Endre søk
Begrens søket
2345678 201 - 250 of 1813
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 201.
    Blanco Paananen, Adrian
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Storby, Johan
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Observing coevolution in simulated bacteria: Using asexual reproduction and simple direct mapped functions for decision-making2014Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    In this report we have presented the results of a program which performs simula- tions of artificial bacteria with the ability to evolve different characteristics and behaviours through genetic algorithms. Over time unfit bacteria will die out, and the more fit bacteria will produce offspring with slightly mutated variants of it’s genetic code resembling the evolutionary process. The simulation does not follow the traditional macro-scale hand-picked sexual reproduction often used in genetic algorithms to produce optimal results, but it instead uses individ- ual asexual reproduction which more closely resembles how bacteria reproduce in nature. Furthermore we do not use traditional neural networks for decision making, but simple functions which directly map the bacterias inputs to their decisions.

    The purpose of this study was to observe whether bacteria with different initial starting populations would coevolve, and specialize into heterogeneous populations. Furthermore we have tried to analyze how the populations inter- act with each other and how changing the different parameters of the simulation would affect the populations. We have performed three separate experiments that differ in their initial conditions, one with pre-created and heterogeneous herbivores and carnivores, one with homogeneous omnivores, and one with bac- teria whose genetic values have been decided at random. The result of our experiments was that we observed coevolution in the bacteria, and that they would despite very different initial starting conditions always grow towards sta- ble heterogeneous populations with very few exceptions. 

  • 202.
    Blissing, Björn
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Visualising the Visual Behaviour of Vehicle Drivers2002Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    Most traffic accidents are caused by human factors. The design of the driver environment has proven essential to facilitate safe driving. With the advent of new devices such as mobile telephones, GPS-navigation and similar systems the workload on the driver has been even more complicated. There is an obvious need for tools supporting objective evaluation of such systems, in order to design more effective and simpler driver environments.

    At the moment video is the most used technique for capturing the drivers visual behaviour. But the analysis of these recordings is very time consuming and only give an estimate of where the visual attention is. An automated tool for analysing visual behaviour would minimize the post processing drastically and leave more time for understanding the data.

    In this thesis the development of a tool for visualising where the driver’s attention is while driving the vehicle. This includes methods for playing back data stored on a hard drive, but also methods for joining data from multiple different sources.

  • 203.
    Blixt Myrsell, Erik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Dynamiska Skript: Automatisering med Python2018Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Företaget X är en internetleverantör i behov av automatisering. Det finns tre IT-tekniker anställda och i dagsläget förlitar de sig på skript som automatiserar allt från dokumentering i Företagets databas till grundkonfiguration av de switchar som avlämnas till kunder. Företaget ger även support till de kunder som skriver ett sådant avtal och allteftersom företaget växer, ökar även arbetsbördan. För att minska den tid de anställda idag lägger på att informera och supportera kunder önskar företaget att skapa en webbplattform där kunder kan hjälpa sig själva. Detta arbete syftar till skapa, testa och utvärdera ett utkast till en sådan plattform, där en kund skall kunna logga in och se information om sina enheter, men också att själv kunna konfigurera sina enheter utifrån några, av företaget bestämda, parametrar. För att åstadkomma detta kommer programmeringsspråket Python och några för Python anpassade bibliotek och moduler att användas. Arbetet kommer att täcka in relevant teori och har genomförs genom kravinsamling, pseudokod och flödesscheman, kodning samt testning och utvärdering. Vidare diskuteras de etiska aspekterna rörande automation. Undersökningen har visat att Python och dess bibliotek är väl lämpade för att hantera automation enligt Företagets behov.

  • 204.
    Blom, Marcus
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Hammar, Kim
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Integrating Monitoring Systems - Pre-Study2016Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    Failures in networks that reside in business environments cause harm to organizations depending on them. Every minute of inoperativety is hurtful and as a network adminstrator you want to minimize the rates of failures as well as the time of inoperation. Therefore, a fruitful network monitoring system is of great interest for such organizations. This bachelor’s thesis is the outcome of a pre-study performed on behalf of MIC Nordic and sought to advice them in the implementation of a new monitoring system.

    The aim of this study was to investigate how a Network Operation Center (NOC) can be implemented in an existing monitoring environment, to integrate current monitoring systems to a central point for monitoring. This study takes an holitstic approach to network management and the research can be divided into two main categories: Communication between network components and Presentation of information. Our process involves an analysis of the environment of MIC Nordic and an in depth inquiry on the current state of network monitoring and interface design. The study then culminates in the implementation of a prototype. The prototype serves in first hand as a research tool to collect experience and empirical evidence to increase the crediblity of our conclusions. It is also an attempt of demonstrating the complete process behind developing a NOC, that we believe can fill a gap among the previous research in the field.

    From our results you can expect a prototype with functionality for monitoring network components and a graphical user interface (GUI) for displaying information. The results are designed towards solving the specific network management problem that was given and the environment that it concerns. This pre-study suggests that the best solution for implementing a NOC in the given environment is to use SNMP for communication. From an investigation on how to present network management information in a effective way we propose to follow a user-centered approach and to utilize human perception theory in the design process. The authors recommend further research that maintain the holistic approach but applies more quantitative methods to broaden the scope.

  • 205.
    Blumenthal, Carl
    Linköpings universitet, Institutionen för systemteknik.
    Development of the NoGAP CL Hardware Description Language and its Compiler2007Independent thesis Basic level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    The need for a more general hardware description language aimed specifically at processors, and vague notions and visions of how that language would be realized, lead to this thesis. The aim was to use the visions and initial ideas to evolve and formalize a language and begin implementing the tools to use it. The language, called NoGAP Common Language, is designed to give the programmer freedom to implement almost any processor design without being encumbered by many of the tedious tasks normally present in the creation process. While evolving the language it was chosen to borrow syntaxes from C++ and verilog to make the code and concepts easy to understand. The main advantages of NoGAP Common Language compared to RTL languages are;

    -the ability to define the data paths of instructions separate from each other and have them merged automatically along with assigned timings to form the pipeline.

    -having control paths automatically routed by activating named clauses of code coupled to control signals.

    -being able to specify a decoder, where the instructions and control structures are defined, that control signals are routed to.

    The implemented compiler was created with C++, Bison, and Flex and utilizes an AST structure, a symbol table, and a connection graph. The AST is traversed by several functions to generate the connection graph where the instructions of the processor can be merged into a pipeline. The compiler is in the early stages of development and much is left to do and solve. It has become clear though that the concepts of NoGAP Common Language can be implemented and are not just visions.

  • 206.
    Bohlin, Ludvig
    et al.
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för fysik.
    Edler, Daniel
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för fysik.
    Lancichinetti, Andrea
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för fysik.
    Rosval, Martin
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för fysik.
    Community Detection and Visualization of Networks with the Map Equation Framework2014Inngår i: Measuring Scholarly Impact: Methods and Practice / [ed] Ying Ding, Ronald Rousseau, Dietmar Wolfram, Springer, 2014, s. 3-34Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Large networks contain plentiful information about the organization of a system. The challenge is to extract useful information buried in the structure of myriad nodes and links. Therefore, powerful tools for simplifying and highlighting important structures in networks are essential for comprehending their organization. Such tools are called community-detection methods and they are designed to identify strongly intraconnected modules that often correspond to important functional units. Here we describe one such method, known as the map equation, and its accompanying algorithms for finding, evaluating, and visualizing the modular organization of networks. The map equation framework is very flexible and can identify two-level, multi-level, and overlapping organization in weighted, directed, and multiplex networks with its search algorithm Infomap. Because the map equation framework operates on the flow induced by the links of a network, it naturally captures flow of ideas and citation flow, and is therefore well-suited for analysis of bibliometric networks.

  • 207.
    Bohlin, Therese
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för datorteknik. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Regular Inference for Communication Protocol Entities2009Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    A way to create well-functioning computer systems is to automate error detection in the systems. Automated techniques for finding errors, such as testing and formal verification, requires a model of the system. The technique for constructing deterministic finite automata (DFA) models, without access to the source code, is called regular inference. The technique provides sequences of input, so called membership queries, to a system, observes the responses, and infers a model from the input and responses.

    This thesis presents work to adapt regular inference to a certain kind of systems: communication protocol entities. Such entities interact by sending and receiving messages consisting of a message type and a number of parameters, each of which potentially can take on a large number of values. This may cause a model of a communication protocol entity inferred by regular inference, to be very large and take a long time to infer. Since regular inference creates a model from the observed behavior of a communication protocol entity, the model may be very different from a designer's model of the system's source code.

    This thesis presents adaptations of regular inference to infer more compact models and use less membership queries. The first contribution is a survey over three algorithms for regular inference. We present their similarities and their differences in terms of the required number of membership queries. The second contribution is an investigation on how many membership queries a common regular inference algorithm, the L* algorithm by Angluin, requires for randomly generated DFAs and randomly generated DFAs with a structure common for communication protocol entities. In comparison, the DFAs with a structure common for communication protocol entities require more membership queries. The third contribution is an adaptation of regular inference to communication protocol entities which behavior foremost are affected by the message types. The adapted algorithm avoids asking membership queries containing messages with parameter values that results in already observed responses. The fourth contribution is an approach for regular inference of communication protocol entities which communicate with messages containing parameter values from very large ranges. The approach infers compact models, and uses parameter values taken from a small portion of their ranges in membership queries. The fifth contribution is an approach to infer compact models of communication protocol entities which have a similar partitioning of an entity's behavior into control states as in a designer's model of the protocol.

  • 208.
    Boivie, Victor
    Linköpings universitet, Institutionen för systemteknik.
    Network Processor specific Multithreading tradeoffs2005Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    Multithreading is a processor technique that can effectively hide long latencies that can occur due to memory accesses, coprocessor operations and similar. While this looks promising, there is an additional hardware cost that will vary with for example the number of contexts to switch to and what technique is used for it and this might limit the possible gain of multithreading.

    Network processors are, traditionally, multiprocessor systems that share a lot of common resources, such as memories and coprocessors, so the potential gain of multithreading could be high for these applications. On the other hand, the increased hardware required will be relatively high since the rest of the processor is fairly small. Instead of having a multithreaded processor, higher performance gains could be achieved by using more processors instead.

    As a solution, a simulator was built where a system can effectively be modelled and where the simulation results can give hints of the optimal solution for a system in the early design phase of a network processor system. A theoretical background to multithreading, network processors and more is also provided in the thesis.

  • 209.
    Boklund, Andreas
    et al.
    Högskolan Väst. Högskolan Väst, Institutionen för teknik, matematik och datavetenskap. Högskolan Väst, Institutionen för teknik, matematik och datavetenskap, Avd för datavetenskap.
    Jiresjö, Christian
    Högskolan Väst, Institutionen för teknik, matematik och datavetenskap, Avd för datavetenskap.
    Mankefors, Stefan
    Högskolan Väst, Institutionen för teknik, matematik och datavetenskap, Avd för datavetenskap.
    The Story Behind Midnight, a Part Time High Performance Cluster2003Inngår i: International conference on Parallel and Distributed Processing Techniques and Applications / [ed] Hamid R. Arabnia, Las Vegas: CSREA Press , 2003, s. 173-178Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    In this paper, we present the creation process andthe purpose behind the Midnight cluster. It isdisguised as a computer laboratory during the day,but turns into a high performance compute clusterduring the night.The main focus of this paper is on the basic issueswith creating a part time compute cluster. TheMidnight cluster was constructed to serve both as aCPU harvester and as a platform for further studies.The main goal of our upcoming research is toev aluate different methods for handling shapechangeand process management on the cluster, andhow these factors affect running processes, stabilityand performance.

  • 210. Bollig, Benedikt
    et al.
    Leucker, Martin
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik. Datorteknik.
    Deciding LTL over Mazurkiewicz traces2003Inngår i: Data & Knowledge Engineering, ISSN 0169-023X, Vol. 44, nr 2, s. 221-240Artikkel i tidsskrift (Fagfellevurdert)
  • 211. Bollig, Benedikt
    et al.
    Leucker, Martin
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik. Datorteknik.
    Model checking probabilistic distributed systems2003Inngår i: ASIAN 2003: Proceedings of the 8th Asian Computing Science Conference, 2003, s. 291-304Konferansepaper (Fagfellevurdert)
  • 212.
    Boman, Simon
    et al.
    Linköpings universitet, Institutionen för datavetenskap.
    Rutgersson, Olof
    Linköpings universitet, Institutionen för datavetenskap.
    Replacing OSE with Real Time capable Linux2009Independent thesis Advanced level (degree of Master (One Year)), 20 poäng / 30 hpOppgave
    Abstract [en]

    For many years OSE has been a common used operating system, with real time extensions enhancements, in embed-ded systems. But in the last decades, Linux has grown and became a competitor to common operating systems and, in recent years, even as an operating system with real time extensions. With this in mind, ÅF was interested in replacing the quite expensive OSE with some distribution of the open source based Linux on a PowerPC MPC8360. Therefore, our purpose with thesis is to implement Linux on the named platform and make some tests to see if it is possible to replace OSE with Linux. Using Linux has several advantages, for example it is free of charge to use and over the years the popularity of Linux within the developer community has resulted in numerous tools and utilities available for free.

    As a result, this study shows that Linux with real time extensions on the MPC8360 PowerPC platform is a viable alternative to OSE regarding cost efficiency, flexibility, adaptability and competence available on the market.

    Further studies can be done towards benchmarking for I/O systems and implementing support for more hardware on the MPC8360 AF platform.

  • 213. Bonnichsen, L.
    et al.
    Podobas, Artur
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Programvaruteknik och Datorsystem, SCS.
    Using transactional memory to avoid blocking in OpenMP synchronization directives: Don’t wait, speculate!2015Inngår i: 11th International Workshop on OpenMP, IWOMP 2015, Springer, 2015, s. 149-161Konferansepaper (Fagfellevurdert)
    Abstract [en]

    OpenMP applications with abundant parallelism are often characterized by their high-performance. Unfortunately, OpenMP applications with a lot of synchronization or serialization-points perform poorly because of blocking, i.e. the threads have to wait for each other. In this paper, we present methods based on hardware transactional memory (HTM) for executing OpenMP barrier, critical, and taskwait directives without blocking. Although HTM is still relatively new in the Intel and IBM architectures, we experimentally show a 73% performance improvement over traditional locking approaches, and 23% better than other HTM approaches on critical sections. Speculation over barriers can decrease execution time by up-to 41 %. We expect that future systems with HTM support and more cores will have a greater benefit from our approach as they are more likely to block.

  • 214.
    Bor, Martin
    et al.
    Lancaster University.
    Roedig, Utz
    Lancaster University.
    Voigt, Thiemo
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Alonso, Juan
    Univ. Nac. de Cuyo, Argentina.
    Do LoRa Low-Power Wide-Area Networks Scale?2016Konferansepaper (Fagfellevurdert)
    Abstract [en]

    New Internet of Things (IoT) technologies such as LongRange (LoRa) are emerging which enable power ecientwireless communication over very long distances. Devicestypically communicate directly to a sink node which removesthe need of constructing and maintaining a complex multi-hop network. Given the fact that a wide area is coveredand that all devices communicate directly to a few sinknodes a large number of nodes have to share the commu-nication medium. LoRa provides for this reason a rangeof communication options (centre frequency, spreading fac-tor, bandwidth, coding rates) from which a transmitter canchoose. Many combination settings are orthogonal and pro-vide simultaneous collision free communications. Neverthe-less, there is a limit regarding the number of transmitters aLoRa system can support. In this paper we investigate thecapacity limits of LoRa networks. Using experiments wedevelop models describing LoRa communication behaviour.We use these models to parameterise a LoRa simulation tostudy scalability. Our experiments show that a typical smartcity deployment can support 120 nodes per 3.8 ha, which isnot sucient for future IoT deployments. LoRa networkscan scale quite well, however, if they use dynamic commu-nication parameter selection and/or multiple sinks.

  • 215.
    Borg, Richard
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Svensson, Timmy
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Assistansrobot "Slangaren"2011Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    This project is a step towards automatic firefighting. The goal is to decrease the number of personal injuries by replacing the human firefighter with robots or similar technical tools. Especially in very hostile environments due to risk of explosions or building collapse. A robot is easy to replace and can be maneuvered from a safe distance. The idea of the project comes from the company Drones Networking which aims for developing a totally autonomous firefighting system. The result of this project is a prototype of a robot which handles the hose during firefighting.

  • 216.
    Borgenstrand, Markus
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Network automation – the power of Ansible2018Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report discusses network automation primarily with Ansible. Ansible is a software from Red Hat that can be used for network automation. The report also goes through YAML which is a standardized way of exchanging data, Jinja2 that is a templating language, Python as well as the security with Ansible. The report also goes through why network automation is needed as well as how much time might be saved with Ansible. Ansible ships with modules for Cisco IOS such as ios_config and ios_command and for Cisco ASA asa_config, asa_command and asa_acl as well as many other modules for Arista, Juniper and for other vendors. Ansible can use new APIs by creating new modules for handling that particular API, which means that the only change needed in the playbooks is to change the module name. Ansible can handle NETCONF API using the netconf_config module or various Juniper modules. Ansible is used in this report to perform certain tasks such as to adding VLAN's, close ports on ASA's, audit network devices configuration as well as to create network diagram using the information from CDP. Ansible can be made as secure as manually doing the tasks except that Ansible can do it faster and more consistently.  For connecting to normal Linux servers Ansible uses OpenSSH which is a default SSH client on most Linux systems and for connecting to network devices it uses Paramiko. The security in Ansible depends on SSH and may or may not have passwords stored locally, Ansible can be as secure as the administrator wants it to be such as using RSA key-pair to authenticate, using vault encrypted credentials or asking the administrator about which username and password to use. Using Ansible network automation can save time, the amount saved depends on what is being done, how many devices it is doing it on as well as how the playbook is written.

  • 217.
    Borgstedt, Jan
    Linköpings universitet, Institutionen för datavetenskap, Interaktiva och kognitiva system. Linköpings universitet, Tekniska fakulteten.
    Utveckling av ett kommunikationsprotokoll för datainsamling från medicinteknisk utrustning2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [sv]

    Patientövervakningssystem (eng., Patient data management systems) måste hantera olika datakällor som patientmonitorer, ventilatorer och pumpar. Målet med detta arbete var att utveckla ett generellt och underhållsbart medicinskt protokoll samt ett databassystem för att hantera patientdata från olika medicintekniska instrument inom intensivvården.

    Ett prototypsystem med databas och experimentellt kommunikationsprotokoll skapades och utvärderades tekniskt mot övervakningsmonitorn Philips MP30. Systemet utvecklades i programmeringsspråket C# och använder sig av en MySQL-databas.

    Studien visar att det är möjligt att skapa ett protokoll som hanterar olika medicinska datakällor. Rapporten beskriver det framtagna protokollet, datastrukturer, arkitektur samt förekommande relaterade kommunikationsstandarder som används inom sjukvården.

  • 218.
    Borgström, Gustaf
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Sembrant, Andreas
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Adaptive cache warming for faster simulations2017Inngår i: Proc. 9th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, New York: ACM Press, 2017, artikkel-id 1Konferansepaper (Fagfellevurdert)
  • 219.
    Borslehag, Tobias
    Linköpings universitet, Institutionen för systemteknik.
    Implementation of a Gigabit IP router on an FPGA platform2005Independent thesis Advanced level (degree of Magister), 20 poäng / 30 hpOppgave
    Abstract [en]

    The computer engineering group at Linköping University has parts of their research dedicated to networks-on-chip and components used in network components and terminals. This research has among others resulted in the SoCBUS NOC and a flow based network protocol processor. The main objective of this project was to integrate these components into an IP router with two or more Gigabit Ethernet interfaces.

    A working system has been designed and found working. It consists of three main components, the input module, the output module and a packet buffer. Due to the time constraint and the size of the project the packet buffer could not be designed to be as efficient as possible, thus reducing the overall performance. The SoCBUS also has negative impact on performance, although this could probably be reduced with a revised system design. If such a project is carried out it could use the input and output modules from this project, which connect to SoCBUS and can easily be integrated with other packet buffers and system designs.

  • 220.
    Botella, Pedro
    Linköpings universitet, Institutionen för systemteknik.
    Implementation and Design of a Bit-Error Generator and Logger for Multi-Gigabit Serial Links2006Independent thesis Basic level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Test Tools are very important in the design of a system. They generally simulate a working environment, only at a higher

    speed, or with less frequently occurring test cases. In the verification of protocols based on the Fibre Channel physical layer,

    this becomes a necessity, as errors can be non-existent or very unusual in normal operating environments. Most systems need

    to be able to handle these unexpected events nonetheless. Therefore, there is a need for a method of introducing these errors

    in a controlled way.

    A bit error generation and logging tool for two proprietary protocols based on the Fibre Channel physical layer has been

    developed. The hardware platform consists mainly of a Virtex II Pro FPGA with accompanying I/O support. Control of the

    hardware is handled by a graphical user interface residing on a PC. Communication between the hardware and the PC is

    handled with a UART. The final implementation can handle four parallel one way links, or two full duplex links,

    independently. This report describes the implementation and the necessary theoretical background for this.

  • 221.
    Boudjadar, Abdeldjalil
    et al.
    Computer Science, Aalborg University, Denmark.
    David, Alexandre
    Computer Science, Aalborg University, Denmark.
    Hyun Kim, Jin
    Computer Science, Aalborg University, Denmark.
    Larsen, Kim G.
    Computer Science, Aalborg University, Denmark.
    Mikučionis, Marius
    Computer Science, Aalborg University, Denmark.
    Nyman, Ulrik
    Computer Science, Aalborg University, Denmark.
    Skou, Arne
    Computer Science, Aalborg University, Denmark.
    Statistical and exact schedulability analysis of hierarchical scheduling systems2016Inngår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 127, s. 103-130Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper contains two contributions: 1) A development methodology involving two techniques to enhance the resource utilization and 2) a new generic multi-core resource model for hierarchical scheduling systems.

    As the first contribution, we propose a two-stage development methodology relying on the adjustment of timing attributes in the detailed models during the design stage. We use a lightweight method (statistical model checking) for design exploration, easily assuring high confidence in the correctness of the models. Once a satisfactory design has been found, it can be proved schedulable using the computation costly method (symbolic model checking). In order to analyze a hierarchical scheduling system compositionally, we introduce the notion of a stochastic supplier modeling the supply of resources from each component to its child components in the hierarchy. We specifically investigate two different techniques to widen the set of provably schedulable systems: 1) a new supplier model; 2) restricting the potential task offsets.

    We also provide a way to estimate the minimum resource supply (budget) that a component is required to provide. In contrast to analytical methods, we prove non-schedulable cases via concrete counterexamples. By having richer and more detailed scheduling models this framework, has the potential to prove the schedulability of more systems.

    As the second contribution, we introduce a generic resource model for multi-core hierarchical scheduling systems, and show how it can be instantiated for classical resource models: Periodic Resource Models (PRM) and Explicit Deadline Periodic (EDP) resource models. The generic multi-core resource model is presented in the context of a compositional model-based approach for schedulability analysis of hierarchical scheduling systems.

    The multi-core framework presented in this paper is an extension of the single-core framework used for the analysis in the rest of the paper.

  • 222.
    Bouguerra, Abdelbaki
    et al.
    Örebro University, Sweden.
    Andreasson, Henrik
    Örebro University, Sweden.
    Lilienthal, Achim J.
    Örebro University, Sweden.
    Åstrand, Björn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    Rögnvaldsson, Thorsteinn
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR Centrum för tillämpade intelligenta system (IS-lab).
    An Autonomous Robotic System for Load Transportation2009Inngår i: 2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), Piscataway, N.J.: IEEE, 2009Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper presents an overview of an autonomous robotic system for material handling. The system is being developed by extending the functionalities of traditional AGVs to be able to operate reliably and safely in highly dynamic environments. Traditionally, the reliable functioning of AGVs relies on the availability of adequate infrastructure to support navigation. In the target environments of our system, such infrastructure is difficult to setup in an efficient way. Additionally, the location of objects to handle are unknown, which requires runtime object detection and tracking. Another requirement to be fulfilled by the system is the ability to generate trajectories dynamically, which is uncommon in industrial AGV systems.

  • 223.
    Boyer de la Giroday, Anna
    Linköpings universitet, Institutionen för datavetenskap, Artificiell intelligens och integrerad datorsystem.
    Automatic fine tuning of cavity filters2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Cavity filters are a necessary component in base stations used for telecommunication. Without these filters it would not be possible for base stations to send and receive signals at the same time. Today these cavity filters require fine tuning by humans before they can be deployed. This thesis have designed and implemented a neural network that can tune cavity filters. Different types of design parameters have been evaluated, such as neural network architecture, data presentation and data preprocessing. While the results was not comparable to human fine tuning, it was shown that there was a relationship between error and number of weights in the neural network. The thesis also presents some rules of thumb for future designs of neural network used for filter tuning.

  • 224.
    Bozakov, Zdravko
    et al.
    Dell EMC, Ireland.
    Mangiante, Simone
    Dell EMC, Ireland.
    Hernandez Benet, Cristian
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Santos, Ricardo
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Buckley, Donagh
    Dell EMC, Ireland.
    A NEAT framework for enhanced end-host integration in SDN environments2017Inngår i: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE, 2017Konferansepaper (Fagfellevurdert)
    Abstract [en]

    SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network applications exhibit a wide range of properties, posing diverse, often conflicting, demands towards the network. As these requirements are typically not known, controllers must rely on error-prone heuristics to extract them. In this work, we develop a framework which allows applications deployed in an SDN environment to explicitly express their requirements to the network. Conversely, it allows network controllers to deploy policies on end-hosts and to supply applications with information about network paths, salient servers and other relevant metrics. The proposed approach opens the door for fine grained, application-aware resource optimization strategies in SDNs

  • 225.
    Braaf, Joakim
    Linköpings universitet, Institutionen för datavetenskap, Programvara och system. Linköpings universitet, Tekniska högskolan.
    Introducing Mock framework for Unit Test ina modeling environment2014Independent thesis Basic level (university diploma), 10,5 poäng / 16 hpOppgave
    Abstract [en]

    Testing is an important part in the software development process. Unit testsaim to test individual units in isolation. These units may have dependenciesto their surroundings that make the units hard to test in isolation withoutalso testing the surrounding units. A technique to help isolate these units isto replace the surrounding units with mock objects. This work investigateshow a C++ mock framework can be integrated into a modeling environ-ment’s unit test framework. Several mock frameworks are evaluated, and aproof of concept is created to show that integration is possible. Additionally,ideas for how to use mocks in a model environment are presented.

  • 226.
    Braescu, Tatiana
    Högskolan i Kalmar, Institutionen för kommunikation och design.
    Interaktiv webbapplikation för möbelprodukter2008Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Det här examensarbetet är utfört på uppdrag av AB Järnforsens Stoppmöbler i Järnforsen som vill ha en ny webbplast med ett rikt användargränssnitt.

    Syftet med examensarbetet är att undersöka vilka moderna webbteknologier som lämpar sig bäst för att presentera och visualisera data. Målet har varit att designa och implementera en fungerande webbplats till företaget med användning av vald teknik.

    Arbetet baseras på teoristudier samt en kvalitativ empirisk undersökning med hjälp av prototyp och användartest. Undersökningens resultat har analyserats och ligger till grund för den nya webbapplikationen utformning.

    Analysen av denna undersökning antyder att genom att tillföra webbplatsen ny funktionalitet, har användarna fått mer information om företagets produkter.

    Användning av Ajax-tekniken har reducerat tiden för uppdatering av information.

  • 227.
    Brandt, Nick
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    ChattyMe – En webbaserad chattapplikation2018Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Syftet med denna rapporten är att redovisa utvecklingen av chattapplikationen ChattyMe. Målet med projektet är att skapa en robust och högpresterande webbapplikation. Enligt undersökningar finns det stora brister i säkerheten på flertalet webbplatser, och därför är det extra viktigt och en hög prioritet att utveckla denna applikationen med stort fokus på säkerhet. För att kunna hantera den begränsade utvecklingstiden har en tidsplan med deadlines skapats som följs under hela utvecklingen. Det som kommer att ingå i applikationen är teknik som registrering och inloggning, chattrum och privata meddelanden medlemmar emellan. Teknologierna som kommer att användas till att utveckla applikationen är JavaScript-ramverket Angular för frontend och JavaScript server-ramverket Node.js för backend. Förutom Angular och Node.js kommer JavaScript-biblioteket Socket.io användas för uppdatering i realtid. Att utveckla effektivt är viktigt i ett tidsbegränsad projekt, och för att göra det krävs en optimal utvecklingsmiljö. I detta fallet har Jetbrains Webstorm använts för programmering, Google Chrome debugger för debugging, med Postman för API testning och detta har gjorts i Linux Ubuntu 17.10 operativsystem. Resultatet blev en funktionell, högpresterande och säker chattapplikation enligt tester.

  • 228.
    Braun, Fredrik von
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    VARETT.SE: Hemsida med webbshop och administrationssystem2003Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    This thesis will show you how to build and construct a interactive website with a web shop and a web based administration system. The website is developed for a company called Varett. Varett will use the website to reach out for a larger group of customers and also for promoting new products. I have develop this site mainly using ASP, MS Access and HTML.

    I have also developed a graphic profile for the company to use at the homepage and at other commercial products. You can find the current version of the website at http://www.varett.se.

  • 229.
    Braun, Stefan
    KTH, Skolan för elektro- och systemteknik (EES), Mikrosystemteknik.
    Wafer-level heterogeneous integration of MEMS actuators2010Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    This thesis presents methods for the wafer-level integration of shape memory alloy (SMA) and electrostatic actuators to functionalize MEMS devices. The integration methods are based on heterogeneous integration, which is the integration of different materials and technologies. Background information about the actuators and the integration method is provided.

    SMA microactuators offer the highest work density of all MEMS actuators, however, they are not yet a standard MEMS material, partially due to the lack of proper wafer-level integration methods. This thesis presents methods for the wafer-level heterogeneous integration of bulk SMA sheets and wires with silicon microstructures. First concepts and experiments are presented for integrating SMA actuators with knife gate microvalves, which are introduced in this thesis. These microvalves feature a gate moving out-of-plane to regulate a gas flow and first measurements indicate outstanding pneumatic performance in relation to the consumed silicon footprint area. This part of the work also includes a novel technique for the footprint and thickness independent selective release of Au-Si eutectically bonded microstructures based on localized electrochemical etching.

    Electrostatic actuators are presented to functionalize MEMS crossbar switches, which are intended for the automated reconfiguration of copper-wire telecommunication networks and must allow to interconnect a number of input lines to a number of output lines in any combination desired. Following the concepts of heterogeneous integration, the device is divided into two parts which are fabricated separately and then assembled. One part contains an array of double-pole single-throw S-shaped actuator MEMS switches. The other part contains a signal line routing network which is interconnected by the switches after assembly of the two parts. The assembly is based on patterned adhesive wafer bonding and results in wafer-level encapsulation of the switch array. During operation, the switches in these arrays must be individually addressable. Instead of controlling each element with individual control lines, this thesis investigates a row/column addressing scheme to individually pull in or pull out single electrostatic actuators in the array with maximum operational reliability, determined by the statistical parameters of the pull-in and pull-out characteristics of the actuators.

  • 230.
    Brejcha, Kevin
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Prestandaanalys av HTTP/22015Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Swedbank är en av Sveriges största företag inom finanssektorn med drygt fyra miljoner privatkunder och försöker ständigt utveckla sina tjänster så att de är lättåtkomliga och lättanvända för kunderna. För att tillfredsställa sina kunders behov av en snabb och lättåtkomlig bank så vill Swedbank minska på laddningstiderna till sina finanstjänster, särskilt de mobila tjänsterna då det är där uppkopplingarna är som långsammast. Uppdraget var att göra en prestandaanalys av HTTP/2 som är den senaste versionen av HTTP-protokollet. Efter att ha genomfört arbetet ska Swedbank veta vad dem kan anpassa för att göra sina tjänster så optimala som möjligt för framtiden.Resultatet visade att med hjälp av HTTP/2’s nya funktioner, bland annat det binära ramlagret, uppnåddes en prestandaökning på 44% av totala laddningstiden på Swedbank’s hemsida. Testerna genomfördes i en lokal labbmiljö där de olika HTTP versionerna installerades och mätvärden dokumenterades. Detta ansågs som ett bra resultat utan att ha genomfört någon fördjupande konfiguration.

  • 231.
    Brink, Johan
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Elvland, Erik
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Hansson, Patrik
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Effekterna av GDPR: En jämförelse mellan Personuppgiftslagen och den kommande allmänna dataskyddsförordningen.2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Den 25 maj 2018 kommer Personuppgiftslagen (PuL) att ersättas av EU-förordningen GeneralData Protection Regulation (GDPR). Denna studie har granskat vilka skillnader som finnsmellan GDPR och PuL och även hur företag planerar att hantera de förändringar som GDPRkommer att medföra. Även om GDPR i många avseende är lik PuL kommer den nyaförordningen att påverka allt ifrån den enskilda individen till de största organisationerna.Förordningen kommer innebära mer rättigheter och bättre skydd för den registrerade, vilketbetyder att det kommer ställas högre krav på de företag som behandlar personuppgifter.

    De nya kraven kommer innebära ett omfattande anpassningsarbete inom flera områden. Delskommer det behöva ske administrativa och juridiska förändringar inom verksamheten i form avnya eller uppdaterade avtal. Det kan även komma att krävas tekniska åtgärder för att hanterafrågor som “Rätten att bli glömd”, ”Dataportabilitet”, ”Registerföring” samt det förstärktaskyddet av personuppgifter. Det ställs även krav på att personuppgiftsincidenter måsterapporteras till tillsynsmyndigheten vid upptäckande. Då tillämpningsområdet utökas medfördetta att personuppgifter som lagras ostrukturerat kommer omfattas av lagstiftningen. För attuppnå efterlevnad av förordningen införs krav på att i vissa fall utse ett “Dataskyddsombud” iverksamheten; tillsynsmyndigheten får även befogenhet till att utdöma mycket kraftigasanktioner vid överträdelse av förordningen.

    Beroende på hur en verksamhets personuppgiftshantering ser ut i dagsläget kan dennaanpassning bli mer eller mindre omfattande. Anpassningsarbetets omfattning påverkas av ettantal faktorer exempelvis under vilka förutsättningar som behandlingen sker i nuläget och ivilken omfattning denna sker.

    Inställningen till förordningen bland företag är varierande, de som tar den på allvar har insettatt nya krav kommer att ställas på deras verksamheter och har påbörjat arbetet för att anpassasin verksamhet. Andra anser att de inte berörs i samma utsträckning och är därför inte likaoroliga. På det stora hela kommer förordningen göra att personuppgiftsbehandlingen inomEU/ESS blir säkrare även om resan dit kan kosta.

  • 232.
    Brink, Pontus
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Rinnarv, Jonathan
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Machine learning - neuroevolution for designing chip circuits/pathfinding2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Neural Networks have been applied in numeral broad categories of work. Such as classification, data processing, robotics, systemcontrol e.t.c. This thesis compares using traditional methods of the routing process in chip circuit design to using a Neural Network trained with evolution. Constructing and evaluating a chip design is a complicated thing, where a lot of variables have to be accounted for and therefore a simplified evaluation and design process is used in order to train the network and compare the results. This was done by constructing simple test cases and running the algorithms BFS, A*Star and the neural network and comparing the paths each algorithm found using a fitness function. The results were that BFS and A*Star both performed better on complex circuits, but the neural network was able to create better paths on very small and niche circuits. The conclusion of the study is that the neural network approach is not able to compete with the standard industry methods of the routing process, but we do not exclude the possibility that with a better designed Fitness function, this could be possible.

  • 233.
    Brodin, Alexander
    et al.
    Högskolan i Jönköping, Tekniska Högskolan.
    Peterson, Erik
    Högskolan i Jönköping, Tekniska Högskolan.
    Webbaserat ärendehanteringssystem2012Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
  • 234.
    Brorsson, Hannah
    et al.
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Jacobsson, Ingrid
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Interaktiv vittneskonfrontation: Utvecklandet av ett Directorspel för Internet2002Independent thesis Basic level (professional degree)Oppgave
    Abstract [sv]

    This final-year project has been performed at Strix production Efterlyst. The task has been to make a page under their homepage, with a game application that’s supposed to be interesting and also have a strong connection to the TV- program.

    In the first part of the report, the reader will learn about the preparing work that was done before the work with the final game began. It is in these two test versions all the technical problems were tested, to finally be used or thrown away.

    When all this was done, a lot of effort was made to make an attractive design of the game. The different design alternatives that were made were sent to Strix, so that they could choose what they liked the most.

    After the technical description and the design, comes a part that explains how each frame in the game is constructed. In this part you can also read about the programming that were made to make the game work as it’s supposed to.

    In the end of this report you can follow the difficulties that came up during the project, and how they have been solved.

  • 235.
    Brorsson, Mats
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Collin, Mikael
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Adaptive and flexible dictionary code compression for embedded applications2006Inngår i: Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems, 2006, s. 113-124Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Dictionary code compression is a technique where long instructions in the memory are replaced with shorter code words used as index in a table to look up the original instructions. We present a new view of dictionary code compression for moderately high-performance processors for embedded applications. Previous work with dictionary code compression has shown decent performance and energy savings results which we verify with our own measurement that are more thorough than previously published. We also augment previous work with a more thorough analysis on the effects of cache and line size changes. In addition, we introduce the concept of aggregated profiling to allow for two or more programs to share the same dictionary contents. Finally, we also introduce dynamic dictionaries where the dictionary contents is considered to be part of the context of a process and show that the performance overhead of reloading the dictionary contents on a context switch is negligible while on the same time we can save considerable energy with a more specialized dictionary contents.

  • 236.
    Brundin, Michelle
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Morris, Peter
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Åhlman, Gustav
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Rosén, Emil
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Implementation av webbsida för rekommendationssystem med användaruppbyggd databas2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    The goal of this project was to create a web-based, crowd-sourced, correlational database, that easily allowed users to submit objects and receive correlated objects as results. The webservice was created in the web development languages of HTML, CSS, PHP and Javscript, with MySQL to handle the database. Simultaneous development was kept in check with the aid of the source code management system GIT. Upon completion, the service contained several HTML-views, the ability to add and rate objects, a per-object dedicated page with information parsed from Wikipedia.org, and a view with objects ranked in accordance to the preferences specific to the current user. Roughly a month after the beginning of development, the website was publicly launched and promoted in order to collect data, and improvements were added to the website as needed. Two weeks after the public launch, the collected data was measured and analyzed. The algorithm proved effective and scalable, especially with the introduction of tags and simultaneous computation of object features.

  • 237.
    Bruse, Andreas
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Exploiting Cloud Resources For Semantic Scene Understanding On Mobile Robots2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Modern day mobile robots are constrained in the resources available to them. Only so much hardware can be fit onto the robotic frame and at the same time they are required to perform tasks that require lots of computational resources, access to massive amounts of data and the ability to share knowledge with other robots around it.

    This thesis explores the cloud robotics approach in which complex compu- tations can be offloaded to a cloud service which can have a huge amount of computational resources and access to massive data sets. The Robot Operat- ing System, ROS, is extended to allow the robot to communicate with a high powered cluster and this system is used to test our approach on such a complex task as semantic scene understanding. The benefits of the cloud approach is utilized to connect to a cloud based object detection system and to build a cat- egorization system relying on large scale datasets and a parallel computation model. Finally a method is proposed for building a consistent scene description by exploiting semantic relationships between objects.

  • 238.
    Buckwalter, Claes
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    INFLOW: Structured Print Job Delivery2003Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    More and more print jobs are delivered from customer to printer digitally over the Internet. Although Internet-based job delivery can be highly efficient, companies in the graphic arts and printing industry often suffer unnecessary costs related to this type of inflow of print jobs to their production workflows. One of the reasons for this is the lack of a well-defined infrastructure for delivering print jobs digitally over the Internet.

    This thesis presents INFLOW - a prototype for a print job delivery system for the graphic arts and printing industry. INFLOW is a web-based job delivery system that is hosted on an Internet-connected server by the organization receiving the print jobs. Focus has been on creating a system that is easy to use, highly customizable, secure, and easy to integrate with existing and future systems from third-party vendors. INFLOW has been implemented using open standards, such as XML and JDF (Job Definition Format).

    The requirements for ease-of-use, high customizability and security are met by choosing a web-based architecture. The client side is implemented using standard web technologies such as HTML, CSS and JavaScript while the serverside is based on J2EE, Java Servlets and Java Server Pages (JSP). Using a web browser as a job delivery client provides a highly customizable user interface and built in support for encrypted file transfers using HTTPS (HTTP over SSL).

    Process automation and easy integration with other print production systems is facilitated with CIP4’s JDF (Job Definition Format). INFLOW also supports"hot folder workflows"for integration with older preflight software and other hot folder-based software common in prepress workflows.

  • 239.
    Burghout, Wilco
    KTH, Tidigare Institutioner                               , Infrastruktur.
    Hybrid microscopic-mesoscopic traffic simulation2004Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    Traffic simulation is an important tool for modelling the operations of dynamic traffic systems and helps analyse the causes and potential solutions of traffic problems such as congestion and traffic safety. Microscopic simulation models provide a detailed representation of the traffic process, which makes them most suitable for evaluation of complicated traffic facilities and Intelligent Transportation Systems that often consist of complex traffic management, safety and information systems. Macroscopic and mesoscopic models on the other hand, capture traffic dynamics in lesser detail, but are faster and easier to apply and calibrate than microscopic models. Therefore they are most suitable for modelling large networks, while microscopic models are usually applied to smaller areas.

    The objective of this thesis is to combine the strengths of both modelling approaches and diminish their individual weaknesses by constructing a hybrid mesoscopic-microscopic model that applies microscopic simulation to areas of specific interest, while simulating a surrounding network in lesser detail with a mesoscopic model.

    Earlier attempts at hybrid modelling have concentrated on integrating macroscopic and microscopic models and have proved difficult due to the large difference between the continuous-flow representation of traffic in macroscopic models and the detailed vehicle-and driver-behaviour represented in microscopic models. These problems are solved in this thesis by developing a mesoscopic vehicle-based and event-based model that avoids the (dis)aggregation problems of traffic flows at the inter-model boundaries. In addition, this thesis focuses on the general problems of consistency across the entire hybrid model.

    The requirements are identified that are important for a hybrid model to be consistent across the models at different levels of detail. These requirements vary from network and route-choice consistency to consistency of traffic dynamics across the boundaries of the micro- and mesoscopic submodels. An integration framework is proposed that satisfies these requirements. This integration framework has been implemented in a prototype hybrid model, MiMe, which is used to demonstrate the correctness of the solutions to the various integration issues. The hybrid model integrates MITSIMLab, a microscopic traffic simulation model, and Mezzo, the newly developed mesoscopic model. Both the hybrid model and the new Mezzo model are applied in a number of case studies, including a network in the North of Stockholm, which show their validity and applicability. The results are promising and support both the proposed integration architecture and the importance of integrating microscopic and mesoscopic models.

  • 240.
    Bustos, Sebastian
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Grek, Niklas
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Säkerhetsklassificering av IT-system på Fläkt Woods AB2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:

    • What defines a secure system and how does the company relate to these factors?

    • What are the threats today based on hardware/software, human factors and company routines/policies?

    • What measures should be taken for the organisation to reach a higher level of security for their systems?

    • How do we develop a method for classification of security and what components should it contain?

    • What changes are reasonable and necessary with the respect to the company’s resources?

    The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems.

    The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information.

    Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.

  • 241.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Pereira, Nuno
    Polytechnic Institute of Porto, Porto, Portugal .
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Analysis of LoRaWAN V1.1 Security2018Inngår i: Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS '18)., ACM Digital Library, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    LoRa and the LoRaWAN specification is a technology for Low Power Wide Area Networks (LPWAN) designed to allow connectivity for connected objects, such as remote sensors. Several previous works revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft) and these led to improvements included in LoRaWAN v1.1, released on Oct 11, 2017. In this work, we provide the first look into the security of LoRaWAN v1.1. We present an overview of the protocol and, importantly, present several threats to this new version of the protocol. Besides, we propose our own ramification strategies for the mentioned threats, to be used in developing next version of LoRaWAN. The threats presented were not previously discussed, they are possible even within the security assumptions of the specification and are relevant for practitioners implementing LoRa-based applications as well researchers and the future evolution of the LoRaWAN specification.

  • 242.
    Bygdeson, Andreas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    Cartographer: En kartbaserad friluftsapplikation2016Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Målet med det här arbetet har varit att utveckla en friluftsapplikation för människor som rör sig i skog och mark antingen i arbetet eller i privatlivet. Med syfte att låta de skapa och placera ut markörer på en karta med aktivt uppdaterande gps positionering. För att uppnå detta har Google Maps använts som gränssnitt för att hämta och hantera kartinformation och en applikation har designats i flödesscheman utefter kravspecifikationen och i enlighet med Jacob Nielsens användbarhetsprinciper. Hallway test metoden har använts för att utvärdera hur väl användbarhetsdesignen har uppnått sina mål. Applikationen har sedan konstruerats i Java och Android Studio mot Androids mobila plattform. Utvecklingen har följt den planerade designen och uppnått samtliga konkreta mål som specificerades och i synnerhet användbarhetsmålen. Flera funktionella mål har identifierats att kunna optimeras ytterligare och en rad förslag på vidareutveckling av applikationen har tagits fram för eventuella framtida arbeten.

  • 243.
    Bäckstedt, Dennis
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Felsökning och optimering av trådlöst nätverk IEEE 802.11ac2017Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Trådlösa nätverk växer sig allt starkare och normen är nu mera att man i ett kontorslandskap eller

    hem skall kunna slå sig ner med sin laptop och jobba utan att behöva oroa sig om nätverksuttag

    eller sladdar. Även IP-telefoni och surfplattor är nu en naturlig del i flera användares dagliga liv,

    och just IP-telefoni ställer höga krav på det nätverk som denna är ansluten till. Därför har jag

    valt att i denna denna rapport titta närmare på den trådlösa tekniken 802.11 som är framtagen av

    standardiseringsorganisationen IEEE. Metoden jag valt att använda för att åstadkomma detta är

    att genomföra en mätning av ett befintligt trådlöst nät. Jag kommer därefter att undersöka denna

    data för att förhoppningsvis kunna lämna ett förslag på en bättre nätverksdesign. Som hjälpmedel

    för att genomföra denna mätning har jag utrustning från Ekahau, ett finsk företag vars huvudsyssla

    är just mätning, optimering och felsökning av trådlösa nät. Det jag kom fram till var att det tråd-

    lösa nätverket hade stora brister. Framförallt var täckning det stora bekymret, inte bara bristen på

    täckning utan ibland även för bra täckning vilket resulterat i sticky clients. Jag har därefter presen-

    terat en design som för att minimera kostnaderna och miljöpåverkan använder befintlig utrustning,

    dock kräver denna att det kompletteras med 9 stycken nya accesspunkter.

  • 244.
    Bäckström, David
    Linköpings universitet, Institutionen för datavetenskap.
    Boundary-Scan in the ATCA standard2005Independent thesis Basic level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Larger systems today, like telephone and optical switches, are usually based on a multiboard architecture where a set of printed-circuit boards are connected to a backplane board. These systems are also equipped with Boundary-Scan to enable testing, however, the backplane in a multi-board system has a limited wiring capability, which makes the additional backplane Boundary-Scan wiring highly costly. The problem is to access the Boundary-Scan enabled boards with the Boundary-Scan controller located at a central board. In this MSc. thesis project we propose an approach suitable for the Advanced Telecommunication Computing Architecture (ATCA) standard where we make use of the existing Intelligent Platform Management Bus (IPMB) and expands its protocol for application of Boundary-Scan tests. We have also defined a command set as well as a test data format for storing embedded test data on the boards to support the remote execution of Boundary-Scan tests. For validation of the proposed approach we have developed demonstrator.

  • 245.
    Bäckström, David
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Pulstågsmodul2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 246.
    Bäckström, Jonas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Limitations of Azure in GIS Scalability: A performance and migration study2012Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In this study, the cloud platform Windows Azure has been targeted for test implementations of Geographical Information System (GIS) software in the form of map servers and tile caches. The map servers included were GeoServer, MapNik, MapServer and SharpMap, which together with the tile caches, GeoWebCache, MapCache and TileCache, were installed on Windows Azures three different virtual machine roles (Web, Worker and VM). Furthermore, different techniques for scalingapplications and internal role communication are presented, followed by four sets of performance tests. The performance tests attempt to highlight the differences in request times, how the different role sizes handle the load from the incoming requests, how the different role sizes handle many concurrent TCP-connections and how well the incoming requests are load balanced in between the worker roles. The test implementations showed that all map servers and tile caches were successfully installed in Azure, which leads to the conclusion that Windows Azure is suitable for hosting GIS software with similar installation requirements to the previously mentioned software. Four different approaches (Direct mapping, Public Internal Endpoints, Queue and Worker Role Request Broker) are presented showing how Azure allows different methods in order to scale the internal role communication as well as the external client requests. The performance tests provided somewhat inconclusive test results due to hardware limitations in the test setup. This made it difficult to draw concluding parallels between the final results and the expected values. Minor tendencies in performance gain can be seen when scaling the VM size as well as the number of VMs.

  • 247.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Handover in IEEE 802.11p-based delay-sensitive vehicle-to-infrastructure communication2009Rapport (Annet vitenskapelig)
    Abstract [en]

    Based on communication and cooperation between vehicles and roadside infrastructure, Intelligent Transport Systems (ITS) safety applications offer great potential to avoid traffic accidents or at least reduce their impact. As these applications usually are delay-sensitive, the delay introduced by waiting for access to the wireless communication channel should both be reduced and provided with an upper bound. The proposed IEEE 802.11p standard for short to medium range vehicular communication does not offer these guarantees. In previous work, we presented a MAC (Medium Access Control) enhancement supporting delay-sensitive, safety-critical V2I (Vehicle-to-Infrastructure) applications. Since the proposed enhancement requires a deterministic and fast mechanism to associate a vehicle to a roadside unit (RSU) so that it can be integrated into the centralized polling schedule, we now target the handover and connection setup between a vehicle and an RSU. Although the first connection setup with an RSU still underlies the randomness of the original 802.11p MAC method, we provide a deterministic solution to further enhance the handover procedures by introducing a fast, proactive handover mechanism. We show that the overhead of our solution is limited and still allows our MAC protocol to support safety-critical V2I applications in a densely trafficked highway scenario.

  • 248.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Position-based data traffic prioritization in safety-critical, real-time vehicle-to-infrastructure communication2009Inngår i: IEEE International Conference on Communications Workshops, 2009. ICC Workshops 2009 / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2009, s. 205-210Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Future active-safety applications in vehicular networks rely heavily on the support for real-time inter-vehicle communication. The Medium Access Control (MAC) mechanism proposed for the upcoming IEEE 802.11p standard intended for Intelligent Transport Systems (ITS) applications does not offer deterministic real-time support, i.e., the channel access delay is not upper bounded. We therefore propose a vehicle-to-infrastructure (V2I) communication solution extending IEEE 802.11p, by introducing a collision-free MAC phase with an enhanced prioritization mechanism based on vehicle positions and the overall road traffic density. A road side unit using a polling mechanism is then able to provide real-time support such that it can guarantee collision-free channel access within its transmission range. Part of the bandwidth remains unchanged such that best-effort services like ongoing vehicle-to-vehicle (V2V) applications may continue. Our solution guarantees that all communication deadlines of the V2I applications are met, while minimizing the required length of the collision-free phase. This in turn maximizes the amount of bandwidth available for best-effort services and ongoing V2V applications. The position-based prioritization mechanism further improves the throughput of both real-time and best-effort data traffic by focusing the communication resources to the most hazardous areas. The concept is evaluated analytically based on a realistic task set from a V2I merge assistance scenario.

  • 249.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Kunert, Kristina
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A fibre-optic AWG-based real-time network for high-performance embedded computing2004Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, an architecture and a Medium Access Control (MAC) protocol for a multiwavelength optical communication network, applicable in short range communication systems like System Area Networks (SANs), are proposed. The main focus lies on guaranteed support for hard and soft real-time traffic. The network is based upon a single-hop star topology with an Arrayed Waveguide Grating (AWG) at its center. Traffic scheduling is centralized in one node (residing together with the AWG in a hub), which communicates through a physical control channel. The AWG’s property of spatial wavelength reuse and the combination of fixedtuned and tunable transceivers in the nodes enable simultaneous control and data transmission. A case study with defined real-time communication requirements in the field of Radar Signal Processing (RSP) was carried out and indicates that the proposed system is very suitable for this kind of application.

  • 250. Calandriello, Giorgio
    et al.
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Lioy, Antonio
    Efficient and Robust Pseudonymous Authentication in VANET2007Inngår i: VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, 2007, s. 19-27Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security and privacy-enhancing mechanisms axe essential for the wide-spread adoption of the VANET technology. In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings. Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security.

2345678 201 - 250 of 1813
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf