Ändra sökning
Avgränsa sökresultatet
7576777879 3851 - 3900 av 3909
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 3851.
    Zhang, Kai
    et al.
    Jinan Univ, Peoples R China.
    Qu, Ting
    Jinan Univ, Peoples R China.
    Zhou, Dajian
    Guangdong Univ Technol, Peoples R China.
    Thurer, Matthias
    Jinan Univ, Peoples R China.
    Liu, Yang
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, Industriell miljöteknik. Linköpings universitet, Tekniska fakulteten. Jinan Univ, Peoples R China.
    Nie, Duxian
    South China Agr Univ, Peoples R China.
    Li, Congdong
    Jinan Univ, Peoples R China.
    Huang, George Q.
    Jinan Univ, Peoples R China; Univ Hong Kong, Peoples R China.
    IoT-enabled dynamic lean control mechanism for typical production systems2019Ingår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 10, nr 3, s. 1009-1023Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The emergence and subsequent popularization of lean has been one of the most significant developments in the history of operations management. However, there is a lack of systematic theory on the control framework underlying lean production. It is therefore difficult to conduct more in-depth research on Lean theory, specifically in the context of emerging technologies as smart manufacturing or Industry 4.0. In this study, process control theory is used to re-define several major lean methods and tools. Then a Lean-Oriented Optimum-State Control Theory (L-OSCT) is proposed that integrates these lean methods and tools into optimum-state control theory. On the level of method and mechanism, we adopt a recently emerged synchronization approach to obtain global-wide leanness of a large-scale system. L-OSCT provides dynamic process control in industrial networking systems. At last, a case study in a large-size paint making company in China is used to validate the effectiveness of the approach.

  • 3852.
    Zhang, Minghui
    et al.
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad.
    Su, Lian
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad.
    How Can Digital Games be Applied in Education?: A Digital Education Game for introducing university to new students2013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In order to introduce the environment of the University of Gävle to the new students, an efficient way is needed. Among many different methods of helping new students get familiar with university, a Digital Education Game could be a good option. The aim of this research is to test if new students can learn more about University of Gävle when they are learning through a Digital Education Game. This research was mainly based on five methods. Before creating the game, a theoretical framework was built in the beginning, and then interviews and surveys were performed to get useful information. Next, a Digital Education Game was created through the platform e-Adventure. Finally, evaluations of this game were performed. The findings of this research were that according to the result of evaluating surveys, after players played this game, they were able to provide more correct answers than before. The conclusion could be drawn from this research was that new students could learn more about University of Gävle by playing a Digital Education Game.

  • 3853.
    Zhang, Silun
    et al.
    KTH, Skolan för teknikvetenskap (SCI), Matematik (Inst.), Optimeringslära och systemteori. Harbin Institute of Technology, China.
    He, F.
    Yao, Y.
    Hu, Xiaoming
    KTH, Skolan för teknikvetenskap (SCI), Matematik (Inst.), Optimeringslära och systemteori.
    Spherical formation of regular tetrahedra2017Ingår i: 2017 36th Chinese Control Conference, CCC, IEEE Computer Society, 2017, s. 1317-1322, artikel-id 8027533Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we study the problem of tracking and encircling a moving target by agents in the 3-dimensional space. Specifically, a group of agents are driven to a regular tetrahedron formation on a spherical surface and simultaneously keep the center of this spherical formation coinciding with the target to be tracked. In the proposed method, to avoid the singularity caused by spherical parameterisations in control, we directly consider the spherical formation in space S2. Besides, the protocol proposed does not contain any information of the desired formation beforehand. Rather the constructed formation pattern is attributed to the properties of space S2 and the inter-agent topology.

  • 3854. Zhang, Weiqing
    et al.
    Møller-Pedersen, Birger
    Biehl, Matthias
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    A light-weight tool integration approach: From a tool integration model to OSLC integration services2012Ingår i: ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, 2012, s. 137-146Konferensbidrag (Refereegranskat)
    Abstract [en]

    Existing tool integration approaches integrate various tools directly through tool proprietary APIs. This kind of integration lacks standardization and are different case by case. Integration based upon common tool metamodels also turns to be too complicated and hard to maintain. In this paper we provide an approach which integrates tools based on a combination of tool metamodels and an integration model. Tool element representatives (Artifacts) are defined to make integrations more standardized and flexible compared to direct tool APIs. The approach links the tool integration model to the various tool metamodels, and provides mechanism by which the common integration properties and the various tool metamodels are related. An industrial case study has been performed to validate the approach with both scenarios of traceability and exchange of data based upon common data definitions.

  • 3855.
    Zhang, Ying
    et al.
    Ericsson AB.
    Arvidsson, Åke
    Ericsson AB.
    Understanding the characteristics of cellular data traffic2012Ingår i: CellNet 2012 / [ed] Li Erran Li och Morley Mao Zhuoqing, Association for Computing Machinery (ACM), 2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    Because of rapidly growing subscriber populations, advances in cellular communication technology, increasingly capable user terminals, and the expanding range of mobile applications, cellular networks have experienced a significant increase in data traffic, the dominant part of which is carried by the http protocol. Understanding the characteristics of this traffic is important for network design, traffic modeling, resource planning and network control. In this study we present a comprehensive characterization study of mobile http-based traffic using packet level traces collected in a large cellular network. We analyze the traffic using metrics at packet level, flow level and session level. For each metric, we conduct a comparison between traffic from different applications, as well as comparison to traffic in a wired network. Finally, we discuss the implications of our findings for better resource utilization in cellular infrastructures.

  • 3856.
    Zhang, Ying
    et al.
    USA.
    Arvidsson, Åke
    Ericsson AB.
    Siekkinen, Matti
    Finland.
    Urvoy-Keller, Guillaume
    Frankrike.
    Understanding HTTP flow rates in cellular networks2014Ingår i: Networking 2014 / [ed] Bjarne Helvik, Deep Medhi och Bin Liu, IFIP , 2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    Data traffic in cellular networks increased tremendously over the past few years and this growth is predicted to continue over the next few years. Due to differences in access technology and user behavior, the characteristics of cellular traffic can differ from existing results for wireline traffic. In this study we focus on understanding the flow rates and on the relationship between the rates and other flow properties by analyzing packet level traces collected in a large cellular network. To understand the limiting factors of the flow rates, we further analyze the underlying causes behind the observed rates, e.g.,network congestion, access link or end host configuration. Our study extends other related work by conducting the analysis from a unique dimension, the comparison with traffic in wired networks, to reveal the unique properties of cellular traffic. We find that they differ in variability and in the dominant rate limiting factors.

  • 3857.
    Zhang, Yingfeng
    et al.
    Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Shaanx, China / Department of Industrial Engineering, Northwestern Polytechnical University, Xi’an, China.
    Zhang, Geng
    Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Shaanx, China.
    Liu, Yang
    Department of Production, University of Vaasa, Vaasa, Finland.
    Hu, Di
    Key Laboratory of Contemporary Design and Integrated Manufacturing Technology, Ministry of Education, Northwestern Polytechnical University, Shaanx, China.
    Research on services encapsulation and virtualization access model of machine for cloud manufacturing2015Ingår i: Journal of Intelligent Manufacturing, ISSN 0956-5515, E-ISSN 1572-8145, s. 1-15Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Considering the new requirements of the services encapsulation and virtualization access of manufacturing resources for cloud manufacturing (CMfg), this paper presents a services encapsulation and virtualization access model for manufacturing machine by combining the Internet of Things techniques and cloud computing. Based on this model, some key enabling technologies, such as configuration of sensors, active sensing of real-time manufacturing information, services encapsulation, registration and publishing method are designed. By implementing the proposed services encapsulation and virtualization access model to manufacturing machine, the capability of the machine could be actively perceived, the production process is transparent and can be timely visited, and the virtualized machine could be accessed to CMfg platform through a loose coupling, ‘plug and play’ manner. The proposed model and methods will provide the real-time, accurate, value-added and useful manufacturing information for optimal configuration and scheduling of large-scale manufacturing resources in a CMfg environment.

  • 3858.
    Zhao, Yi
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Discovery of temporal association rules in multivariate time series2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This thesis focuses on mining association rules on multivariate time series. Com-mon association rule mining algorithms can usually only be applied to transactional data, and a typical application is market basket analysis. If we want to mine temporal association rules on time series data, changes need to be made. During temporal association rule mining, the temporal ordering nature of data and the temporal interval between the left and right patterns of a rule need to be considered. This thesis reviews some mining methods for temporal association rule mining, and proposes two similar algorithms for the mining of frequent patterns in single and multivariate time series. Both algorithms are scalable and efficient. In addition, temporal association rules are generated from the patterns found. Finally, the usability and efficiency of the algorithms are demonstrated by evaluating the results.

  • 3859.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    A Hazard Domain Ontology for Preliminary Hazard Analysis in Reuse Scenarios2016Rapport (Övrigt vetenskapligt)
  • 3860.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard Ontology2017Ingår i: 43rd Euromicro Conference on Software Engineering and Advanced Applications SEAA'17, 2017, s. 301-304Konferensbidrag (Refereegranskat)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned activity, applied during the early stages of safety-critical systems development process, aiming to provide stakeholders with a general understanding of potential hazards. The identified hazards will be described and serve as a basis to further identify mitigation mechanisms in the subsequent development process. However, since various stakeholders will be involved in the identification process, a common understanding of the nature of hazards among stakeholders, such as what a hazard consists of and how to describe it without ambiguities, is of crucial importance to achieve the goal of PHA. In this work, we propose a hazard modeling language (HML) based on a hazard domain ontology, i.e., the Hazard Ontology, in order to facilitate the specification of identified hazards. In addition, we present an approach to the transformation from natural language hazard descriptions into the HML specification. Finally, an industrial PHA example is used to illustrate the usefulness of our work.

  • 3861.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation AB, Sweden.
    Forsberg, Kristina
    Saab AB, Sweden.
    An Environment-Driven Ontological Approach to Requirements Elicitation for Safety-Critical Systems2015Ingår i: 23rd IEEE International Requirements Engineering Conference RE'15, 2015, s. 247-251Konferensbidrag (Refereegranskat)
    Abstract [en]

    The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.

  • 3862.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    An Ontological Approach to Identify the Causes of Hazards for Safety-Critical Systems2017Ingår i: 2017 2nd International Conference on System Reliability and Safety ICSRS'17, 2017, s. 405-413Konferensbidrag (Refereegranskat)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned technique, applied in early stages of safety critical systems development, aiming to provide stakeholders with a general understanding of potential hazards together with their causes. Various studies have asserted that most significant flaws in hazard analysis techniques are related to the omission of causes associated with the identified hazards. In addition, identified causes are sometimes described in too generic terms to provide useful guidance for subsequent activities. In this paper, we propose an approach to explore and identify the causes associated with the hazards from a PHA, aiming to improve the results of hazard causes identification in terms of completeness and usefulness. To achieve the goal, the proposed approach utilizes the hazard-related concepts and relations defined in a hazard domain ontology presented in our previous work. Furthermore, an application scenario of a train control system is used to evaluate our approach.

  • 3863.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation, Sweden.
    An Ontological Interpretation of the Hazard Concept for Safety-Critical Systems2017Ingår i: PROCEEDINGS OF THE 27TH EUROPEAN SAFETY AND RELIABILITY CONFERENCE (ESREL 2017), PORTOROZ , SLOVENIA, 18–22 JUNE 2017, 2017, s. 183-185Konferensbidrag (Refereegranskat)
    Abstract [en]

    The hazard concept has been extensively used in the literature and defined in an informal way, which serves as a guidance on identifying the potential hazards during the development of safety-critical systems. Intuitively, the definitions seem to be consistent and easy to understand. However, when we take a closer look at these definitions, ambiguities may arise, and real-world semantics need to be defined. In this work, we propose a hazard domain ontology, i.e., the Hazard Ontology (HO), to provide an ontological interpretation of hazard. To tackle the aforementioned issues, the HO is grounded in the Unified Foundational Ontology (UFO) to utilize the benefits provided by taking foundational concepts into account. Finally, we show some useful findings when we use the proposed ontology to analyze the hazard descriptions from an industrial passenger train project.

  • 3864.
    Zhou, Shuqiao
    et al.
    Tsinghua University.
    Yuan, Ruixi
    Tsinghua University.
    Dely, Peter
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Mitigating Control Channel Saturation in the Dynamic Channel Assignment Protocol2011Ingår i: JCIT: Journal of Convergence Information Technology, ISSN 2233-9299, Vol. 6, nr 6, s. 271-281Artikel i tidskrift (Refereegranskat)
    Abstract [en]

     Multi-channel MAC protocols that rely on a dedicated control channel (CC) for data channel reservation face the problem of control channel saturation. When the control channel becomes the bottleneck, data channels are not fully utilized and the spectrum allocated for the network is not used efficiently. For a popular dedicated control channel based multi-channel MAC protocol, the dynamic channel assignment protocol (DCA), we propose and compare two methods for mitigating control channel saturation. The first method is based on the ability of modern wireless cards to use different channel bandwidths. Increasing the bandwidth of the CC allows higher transmission rates and thereby relieves the saturation on the CC. The second method involves TXOP (Transmission Opportunity)-like burst-transmissions, where several date packets are transmitted using one reservation operation on the control channel. Network simulations and analysis show that, in an 802.11 based network, the bandwidth adaptation method yields a throughput improvement of around 30%. The TXOP mechanism performs much better and increases the throughput by a factor of 2 to 10, depending on the length of the data packets.

  • 3865.
    Zhu, Angela Yun
    et al.
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Inoue, Jun
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Peralta, Marisa Linnea
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    Taha, Walid
    Department of Computer Science, Rice University Houston, TX 77005, USA.
    O’Malley, Marcia
    Department of Mechanical Engineering and Materials Science Rice University, Houston, TX 77005, USA.
    Powell, Dane
    Department of Mechanical Engineering and Materials Science Rice University, Houston, TX 77005, USA.
    Implementing Haptic Feedback Environments from High-level Descriptions2009Ingår i: Embedded Software and Systems, 2009. ICESS '09. International Conference on: proceedings, Los Alamitos, Calif.: IEEE Computer Society, 2009, s. 482-489Konferensbidrag (Refereegranskat)
    Abstract [en]

    Haptic feedback can be a critical component of virtual environments used in cognitive research, rehabilitation, military training, and entertainment. A limiting factor in the innovation and the acceptance of virtual environments with haptic feedback is the time and cost required tobuild them. This paper presents a development environmentcalled iAcumen that supports a new approach for programming such systems. This approach allows the developer todirectly express physical equations describing the underlying dynamics. By raising the level of abstraction for thedeveloper, we avoid many of the problems that limit the effectiveness of traditional approaches.

  • 3866.
    Zhu, Angela Yun
    et al.
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Taha, Walid
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Cartwright, Robert
    Department of Computer Science, Rice University Houston, Houston, TX, USA.
    Martel, Matthieu
    Laboratoire ELIAUS-DALI, Universit´e de Perpignan, Perpignan Cedex, France.
    Siek, Jeremy G.
    Department of Electrical and Computer Engineering University of Colorado, Boulder, USA.
    In Pursuit of Real Answers2009Ingår i: 2009 International Conference on Embedded Software and Systems: ICESS 2009 : proceedings, 25-27 May, 2009, Hangzhou, Zhejiang, P.R. China, Los Alamitos, Calif.: IEEE Press, 2009, s. 115-122Konferensbidrag (Refereegranskat)
    Abstract [en]

    Digital computers permeate our physical world. This phenomenon creates a pressing need for tools that help us understand a priori how digital computers can affect their physical environment. In principle, simulation can be a powerful tool for animating models of the world. Today, however, there is not a single simulation environment that comes with a guarantee that the results of the simulationare determined purely by a real-valued model and not by artifacts of the digitized implementation. As such, simulation with guaranteed fidelity does not yet exist. Towards addressing this problem, we offer an expository account of what is known about exact real arithmetic. We argue that this technology, which has roots that are over 200 years old, bears significant promise as offering exactly the right technology to build simulation environments with guaranteed fidelity. And while it has only been sparsely studied in this large span of time, there are reasons to believe that the time is right to accelerate research in this direction.

  • 3867.
    Zhu, Sainan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    Creating a NoSQL database for the Internet of Things: Creating a key-value store on the SensibleThings platform2015Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Due to the requirements of the Web 2.0 applications and the relational databaseshave a limitation in horizontal scalability. NoSQL databases have become moreand more popular in recent years. However, it is not easy to select a databasethat is suitable for a specific use. This thesis describes the detailed design, im plementation and final performance evaluation of a key-value NoSQL databasefor the SensibleThings platform, which is an Internet of Things platform. Thethesis starts by comparing the different types of NoSQL databases to select themost appropriate one. During the implementation of the database, the algorithms for data partition, data access, replication, addition and removal ofnodes, failure detection and handling are dealt with. The final results for theload distribution and the performance evaluation are also presented in this pa per. At the end of the thesis, some problems and improvements that need betaken into consideration in the futures.

  • 3868.
    Ziegenbein, Tim
    Linköpings universitet, Institutionen för datavetenskap, Interaktiva och kognitiva system.
    Designing HTML5 2D platformer for web cam based motion games2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Movement interaction in games has over the last years been a main subject in the area of game design and recent motion based interaction systems provide many improvements over earlier systems. Research has proven that motion based games provide several benefits over general games, they increase the players’ engagement level and may induce both mental and physical health benefits. Still, not much research has been conducted in the area of motion based platform games, even though the platform game genre is one of the most popular game genres. In this thesis, a case study is conducted in order to extract design principles and guidelines applicable for motion based platform games. The study includes implementation of a browser-based 2D platform game that uses the web camera to provide motion based interaction. One of the conclusions in this study indicates that many game features from ordinary platform games only require minor modifications to be applicable for motion based platform games.

  • 3869.
    Zimmerman, Marc
    et al.
    Massachusetts Institute of Technology, Cambridge, USA.
    Lundqvist, Kristina
    Massachusetts Institute of Technology, Cambridge, USA.
    Leveson, Nancy
    Massachusetts Institute of Technology, Cambridge, USA.
    Investigating the readability of state-based formal requirements specification languages2002Ingår i: Proc. 24th International Conference on Software Engineering ICSE02, 2002, s. 33-43, artikel-id 7Konferensbidrag (Övrigt vetenskapligt)
  • 3870.
    Zografos, Vasileios
    et al.
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Lenz, Reiner
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Institutionen för teknik och naturvetenskap, Medie- och Informationsteknik. Linköpings universitet, Tekniska högskolan.
    Spatio-chromatic image content descriptors and their analysis using Extreme Value Theory2011Ingår i: Image analysis: 17th Scandinavian Conference, SCIA 2011, Ystad, Sweden, May 2011. Proceedings, Springer Berlin/Heidelberg, 2011, s. 579-591Konferensbidrag (Refereegranskat)
    Abstract [en]

    We use the theory of group representations to construct very fast image descriptors that split the vector space of local RGB distributions into small group-invariant subspaces. These descriptors are group theoretical generalizations of the Fourier Transform and can be computed with algorithms similar to the FFT. Because of their computational efficiency they are especially suitable for retrieval, recognition and classification in very large image datasets. We also show that the statistical properties of these descriptors are governed by the principles of the Extreme Value Theory (EVT). This enables us to work directly with parametric probability distribution models, which offer a much lower dimensionality and higher resolution and flexibility than explore the connection to EVT and analyse the characteristics of these descriptors from a probabilistic viewpoint with the help of large image databases.

  • 3871.
    Zografos, Vasileios
    et al.
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Nordberg, Klas
    Linköpings universitet, Institutionen för systemteknik, Datorseende. Linköpings universitet, Tekniska högskolan.
    Fast and accurate motion segmentation using linear combination of views2011Ingår i: BMVC 2011, 2011, s. 12.1-12.11Konferensbidrag (Refereegranskat)
    Abstract [en]

    We introduce a simple and efficient procedure for the segmentation of rigidly moving objects, imaged under an affine camera model. For this purpose we revisit the theory of "linear combination of views" (LCV), proposed by Ullman and Basri [20], which states that the set of 2d views of an object undergoing 3d rigid transformations, is embedded in a low-dimensional linear subspace that is spanned by a small number of basis views. Our work shows, that one may use this theory for motion segmentation, and cluster the trajectories of 3d objects using only two 2d basis views. We therefore propose a practical motion segmentation method, built around LCV, that is very simple to implement and use, and in addition is very fast, meaning it is well suited for real-time SfM and tracking applications. We have experimented on real image sequences, where we show good segmentation results, comparable to the state-of-the-art in literature. If we also consider computational complexity, our proposed method is one of the best performers in combined speed and accuracy. © 2011. The copyright of this document resides with its authors.

  • 3872.
    Zola, Enrica
    et al.
    Spain.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Centrum för HumanIT (from 2013).
    Minimizing the impact of the handover for mobile users in WLAN: A study on performance optimization2016Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 107, s. 292-303Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    IEEE 802.11 based Wireless LANs are an important piece in today’s communication infrastructure in order to provide high speed wireless Internet access to static or quasi mobile users. For large WLAN deployments (i.e., Campus or enterprise WLAN), it is important to understand the impact of user mobility and handovers on the system performance. In this article, we have developed a performance model for a set of networked 802.11 based WLAN Access Points, which is based on a Mixed Integer Linear Program (MILP). The objective function tries simultaneously to maximize the total system rate while at the same time minimizing the number of handovers for a configurable handover signaling rate. Because of the conflicting nature of the two objective functions, such multi-objective optimization is difficult to explore. A detailed evaluation of the model using several scenarios involving both different numbers of static and mobile users shows that our formulation allows trading off those two objectives in a robust way. 

  • 3873.
    Zou, Zhuo
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Impulse Radio UWB for the Internet-of-Things: A Study on UHF/UWB Hybrid Solution2011Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    This dissertation investigates Ultra-Wideband (UWB) techniques for the next generation Radio Frequency Identification (RFID) towards the Internet-of-Things (IoT). In particular, an ultra-high frequency (UHF) wireless-powered UWB radio (UHF/UWB hybrid) with asymmetric links is explored from system architecture to circuit implementation.

    Context-aware, location-aware, and energy-aware computing for the IoT demands future micro-devices (e.g., RFID tags) with capabilities of sensing, processing, communication, and positioning, which can be integrated into everyday objects including paper documents, as well as food and pharmaceutical packages. To this end, reliable-operating and maintenance-free wireless networks with low-power and low-cost radio transceivers are essential. In this context, state-of-the-art passive RFID technologies provide limited data rate and positioning accuracy, whereas active radios suffer from high complexity and power-hungry transceivers. Impulse Radio UWB (IR-UWB) exhibits significant advantages that are expected to overcome these limitations. Wideband signals offer robust communications and high-precision positioning; duty-cycled operations allow link scalability; and baseband-like architecture facilitates extremely simple and low-power transmitters. However, the implementation of the IR-UWB receiver is still power-hungry and complex, and thus is unacceptable for self-powered or passive tags.

    To cope with μW level power budget in wireless-powered systems, this dissertation proposes an UHF/UWB hybrid radio architecture with asymmetric links. It combines the passive UHF RFID and the IR-UWB transmitter. In the downlink (reader-tag), the tag is powered and controlled by UHF signals as conventional passive UHF tags, whereas it uses an IR-UWB transmitter to send data for a short time at a high rate in the uplink (tag-reader). Such an innovative architecture takes advantage of UWB transmissions, while the tag avoids the complex UWB receiver by shifting the burden to the reader. A wireless-powered tag providing -18.5 dBm sensitivity UHF downlink and 10 Mb/s UWB uplink is implemented in 180 nm CMOS. At the reader side, a non-coherent energy detection IR-UWB receiver is designed to pair the tag. The receiver is featured by high energy-efficiency and flexibility that supports multi-mode operations. A novel synchronization scheme based on the energy offset is suggested. It allows fast synchronization between the reader and tags, without increasing the hardware complexity. Time-of-Arrival (TOA) estimation schemes are analyzed and developed for the reader, which enables tag localization. The receiver prototype is fabricated in 90 nm CMOS with 16.3 mW power consumption and -79 dBm sensitivity at 10 Mb/s data rate. The system concept is verified by the link measurement between the tag and the reader. Compared with current passive UHF RFID systems, the UHF/UWB hybrid solution provides an order of magnitude improvement in terms of the data rate and positioning accuracy brought by the IR-UWB uplink.

  • 3874.
    Åberg, Christian
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Automated Deployment of Customer-Premises Equipment2016Självständigt arbete på grundnivå (yrkesexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Zero touch deployment tools perform installation and configuration of computer networking devices without human interaction. Modern zero touch deployment tools generally lack support for routers and are platform dependent. This forces Internet Service Providers to rely on manual node deployment methods when deploying Customer-Premise Equipment which is time consuming and error prone. This thesis investigates how the process of deploying Customer-Premises Equipment can be automated and optimized. State-of-the-art is discussed to point out requirements and possible improvements. Based on that, a tool is implemented performing deployment of Customer-Premises Equipment while minimizing manual intervention. As Internet Service Providers typically work with equipment from various vendors, multivendor support is implemented. This thesis studies common methods for initial Customer-Premises Equipment configuration. Request for Comments and Technical manuals are consulted regarding network protocols, zero touch deployment tools and router operating systems.

  • 3875.
    Åberg, Ludvig
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Parallelism within queue application2017Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The aim of this thesis was to modify an existing order queue application which was unable to execute orders in a queue in parallel which in turn could lead to a bad user experience due to the increased queue delay. The thesis proposes two queue structures to allow parallel execution within a queue. One of the two is selected for implemented in the modified order queue application. The implementation was carried out in Java EE and used different types of frameworks such as JPQL. Some parts of the order queue application had to be modified to be able to handle the new queue structure. New attributes that defines dependencies of the orders are used to find a suitable parent for each order in the queue. The queue structure was visualized making it possible to see the execution in real time, and a test server was implemented to test the queue structure. This resulted in a working prototype able to handle dependencies and parallel orders. The modified order queue application was performance measured and compared to the original order queue application. The measurement showed that the modified order queue application performed better than the original order queue application in terms of execution time below a certain number of queues. Future work includes optimizing the methods and queries in the implementation to increase the performance and to handle parallelism within the orders.

  • 3876.
    Åhlander, Gustav
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    William, Andersson
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    En bild säger mer än tusen ord: En fallstudie om hur verksamhetsmodellering kan användas som stöd vid kravarbete i en outsourcad miljö.2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This bachelor thesis deals with the subject of business process modelling in an outsourced environment. The communication process between two parties that are on either side of the globe can be problematic and affect the quality of the system requirements. The background of this study is that there is a lack of communication between these parties, which will eventuate in poor results.

     

    The purpose of this study is to find out whether it is possible to make use of business process modelling in an outsourced environment in order to increase the quality of system requirements by bringing the two parties closer together with help of a common language. A qualitative approach was used to interview relevant informants at Länsförsäkringar AB and its business units Länsförsäkringar Liv and Länsförsäkringar Bank.

     

    We have identified that it is not necessarily the system requirements that have a poor quality but how these system conveyed to the external supplier. Based on our data collection, we realized the great benefits of business process modelling as a means of communication in the system development, which can be a huge advantage in an outsourced environment. According to our study, it is certain that a business process modelling with mapped processes and flow charts can support communication as a common language because of the creation of processes and images instead of text.

  • 3877.
    Åhlander, Niclas
    et al.
    Högskolan i Halmstad.
    Aldaamsah, Saed
    Högskolan i Halmstad.
    Inhämtning & analys av Big Data med fokus på sociala medier2015Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    I en värld som till allt större del använder sig av sociala medier skapas och synliggörs information om användarna som tidigare inte varit enkel att i stor mängd analysera. I det här arbetet visas processen för att skapa ett automatiserat insamlingssätt av specifik data från sociala medier. Insamlad data analyseras därefter med noggrant utformade algoritmer och slutligen demonstreras processens nytta i sin helhet. Datainhämtningen från sociala medier automatiserades med hjälp av en mängd kombinerade metoder. Därefter kunde analysen av det inhämtade datat utföras med hjälp av specifika algoritmer som redovisades i det här arbetet. Tillsammans resulterade metoderna i att vissa mönster framkom i datan, vilket avslöjade en mängd olika typer av information kring analysens utvalda individer.

  • 3878.
    Åhman, Stefan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Robust Issue Tracking Application (RITA): Developing an issue tracker using modern web technologies2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Issue tracking is one of the vital parts in maintaining computer  systems.  It is utilized in anything from small independent companies to large enterprises. The tracking does not just provide developers and other personnel with crucial information regarding their systems current state, but additionally stores useful documentation if any error reoccurs in the future. However, if the tracking issue would be deficient in some way, the complete process of developing or maintaining a system could affected negatively in great extent. This thesis work has looked into a scenario where the tool has been to slow, overly complicated and obsolete. It has made a large negative impact on the work force that uses the tool and made tracking issue to a discouragement. The thesis work has thence investigated features of the existing tool, suggested a better solution to use based upon these findings, followed by the development of a web application. When the application was finished, its usability was tested by the intended staff and performance tests were conducted. The test results showed that the application had been implemented successfully in many aspects. Unfortunately, due to deficient technical choices, the project did struggle with implementing all features as expected. The thesis work did consequently learn the hard way the importance of a choosing development techniques very thoroughly.

     

  • 3879.
    Åkerberg, Johan
    et al.
    ABB AB, Corporate Research, Sweden.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Exploring Network Security in PROFIsafe2009Ingår i: Lecture Notes In Computer Science: Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security, Heidelberg: Springer-Verlag , 2009, s. 67-80Konferensbidrag (Refereegranskat)
    Abstract [en]

    Safety critical systems are used to reduce the probability of failure that could cause danger to person, equipment or environment. The increasing level of vertical and horizontal integration increases the security risks in automation. Since the risk of security attacks can not be treated as negligible anymore, there is a need to investigate possible security attacks on safety critical communication.

    In this paper we show that it is possible to attack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept defense-in-depth.

  • 3880.
    Åkerberg, Johan
    et al.
    ABB AB Corporate Research, Västerås, Sweden.
    Gidlund, Mikael
    ABB AB Corporate Research, Västerås, Sweden.
    Lennvall, Tomas
    ABB AB Corporate Research, Västerås, Sweden.
    Landernäs, Krister
    ABB AB Corporate Research, Västerås, Sweden.
    Björkman, Mats
    School of Innovation, Design, and Technology, Mälardalen University, Västerås, Sweden.
    Design Challenges and Objectives in Industrial Wireless Sensor Networks2013Ingår i: Industrial wireless sensor networks: applications, protocols, and standards / [ed] V. Çağrı Güngör and Gerhard P. Hancke, Boca Raton: Taylor & Francis , 2013, s. 79-100Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 3881.
    Åkerberg, Johan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Gidlund, Mikael
    Lennvall, Tomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Landernäs, Krister
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Design Challenges and Objectives in Industrial Wireless Sensor Networks2013Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards / [ed] V. Çağrı Güngör, CRC Press, 2013Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 3882.
    Åkerberg, Mathias
    et al.
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Tibbling, Anders
    KTH, Skolan för teknik och hälsa (STH), Medicinsk teknik, Data- och elektroteknik.
    Säker identitetshantering på internet: Att minimera bedrägerier och öka konsumentens säkerhet och inflytande vid e-handel2015Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Risken att en obehörig part kan komma över och använda en enskild konsuments identitets-handlingar är stor, samtidigt som individens möjlighet att kontrollera hur och när dess iden-titet används är liten. Problemformuleringen som skulle besvaras var hur identitetsstölder och bedrägerier på internet kunde minimeras samtidigt som konsumenten får ett ökat infly-tande över hanteringen av sin identitet.

    Målsättningen var att centralisera och skapa ett gemensamt förhållningssätt för identitets-hantering på internet till förmån för konsumenterna, och på så vis minimera spridning av egna lösningar för identitetshantering hos enskilda aktörer.

    Lösningen resulterade i en systemmodell med förutsättningar för att autentisera konsumen-ten, hantera filter för hur enskilda identitetshandlingar får användas på internet, samt för att möjliggöra kommunikation med konsumenten genom att skicka notifikationer om händelser som uppstått kopplat till en specifik identitet. Genom en användarportal skulle konsumen-ten kunna administrera sina filter för olika e-tjänster och webbutiker samt få en överblick över specifika händelser som inträffat.

    En prototyp togs fram för att demonstrera systemmodellens grundläggande funktionalitet i praktiken. Denna kom att innefatta funktionalitet för att autentisera konsumenten, skicka notifikationer om händelser och kontrollera existerande filter för en specifik identitet. Pro-totypen kom att bestå av ett förenklat system enligt den modell som tagits fram, med ett tillhörande API samt två modeller motsvarande en webbutik och en betalningsväxel som skulle nyttja funktionaliteten genom att anropa systemets API.

    Lösningen utvärderades baserat på det uppnådda resultatet från intervjuer med experter inom problemområdet och genomförd funktionskontroll av den framtagna prototypen. Ge-nom utvärderingen kunde slutsatsen dras att identitetsbaserade bedrägerier med stor sanno-likhet skulle sjunka drastiskt och att den enskilde konsumentens inflytande och medveten-het skulle stärkas. Den största bidragande faktorn till slutsatsen ansågs främst vara det kon-sistenta och standardiserade sätt som skapats för autentisering av och kommunikation med konsumenten. På så vis skulle aktörerna själva avsätta delar av den funktionalitet och de säkerhetsrisker som ansågs finnas i anslutning till hanteringen av identiteter på internet.

    Svårigheterna med den föreslagna lösningen ansågs vara att få konsumenter, webbutiker och betalningsväxlar att ansluta sig till ett centralt system då man av affärsmässiga skäl väljer att behålla särskilda delar internt.

  • 3883.
    Åkerblom, Jacob
    Mälardalens högskola, Akademin för innovation, design och teknik.
    UTVÄRDERING AV UTVALDA SD-WAN PRODUKTER2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna jämförelsestudie ämnar att undersöka marknadens leverantörer av nätverksutrustning de- finierade som Software Defined Wide Area Networks(SD-WAN). SD-WAN är en innovativ teknik som applicerar virtualisering och Software defined networking koncept i Wide Area Networks (WAN) för att skapa kostnadseffektiva nätverk. Studien har utförts på företaget Curitiba som idag arbetar med konsulttjänster inom utvalda WAN-optimering och SD-WAN-produkter. Arbetets syfte är att utvärdera SD-WAN-lösningar och specificera i vilken typ av företagsnätverk lösningen bäst appliceras. Undersökningen börjar med en utredning av dagens organisationsnätverk för att kunna utföra en jämförelse mot SD-WAN. Därefter utvärderas fem leverantörer av nätverksutrustning definierade som SD-WAN, dessa är: Cisco IWAN, CloudGenix, Riverbed Steelconnect, Talari och Viptela. Produkter från Viptela utvärderas i ett test som undersöker komplexiteten i konfiguration av produkten. Utöver SD-WAN jämförelsen undersöks dagens state of practice och vilka fördelar samt nackdelar denna har över SD-WAN. Cisco IWAN är en sammanslagning av Ciscos tidigare funktioner som tillammans bildar en komplett SD-WAN-lösning, för att uppnå detta behöver produkterna kompletteras med programvarulicenser. CloudGenix är en nystartad nätverksleverantör som erbjuder en SD-WAN-produkt som liknar många andra aktörer men utmärker sig med avancerad applikationsidentifikation. Riverbed SteelConnect är intressant för organisationer som söker en simplifierad helhetslösning med ett centraliserat gränssnitt. Talari var en av de första SDWAN-leverantörerna och fokuserar på applikationsprestanda och pålitlighet men saknar några av funktionerna som de andra aktörerna erbjuder. Viptela erbjuder en simplifierad SD-WAN-lösning med hög skalbarhet. SD-WAN som teknik har många spännande funktioner, organisationer som planerar att investera i en uppgradering av WAN-infrastruktur bör undersöka SD-WAN alternativ.

  • 3884.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Fredriksson, Johan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Sweden.
    Möller, Anders
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Uppsala University, Sweden.
    Tivoli, Massimo
    University of L'Aquila, Italy.
    The SAVE approach to component-based development of vehicular systems2007Ingår i: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 80, nr 5, s. 655-667Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The component-based strategy aims at managing complexity, shortening time-to-market, and reducing maintenance requirements by building systems with existing components. The full potential of this strategy has not yet been demonstrated for embedded software, mainly because of specific requirements in the domain, e.g., those related to timing, dependability, and resource consumption. We present SaveCCT - a component technology intended for vehicular systems, show the applicability of SaveCCT in the engineering process, and demonstrate its suitability for vehicular systems in an industrial case-study. Our experiments indicate that SaveCCT provides appropriate expressiveness, resource efficiency, analysis and verification support for component-based development of vehicular software. 

  • 3885.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Uppsala, Sweden.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Sjödin, Mikael
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Nolte, Thomas
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    The SaveCCM Language Reference Manual2007Rapport (Övrigt vetenskapligt)
    Abstract [en]

    This language reference describes the syntax and semantics of SaveCCM, a

    component modeling language for embedded systems designed with vehicle applications and safety concerns in focus. The SaveCCM component model was

    defined within the SAVE project. The SAVE components are influenced mainly

    by the Rubus component technology, with a switch concept similar to that

    in Koala. The semantics is defined by a transformation into timed automata

    with tasks, a formalism that explicitly models timing and real-time task scheduling.

    The purpose of this document is to describe a semantics of the SAVE component modeling language, which can be used to describe timing and functional behavior of components. The model of a system is in some cases an over approximation of the actual system behavior. An implementation of a model can resolve non-determinism e.g. by merging tasks or assigning a scheduling policy (such as static scheduling or fixed priority, preemptive or not) that will resolve

    the non-determinism.

  • 3886.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Möller, Anders
    Hansson, Hans
    Nolin, Mikael
    Towards a Dependable Component Technology for Embedded System ApplicationsManuskript (Övrigt vetenskapligt)
  • 3887.
    Åkerman, Hedwig
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Dataskyddsförordningen GDPR:S påverkan på befintliga informationssystem: En studie om hur befintliga informationsystem påverkas av GDPR, med fokus på Privacy by Design2018Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna studie har undersökt hur den nya dataskyddsförordningen GDPR påverkar befintliga informationssystem. Genom arbetet har ett fokus även legat på metoden Privacy by Design och hur väl den uppfylls.GDPR ersätter Personuppgiftslagen i Sverige och innebär även att Missbruksregeln försvinner. Denna förändring kan tänkas resultera i större utmaningar för många företag, eftersom de krav som ställs är högre än tidigare. GDPR innebär ett utökat skydd för den personliga integriteten och ger EU:s medborgare fler rättigheter gällande hur personuppgifter bör behandlas. I och med att många befintliga informationssystem ej skapats med hänsyn till mycket av det GDPR ställer krav på, finns en trolig riskatt flera befintliga informationssystem blir svåra att uppdatera för att vara i linje med förordningen. Då GDPR även inkluderar krav med relevans till metoden Privacy by Design, är det troligt att företag som bättre uppfyller Privacy by Design även kan vara bättre i linje med GDPR. Från de deltagande respondenterna framgick det att en majoritet av de sju grundläggande principerna inom Privacy by Design uppfylls. Viss avsaknad kunde dock ses beroende på vilken organisation eller informationssystem det gällde. Vad som ansågs mest utmanande med dataskyddsförordningen uttryckte samtliga respondenter var förståelse av innebörd och intention med förordningstexten. Gällande vad som upplevdes som det tekniskt mest utmanande kunde mönster identifieras för ett antal krav. De krav som identifierades som väsentliga för befintliga informationssystem att anpassas efter, samt vilka principer inom Privacy by Designsom bättre uppfylldes, låg sedan i grund till en checklista. Checklistan blirett redskapsom ger en riktning för hur dessa punkter kan bemötas.

  • 3888.
    Åkesson, Anders
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Lewenhagen, Kenneth
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Node.js in Open Source projects on Github: A literature study and exploratory case study2015Självständigt arbete på grundnivå (kandidatexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This study has been performed with an aim to provide an insight into how Node.js is used and the Node.js technology adaptation in the open source community. This research displays the diversity of Node.js and can inspire the reader to further development or continued research.

    Studies into different usages of Node.js have been missing in academic research and therefore this study gives a new, important insight into this technology.

    The authors used the exploratory case study methodology. For data collection, the authors created a JQuery and HTML script that fetched the desired dataset from Github and that were used as a static base for the study. Based on the usage areas extracted from the literature study, the authors specified different categories of usage. The dataset was manually investigated and placed into the categories, if they were relevant.

    The results show that web applications is by far the most well represented category with over 50% of all usages falling into this category. Network applications and Web servers come in at second and third position with 14% and 13% respectively.

    This study provided further categories and the authors could generate a set of diagrams, showing a trend on how the different usage areas changed from 2010 to 2015.

  • 3889.
    Åkesson, Tobias
    et al.
    Högskolan Kristianstad, Fakulteten för naturvetenskap.
    Horntvedt, Rasmus
    Högskolan Kristianstad, Fakulteten för naturvetenskap.
    Java, Python and Javascript, a comparison2019Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    With the amount of programming languages currently available there is a high risk of confusion anddoubtfulness in aspiring programmers of which to choose. It may be motivating for a beginner tochoose “the perfect language” when starting, to avoid learning multiple languages. This thesiscompares three popular languages on three separate aspects, their syntax, usefulness in differentareas, and performance in terms of speed. Syntax wise the results varied with some aspects beingvery similar across all three languages to completely different in others. In terms of usefulness inspecific areas the languages flexibility allowed them to develop applications in most fields, while beingdominant in different areas. The speed comparison resulted in python being the slowest across alltests, with Java and Javascript (running inside Nodejs) competing for first place.

  • 3890.
    Åklint, Richard
    et al.
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Khan, Muhammad Farhan
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Multidimensional Visualization of News Articles2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Large data sets are difficult to visualize. For a human to find structures and understand the data, good visualization tools are required. In this project a technique will be developed that makes it possible for a user to look at complex data at different scales. This technique is obvious when viewing geographical data where zooming in and out gives a good feeling for the spatial relationships in map data or satellite images. However, for other types of data it is not obvious how much scaling should be done.

    In this project, an experimental application is developed that visualizes data in multiple dimensions from a large news article database. Using this experimental application, the user can select multiple keywords on different axis and then can create a visualization containing news articles with those keywords.

    The user is able to move around the visualization. If the camera is far away from the document icons then they are clustered using red coloured spheres. If the user moves the camera closer to the clusters they will pop up into single document icons. If the camera is very close to the document icons it is possible to read the news articles

  • 3891.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Kato, Shinpei
    Carnegie Mellon University, Department of Electrical and Computer Engineering, United States.
    A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux2011Ingår i: Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011, 2011, s. 380-387Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a Hierarchical Scheduling Framework (HSF) recorder for Linux-based operating systems. The HSF-recorder is a loadable kernel module that is capable of recording tasks and servers without requiring any kernel modifications. Hence, it complies with the reliability and stability requirements in the area of embedded systems where proven versions of Linux are preferred. The recorder is built upon the loadable real-time scheduler framework RESCH (REal-time SCHed- uler). We evaluate our recorder by comparing the overhead of this solu- tion against two other recorders. Also, the tracing accuracy of the HSF- recorder is tested by running a media-processing task together with periodic real-time Linux tasks in combination with servers. We experiment with different task parameters and scheduling strategies and measure the performance of the media-processing task. The tests are recorded with the HSF-recorder, and the Ftrace recorder, in order to show the correctness of the experiments and the HSF-recorder itself.

  • 3892.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Pettersson, Paul
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Modelling, Verification and Synthesis of Two-Tier Hierarchical Fixed-Priority Preemptive Scheduling2011Ingår i: Proceedings - 23rd EUROMICRO Conference on Real-Time Systems (ECRTS'11), 2011, s. 172-181Konferensbidrag (Refereegranskat)
    Abstract [en]

    Hierarchical scheduling has major benefits when it comes to integrating hard real-time applications. One of those benefits is that it gives a clear runtime separation of applications in the time domain. This in turn gives a protection against timing error propagation in between applications. However, these benefits rely on the assumption that the scheduler itself schedules applications correctly according to the scheduling parameters and the chosen scheduling policy. A faulty scheduler can affect all applications in a negative way. Hence, being able to guarantee that the scheduler is correct is of great importance. Therefore, in this paper, we study how properties of hierarchical scheduling can be verified. We model a hierarchically scheduled system using task automata, and we conduct verification with model checking using the Times tool. Further, we generate C-code from the model and we execute the hierarchical scheduler in the Vx Works kernel. The CPU and memory overhead of the modelled scheduler is compared against an equivalent manually coded two-level hierarchical scheduler. We show that the worst-case memory consumption is similar and that there is a considerable difference in CPU overhead.

  • 3893.
    Åstrand, Elaine
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. Université Claude Bernard, Lyon, France.
    Wardak, Claire
    Université Claude Bernard, Lyon, France.
    Baraduc, Pierre
    Université Claude Bernard, Lyon, France.
    Ben Hamed, Suliann
    Université Claude Bernard, Lyon, France.
    Direct Two-Dimensional Access to the Spatial Location of Covert Attention in Macaque Prefrontal Cortex.2016Ingår i: Current Biology, ISSN 0960-9822, E-ISSN 1879-0445, Vol. 26, nr 13, s. 1699-1704Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Direct access to motor cortical information now enables tetraplegic patients to precisely control neuroprostheses and recover some autonomy. Incontrast, explicit access to higher cortical cognitive functions, such as covert attention, has been missing. Indeed, this cognitive information, known only to the subject, can solely be inferred by an observer from the subject's overt behavior. Here, we present direct two-dimensional real-time access to where monkeys are covertly paying attention, using machine-learning decoding methods applied to their ongoing prefrontal cortical activity. Decoded attention was highly predictive of overt behavior in a cued target-detection task. Indeed, monkeys had a higher probability of detecting a visual stimulus as the distance between decoded attention and stimulus location decreased. This was true whether the visual stimulus was presented at the cued target location or at another distractor location. In error trials, in which the animals failed to detect the cued target stimulus, both the locations of attention and visual cue were misencoded. This misencoding coincided with a specific state of the prefrontal cortical population in which the shared variability between its different neurons (or noise correlations) was high, even before trial onset. This observation strongly suggests a functional link between high noise-correlation states and attentional failure. Overall, this real-time access to the attentional spotlight, as well as the identification of a neural signature of attentional lapses, open new perspectives both to the study of the neural bases of attention and to the remediation or enhancement of the attentional function using neurofeedback.

  • 3894.
    Åström Åberg, Fabian
    Linköpings universitet, Institutionen för datavetenskap.
    Dry-run med hjälp av union mount2015Självständigt arbete på grundnivå (kandidatexamen), 10,5 poäng / 16 hpStudentuppsats (Examensarbete)
  • 3895.
    Çürüklü, Baran
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lansner, Anders
    Configuration-specific facilitation phenomena explained by layer 2/3 summation pools in V12009Konferensbidrag (Refereegranskat)
  • 3896.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Düring, Morgan
    Millberg, Mikael
    Evaluating the Efficacy of utilizing a Protocol Grammar for Modeling of a Processor Architecture: A Case Study2002Ingår i: Proceedings of NORCHIP, 2002, s. 309-315Konferensbidrag (Refereegranskat)
  • 3897.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Eles, Petru
    Linköpings Tekniska Högskola.
    Hemani, Ahmed
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Kuchcinski, Krzystof
    Linköpings Tekniska Högskola.
    Peng, Zebo
    Linköpings Tekniska Högskola.
    Specifying Local Timing Constraints in VHDL for HLS of Digital Systems1995Ingår i: Proceedings of the 6th Swedish Workshop on Copmuter System Architecture, 1995Konferensbidrag (Refereegranskat)
  • 3898.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Ellervee, Johnny
    Revolver: A high-performance MIMD architecture for collision free computing1998Konferensbidrag (Refereegranskat)
  • 3899.
    Öberg, Johnny
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Ellervee, Peeter
    Kumar, Anshul
    Hemani, Ahmed
    Comparing Conventional HLS with Grammar-Based Hardware Synthesis: A Case Study1997Konferensbidrag (Refereegranskat)
  • 3900.
    Öberg, Johnny
    et al.
    KTH, Tidigare Institutioner, Elektroniksystemkonstruktion.
    Ellervee, Peeter
    Mokhtari, Mehran
    Jantsch, Axel
    SpaceBall-1G: A 32-bit 1 GIPS Peak Performance MIMD CPU Targeted for GaAs1995Rapport (Övrigt vetenskapligt)
7576777879 3851 - 3900 av 3909
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf