    Ananthakrishnan, Gopal
    KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH, Speech Communication and Technology.
    Acoustic-to-Articulatory Inversion based on Local Regression2010In: Proceedings of the 11th Annual Conference of the International Speech Communication Association, INTERSPEECH 2010, Makuhari, Japan, 2010, 937-940 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents an Acoustic-to-Articulatory inversionmethod based on local regression. Two types of local regression,a non-parametric and a local linear regression have beenapplied on a corpus containing simultaneous recordings of positionsof articulators and the corresponding acoustics. A maximumlikelihood trajectory smoothing using the estimated dynamicsof the articulators is also applied on the regression estimates.The average root mean square error in estimating articulatorypositions, given the acoustics, is 1.56 mm for the nonparametricregression and 1.52 mm for the local linear regression.The local linear regression is found to perform significantlybetter than regression using Gaussian Mixture Modelsusing the same acoustic and articulatory features.

45678910 301 - 350 of 17069
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf