Change search
Refine search result
928929930931932933934 46501 - 46550 of 48265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 46501. Xia, Kai
    et al.
    Gao, Liang
    Chao, Kuo-Ming
    Wang, Lihui
    KTH, School of Industrial Engineering and Management (ITM), Production Engineering.
    A Cloud-based Disassembly Planning Approach towards Sustainable Management of WEEE2015In: 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), IEEE , 2015, p. 203-208Conference paper (Refereed)
    Abstract [en]

    Waste Electrical and Electronic Equipment (WEEE) is becoming an important and challenging waste stream in terms of quantity and toxicity. Developing technical solutions for sustainable management of WEEE is becoming a global trend. Disassembly planning plays an important role in End-of-Life treatment of WEEE. Effective disassembly planning can improve the recovery rate and reduce the environmental impact of WEEE significantly. Targeting sustainable WEEE management, this paper aims to propose a cloud-based approach for disassembly planning. The approach provides a comprehensive and standardized service-oriented environment for distributed information sharing, disassembly modeling, evaluation and optimization.

  • 46502. Xia, Ruixue
    et al.
    Rost, Mattias
    Holmquist, Lars Erik
    Södertörn University College, School of Communication, Media and it, Media technology.
    Business Models in the Mobile Ecosystem2010In: Proceedings of the 2010 Ninth International Conference on Mobile Business / 2010 Ninth Global Mobility Roundtable, Los Alamitos, Calif.: IEEE Computer Society , 2010, p. 1-8Conference paper (Other academic)
  • 46503.
    Xia, Yiming
    Växjö University, Faculty of Mathematics/Science/Technology, School of Mathematics and Systems Engineering.
    Quick Orientation Viewer2008Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This is a plug-in project using GEF and JDT in Eclipse. The purpose for this thesis is to solve the orientation for a existing project. We can get a overview of a project such as display the class diagram of the project with the help of Orientation Viewer.

  • 46504.
    Xia, Zhihua
    et al.
    Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, College of Computer and Software, Nanjing University of Information Science & Technology.
    Xiong, Neal N.
    Department of Business and Computer Science, Southwestern Oklahoma State University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Sun, Xingming
    Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, College of Computer and Software, Nanjing University of Information Science & Technology.
    EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing2017In: Information Sciences, ISSN 0020-0255, E-ISSN 1872-6291, Vol. 387, p. 195-204Article in journal (Refereed)
    Abstract [en]

    The content-based image retrieval (CBIR) has been widely studied along with the increasing importance of images in our daily life. Compared with the text documents, images consume much more storage and thus are very suitable to be stored on the cloud servers. The outsourcing of CBIR to the cloud servers can be a very typical service in cloud computing. For the privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before being outsourced, which will cause the CBIR technologies in plaintext domain unusable. In this paper, we propose a scheme that supports CBIR over the encrypted images without revealing the sensitive information to the cloud server. Firstly, the feature vectors are extracted to represent the corresponding images. Then, the pre-filter tables are constructed with the locality-sensitive hashing to increase the search efficiency. Next, the feature vectors are protected by the secure k-nearest neighbor (kNN) algorithm. The security analysis and experiments show the security and efficiency of the proposed scheme.

  • 46505.
    Xiang, Luo
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management.
    A virtual Music fountain simulation based on particle system2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report presents a real-time simulation of a music fountain which is simulated in three dimensions by a particle animation system. In this system, gravity and wind are factors that affect the locus movement of particles. Using kinematic equations, the dynamic behaviors of particles is modeled. A specific contribution of the work presented here is that parameters for the motion equation are estimated from sound playing in real-time which controls the dynamic behavior of animated fountain. An open source programming language called Processing is used to implement the environment. Results of the system are demonstrated in form of its graphical output and performance benchmarks from run-time evaluation. The author investigates the influence of the parameters of particle system and music attributes on the animation of the music fountain simulation. The size, number, color, texture and transparency of particles can influence the quality of music fountain simulation. Using FFT function to get music parameters is the best way to figure out differences between different music.

  • 46506.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    An Ontology-based Problem-logic Driven Approach towards the Activity Awareness for Elderly Care2015In: International Journal of Multimedia and Ubiquitous Engineering, ISSN 1975-0080, Vol. 10, no 4, p. 31-42Article in journal (Refereed)
    Abstract [en]

    The same activity under different user situations in the elderly care system may lead to different intelligent system response, since user needs vary with the changing situations. Activity awareness (AA) emphasizes that systems intelligently respond to user needs by aware the user-performed activities which is denoted and comprehended according to various user situations. But most current AA technics use similar patterns retrieved from the growing historical data, neglecting the situation change, called dataset driven. Thus, an aptly approach is needed in support of AA systems to handle various activity denotations in different user situations. Responding to the problem, this paper proposes an Ontology-based Problem-logic driven approach (OPL) to enhance the AA system by denoting user activities with the problem logic according to user-oriented denoted problem domains, where the AA system can seamlessly integrate with inferring for intelligent system response. Specifically, denoted problem domain and logic are proposed to support the OPL concepts, while activity graph is formed to support the intelligent system response based on the annotated problem logic. With the OPL, systems can directly target at the changing situations with rule-based inferring. A case study is performed upon the scenario retrieved from a European elderly care project, where a proof-of-concept prototype is established to confirm the validity of the OPL approach.

  • 46507.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Constructing Context-centric Data Objects to Enhance Logical Associations for IoT Entities2015In: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 52, p. 1095-1100Article in journal (Refereed)
    Abstract [en]

    Entities in Internet of Things (IoT) need intelligent associations to allow a flexible and dynamic system reaction towards varying user situations. Purely data-oriented association methods (e.g., data-mining, machine-learning, etc.) are limited in deduction from existing associations. Also such data-oriented methods are limited in accuracy for working with small-scale datasets (e.g., working with patterns retrieved from historical data), outputting associations based on statistics rather than logic. Moreover, existing semantic technologies (ontological-oriented or rule-oriented) are facing with either flexibility or dynamicity challenges to discover and maintain the associations. This paper proposes an alternative technique of semantically constructing context-centric data objects based on service logics for logical associations, which enables an event net based on association nets adapting for the changing situations (called context-centric). A proof-of-concept implementation is carried out based on a vehicle planning scenario to validate the data construction technique. Comparing to previous work, this technique possesses advantages of flexibility and dynamicity for entity associations based on service logics.

  • 46508.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Generic Distributed Sensing in Support of Context Awareness in Ambient Assisted Living2014In: Multimedia and Ubiquitous Engineering / [ed] Park, J. J.; Chen, S. C.; Gil, J. M.; Yen, N. Y., Springer Berlin/Heidelberg, 2014, p. 99-107Conference paper (Refereed)
    Abstract [en]

    Researches in ambient assisted living have so far faced three important challenges: (1) Lack of a comprehensive approach to capture user needs that are generic; i.e., not limited to specific events, but as generic related to the user. (2) Lack of a highly flexible and scalable platform for the distributed sharing and processing of context between nodes in IoT networks. (3) Increased amount of communication and devices with sensors participating in the acquisition, processing and sharing of context further challenges both computation capability and storage capacity of the system. In this paper, we address these limitations and present novel support, applied in a system for remote assistance of elderly. The support comprehensively retrieves user needs from generic context, via a scalable overlay providing increment of processing capability and storage. Further, the support self-organizes entities into generic context from distributed sensing, using the Dependent Context Pattern (DCP) based on the Context Virtualizing Platform (CVP).

  • 46509.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Logical interactions for heterogeneous IoT entities via virtual world mirrors in support of Ambient Assisted Living2016In: Journal of Ambient Intelligence and Smart Environments, ISSN 1876-1364, E-ISSN 1876-1372, Vol. 8, no 5, p. 565-580Article in journal (Refereed)
    Abstract [en]

    In Ambient Assisted Living (AAL), as an important applied area of Internet of Things (IoT) technology, logical entity interaction establishes an intelligent virtual world in which heterogeneous entities are emulated by object-oriented mirrors through tightly cooperating sensors and actuators from different spaces in the real world; this enables the system to generate intelligent services to support human behaviour. However, until now, few researchers have focused on enabling interactions between heterogeneous IoT entities for AAL services. Further, in relevant studies regarding semantic entity interactions, researchers have mainly focused on enabling semantic interactions between sensors (rather than integral entities) for the purpose of coordinating and managing data resources, where tight collaborations between sensors and actuators are not emphasised. Hence, the system capability of initialising intelligent service to enhance human experience has not been properly emphasised, to date. This paper discusses enabling logical object-oriented IoT entity interactions to enrich AAL services for humans through the creation of mirrors in the virtual world emulating the attributes and behaviours of heterogeneous entities via cooperating sensors and actuators in the real world. This paper introduces the Entity Device Collocating (EDC) Platform to globally locate and retrieve sensors and actuators respectively adhering to the attributes and behaviours of integral mirrors in the virtual world; this is intended to enable the interoperability between virtual and real worlds. Interactions are created upon entity mirrors mapping entities from the physical world to the virtual world, during which interactions continue to evolve based on the service logics. The proposed technique is applied to a typical AAL case of smart pill-ingestion, where a demo is implemented for verification. Comparing with relevant research, the proposed technique contributes by introducing a flexible and scalable IoT entity interaction method targeting AAL to address human needs.

  • 46510.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahim, Rahmani
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A Deep Relation Learning Method for IoT Interoperability Enhancement within Semantic Formalization Framework2016Conference paper (Refereed)
  • 46511.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A deep relation learning method for IoT interoperability enhancement within semantic formalization framework2017In: Proceedings of the Second International Conference on Internet of things and Cloud Computing, Association for Computing Machinery (ACM), 2017, article id 149Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) is facing with the interoperability issue due to the massive amount of heterogeneous entities (both physical and virtual entities) constantly generating heterogeneous data objects; semantic formalization has been widely recognized as a basis for the IoT interoperability, by which IoT can acquire the ability to comprehend data and further recognize the logic relations among heterogeneous IoT entities and heterogeneous data objects, thus to establish mutual understanding between each other to support with interoperability. Even semantic-driven track has emphasizes a lot on the logic relations in connection to the service rules and policies for interoperability, it is important that the quantity-driven relations should be also explored with adhering to the framework of semantic formalization. This paper explores a Deep Recursive Auto-encoders formed data relation learner in line with the semantic framework, which supports the data interoperability enhancement in a quantity-driven way based on the logic-driven framework. The learner starts with representing the virtual IoT entities via feature extraction; based on that, learner is trained in a manner of considering the surrounding relations of the targeted entity. As a baseline, a contrast learner with "regular" structure has been proposed which cannot functionally support semantic framework, even though the semantic formalization is indispensable; regardless the limitations in lab environment, the conducted experiments show that the proposed learner performs a bit better than the contrast learner under the same conditions. So that, the proposed method can synergistically enhances the interoperability within a semantic formalization framework.

  • 46512.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Yuhong
    Gillblad, Daniel
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Intelligent Data-Intensive IoT: A Survey2016In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC): Proceedings, IEEE Computer Society, 2016, p. 2362-2368Conference paper (Refereed)
    Abstract [en]

    The IoT paradigm proposes to connect entities intelligently with massive heterogeneous nature, which forms an ocean of devices and data whose complexity and volume are incremental with time. Different from the general big data or IoT, the data-intensive feature of IoT introduces several specific challenges, such as circumstance dynamicity and uncertainties. Hence,intelligence techniques are needed in solving the problems brought by the data intensity. Until recent, there are many different views to handle IoT data and different intelligence enablers for IoT, with different contributions and different targets. However, there are still some issues have not been considered. This paper will provide a fresh survey study on the data-intensive IoT issue. Besides that, we conclude some shadow issues that have not been emphasized, which are interesting for the future. We propose also an extended big data model for intelligent data-intensive IoT to tackle the challenges.

  • 46513.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Yuhong
    Kanter, Theo
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Edge-based interoperable service-driven information distribution for intelligent pervasive services2017In: Pervasive and Mobile Computing, ISSN 1574-1192, E-ISSN 1873-1589, Vol. 40, p. 359-381Article in journal (Refereed)
    Abstract [en]

    Internet of Things (IoT)-based Intelligent Pervasive Service (IPS) systems face increasing pressure from the massive amounts of heterogeneous data generated; the heterogeneity hinders interoperability between data resources and IPSs, making data sharing inefficient and making it difficult to satisfy the needs and fulfill requirements of the IPSs. In response, this article proposes a method of interoperable service-driven information distribution on the edge side to enhance the service-level interoperability with feature-level interoperability by self-adapting data sharing according to the service needs, which will also help to release incremental data pressure and provide better data privacy by conducting service-driven and relevance-based data sharing.

  • 46514.
    Xiao, Bin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Zeeshan Asghar, Muhammad
    university of Oulu, faculty of science , department of information processing science .
    Jämsä, Tapani
    university of Oulu , faculty of science , department of information processing science.
    Pulli, Petri
    university of Oulu, faculty of science , department of information processing science.
    “Canderoid”: A mobile system to remotely monitor travelling status of the elderly with dementia2013In: International Joint Conference on Awareness Science and Technology and Ubi-Media Computing (iCAST-UMEDIA), 2013, IEEE Press , 2013, p. 648-654Conference paper (Refereed)
    Abstract [en]

    The number of elderly people increases quickly in many countries, under the global population aging situation. It is an upsetting fact that many elderly people are suffering from the dementia, which seriously obstructs their independent living and travel. It is a pervasive problem that the demented elderly individuals are easy to get lost or go into danger during alone travel in daily life. Therefore we propose a novel mobile system named “Canderoid” to monitor independent outdoor travel of the elderly individuals remotely, with aid from the caretaker. The system is composed mainly of an android terminal (Wanderoid), an MQTT broker, and a platform on caretaker side. In the system, an android terminal named “Wanderoid” is implemented on a smartphone to capture the travelling status, using built-in smartphone sensors (i.e. camera with an adhesive fish-eye lens, compass and GPS). The terminal device is a normal smartphone, with a fish-eye lens attached on the camera. The sensor data are transferred to the platform of caretaker after capturing. The data transmission work relies on a message pushing architecture, which deals with mobile IP address changing and enables remote manipulation of the smartphone terminal, by introducing the MQTT broker. Then the caretaker platform can interpret sensor data and real-timely present the travelling status using snapshot taken by the fish-eye camera, street view and map. A reliability test, energy dissipation test and usability test are carried out on the prototype to verify that the system is effective, easy-to-use, reliable and energy-saving, from the viewpoints of both technology and human factors.

  • 46515.
    Xiao, Chuye
    et al.
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management.
    Jiang, Xi
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Industrial Development, IT and Land Management.
    Implementation of utility calculations based on utility difference proportions2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This pilot study presents an implementation of utility calculation that is based on utility difference proportions. To conduct a utility calculation for a consequence, one needs to evaluate utility difference proportions and to calculate utility values. The application can help decision makers to compare consequences pairwise and make decisions easier regarding to the final output utility value for each consequence. On the other hand, the application is limited to a specific case with specified preference ordering. The application can be further developed into a more real interactive analytic decision-making support tool in the future.

  • 46516. Xiao, J.
    et al.
    Culver, Stephen
    Gidlund, Mikael
    ABB Corporate Research.
    Performance of UWB Communication based on Dynamic Bandwidth Direct Sequence2010In: Proceedings, 2010, p. 1-5Conference paper (Refereed)
  • 46517. Xiao, Jun
    et al.
    Xu, Zhen
    Yu, Ye
    Cai, Shuo
    Hansen, Preben
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Design of Augmented Reality-Based Learning System Applied in U-Learning Environment2016In: E-Learning and Games: 10th International Conference, Edutainment 2016, Hangzhou, China, April 14-16, 2016, Revised Selected Papers / [ed] Abdennour El Rhalibi, Feng Tian, Zhigeng Pan, Baoquan Liu, Springer, 2016, p. 27-36Conference paper (Refereed)
    Abstract [en]

    The easy and widely accessibility of Internet resources makes it possible to support learning almost anywhere at any time through powerful mobile technologies, and facilitate ubiquitous learning (u-learning) to grow in use and popularity. Augmented Reality (AR) can be recognized as a key technology that can be used in the U-learning environment to increase learning effect and improve learning experience. This paper designs an integrated model of U-learning, based on which we have also developed an augmented reality technology based learning system named as “Starry Sky Exploration—Eight Planets of Solar System”; an analysis on its implementation is reported and the AR learning system applicable for U-learning environment is found effective and practical.

  • 46518. Xiao, Junchao
    et al.
    Afzal, Wasif
    Search-based resource scheduling for bug fixing tasks2010Conference paper (Refereed)
    Abstract [en]

    The software testing phase usually results in a large number of bugs to be fixed. The fixing of these bugs require executing certain activities (potentially concurrent) that demand resources having different competencies and work-loads. Appropriate resource allocation to these bug-fixing activities can help a project manager to schedule capable resources to these activities, taking into account their availability and skill requirements for fixing different bugs. This paper presents a multi-objective search-based resource scheduling method for bug-fixing tasks. The inputs to our proposed method include i) a bug model, ii) a human resource model, iii) a capability matching method between bug-fixing activities and human resources and iv) objectives of bug-fixing. A genetic algorithm (GA) is used as a search algorithm and the output is a bug-fixing schedule, satisfying different constraints and value objectives. We have evaluated our proposed scheduling method on an industrial data set and have discussed three different scenarios. The results indicate that GA is able to effectively schedule resources by balancing different objectives. We have also compared the effectiveness of using GA with a simple hill-climbing algorithm. The comparison shows that GA is able to achieve statistically better fitness values than hill-climbing.

  • 46519. Xiao, Ming
    et al.
    Aulin, Tor
    On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding2008In: IEEE Transactions on Information Theory, ISSN 0018-9448, E-ISSN 1557-9654, Vol. 54, no 11, p. 5188-5198Article in journal (Refereed)
    Abstract [en]

    We investigate the calculation approach of the sink bit error probability (BEP) for a network with intermediate node encoding. The network consists, of statistically independent noisy channels. The main contributions are, for binary network codes, an error marking algorithm is given to collect the error weight (the number of erroneous bits). Thus, we can calculate the exact sink BEP from the channel BEPs. Then we generalize the approach to nonbinary codes. The coding scheme works on the Galois field 2(m), where m is a positive integer. To reduce computational complexity, a subgraph decomposition approach is proposed. In general, it can significantly reduce computational complexity, and the numerical result is also exact. For approximate results, we discuss the approach of only considering error events in a single channel. The results well approximate the exact results in low BEP regions with much lower complexity.

  • 46520.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Aulin, Tor M.
    A physical layer aspect of network coding with statistically independent noisy channels2006In: 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, Vol. 9, p. 3996-4001Conference paper (Refereed)
    Abstract [en]

    We investigate the physical layer bit error probability (BEP) of a network using network coding (coded network). The network consists of statistically independent noisy channels. Thus, transmitted bits are subject to the noise disturbance. An error marking algorithm is given to calculate the error weight (the number of erroneous bits) in the sinks. Then we can calculate the sink BEP of a coded network from the channel BEPs. We formulate the minimizing BEP problem. We show that coding schemes with the same flow may have different sink BEPs. Two approaches are suggested to reduce the complexity.

  • 46521. Xiao, Ming
    et al.
    Aulin, Tor M.
    Maximum-likelihood decoding and performance analysis of a noisy channel network with network coding2007In: 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2007, p. 6103-6110Conference paper (Refereed)
    Abstract [en]

    We investigate sink decoding methods and performance analysis approaches for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. We first discuss soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). The example shows that the decoder cannot significantly improve the BEP from the hard-decision decoder. We develop the union bound to analyze the decoding approach. The bound can show the asymptotic (regarding SNR: signal-to-noise ratio) performance. Using statistical information of the upstream channels, we then show the method of maximum-likelihood (ML) decoding. With the decoder, a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent signal point procedure. It can be reduced to a leastsquares problem with linear constraints for medium-to-high SNR.

  • 46522.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Aulin, Tor M.
    Rate-adaptive CPM with punctured LDGM codes in slow-fading channels2006In: 2006 IEEE International Symposium on Information Theory, Proceedings, NEW YORK: IEEE , 2006, p. 1324-1328Conference paper (Refereed)
    Abstract [en]

    We investigate rate-adaptive continuous phase modulation (CPM) with punctured low-density generator matrix (LDGM) codes. We give an adaptive principal component analysis (PCA) CPM receiver for slow-fading channels. With the merit of. the PCA receiver, the new receiver avoids the eigenvalue decomposition in every symbol interval, and uses a fixed filter-bank. By changing the rate of the LDGM codes, the information rate of CPM signals is adapted to the channel state information (CSI). We use a low rate LDGM code as the mother code, and higher rates are achieved by puncturing the output of the LDGM codes. To exploit the rate-flexible property of punctured LDGM codes, a rate function is proposed to calculate the rate of each transmitted block. Thus, we can have a quasi-continuous information rate. Numerical results for MSK show that up to 11dB transmitted energy gain can be achieved in the low bit-error-rate region (smaller than 10(-3)), compared to the nonadaptive systems.

  • 46523.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Aulin, Tor M.
    Serially concatenated continuous phase modulation with low density generator matrix codes: Property, optimization and performance analysis2005In: Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, NEW YORK: IEEE , 2005, p. 253-257Conference paper (Refereed)
    Abstract [en]

    We propose a new scheme of serially concatenated continuous phase modulation (SCCPM) by using nonsystematic low density generator matrix (LDGM) codes as the outer code. A property of the LDGM code degree is investigated. We use the EXIT chart/function to optimize the LDGM codes. The EXIT function of CPM with a fixed SNR (Signal-to-Noise-Ratio) is shown. We derive the union bound to analyze the error floor performance. Design principles are proposed from the analysis process. Numerical results show that this scheme converges earlier (lower SNR) than previous SCCPM for iterative decoding.

  • 46524.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Aulin, Tor M
    Serially concatenated continuous phase modulation with symbol interleavers: Performance, properties and design principles2004In: GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2004, p. 179-183Conference paper (Refereed)
    Abstract [en]

    Serially concatenated continuous phase modulation (SCCPM) systems with symbol interleavers are investigated. The transmitted signals are disturbed by additive white Gaussian noise (AWGN). Iterative detection with extrinsic information is used at the receiver side. Compared to bit interleaved SCCPM systems, this scheme shows a substantial improvement in convergence threshold at the price of a higher error floor. In addition to showing this property, we also investigate the underlying reason by error event analysis. In order to estimate bit error rate performance, we generalize traditional union bounds for a bit interleaver to the non-binary interleaver. For the latter, both the order and the position of permuted non-zero symbols have to be considered. From the analysis, some principal properties are presented. Finally some design principles are proposed. The paper concentrates on SCCPM, but the proposed analysis methods and conclusions can be widely used in many other systems such as serially concatenated trellis coded modulation etcetera.

  • 46525.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Aulin, Tor
    Medard, Muriel
    Systematic Binary Deterministic Rateless Codes2008In: 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, NEW YORK: IEEE , 2008, p. 2066-2070Conference paper (Refereed)
    Abstract [en]

    We investigate a systematic construction of binary deterministic rateless codes (BDRCs). The codes are for networks with erasure channels. With a maximum distance separable (MDS) property, non-systematic BDRCs were first proposed in [1] with encoding complexity O(K), and decoding complexity is O(K-2). Here K is the length of information bits. To reduce complexity, we study systematic-BDRCs (SBDRCs). For SBDRCs, the source first transmits m - 1 uncoded blocks, where m is the number of source blocks. Then, the source produces and transmits coded blocks in a rateless way. These coded blocks are produced using only cyclic-shift and XOR (exclusive or). The SBDRCs can use a large number of information blocks (potentially infinite m). On receiving any m distinct blocks (uncoded or coded), a sink can rebuild the source. The SBDRCs have encoding complexity O(epsilon K), and decoding complexity O(epsilon(2) K-2), where epsilon is the source-to-sink block erasure probability.

  • 46526. Xiao, Ming
    et al.
    Medard, Muriel
    Aulin, Tor
    A binary coding approach for combination networks and general erasure networks2007In: 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, NEW YORK: IEEE , 2007, p. 786-790Conference paper (Refereed)
    Abstract [en]

    We investigate a deterministic binary coding approach for combination networks. In the literature, network coding schemes with large alphabet sizes achieve the min-cut capacity. Here, we propose an approach using binary (GF(2)) sequences instead of going to a large alphabet size. In the encoding process, only cyclic-shifting and XOR operations are used. The encoding complexity is linear with the length of information bits. The transfer matrix is sparse, and the decoder can perfectly decode source information by a sparse-matrix processing approach. Our approach does not use any redundant bits, and achieves the min-cut capacity. Further, the code blocks can be produced in a rateless way. The sink can decode source information from any subset of code blocks, if the number of received distinct blocks is the same as that of the information blocks. Thus, we use the code for general networks with erasure channels. The proposed binary rateless codes have quite small overheads and can work with a small number of blocks. With high probability, the codes behave as maximum distance separable (MDS) codes.

  • 46527.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Information Science and Engineering.
    Mumtaz, Shahid
    Huang, Yongming
    Dai, Linglong
    Li, Yonghui
    Matthaiou, Michail
    Karagiannidis, George K.
    Bjornson, Emil
    Yang, Kai
    Chih-Lin, I
    Ghosh, Amitabha
    Millimeter Wave Communications for Future Mobile Networks2017In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 35, no 9, p. 1909-1935Article in journal (Refereed)
    Abstract [en]

    Millimeter wave (mmWave) communications have recently attracted large research interest, since the huge available bandwidth can potentially lead to the rates of multiple gigabit per second per user. Though mmWave can be readily used in stationary scenarios, such as indoor hotspots or backhaul, it is challenging to use mmWave in mobile networks, where the transmitting/receiving nodes may be moving, channels may have a complicated structure, and the coordination among multiple nodes is difficult. To fully exploit the high potential rates of mmWave in mobile networks, lots of technical problems must be addressed. This paper presents a comprehensive survey of mmWave communications for future mobile networks (5G and beyond). We first summarize the recent channel measurement campaigns and modeling results. Then, we discuss in detail recent progresses in multiple input multiple output transceiver design for mmWave communications. After that, we provide an overview of the solution for multiple access and backhauling, followed by the analysis of coverage and connectivity. Finally, the progresses in the standardization and deployment of mmWave for mobile networks are discussed.

  • 46528.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks2009In: 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, NEW YORK: IEEE , 2009, p. 2562-2566Conference paper (Refereed)
    Abstract [en]

    We investigate the design of network codes for multiple-user multiple-relay (MUMR) wireless networks. In the networks, multiple (M >= 2) users have independent information to be transmitted to a common base station (BS), with the help of N (N >= 2) relays. The networks consist of independent quasi. static fading channels. We investigate such networks in terms of outage probabilities (to measure asymptotic performance), and propose network codes with linearly independent global encoding kernels for all possible source-relay channel situations (outage or not) to achieve asymptotic optimality. We compare the performance of proposed finite-field network coding (FFNC) and superposition coding (real-domain network coding) in the relays. The results show that proposed FFNC has better performance than superposition coding in high rate regions.

  • 46529.
    Xiao, Ming
    et al.
    KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering (EES), Communication Theory.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    M-user Cooperative Wireless Communications Based on Nonbinary Network Codes2009In: ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, NEW YORK: IEEE , 2009, p. 316-320Conference paper (Refereed)
    Abstract [en]

    We propose a new method of applying network coding for cooperative wireless networks. The network consists of multiple (M >= 2) users having independent information to be transmitted to a common base station (BS). These users form partners and relay information for each other. The transmission blocks are subject to block-fading with independent fading coefficients for each block. Designed non-binary network codes over finite fields are used on top of channel codes. Assuming perfect error detection, erroneous blocks out from channel decoders are discarded (erasure). Thus, relaying nodes may not have information messages of some partners (erasure in inter-user channels), and the BS may not decode some blocks correctly either. The network topology from the point of view of network coding is dynamic. To improve performance, we propose dynamic-network codes (deterministic codes for dynamic networks) for the cooperative networks. The codes are designed such that the BS can rebuild user information from a minimum possible set of coding blocks. In this sense, dynamic-network codes achieve the min-cut for cooperative networks with a dynamic topology. For block fading channels, the proposed scheme obtains high asymptotic performance. For two-user networks, we calculate the resulting outage probabilities. We also present simulations with specific channel codes. Numerical results show substantial improvement over previous schemes. Then, we generalize the results to multiple-user (M > 2) networks. We investigate the existence of deterministic dynamic-network codes for multiple-user networks, and show that the diversity order of the proposed scheme can achieve 2M - 1.

  • 46530.
    Xiao, Yi
    et al.
    School of Engineering and Information Technology, The University of New South Wales, Canberra, ACT, Australia.
    Pham, Tuan D
    School of Engineering and Information Technology, The University of New South Wales, Canberra, ACT, Australia.
    Jia, Xiuping
    School of Engineering and Information Technology, The University of New South Wales, Canberra, ACT, Australia.
    Zhou, Xiaobo
    Centre for Biotechnology and Informatics, The Methodist Hospital Research Institute & Cornell University, Houston, TX, USA.
    Yan, Hong
    Department of Electronic Engineering, City University of Hong Kong, Hong Kong.
    Correlation-based cluster-space transform for major adverse cardiac event prediction2010In: IEEE International Conference on Systems Man and Cybernetics (SMC), Institute of Electrical and Electronics Engineers (IEEE), 2010, p. 2003-2007Conference paper (Refereed)
    Abstract [en]

    This paper investigates the affect of variation of patterns in protein profiles to the identification of disease-specific biomarkers. A correlation-based cluster-space transform is applied to mass spectral data for predicting major adverse cardiac events (MACE). Training and testing data are transformed into cluster spaces by correlation distance based clustering, respectively. Data in the testing cluster that falls into a pair of training clusters is classified by a supervised classifier. Experiment results have shown that proteomic spectra of MACE which vary with certain patterns could be separated by the correlation-based clustering. The cluster-space transform allows better classification accuracy than single-clustered class method for separating disease and healthy samples.

  • 46531.
    Xiaojun, Chen
    et al.
    Blekinge Institute of Technology, School of Computing.
    Bhattrai, Premlal
    Blekinge Institute of Technology, School of Computing.
    A Method for Membership Card Generation Based on Clustering and Optimization Models in A Hypermarket2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Data mining as a technique is used to find interesting and valuable knowledge from huge amount of stored data within databases or data warehouses. It encompasses classification, clustering, association rule learning, etc., whose goals are to improve commercial decisions and behaviors in organizations. Amongst these, hierarchical clustering method is commonly used in data selection preprocessing step for customer segmentation in business enterprises. However, this method could not treat with the overlapped or diverse clusters very well. Thus, we attempt to combine clustering and optimization into an integrated and sequential approach that can substantially be employed for segmenting customers and subsequent membership cards generation. Clustering methods is used to segment customers into groups while optimization aids in generating the required membership cards. Objectives: Our master thesis project aims to develop a methodological approach for customer segmentation based on their characteristics in order to define membership cards based on mathematical optimization model in a hypermarket. Methods: In this thesis, literature review of articles was conducted using five reputed databases: IEEE, Google Scholar, Science Direct, Springer and Engineering Village. This was done to have a background study and to gain knowledge about the current research in the field of clustering and optimization based method for membership card generating in a hypermarket. Further, we also employed video interviews as research methodologies and a proof-of-concept implementation for our solution. Interviews allowed us to collect raw data from the hypermarket while testing the data produces preliminary results. This was important because the data could be regarded as a guideline to evaluate the performance of customer segmentation and generating membership cards. Results: We built clustering and optimization models as a two-step sequential method. In the first step, the clustering model was used to segment customers into different clusters. In the second step, our optimization model was utilized to produce different types of membership cards. Besides, we tested a dataset consisting of 100 customer records consequently obtaining five clusters and five types of membership cards respectively. Conclusions: This research provides a basis for customer segmentation and generating membership cards in a hypermarket by way of data mining techniques and optimization. Thus, through our research, an integrated and sequential approach to clustering and optimization can suitably be used for customer segmentation and membership card generation respectively.

  • 46532. Xiaosong, H
    et al.
    Murgovski, N
    Johannesson, L
    RISE, Swedish ICT, Viktoria.
    Egardt, B
    Comparison of three electrochemical energy buffers applied to a hybrid bus powertrain with simultaneous optimal sizing energy management2014In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 15, no 3, p. 1193-Article in journal (Refereed)
    Abstract [en]

    This paper comparatively examines three different electrochemical energy storage systems (ESSs), i.e., a Li-ion battery pack, a supercapacitor pack, a dual buffer, for a hybrid bus powertrain operated in Gothenburg, Sweden. Existing studies focus on comparing these ESSs, in terms of either general attributes (e.g., energy density power density) or their implications to the fuel economy of hybrid vehicles with a heuristic/nonoptimal ESS size power management strategy. This paper adds four original contributions to the related literature. First, the three ESSs are compared in a framework of simultaneous optimal ESS sizing energy management, where the ESSs can serve the powertrain in the most cost-effective manner. Second, convex optimization is used to implement the framework, which allows the hybrid powertrain designers/integrators to rapidly optimally perform integrated ESS selection, sizing, power management. Third, both hybrid electric vehicle (HEV) plug-in HEV (PHEV) scenarios for the powertrain are considered, in order to systematically examine how different the ESS requirements are for HEV PHEV applications. Finally, a sensitivity analysis is carried out to evaluate how price variations of the onboard energy carriers affect the results conclusions._x000D_

  • 46533. Xiaosong, H
    et al.
    Murgovski, N
    Johannesson, L
    RISE, Swedish ICT, Viktoria.
    Egardt, B
    Optimal Dimensioning Power Management of a Fuel Cell/Battery Hybrid Bus via Convex Programming2014In: IEEE/ASME transactions on mechatronics, ISSN 1083-4435, E-ISSN 1941-014X, Vol. 20, no 1, p. 457-Article in journal (Refereed)
    Abstract [en]

    Abstract€”This paper is concerned with the simultaneous optimal component sizing and_x000D_ power management of a fuel cell/battery hybrid bus. Existing studies solve the combined_x000D_ plant/controller optimization problem for fuel cell hybrid vehicles (FCHVs) by using methods_x000D_ with disadvantages of heavy computational burden and/or suboptimality, for which only a_x000D_ single driving profile was often considered. This paper adds three important contributions to_x000D_ the FCHVs-related literature. First, convex programming is extended to rapidly ..._x000D_

  • 46534. Xie, C
    et al.
    Karlsson, M
    Andrekson, P A
    Sunnerud, H
    Li, J
    RISE, Swedish ICT, Acreo.
    Influences of Polarization-Mode Dispersion on Soliton Transmission Systems2002In: IEEE Journal of Selected Topics in Quantum Electronics, Vol. 8, p. 575-90Article in journal (Refereed)
  • 46535.
    Xie, Hailian
    et al.
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics.
    Ängquist, Lennart
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics.
    Nee, Hans-Peter
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics.
    Active power compensation of voltage source converters with energy storage capacitors2006In: 2006 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION. VOLS 1-5, NEW YORK: IEEE , 2006, p. 1012-1019Conference paper (Refereed)
    Abstract [en]

    The voltage at the point of common coupling (PCC) in a weak network is very sensitive to load changes. A sudden change in active load will cause both a phase jump and a magnitude fluctuation in the bus voltage, whereas reactive load changes mainly affect the voltage magnitude. With the addition of energy storage to a static synchronous compensator (StatCom), it is possible to compensate for the active power change as well as providing reactive power support. In this paper some effective active power compensation schemes are proposed. Simulation and experimental results verify the compensation schemes by showing that a StatCom with energy storage can significantly reduce phase jumps and magnitude deviations of the bus voltage. Simulation results are also presented showing the benefits of active power compensation to certain applications with phase sensitive load.

  • 46536.
    Xie, Hailian
    et al.
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics (closed 20110930).
    Ängquist, Lennart
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics (closed 20110930).
    Nee, Hans-Peter
    KTH, School of Electrical Engineering (EES), Electrical Machines and Power Electronics (closed 20110930).
    Novel flux modulated positive and negative sequence deadbeat current control of voltage source converters2006In: IEEE POWER ENG SOC GEN MEETIN, 2006, p. 533-540Conference paper (Refereed)
    Abstract [en]

    Voltage source converters are widely used in the power system to enhance the power system performance. In the conventional converter control, the control system usually takes the voltage measured at the point where the converter is connected and calculates the reference voltage for the converter; with a modulation system the converter then produces the required 'average voltage'. In this paper, a novel flux modulation scheme, combined with the deadbeat current control strategy, is proposed. The current controller is capable of controlling both positive and negative sequence currents. With flux modulation, the control system measures the bus flux and commands the converter to generate the required flux. The simulation and experimental results presented show a good performance of this converter control system.

  • 46537.
    Xie, Kefan
    et al.
    Management School, Wuhan University of Technology, Wuhan, China / Institute of Systems Science and Engineering, Wuhan University of Technology, Wuhan, China.
    Chen, Gang
    Management School, Wuhan University of Technology, Wuhan, China / Institute of Systems Science and Engineering, Wuhan University of Technology, Wuhan, China.
    Wu, Qian
    Management School, Wuhan University of Technology, Wuhan, China / Institute of Systems Science and Engineering, Wuhan University of Technology, Wuhan, China.
    Liu, Yang
    Department of Production, University of Vaasa, Vaasa, Finland.
    Wang, Pan
    Institute of Systems Science and Engineering, Wuhan University of Technology, Wuhan, China / School of Automation, Wuhan University of Technology, Wuhan, China.
    Research on the group decision-making about emergency event based on network technology2011In: Journal of Special Topics in Information Technology and Management, ISSN 1385-951X, E-ISSN 1573-7667, Vol. 12, no 2, p. 137-147Article in journal (Refereed)
    Abstract [en]

    In order to improve decision-making efficiency about emergency event, this paper proposes a novel concept, i.e., Agile-Delphi Method, which is an integration of agile decision and Delphi Method implicating that the decision-makers instantly deliver, respond, treat, and utilize information via Delphi process while conducting group decision-making about emergency event. The paper details the mechanism of group decision-making about emergency event based on network technology and Agile-Delphi Method. Finally, the paper conducts an empiric analysis taking the “111 event”, i.e., the liquid ammonia spill event happened on November 1, 2006 in a phosphorus chemical company in China, as an example.

  • 46538. Xie, M
    et al.
    Hong, G Y
    Wohlin, Claes
    Modeling and Analysis of Software System Reliability.2003In: Case Studies on Reliability and Maintenance / [ed] Blischke, W; Murphy, P, Germany: Wiley VHC Verlag , 2003Chapter in book (Other academic)
  • 46539.
    Xie, Yao
    et al.
    Shanghai Jiao Tong University.
    Liu, Xiao-Yang
    Shanghai Jiao Tong University.
    Kong, Linghe
    Shanghai Jiao Tong University.
    Wu, Fan
    Shanghai Jiao Tong University.
    Chen, Guihai
    Shanghai Jiao Tong University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Drone-Based Wireless Relay using Online Tensor Update2016In: 2016 IEEE 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS) / [ed] Liao, X; Lovas, R; Shen, X; Zheng, R, Piscataway, NJ: IEEE Computer Society, 2016, p. 48-55, article id 7823731Conference paper (Refereed)
    Abstract [en]

    In the wireless communication, there are many cases where the transmission path is obstructed by unknown objects. With the rapid development of the drone technology in recent years, the drones are advocated to serve as mobile relays to forward data streams. However, the challenges are that data transmission may suffer severe signal attenuation due to the existence of the obstructions and it is challenging to find the best location for mobile relays due to the dynamic environment and unpredictable interference. To address the problem, this paper proposes an approach that a drone can automatically find the location with the optimal link quality. We design a novel algorithm, named Path-sampling Online Tensor Update (POTU), to estimate the link quality in the space and find the optimal location. Furthermore, the algorithm is practical to the real applications due to the simplicity of implementation. In the experiment, we construct a realistic scene and compare the performance of our algorithm with the classic and the state-of-the-art algorithms. As a result, POTU outperforms existing methods in achieving the trade-off between time cost and estimation accuracy.

  • 46540.
    Xie, Yi
    et al.
    Wuhan Engineering Consulting Bureau, Wuhan, China.
    Takala, Josu
    Faculty of TechnologyUniversity of Vaasa, Vaasa, Finland.
    Liu, Yang
    Faculty of TechnologyUniversity of Vaasa, Vaasa, Finland.
    Chen, Yong
    Old Dominion University, Norfolk, USA.
    A combinatorial optimization model for enterprise patent transfer2015In: Journal of Special Topics in Information Technology and Management, ISSN 1385-951X, E-ISSN 1573-7667, Vol. 16, no 4, p. 327-337Article in journal (Refereed)
    Abstract [en]

    Enterprises need patent transfer strategies to improve their technology management. This paper proposes a combinatorial optimization model that is based on intelligent computing to support enterprises’ decision making in developing patent transfer strategy. The model adopts the Black–Scholes Option Pricing Model and Arbitrage Pricing Theory to estimate a patent’s value. Based on the estimation, a hybrid genetic algorithm is applied that combines genetic algorithms and greedy strategy for the optimization purpose. Encode repairing and a single-point crossover are applied as well. To validate this proposed model, a case study is conducted. The results indicate that the proposed model is effective for achieving optimal solutions. The combinatorial optimization model can help enterprise promote their benefits from patent sale and support the decision making process when enterprises develop patent transfer strategies.

  • 46541.
    Xie, Yingfu
    et al.
    SLU, Centre of Biostochastics.
    Yu, Jun
    SLU, Centre of Biostochastics.
    Ranneby, Bo
    SLU, Centre of Biostochastics.
    Forecasting using locally stationary wavelet processes2009In: Journal of Statistical Computation and Simulation, ISSN 0094-9655, E-ISSN 1563-5163, Vol. 79, no 9, p. 1067-1082Article in journal (Refereed)
    Abstract [en]

    Locally stationary wavelet (LSW) processes, built on non-decimated wavelets, can be used to analyse and forecast non-stationary time series. They have been proved useful in the analysis of financial data. In this paper, we first carry out a sensitivity analysis, then propose some practical guidelines for choosing the wavelet bases for these processes. The existing forecasting algorithm is found to be vulnerable to outliers, and a new algorithm is proposed to overcome the weakness. The new algorithm is shown to be stable and outperforms the existing algorithm when applied to real financial data. The volatility forecasting ability of LSW modelling based on our new algorithm is then discussed and shown to be competitive with traditional GARCH models.

  • 46542.
    Xie, Yun
    et al.
    Örebro University, Örebro University School of Business.
    Wang, Hao
    Örebro University, Örebro University School of Business.
    Utilization of M-Government Service in Rural China2012Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Electronic government (e-government) has developed rapidly, the Mobile Government service (m-government) as one of the import branches play a significant role in recent years, and it would be also an effective way to satisfy Chinese rural citizen’s information needs. Our research question is how the m-government service satisfies Chinese rural citizen’s information needs. The investigation is conducted with questionnaires in a rural town where in Guangdong Province. We find that the most needed information perceived or expresses by rural citizen are closely related to their basic survival. There is a big potential to develop m-government service in rural areas since most of rural citizen haven’t paid attention on it. Last we put forward some suggestions for improving m-government services for Chinese rural citizen.

  • 46543.
    Xin, Zhang
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Distributed Electronic Health Record System based on Middleware2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    With the fast development of information technology, traditional healthcare is evolving to a more digital and electronic stage. Electronic HealthRecord (EHR) is residents’ basic information and health care relatedinformation conforming to standard. It can not only provide usefulinformation to medical workers, but also exchange resources with otherinformation systems. But with the growing complexity of electronichealth record data sources, it becomes a big challenge to set up a structurewhich allows different types of data sharing and exchanging inmulti-platform applications. It’s even more important to find out amethod to support great amount of users from different applicationplatform to sharing and exchanging data at the same time.In this paper, we proposed a distributed electronic health record systembased on middleware to address the problem. Both permanent and realtimedata should pass through the middleware provided by the system,and will be transformed into standard format for storage. Multi-threadand distributed server group design will let the system be more flexibleand scalable, and will be able to provide service to users concurrently.The system creates a standard data format for data transferring andstorage. All raw data collected from different kinds of sensor system willbe formatted with application programming interface (API) or softwaredevelopment kit (SDK) system provided before upload to the system.Encryption methods are also implemented to ensure data security andprivacy protection.

  • 46544.
    Xing, Li
    et al.
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Pronobis, Andrzej
    KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS. KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP.
    Multi-cue Discriminative Place Recognition2010In: MULTILINGUAL INFORMATION ACCESS EVALUATION II: MULTIMEDIA EXPERIMENTS, PT II / [ed] Peters C; Caputo B; Gonzalez J; Jones GJF; KalpathyCramer J; Muller H; Tsikrika T, 2010, Vol. 6242, p. 315-323Conference paper (Refereed)
    Abstract [en]

    In this paper we report on our successful participation in the Robot Vision challenge in the ImageCLEF 2009 campaign. We present a place recognition system that employs four different discriminative models trained on different global and local visual cues. In order to provide robust recognition, the outputs generated by the models are combined using a discriminative accumulation method. Moreover, the system is able to provide an indication of the confidence of its decision. We analyse the properties and performance of the system on the training and validation data and report the final score obtained on the test run which ranked first in the obligatory track of the Robot Vision task.

  • 46545.
    Xing, Tinglu
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Design and implementation of a web-based battle application for the New Horizon RPG2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    With the popularity of online role-playing games, a web-based battle application is designed to help the players to improve their characters for the combat. The developed prototype concentrates on one-player-multi-characters mode. The project consists of three major objectives. The first one focuses on the development of web-based interfaces for user registration and login. This functionality benefits the user with an individual and personalized member account. The second goal is to improve the existing web-application for character creation so the user data input is stored in a database for posterior retrieval. The third objective refers to the development of a web-based battle application that allows players to test created characters in a battle, one character against another one. This project also contributed with a logical database model that overcomes some design issues, such as normalization problems, in the current database model.

  • 46546.
    Xing, Yuxin
    et al.
    School of Engineering, University of Warwick, Coventry, UK.
    Vincent, Timothy A.
    School of Engineering, University of Warwick, Coventry, UK.
    Cole, Marina
    School of Engineering, University of Warwick, Coventry, UK.
    Gardner, Julian W.
    School of Engineering, University of Warwick, Coventry, UK.
    Fan, Han
    Örebro University, School of Science and Technology.
    Hernandez Bennetts, Victor
    Örebro University, School of Science and Technology.
    Schaffernicht, Erik
    Örebro University, School of Science and Technology.
    Lilienthal, Achim
    Örebro University, School of Science and Technology.
    Mobile robot multi-sensor unit for unsupervised gas discrimination in uncontrolled environments2017In: IEEE SENSORS 2017: Conference Proceedings, IEEE, 2017, p. 1-3Conference paper (Refereed)
    Abstract [en]

    In this work we present a novel multi-sensor unit to detect and discriminate unknown gases in uncontrolled environments. The unit includes three metal oxide (MOX) sensors with CMOS micro heaters, a plasmonic enhanced non-dispersive infra-red (NDIR) sensor, a commercial temperature humidity sensor, and a flow sensor. The proposed sensing unit was evaluated with plumes of gases (propanol, ethanol and acetone) in both, a laboratory setup on a gas testing bench and on-board a mobile robot operating in an indoor workshop. It offers significantly improved performance compared to commercial systems, in terms of power consumption, response time and physical size. We verified the ability to discriminate gases in an unsupervised manner, with data collected on the robot and high accuracy was obtained in the classification of propanol versus acetone (96%), and ethanol versus acetone (90%).

  • 46547.
    Xiong, Deyi
    et al.
    Soochow University.
    Duh, KevinNara Institute of Science and Technology.Hardmeier, ChristianUppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Languages, Department of Linguistics and Philology.Navigli, RobertoSapienza University of Rome.
    Proceedings of the 1st Workshop on Semantics-Driven Statistical Machine Translation (S2MT 2015)2015Conference proceedings (editor) (Refereed)
  • 46548.
    Xiong, Hu
    et al.
    School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu.
    Choo, Kim-Kwang Raymond
    Department of Information Systems and Cyber Security, The University of Texas at San Antonio.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing2017In: IEEE Transactions on Big Data, ISSN 2325-5870, E-ISSN 2168-6750Article in journal (Refereed)
    Abstract [en]

    To be able to leverage big data to achieve enhanced strategic insight, process optimization and make informed decision, we need to be an efficient access control mechanism for ensuring end-to-end security of such information asset. Signcryption is one of several promising techniques to simultaneously achieve big data confidentiality and authenticity. However, signcryption suffers from the limitation of not being able to revoke users from a large-scale system efficiently. We put forward, in this paper, the first identity-based (ID-based) signcryption scheme with efficient revocation as well as the feature to outsource unsigncryption to enable secure big data communications between data collectors and data analytical system(s). Our scheme is designed to achieve end-to-end confidentiality, authentication, non-repudiation, and integrity simultaneously, while providing scalable revocation functionality such that the overhead demanded by the private key generator (PKG) in the key-update phase only increases logarithmically based on the cardiality of users. Although in our scheme the majority of the unsigncryption tasks are outsourced to an untrusted cloud server, this approach does not affect the security of the proposed scheme. We then prove the security of our scheme, as well as demonstrating its utility using simulations

  • 46549. Xiong, Junjie
    et al.
    Ngai, Edith C.-H.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Zhou, Yangfan
    Lyu, Michael R.
    RealProct: Reliable protocol conformance testing with real nodes for wireless sensor networks2011In: Proc. 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, 2011Conference paper (Refereed)
  • 46550.
    Xiong, Kunli
    KTH, School of Information and Communication Technology (ICT).
    Planar Plasmonic Devices for Controlling Polarization of Light2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Planar nanostructures made of noble metal can efficiently control transmission of light, thanks to surface plasmon polaritons (SPPs) mediated through interaction between such a structure and incoming light. In this thesis, we numerically characterize, with a 3D finiteelement method, three types of plasmonic devices: plasmonic radial/azimuthal filter, plasmonic quarter-wave plate made of a periodic array of round holes in a thin metallic film, and a plasmonic quarter-wave plate with a periodic array of cross-shaped apertures.

    The plasmonic polarization filter is formed by a series of concentric equidistant gold rings, and it can transmit the radially polarized light and block the azimuthally polarized light. The quarter-wave plate with round holes has a different lattice constant along two Cartesiancoordinate directions that enable different phase retardations for two orthogonally polarized incident waves; hence, it can convert a linearly polarized light to a circularly polarized light. For the quarter-wave plate with an array of cross-shaped apertures, it utilizes the different lengths of horizontal/vertical arms to manipulate the phase retardations. All of these devices have sub-micron thicknesses, unlike their traditional counterparts that are bulky and inconvenient for integration purposes. Fabrication of the wave plate with cross-shaped apertures was attempted in collaboration with members in the Optics and Photonics unit at KTH.

928929930931932933934 46501 - 46550 of 48265
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf