Ändra sökning
Avgränsa sökresultatet
925926927928929930931 46351 - 46400 av 49378
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 46351.
    Waterworth, John
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Waterworth, Eva Lindh
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Relaxation Island: A Virtual Tropical Paradise. Interactive Experience2004Ingår i: Proceedings of BCS HCI2004: Designing for Life, Leeds, UK, September 2004., 2004Konferensbidrag (Refereegranskat)
    Abstract [en]

    We present Relaxation Island, one of several Mood Devices we have developed with our partners as part of the EMMA (Engaging Media for Mental Health Applications) project. Mood Devices are interactive digital media and environments designed to alter the inter-actor’s psychological state. Relaxation Island was designed to support established relaxation techniques, as part of interventions to assist individuals cope with specific anxieties such as examination stress, and also simply as a virtual place where anyone can go to relax. Attendees of this interactive experience will have the opportunity to relax on the island, navigating around the virtual space using a novel wireless “seashell” device

  • 46352.
    Watson, Daniel
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Implementation och utvärdering av Mimer SQL Real-Time på INtime RTOS.2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Virtualisering är en ökande trend där man istället för att ha en separat hårdvaruplattform förvarje system, så exekverar flera virtuella system på en och samma maskin. Dessa system kanha olika egenskaper och krav, exempelvis kan ett delsystem med hårda realtidskravinteragera med ett annat delsystem utan realtidskrav. Ett exempel på detta är ett industrielltstyrsystem där ena delsystemet samlar in tidskritisk systemdata i realtid medan det andradelsystemet utför icke tidskritiska åtgärder som är baserad på denna information, som tillexempel att grafiskt åskådliggöra systemstatus.Att dela upp system mellan olika virtuella delsystem ställer höga krav på delning av data. Ettsätt att dela data på ett säkert och strukturerat sätt är att använda sig av en realtidsdatabas.I detta exjobb har vi undersökt möjligheten att anpassa den kommersiella realtidsdatabasenMimer SQL Real-Time Edition för att användas i det virtualiserbara realtidssystemet INtime.Arbetet omfattar undersökningar av olika modeller för delat minne samt synkroniseringmellan systemen. Resultaten av dessa undersökningar har inkorporerats i en version avMimer SQL Real-Time Edition anpassad för virtualisering i INtime. Denna implementationhar följts upp av funktions- och prestandatester som visar att implementationen fungerarbåde funktionellt och prestandamässigt väl samt med bibehållen predikterbarhet jämförtmed tidigare versioner av Mimer SQL Real-Time Edition.

  • 46353. Watteyne, Thomas
    et al.
    Handziski, Vlado
    Vilajosana, Xavier
    Duquennoy, Simon
    RISE., Swedish ICT, SICS, Computer Systems Laboratory.
    Hamn, Oliver
    Bacceli, Emmanuel
    Wolisz, Adam
    Industrial Wireless IP-based Cyber Physical Systems2016Ingår i: Proceedings of the IEEE, special issue on Cyber-Physical Systems, IEEE , 2016, 15, Vol. 104, s. 1025-1038Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Industrial control systems have traditionally been built around dedicated wired solutions. The requirements of flexibility, mobility, and cost have created a strong push toward wireless solutions, preferably solutions requiring low power. Simultaneously, the increased need for interoperability and integration with the wider Internet made a transition to IP-based communication unavoidable. Following these trends, we survey 6TiSCH, the emerging family of standards for IP-based industrial communication over low-power and lossy networks. We describe the state of the standardization work, the major issues being discussed, and open questions recently identified. Based on extensive first-hand experience, we discuss challenges in implementation of this new wave of standards. Lessons learned are highlighted from four popular open-source implementations of these standards: OpenWSN, Contiki, RIOT, and TinyOS. We outline major requirements, present insights from early interoperability testing and performance evaluations, and provide guidelines for chip manufacturers and implementers.

  • 46354.
    Wazid, Mohammad
    et al.
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad.
    Das, Ashok Kumar
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad.
    Khan, Muhammad Khurram
    Center of Excellence in Information Assurance, King Saud University, Riyadh.
    Al-Dhawailie Al-Ghaiheb, Abdulatif
    Clinical Pharmacy Department, College of Pharmacy, King Saud University, Riyad.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment2017Ingår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 4, nr 5, s. 1634-1646Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anti-counterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation

  • 46355.
    Wazid, Mohammad
    et al.
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad India 500032 .
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad India 500032 .
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, Patiala, Punjab India .
    Conti, Mauro
    Department of Mathematics, University of Padua, Padua, Padua Italy .
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment2017Ingår i: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In healthcare applications, after mutual authentication, a user (for example, doctor) can access the health data from the IMDs implanted in a patient's body. However, in this kind of communication environment, there are always security and privacy issues such as leakage of health data and malfunctioning of IMDs by an unauthorized access.

  • 46356. Wearing, Thomas
    et al.
    Dragoni, Nicola
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study2016Ingår i: Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things (EHIoT 2016), 2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    Automated systems for monitoring elderly people in their home are becoming more and more common. Indeed, an increasing number of home sensor networks for healthcare can be found in the recent literature, indicating a clear research direction in smart homes for health-care. Although the huge amount of sensitive data these systems deal with and expose to the external world, security and privacy issues are surpris-ingly not taken into consideration. The aim of this paper is to raise some key security and privacy issues that home health monitor systems should face with. The analysis is based on a real world monitoring sensor network for healthcare built in the context of the eCare@Home project.

  • 46357. Weatherspoon, Hakim
    et al.
    Miranda, Hugo
    Iwanicki, Konrad
    Ghodsi, Ali
    RISE., Swedish ICT, SICS, Computer Systems Laboratory.
    Busnel, Yann
    GOSSIP: Gossiping Over Storage Systems Is Practical2007Ingår i: ACM SIGOPS Operating Systems Review, Vol. 41, s. 75-81Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Gossip-based mechanisms are touted for their simplicity, limited resource usage, robustness to failures, and tunable system behavior. These qualities make gossiping an ideal mechanism for storage systems that are responsible for maintaining and updating data in a mist of failures and limited resources (e.g., intermittent network connectivity, limited bandwidth, constrained communication range, or limited battery power). We focus on persistent storage systems that, unlike mere caches, are responsible for both the durability and the consistency of data. Examples of such systems may be encountered in many different environments, in particular: wide-area networks (constrained by limited bandwidth), wireless sensor networks (characterized by limited resources), and mobile ad hoc networks (suffering from intermittent connectivity). In this paper, we demonstrate the qualities of gossiping in these three respective environments.

  • 46358. Webb, Nick
    et al.
    Benyon, David
    Bradley, Ray
    Hansen, Preben
    RISE, Swedish ICT, SICS. Userware.
    Mival, Oli
    Wizard of Oz Experiments for a Companion Dialogue System: Eliciting Companionable Conversation2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    Working within the EU funded COMPANIONS program, we report recent work with a Wizard of Oz (WoZ) dialogue collection system.COMPANION systems require complex models of dialogue, and new models of evaluation. Wizard of Oz dialogues give us a mechanism to explore both of these research issues. We describe a new corpus of companionable dialogues collected using our WoZ system.

  • 46359. Webb, Nick
    et al.
    Benyon, David
    Hansen, Preben
    RISE., Swedish ICT, SICS.
    Mival, Oli
    Evaluating Human-Machine Conversation for Appropriateness2010Konferensbidrag (Refereegranskat)
  • 46360.
    Webber, Bonnie
    et al.
    University of Edinburgh.
    Carpuat, MarineUniversity of Maryland.Popescu-Belis, AndreiIdiap Research Institute.Hardmeier, ChristianUppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik och filologi.
    Proceedings of the Second Workshop on Discourse in Machine Translation2015Proceedings (redaktörskap) (Refereegranskat)
  • 46361. Webber, Bonnie
    et al.
    Popescu-Belis, AndreiMarkert, KatjaTiedemann, JörgUppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik och filologi.
    Proceedings of the Workshop on Discourse in Machine Translation2013Proceedings (redaktörskap) (Övrigt vetenskapligt)
  • 46362. Weber, Anton
    et al.
    Tran, Kim-Anh
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Jimborean, Alexandra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Decoupled Access-Execute on ARM big.LITTLE2017Ingår i: Proc. 5th Workshop on High Performance Energy Efficient Embedded Systems, 2017Konferensbidrag (Refereegranskat)
  • 46363.
    Weber, Katharina
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Intranätet -Axet: Kartläggning av LRF:s användning av intranätet som verktyg för internkommunikationen.2012Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 46364. Weber, Stefan G.
    et al.
    Martucci, Leonardo
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Ries, Sebastian
    Mühlhäuser, Max
    Technische Universität Darmstadt.
    Towards trustworthy identity and access management for the future internet2010Ingår i: Proceedings of the 4th International Workshop on Trustworthy Internet ofPeople, Things & Services (Trustworthy IoPTS 2010), 2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    The Future Internet, in its different variants, promises a global connectivity of people, things and services.However, in order to develop its full potential and to achieve an accepted, seamless integration of Internet use into daily lives, severe security issues have to be addressed. In this paper, we propose to establish security and trustworthiness by means of an integrated identity and access management. Especially, we sketch the foundations of a novel identity and access management approach that is tailored for the Future Internet. We provide mechanisms for flexible modeling and description of digital user identities with support to transaction-based privacy protection, access to personal data, flexible third party accountability and end-to-end secure communication. The mechanisms are tailored for the use on a trusted personaldevice called Minimal Entity, which provides a trustworthy gateway to benefit from the offerings of the Future Internet.

  • 46365.
    Weber, Tjark
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Scrambling and descrambling SMT-LIB benchmarks2016Ingår i: Satisfiability Modulo Theories: SMT 2016, RWTH Aachen University , 2016, s. 31-40Konferensbidrag (Refereegranskat)
  • 46366.
    Weber, Tjark
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Cok, David R.
    Deharbe, David
    The 2014 SMT Competition2016Ingår i: Journal on Satisfiability, Boolean Modeling and Computation, ISSN 1875-5011, E-ISSN 1574-0617Artikel i tidskrift (Refereegranskat)
  • 46367.
    Weber, Tjark
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Eriksson, Lars-Henrik
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Parrow, Joachim
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Borgström, Johannes
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Gutkovas, Ramūnas
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Modal Logics for Nominal Transition Systems2016Ingår i: Archive of Formal Proofs, ISSN 2150-914xArtikel i tidskrift (Refereegranskat)
  • 46368.
    Wecksten, Mattias
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    RealLife - en tekniköversikt2008Rapport (Övrigt vetenskapligt)
    Abstract [sv]

    RealLife är en sammankopplink mellan användarens plattform och tjänsteleverantörer via en central databas. Tanken är att en individidentifierare, UBI passport, ska vara kärnan i systemet som möjliggör att flytta innehåll från plattform till plattform. Genom att ta kontroll över den databas som samlar allt material och alla tjänster får man möjlighet att sälja extremfokuserad reklam. All den teknik som krävs för att genomföra projektet RealLife finns tillgänglig i någon form redan idag. Avgörande blir om man lyckas att göra så att användaren känner någon nytta utöver vad man skulle ha fått från en traditionell söktjänst. Detta kräver articifiell intelligens utöver vad som är tillgängligt idag.

  • 46369.
    Wecksten, Mattias
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Resource budgeting as a tool for reduced development cost for embedded real-time computer systems2004Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Wouldn’t it be great if there were a systematic method for derivation of non functional constraints available at design time that made it possible to verify design and make implementa tion a much clearer task? This kind of methods are needed since systems of increasing com plexity has to be developed, and the cost for failing has proven to bee too high. The problem is how to derive the design time constraints into implementation time constraints, maintaining the traceability for the individual constraints, and early on get indications whether a project is about to fail or not.A method for implementation time constraint derivation has been developed and is presented in this thesis. Along with the basic method, several extensions are proposed. Evaluations of the practical usefulness of the method and the method’s scalability have been done. To prove the method’s importance in real development projects, a method for evaluation of the usability of this kind of methods has also been developed. The evaluation of the practicality shows that it is possible to find close to optimal solutions (within percent) in short time (within minutes). The evaluation of the scalability shows that the run time for finding implementable solutions scales polynomial with the size of the task graph. The evaluation of the usability shows that using the proposed method always leads to lower development cost than using an ad hoc method, in the case that the implementation is about to fail.

  • 46370.
    Wecksten, Mattias
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Är du beredd? – för nu snor någon dina företagshemligheter!2008Ingår i: Hallands Affärer, nr 3, s. 1-Artikel i tidskrift (Övrig (populärvetenskap, debatt, mm))
    Abstract [sv]

    Populärvetenskapligt brandtal om nyttan och behovet av välutbildade nätverkstekniker med perspektiv på såväl teknik som juridik.

  • 46371.
    Weckstén, Mattias
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Vasell, J.
    Generic Systems Sweden AB.
    Derivation of implementation constraints - implementation simulation and treatment of multiple design choices2005Ingår i: Proceedings: 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005, 16-20 June 2005, Shanghai, China, Los Alamitos, Calif.: IEEE Computer Society, 2005, s. 459-466Konferensbidrag (Refereegranskat)
    Abstract [en]

    The industrial use of ad hoc implementation methods for non-functional constrained tasks has resulted in unnecessary expensive projects. In some cases, ad hoc methods result in overly many iterations to be made and in some severe cases, total project breakdown. To be able to solve these problems a method has been developed to derive end-to-end non-functional constraints, such as timing requirements, to task-level constraints and to promote this information to the implementation phase of the project. For a tool, as the one described above, to be really useful it is important to be able to show that there is a potential cost reduction to be made. To be able to show that a certain implementation method costs less in work hours than to use an ad hoc implementation method, a model for implementation simulation with support for multiple implementation alternatives has been developed. The experiments show that using the budget based implementation method leads to a significant cost reduction in most cases, compared to the ad hoc method. As far as we know, no similar experiments have been done to compare implementation methods.

  • 46372.
    Weckstén, Mattias
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Vasell, Jonas
    Generic Systems Sweden AB, Stockholm, Sweden.
    Derivation of implementation constraints – implementation simulation and treatment of multiple design choices2007Ingår i: Proc. of the 9th biennial SNART Conference on Real-Time Systems (Real-Time in Sweden – RTiS’07), Västerås, Sweden, Aug. 21-22, 2007, s. 21-28Konferensbidrag (Refereegranskat)
    Abstract [en]

    The industrial use of ad hoc implementation methods for non-functional constrained tasks has resulted in unnecessary expensive projects. In some cases, ad hoc methods result in overly many iterations to be made and in some severe cases, total project breakdown. To be able to solve these problems a method has been developed to derive end-to-end non-functional constraints, such as timing requirements, to task-level constraints and to promote this information to the implementation phase of the project. For a tool, as the one described above, to be really useful it is important to be able to show that there is a potential cost reduction to be made. To be able to show that a certain implementation method costs less in work hours than to use an ad hoc implementation method, a model for implementation simulation with support for multiple implementation alternatives has been developed. The experiments show that using the budget based implementation method leads to a significant cost reduction in most cases, compared to the ad hoc method. As far as we know, no similar experiments has been done to compare implementation methods.

  • 46373.
    Weckstén, Mattias
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Vassell, Jonas
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    A tool for derivation of implementation constraints: – evaluation using implementation simulation2004Ingår i: RTSS 2004 WIP Proceedings, The 25th IEEE International Real-Time Systems Symposium, IEEE , 2004, s. 4-Konferensbidrag (Refereegranskat)
    Abstract [en]

    The industrial use of ad hoc implementation methods for non-functional constrained tasks has sometimes resulted in unnecessary expensive projects. In some cases, ad hoc methods result in overly many iterations to be made and in some severe cases, total project breakdown. To be able to solve these problems a new method has been developed to derive end-to-end non-functional constraints, such as performance or resource utilization requirements, to task-level constraints and to promote this information to the implementation phase of the project. For a tool to be really useful it is important to be able to show the usability and potential cost reduction. To be able to show that a certain implementation method costs less in work hours than to use an ad hoc implementation method, a model for implementation simulation has been developed. As far as we know, no similar experiments has been done to compare implementation methods.

  • 46374.
    Wedberg, Magnus
    Linköpings universitet, Institutionen för systemteknik, Datorseende.
    Detecting Rails in Images from a Train-Mounted Thermal Camera Using a Convolutional Neural Network2017Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Now and then train accidents occur. Collisions between trains and objects such as animals, humans, cars, and fallen trees can result in casualties, severe damage on the train, and delays in the train traffic. Thus, train collisions are a considerable problem with consequences affecting society substantially.

    The company Termisk Systemteknik AB has on commission by Rindi Solutions AB investigated the possibility to detect anomalies on the railway using a trainmounted thermal imaging camera. Rails are also detected in order to determine if an anomaly is on the rail or not. However, the rail detection method does not work satisfactory at long range.

    The purpose of this master’s thesis is to improve the previous rail detector at long range by using machine learning, and in particular deep learning and a convolutional neural network. Of interest is also to investigate if there are any advantages using cross-modal transfer learning.

    A labelled dataset for training and testing was produced manually. Also, a loss function tailored to the particular problem at hand was constructed. The loss function was used both for improving the system during training and evaluate the system’s performance during testing. Finally, eight different approaches were evaluated, each one resulting in a different rail detector.

    Several of the rail detectors, and in particular all the rail detectors using crossmodal transfer learning, perform better than the previous rail detector. Thus, the new rail detectors show great potential to the rail detection problem.

  • 46375.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    A Minor Grammar Checking Test for Swedish Using the Fragment Analysis Approach in CORRIE1999Ingår i: Working Papers in Computational Linguistics & Language Engineering;11, ISSN 1401-923X, nr 11, s. 26-Artikel i tidskrift (Övrigt vetenskapligt)
  • 46376.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    A Study of Three Commercial Grammar Checkers1999Rapport (Övrigt vetenskapligt)
  • 46377.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    CORRIE-based Grammar Checking1999Rapport (Övrigt vetenskapligt)
  • 46378.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    Error Typology for Automatic Proof-reading Purposes1999Rapport (Övrigt vetenskapligt)
  • 46379.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    Multi-word Expressions for Swedish1999Rapport (Övrigt vetenskapligt)
  • 46380.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    Swedish Phrase Constituent Rules. A Formalism for the Expression of Local Error Rules for Swedish1999Ingår i: Working Papers in Computational Linguistics & Language Engineering;11, ISSN 1401-923X, nr 11, s. 28-Artikel i tidskrift (Övrigt vetenskapligt)
  • 46381.
    Wedbjer Rambell, Olga
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    Three Types of Grammatical Errors in Swedish1999Rapport (Övrigt vetenskapligt)
  • 46382.
    Wedbjer Rambell, Olga
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Språkvetenskapliga fakulteten, Institutionen för lingvistik.
    Dahlqvist, Bengt
    Tjong Kim Sang, Erik
    Hein, Nils
    An Error Database of Swedish1999Rapport (Övrigt vetenskapligt)
  • 46383. Wedekind, D.
    et al.
    Kleyko, D.
    Osipov, E.
    Malberg, H.
    Zaunseder, S.
    Wiklund, Urban
    Umeå universitet, Medicinska fakulteten, Institutionen för strålningsvetenskaper, Radiofysik.
    Sparse Coding of Cardiac Signals for Automated Component Selection after Blind Source Separation2016Ingår i: / [ed] Murray, A, IEEE, 2016, s. 785-788Konferensbidrag (Refereegranskat)
    Abstract [en]

    Wearable sensor technology like textile electrodes provides novel ambulatory health monitoring solutions but most often goes along with low signal quality. Blind Source Separation (BSS) is capable of extracting the Electrocardiogram (ECG) out of heavily distorted multichannel recordings. However, permutation indeterminacy has to be solved, i.e. the automated selection of the desired BSS output. To that end we propose to exploit the sparsity of the ECG modeled as a spike train of successive heartbeats. A binary code derived from a two-item dictionary {peak, no peak} and physiological a-priori information temporally represents every BSS output component. The (best) ECG component is automatically selected based on a modified Hamming distance comparing the components' code with the expected code behavior. Non-standard ECG recordings from ten healthy subjects performing common motions while wearing a sensor garment were subsequently processed in 10 s segments with spatio-temporal BSS. Our sparsity-based selection RCODE achieved 98.1% heart beat detection accuracy (ACC) by selecting a single component each after BSS. Traditional component selection based on higher-order statistics (e.g. skewness) achieved only 67.6% ACC.

  • 46384.
    Wedekind, Daniel
    et al.
    Institute of Biomedical Engineering, TU Dresden, Dresden Germany .
    Kleyko, Denis
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Osipov, Evgeny
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Malberg, Hagen
    Institute of Biomedical Engineering, TU Dresden, Dresden Germany .
    Zaunseder, Sebastian
    Institute of Biomedical Engineering, TU Dresden, Dresden Germany .
    Wiklund, Urban
    Department of Biomedical Engineering and Informatics, Umea Universitet.
    Robust Methods for Automated Selection of Cardiac Signals after Blind Source Separation2018Ingår i: IEEE Transactions on Biomedical Engineering, ISSN 0018-9294, E-ISSN 1558-2531Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Objective: Novel minimum-contact vital signs monitoring techniques like textile or capacitive electrocardiogram (ECG) provide new opportunities for health monitoring. These techniques are sensitive to artifacts and require handling of unstable signal quality. Spatio-temporal Blind Source Separation (BSS) is capable of processing suchlike multichannel signals. However, BSS's permutation indeterminacy requires the selection of the cardiac signal (i.e. the component resembling the electric cardiac activity) after its separation from artifacts. This study evaluates different concepts for solving permutation indeterminacy. Methods: Novel automated component selection routines based on heartbeat detections are compared with standard concepts, as using higher order moments or frequency-domain features, for solving permutation indeterminacy in spatio-temporal BSS. BSS was applied to a textile and a capacitive ECG dataset of healthy subjects performing a motion protocol, and to the MIT-BIH Arrhythmia Database. The performance of the subsequent component selection was evaluated by means of the heartbeat component. Results: The proposed heartbeat-detection-based selection routines significantly outperformed the standard selectors based on Skewness, Kurtosis and frequency-domain features, especially for datasets containing motion artifacts. For arrhythmia data, beat analysis by sparse coding outperformed simple periodicity tests of the detected heartbeats. Conclusions: Component selection routines based on heartbeat detections are capable of reliably selecting cardiac signals after spatio-temporal BSS in case of severe motion artifacts and arrhythmia. Significance: The availability of robust cardiac component selectors for solving permutation indeterminacy facilitates the usage of spatio-temporal BSS to extract cardiac signals in artifact-sensitive minimum-contact vital signs monitoring techniques.

  • 46385.
    Wedekind, Daniel
    et al.
    Institute of Biomedical Engineering, TU Dresden.
    Kleyko, Denis
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Osipov, Evgeny
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Malberg, Hagen
    Institute of Biomedical Engineering, TU Dresden.
    Zaunseder, Sebastian
    Institute of Biomedical Engineering, TU Dresden.
    Wiklund, Urban
    Department of Biomedical Engineering & Informatics, Ume˚a University.
    Sparse Coding of Cardiac Signals for Automated Component Selection after Blind Source Separation2016Ingår i: Computing in cardiology, ISSN 2325-8861, E-ISSN 2325-887X, Vol. 43, s. 785-788, artikel-id 7868860Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Wearable sensor technology like textile electrodes provides novel ambulatory health monitoring solutions but most often goes along with low signal quality. Blind Source Separation (BSS) is capable of extracting the Electrocardiogram (ECG) out of heavily distorted multichannel recordings. However, permutation indeterminacy has to be solved, i.e. the automated selection of the desired BSS output. Accordingly, we exploit the sparsity of the ECG modeled as a spike train of successive heartbeats. A binary code derived from a two-item dictionary fpeak, no peakg and physiological a-priori information temporally represents every BSS output component. The (best) ECG component is automatically selected based on a modified Hamming distance comparing the components’ code with the expected code behavior. Non-standard ECG recordings from ten healthy subjects performing common motions while wearing a sensor garment were subsequently processed in 10 s segments with spatio-temporal BSS. Our sparsity-based selection RCODE achieved 98.1% heart beat detection accuracy (ACC) by selecting a single component each after BSS. Traditional component selection based on higher-order statistics (e.g. skewness) achieved only 67.6% ACC.

  • 46386.
    Wedell, Stefan
    Linköpings universitet, Institutionen för systemteknik.
    Realtidsmodeller av däck och koppling för fordonssimulator2007Självständigt arbete på grundnivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [sv]

    Syftet med detta arbete var att undersöka metoder för modellering och realtidssimulering av fordonskomponenterna koppling och däck. Avsikten skulle sedan vara att implementera utvalda modeller i simulink för användning tillsammans med en befintlig fordonssimulator. Arbetet innehåller en litteraturstudie som ger fysikalisk förståelse för fordonskomponenterna samt vägledning vid valet av modelleringsmetod.

    Utmaningen med kopplingen var att modellera övergången mellan låst och

    slirande tillstånd. Efter utvärdering av olika metoder valdes en metod som använder samma systemstruktur för båda fallen, dvs ett system med två frihetsgrader.

    Däcksmodellen valdes med hänsynen att ett trovärdigt beteende skulle uppnås utan att kräva för mycket beräkningskraft. En metod byggd på fysikaliska resonemang är svår att få verklighetstrogen med begränsad komplexitet. Valet föll därför på metoden Magic Formula som är en metod baserad på experimentella mätningar som är vanligt använd i realtidstillämpningar.

    Ett problem vid modelleringen av både koppling och däck är sista steget i simuleringen innan kopplingen låser sig respektive däcket går från slirande till rullande. Orsaken är att simuleringen görs diskret med fix steglängd och en hög sannolikhet för att övergången mellan tillstånden "missas" och en oscillering uppstår. Problemet löses med hjälp av en prediktering av nästkommande beräkningssteg.

    Med modellerna implementerade och sammankopplade med den övriga fordonsmodellen erhålls en acceptabel körkänsla vid realtidssimulering på en helt vanlig hemdator. Med detta anses syftet med detta arbete vara uppfyllt.

  • 46387.
    Wedenberg, Kim
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi.
    Sjöberg, Alexander
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi.
    Online inference of topics: Implementation of the topic model Latent Dirichlet Allocation using an online variational bayes inference algorithm to sort news articles2014Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The client of the project has problems with complex queries and noisewhen querying their stream of five million news articles per day. Thisresults in much manual work when sorting and pruning the search result of their query. Instead of using direct text matching, the approachof the project was to use a topic model to describe articles in terms oftopics covered and to use this new information to sort the articles.

    An online version of the topic model Latent Dirichlet Allocationwas implemented using online variational Bayes inference to handlestreamed data. Using 100 dimensions, topics such as sports and politics emerged during training on a 1.7 million articles big simulatedstream. These topics were used to sort articles based on context. Theimplementation was found accurate enough to be useful for the client aswell as fast and stable enough to be a feasible solution to the problem.

  • 46388.
    Wedenborn, Andreas
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    A physical robot's effect on vocabulary learning2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna uppsats undersöker påverkan av att ha en fysiks robot närvarande för att inta rollen som lärare eller övningskamrat i språkinlärning. För att undersöka detta utvecklades en applikation som möjliggjorde genomförandet av en övning av glosor framför en dator i tre olika situationer. I en situation var en icke förkroppsligad röst ledare för övningen, i en annan situation var ett animerat ansikte på skärmen ledare för övningen, och i det sista fallet var övningsledaren förflyttad till fysisk form genom ett robothuvud med en 3D-ansiktsmask. Inledningsvis gjordes en användarstudie med en vokabulärövning med 15 deltagare. För att samla mer data för diskussion strukturerades övningen om och genomfördes med 11 nya deltagare. Resultaten från användarstudierna tolkas som att man kan se en ökad motivation för uppgiften när man arbetar med robothuvudet.

  • 46389.
    WEDENBORN, ANDREAS
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Dolt i det öppna2013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely. But it is not without a downside, anyone who manages to see your communication knows that you are hiding something. This is where Linguistic steganography comes in to play. Linguistic steganography is an attempt to solve the problem of suspicion, by concealing hidden messages in plain text. This report attempts to give the reader an insight to three different methods within linguistic steganography, as well as discussing the strengths and weaknesses. These methods are Mimicry, the use of synonyms and grammatical changes. The discussion of these methods leads to a simple implementation of a modern version of Mimicry, applicable to the current daily communication by short messages such as SMS. The discussions also lead to a theoretical way of implementing an automatic way of using synonyms as well as acknowledging the fact the method of grammatical changes is a complex system. The general conclusion is that the area of linguistic steganography needs to be explored further.

  • 46390.
    Wedin, Tommy
    Högskolan i Gävle, Institutionen för matematik, natur- och datavetenskap, Ämnesavdelningen för datavetenskap.
    Fantasy War Game: Spelmotor i PHP2009Självständigt arbete på grundnivå (yrkesexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Fantasy War Game är en spelmotor gjort i PHP med inslag av Java. Själva striden är uppbyggd med objektorienterad programmeringsmetodik. Spelet är ett textbaserat rollspel i high fantasy-miljö. Sidan är ett interaktivt konfliktspel där spelarna kan utveckla sitt gäng, slåss mot monster eller andra spelare.

  • 46391.
    Wedlund, Tommy
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, VITS - Laboratoriet för verksamhetsinriktad systemutveckling.
    Project-Oriented Education - A Teacher Perspective On What It Is And How It Could Be Applied2006Ingår i: Utvecklingskonferensen för högre utbildning 2005,2005, 2006, s. 46-49Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    This paper describes what project-oriented education is and how it could be applied in universities. It focuses on the teachers- perspective on how to plan and implement a project-oriented course, and how it improves the students- skills and learning. The planning is based on the triple constraint model. Implementing the course consists of five project management phases; initiating, planning, executing, monitoring and controlling, and, finally, closing. The students improve their skills in coordination, decision-making, collaboration, and communication, and they learn about the product of the project. Project-oriented education has been applied to undergraduate courses at Linkoping University.

  • 46392.
    Wedlund, Tommy
    et al.
    Linköpings universitet.
    Axelsson, Karin
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Melin, Ulf
    Linköpings universitet.
    Learning outcomes in use: project-oriented education from a teacher’s perspective2009Ingår i: Proceedings of the Information Systems Education Conference 2009, v 26, 2009, s. 1-11Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper describes how a teacher can apply learning outcomes in a syllabus in projectoriented education. We present these learning outcomes in the context of a project-oriented course and give practical examples of how a teacher can apply the examples by coordinating (1) learning outcomes in the syllabus, (2) learning activities in the course, and (3) processes in a project-oriented course. The examples are applied to processes in a project-oriented course, including the students’ individual learning process, project team process, and project process. Involving students early on, at the start of the course, by presenting the learning outcomes and then continuously working with and referring to them gives the students a learning structure. The course starts with learning outcomes building on team experience and knowledge, i.e., the project team process. After that come learning outcomes for the project process, making the project the carrier of new knowledge for the team, and finally learning outcomes ending in the students’ individual learning process, by which the students can deepen their learning, applying their knowledge in new situations and various learning activities. Project-oriented education was used in an undergraduate course at a Swedish university; experiences from this course are discussed and analysed here.

  • 46393.
    Wedlund, Tommy
    et al.
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, VITS - Laboratoriet för verksamhetsinriktad systemutveckling. Linköpings universitet, Filosofiska fakulteten.
    Axelsson, Karin
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, VITS - Laboratoriet för verksamhetsinriktad systemutveckling. Linköpings universitet, Filosofiska fakulteten.
    Melin, Ulf
    Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, VITS - Laboratoriet för verksamhetsinriktad systemutveckling. Linköpings universitet, Filosofiska fakulteten.
    Towards a Model for Learning Outcomes: Experiences from a Project-Oriented Course2010Ingår i: ISECON2010, 2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper describes an overall model that can be used by a teacher when working with learning outcomes. The model is presented in the context of a project-oriented course and contains three stages. It describes how a teacher can: (1) create a learning breakdown structure with learning modules; (2) define learning activities including feedback, assessment, and examination activities for the learning module; and (3) develop a learning chart that visualises how the learning should be accomplished. The description of the three stages can also be applied to general steps when developing a Gantt chart with project management tools. The work starts in a course with analysing the learning outcomes in the syllabus and breaking it down into learning modules. A learning activity list is subsequently created, which identifies attributes that are associated with each learning activity. This list also includes activities for feedback, assessment and examination of each learning module. Finally, work begins to create relationships between the learning outcomes and learning activities on a calendar-based time axis, which leads to the development of a learning chart. The experiences discussed and analysed here are based on project-oriented education in the context of an undergraduate course at a Swedish university.

  • 46394.
    Weegar, Rebecka
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Casillas, Arantza
    Diaz de Ilarraza, Arantza
    Oronoz, Maite
    Pérez, Alicia
    Gojenola, Koldo
    The impact of simple feature engineering in multilingual medical NER2016Ingår i: Proceedings of the Clinical Natural Language Processing Workshop (ClinicalNLP), 2016, artikel-id W16-4201Konferensbidrag (Refereegranskat)
    Abstract [en]

    The goal of this paper is to examine the impact of simple feature engineering mechanisms before applying more sophisticated techniques to the task of medical NER. Sometimes papers using scientifically sound techniques present raw baselines that could be improved adding simple and cheap features. This work focuses on entity recognition for the clinical domain for three languages: English, Swedish and Spanish. The task is tackled using simple features, starting from the window size, capitalization, prefixes, and moving to POS and semantic tags. This work demonstrates that a simple initial step of feature engineering can improve the baseline results significantly. Hence, the contributions of this paper are: first, a short list of guidelines well supported with experimental results on three languages and, second, a detailed description of the relevance of these features for medical NER.

  • 46395.
    Weegar, Rebecka
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Dalianis, Hercules
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Creating a rule based system for text mining of Norwegian breast cancer pathology reports2015Ingår i: LOUHI, Association for Computational Linguistics , 2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    National cancer registries collect cancer related information from multiple sources and make it available for research. Part of this information originates from pathology reports, and in this pre-study the possibil- ity of a system for automatic extraction of information from Norwegian pathology reports is investigated. A set of 40 pathol- ogy reports describing breast cancer tissue samples has been used to develop a rule based system for information extraction. To validate the performance of this system its output has been compared to the data produced by experts doing manual encod- ing of the same pathology reports. On av- erage, a precision of 80%, a recall of 98% and an F-score of 86% has been achieved, showing that such a system is indeed fea- sible.

  • 46396.
    Weegar, Rebecka
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kalle, Åström,
    Lunds Universitet, , .
    Pierre, Nugues,
    Lunds Universitet, , .
    Linking Entities Across Images and Text2015Ingår i: CoNLL, Association for Computational Linguistics , 2015Konferensbidrag (Refereegranskat)
  • 46397.
    Weegar, Rebecka
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap. Karolinska Institutet, Sweden.
    Sundström, Karin
    Brunak, Søren
    Dalianis, Hercules
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Finding Cervical Cancer Symptoms in Swedish Clinical Text using a Machine Learning Approach and NegEx2015Ingår i: AMIA Annual Symposium Proceedings, American Medical Informatics Association , 2015, s. 1296-1305Konferensbidrag (Refereegranskat)
    Abstract [en]

    Detection of early symptoms in cervical cancer is crucial for early treatment and survival. To find symptoms of cervical cancer in clinical text, Named Entity Recognition is needed. In this paper the Clinical Entity Finder, a machine-learning tool trained on annotated clinical text from a Swedish internal medicine emergency unit, is evaluated on cervical cancer records. The Clinical Entity Finder identifies entities of the types body part, finding and disorder and is extended with negation detection using the rule-based tool NegEx, to distinguish between negated and non-negated entities. To measure the performance of the tools on this new domain, two physicians annotated a set of clinical notes from the health records of cervical cancer patients. The inter-annotator agreement for finding, disorder and body part obtained an average F-score of 0.677 and the Clinical Entity Finder extended with NegEx had an average F-score of 0.667.

  • 46398.
    Weegar, Rebecka
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Nygård, Jan F.
    Dalianis, Hercules
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Efficient Encoding of Pathology Reports Using Natural Language Processing2017Ingår i: Proceedings of the International Conference Recent Advances in Natural Language Processing, RANLP 2017 / [ed] Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Ivelina Nikolova, Irina Temnikova, Association for Computational Linguistics, 2017, s. 778-783Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this article we present a system that extracts information from pathology reports. The reports are written in Norwegian and contain free text describing prostate biopsies. Currently, these reports are manually coded for research and statistical purposes by trained experts at the Cancer Registry of Norway where the coders extract values for a set of predefined fields that are specific for prostate cancer. The presented system is rule based and achieves an average F-score of 0.91 for the fields Gleason grade, Gleason score, the number of biopsies that contain tumor tissue, and the orientation of the biopsies. The system also identifies reports that contain ambiguity or other content that should be reviewed by an expert. The system shows potential to encode the reports considerably faster, with less resources, and similar high quality to the manual encoding.

  • 46399.
    Weerasekera, Roshan
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    System Interconnection Design Trade-offs in Three-Dimensional (3-D) Integrated Circuits2008Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Continued technology scaling together with the integration of disparate technologies in a single chip means that device performance continues to outstrip interconnect and packaging capabilities, and hence there exist many difficult engineering challenges, most notably in power management, noise isolation, and intra and inter-chip communication. Significant research effort spanning many decades has been expended on traditional VLSI integration technologies, encompassing process, circuit and architectural issues to tackle these problems. Recently however, three- dimensional (3-D) integration has emerged as a leading contender in the challenge to meet performance, heterogeneous integration, cost, and size demands through this decade and beyond. Through silicon via (TSV) based 3-D wafer-level integration is an emerging vertical interconnect methodology that is used to route the signal and power supply links through all chips in the stack vertically. Delay and signal integrity (SI) calculation for signal propagation through TSVs is a critical analysis step in the physical design of such systems. In order to reduce design time and mirror well established practices, it is desirable to carry this out in two stages, with the physical structures being modelled by parasitic parameters in equivalent circuits, and subsequent analysis of the equivalent circuits for the desired metric. This thesis addresses both these issues. Parasitic parameter extraction is carried out using a field solver to explore trends in typical technologies to gain an insight into the variation of resistive, capacitive and inductive parasitics including coupling effects. A set of novel closed-form equations are proposed for TSV parasitics in terms of physical dimensions and material properties, allowing the electrical modelling of TSV bundles without the need for computationally expensive field-solvers. Suitable equivalent circuits including capacitive and inductive coupling are derived, and comparisons with field solver provided values are used to show the accuracy of the proposed parasitic parameter models for the purpose of performance and SI analysis. The deep submicron era saw the interconnection delay rather than the gate delay become the major bottleneck in modern digital design. The nature of this problem in 3-D circuits is studied in detail in this thesis. The ubiquitous technique of repeater insertion for reducing propagation delay and signal degradation is examined for TSVs, and suitable strategies and analysis techniques are proposed. Further, a minimal power smart repeater suitable for global on-chip interconnects, which has the potential to reduce power consumption by as much as 20% with respect to a traditional inverter is proposed. A modeling and analysis methodology is also proposed, that makes the smart repeater easier to amalgamate in CAD flows at different levels of hierarchy from initial signal planning to detailed place and route when compared to alternatives proposed in the literature. Finally, the topic of system-level performance estimation for massively integrated systems is discussed. As designers are presented with an extra spatial dimension in 3-D integration, the complexity of the layout and the architectural trade-offs also increase. Therefore, to obtain a true improvement in performance, a very careful analysis using detailed models at different hierarchical levels is crucial. This thesis presents a cohesive analysis of the technological, cost, and performance trade-offs for digital and mixed-mode systems, outlining the choices available at different points in the design and their ramifications

  • 46400. Weerasekera, Roshan
    et al.
    Grange, Matt
    Pamunuwa, Dinesh
    Tenhunen, Hannu
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Zheng, Li-Rong
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Compact Modelling of Through-Silicon Vias (TSVs) in Three-Dimensional (3-D) Integrated Circuits2009Ingår i: 2009 IEEE INTERNATIONAL CONFERENCE ON 3D SYSTEMS INTEGRATION, NEW YORK: IEEE , 2009, s. 322-329Konferensbidrag (Refereegranskat)
    Abstract [en]

    Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional (3-D) Integrated Circuits (ICs). This paper presents a complete set of self-consistent equations including self and coupling terms for resistance, capacitance and inductance of various TSV structures. Further, a reduced-order electrical circuit model is proposed for isolated TSVs as well as bundled structures for delay and SI analysis, and extracted TSV parasitics are employed in Spectre simulations for performance evaluations. Critical issues in the performance modeling for design space exploration of 3-D ICs such as crosstalk induced switching pattern dependent delay variation and cross-talk on noise are discussed. The error in these metrics when using the proposed models as compared to a field solver is contained to a few percentage points.

925926927928929930931 46351 - 46400 av 49378
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf