Change search
Refine search result
1 - 19 of 19
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Bo, Lin
    et al.
    The State Key Laboratory of Mechanical Transmissions, Chongqing University, Chongqing, China.
    Xu, Guanji
    The State Key Laboratory of Mechanical Transmissions, Chongqing University, Chongqing, China.
    Liu, Xiaofeng
    The State Key Laboratory of Mechanical Transmissions, Chongqing University, Chongqing, China.
    Lin, Jing
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    Bearing Fault Diagnosis Based on Subband Time-Frequency Texture Tensor2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 37611-37619Article in journal (Refereed)
    Abstract [en]

    The texture feature tensor established from a subband time–frequency image (TFI) was extracted and used to identify the fault states of a rolling bearing. The TFI of adaptive optimal-kernel distribution was optimally partitioned into TFI blocks based on the minimum frequency band entropy. The texture features were extracted from the co-occurrence matrix of each TFI block. Based on the order of the segmented frequency bands, the texture feature tensor was constructed using the multidimensional feature vectors from all the blocks; this preserved the inherent characteristic of the TFI structure and avoided the information loss caused by vectorizing multidimensional features. The linear support higher order tensor machine based on the feature tensor was applied to identify the fault states of the rolling bearing.

  • 2.
    Chen, Jiayu
    et al.
    Beihang University, Beijing, China.
    Zhou, Dong
    Beihang University, Beijing, China.
    Guo, Ziyue
    Beihang University, Beijing, China.
    Lin, Jing
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    LYU, Chuan
    Beihang University, Beijing, China.
    LU, Chen
    Beihang University, Beijing, China.
    An Active Learning Method Based on Uncertainty and Complexity for Gearbox Fault Diagnosis2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 9022-9031Article in journal (Refereed)
    Abstract [en]

    It is crucial to implement an effective and accurate fault diagnosis of a gearbox for mechanical systems. However, being composed of many mechanical parts, a gearbox has a variety of failure modes resulting in the difficulty of accurate fault diagnosis. Moreover, it is easy to obtain raw vibration signals from real gearbox applications, but it requires significant costs to label them, especially for multi-fault modes. These issues challenge the traditional supervised learning methods of fault diagnosis. To solve these problems, we develop an active learning strategy based on uncertainty and complexity. Therefore, a new diagnostic method for a gearbox is proposed based on the present active learning, empirical mode decomposition-singular value decomposition (EMD-SVD) and random forests (RF). First, the EMD-SVD is used to obtain feature vectors from raw signals. Second, the proposed active learning scheme selects the most valuable unlabeled samples, which are then labeled and added to the training data set. Finally, the RF, trained by the new training data, is employed to recognize the fault modes of a gearbox. Two cases are studied based on experimental gearbox fault diagnostic data, and a supervised learning method, as well as other active learning methods, are compared. The results show that the proposed method outperforms the two common types of methods, thus validating its effectiveness and superiority.

  • 3.
    Dong, Pingping
    et al.
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xie, Jingyun
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Tang, Wensheng
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xiong, Naixue
    College of Intelligence and Computing, Tianjin University, Tianjin, 300350, China.
    Zhong, Hua
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Performance Evaluation of Multipath TCP Scheduling Algorithms2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 29818-29825Article in journal (Refereed)
    Abstract [en]

    One of the goals of 5G is to provide enhanced mobile broadband and enable low latency in some use cases. To achieve this aim, the Internet Engineering Task Force (IETF) has proposed the Multipath TCP (MPTCP) by utilizing the feature of dual connectivity in 5G, where a 5G device can be served by two different base stations. However, the path heterogeneity between the 5G device to the server may cause packet out-of-order problem. The researchers proposed a number of scheduling algorithms to tackle this issue. This paper introduces the existing algorithms, and with the aim to make a thorough comparison between the existing scheduling algorithms and provide guidelines for designing new scheduling algorithms in 5G, we have conducted an extensive set of emulation studies based on the real Linux experimental platform. The evaluation covers a wide range of network scenarios to investigate the impact of different network metrics, namely, RTT, buffer size and file size on the performance of existing widely-deployed scheduling algorithms.

  • 4.
    Fan, Ye
    et al.
    Department of Information and Communication Engineering, Xi’an Jiaotong University, Xi’an, China.
    Liao, Xuewen
    Department of Information and Communication Engineering, Xi’an Jiaotong University, Xi’an, China.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Physical Layer Security Based on Interference Alignment in K-User MIMO Y Wiretap Channels2017In: IEEE Access, E-ISSN 2169-3536, Vol. 5, p. 5747-5759Article in journal (Refereed)
    Abstract [en]

    This paper studies the secure degree of freedom (SDOF) of the multiway relay wiretap system K -user MIMO Y wiretap channel, where each legitimate user equipped with M antennas intends to convey independent signals via an intermediate relay with N antennas. There exists an eavesdropper which is equipped with Neantennas close to the legitimate users. In order to eliminate the multiuser interference and keep the system security, interference alignment is mainly utilized in the proposed broadcast wiretap channel (BWC) and multi-access BWC (MBWC), and cooperative jamming is adopted as a supplementary approach in the MBWC model. The general feasibility conditions of the interference alignment are deduced asM≥K−1,2M>N and N≥((K(K−1))/2) . In the BWC model, we have deduced the secure degrees of freedom (SDOF) asKmin{M,N}−min{Ne,K(K−1)/2} , which is always a positive value. While in the MBWC model, the SDOF is given by Kmin{M,N} . Finally, since the relay transmits the synthesized signals of the legal signal and the jamming signal in the MBWC model, we propose a power allocation scheme to maximize the secrecy rate. Simulation results demonstrate that our proposed power allocation scheme can improve secrecy rate under various antenna configurations.

  • 5.
    Hassan, Abbas M.
    et al.
    Department of Architecture, Faculty of Engineering, Al Azhar University .
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Electrical Engineering Department, Faculty of Engineering, Al Azhar University.
    Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 36428-36440Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication technologies (ICTs) are used in concert to substantially reduce urban problems. Smart cities and ubiquitous cities will adopt ICTs in the urban development process; however, IoT-based cities will experience considerably stronger effects than those that adopt conventional ICTs. IoT cities allow urban residents and “things”to be connected to the Internet by virtue of the extension of the Internet Protocol from IPv4 to IPv6 and of cutting-edge device and sensor technology. Therefore, the urban transition resulting from the influence of IoT may be a critical issue. The privacy-related vulnerabilities of IoT technologies may negatively affect city residents. Furthermore, disparities in the spread of IoT systems across different countries may allow some countries to subvert the privacy of other countries' citizens. The aim of this paper is to identify the potential prospects and privacy challenges that will emerge from IoT deployment in urban environments. This paper reviews the prospects of and barriers to IoT implementation at the regional, city, and residential scales from the perspectives of security and privacy. The IoT technology will be a continual presence in life in general and in urban life in particular. However, the adoption of the IoT paradigm in cities will be complicated due to the inherent presence of unsecured connections. Moreover, the IoT systems may rob people of some of their humanity, infringing on their privacy, because people are also regarded as “things”in the IoT paradigm. Given the social trepidation surrounding IoT implementation, local and international associations related to IoT privacy, and legislation and international laws, are needed to maintain the personal right to privacy and to satisfy the demands of institutional privacy in urban contexts.

  • 6.
    Kleyko, Denis
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Osipov, Evgeny
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Papakonstantinou, Nikolaos
    VTT Technical Research Center of Finland.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Department of Electrical Engineering and Automation, Aalto University, Finland.
    Hyperdimensional computing in industrial systems: the use-case of distributed fault isolation in a power plant2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 30766-30777Article in journal (Refereed)
    Abstract [en]

    This paper presents an approach for distributed fault isolation in a generic system of systems. The proposed approach is based on the principles of hyperdimensional computing. In particular, the recently proposed method called Holographic Graph Neuron is used. We present a distributed version of Holographic Graph Neuron and evaluate its performance on the problem of fault isolation in a complex power plant model. Compared to conventional machine learning methods applied in the context of the same scenario the proposed approach shows comparable performance while being distributed and requiring simple binary operations, which allow for a fast and efficient implementation in hardware.

  • 7.
    Kleyko, Denis
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Osipov, Evgeny
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Wiklund, Urban
    Department of Radiation Sciences, Biomedical Engineering, Umeå University, Umeå, Sweden.
    A Hyperdimensional Computing Framework for Analysis of Cardiorespiratory Synchronization during Paced Deep Breathing2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 34403-34415Article in journal (Refereed)
    Abstract [en]

    Objective: Autonomic function during deep breathing (DB) is normally scored based on the assumption that the heart rate is synchronized with the breathing. We have observed individuals with subtle arrhythmias during DB where autonomic function cannot be evaluated. This study presents a novel method for analyzing cardiorespiratory synchronization: feature-based analysis of the similarity between heart rate and respiration using principles of hyperdimensional computing. Methods: Heart rate and respiration signals were modeled using Fourier series analysis. Three feature variables were derived and mapped to binary vectors in a high-dimensional space. Using both synthesized data and recordings from patients/healthy subjects, the similarity between the feature vectors was assessed using Hamming distance (high-dimensional space), Euclidean distance (original space), and with a coherence-based index. Methods were evaluated via classification of the similarity indices into three groups. Results: The distance-based methods achieved good separation of signals into classes with different degree of cardiorespiratory synchronization, also providing identification of patients with low cardiorespiratory synchronization but high values of conventional DB scores. Moreover, binary high-dimensional vectors allowed an additional analysis of the obtained Hamming distance. Conclusions: Feature-based similarity analysis using hyperdimensional computing is capable of identifying signals with low cardiorespiratory synchronization during DB due to arrhythmias. Vector-based similarity analysis could be applied to other types of feature variables than based on spectral analysis. Significance: The proposed methods for robustly assessing cardiorespiratory synchronization during DB facilitate the identification of individuals where the evaluation of autonomic function is problematic or even impossible, thus, increasing the correctness of the conventional DB scores.

  • 8.
    Lan, Yihua
    et al.
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China.
    Bai, Kun
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China..
    Hung, Chih-Cheng
    Laboratory for Machine Vision and Security Research, College of Computing and Software Engineering, Kennesaw State University, Marietta, USA.
    Alelaiwi, Abdulhameed
    Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 45850-45857Article in journal (Refereed)
    Abstract [en]

    With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for health-care. The emergence of mobile cloud computing will provide cloud servers and storage for IMRT mobile applications, thus realizing visualized radiotherapy in a real sense.Equivalent uniform dose (EUD) is a biomedical indicator based on the dose measure. In this study, the dose volume histogram is used to describe the dose distribution of different tissues in target and nontarget regions. The traditional definition of equivalent uniform dose such as the exponential form and the linear form has only a few parameters in the model for fast calculation. However, there is no close relationship between this traditional definition and the dose volume histogram.In order to establish the consistency between the equivalent uniform dose and the dose volume histogram, this paper proposes a novel definition of equivalent uniform dose based on the volume dose curve, called VD-EUD. By using a unique organic volume weight curve, it is easy to calculate VD-EUD for different dose distributions. In the definition, different weight curves are used to represent the biological effects of different organs. For the target area, we should be more careful about those voxels with low dose (cold point); thus, the weight curve is monotonically decreasing. While for the nontarget area, the curve is monotonically increasing. Furthermore, we present the curves for parallel, serial and mixed organs of nontarget areas separately, and we define the weight curve form with only two parameters. Medical doctors can adjust the curve interactively according to different patients and organs. We also propose a fluence map optimization model with the VD-EUD constraint, which means the proposed EUD constraint will lead to a large feasible solution space.We compare the generalized equivalent uniform dose (gEUD) and the proposed VD-EUD by experiments, which show that the VD-EUD has a closer relationship with the dose volume histogram. If the biological survival probability is equivalent to the VD-EUD, the feasible solution space would be large, and the target areas can be covered.By establishing a personalized organic weight curve, medical doctors can have a unique VD-EUD for each patient. By using the flexible and adjustable equivalent uniform dose definition, we can establish VD-EUD-based fluence map optimization model, which will lead to a larger solution space than the traditional dose volume constraint-based model. The VD-EUD is a new definition; thus, we need more clinical testing and verification.

  • 9.
    Liu, B.
    et al.
    Department of Management Science, University of Strathclyde, Glasgow, United Kingdom.
    Lin, Jing
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    Zhang, Liangwei
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics. Department of Industrial Engineering, Dongguan University of Technology, Dongguan, China.
    Kumar, Uday
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.
    A Dynamic Prescriptive Maintenance Model Considering System Aging and Degradation2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 94941-94943, article id 8762155Article in journal (Refereed)
    Abstract [en]

    This paper develops a dynamic maintenance strategy for a system subject to aging and degradation. The influence of degradation level and aging on system failure rate is modeled in an additive way. Based on the observed degradation level at the inspection, repair or replacement is carried out upon the system. Previous researches assume that repair will always lead to an improvement in the health condition of the system. However, in our study, repair reduces the system age but on the other hand, increases the degradation level. Considering the two-fold influence of maintenance actions, we perform reliability analysis on system reliability as a first step. The evolution of system reliability serves as a foundation for establishing the maintenance model. The optimal maintenance strategy is achieved by minimizing the long-run cost rate in terms of the repair cycle. At each inspection, the parameters of the degradation processes are updated with maximum a posteriori estimation when a new observation arrives. The effectiveness of the proposed model is illustrated through a case study of locomotive wheel-sets. The maintenance model considers the influence of degradation and aging on system failure and dynamically determines the optimal inspection time, which is more flexible than traditional stationary maintenance strategies and can provide better performance in the field.

  • 10.
    Monrat, Ahmed Afif
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Schelén, Olov
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Andersson, Karl
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    A Survey of Blockchain from the Perspectives of Applications, Challenges and Opportunities2019In: IEEE Access, E-ISSN 2169-3536Article in journal (Refereed)
    Abstract [en]

    Blockchain is the underlying technology of a number of digital cryptocurrencies. Blockchain is a chain of blocks that store information with digital signatures in a decentralized and distributed network. The features of blockchain, including decentralization, immutability, transparency and auditability, make transactions more secure and tamper proof. Apart from cryptocurrency, blockchain technology can be used in financial and social services, risk management, healthcare facilities, and so on. A number of research studies focus on the opportunity that blockchain provides in various application domains. This paper presents a comparative study of the tradeoffs of blockchain and also explains the taxonomy and architecture of blockchain, provides a comparison among different consensus mechanisms and discusses challenges, including scalability, privacy, interoperability, energy consumption and regulatory issues. In addition, this paper also notes the future scope of blockchain technology.

  • 11.
    Safkhani, Masoumeh
    et al.
    Department of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 23514-23526Article in journal (Refereed)
    Abstract [en]

    Telecare Medicine Information System (TMIS)'s security importance attracts a lot of attention these days. Whatever the security of TMIS improves, its application becomes wider. To address this requirement, recently, Li et al. proposed a new privacy-preserving RFID authentication protocol for TMIS. After that, Zhou et al. and also Benssalah et al. presented their scheme, which is not secure, and they presented their new authentication protocol and claim that their proposal can provide higher security for TMIS applications. In this stream, Zheng et al. proposed a novel authentication protocol with application in smart campus, including TMIS. In this paper, we present an efficient impersonation and replay attacks against Zheng et al. with the success probability of 1 and a desynchronization attack which is applicable against all of the rest three mentioned protocols with the success probability of 1-2^{-n} , where n is the protocols parameters length. After that, we proposed a new protocol despite these protocols can resist the attacks presented in this paper and also other active and passive attacks. Our proposed protocol's security is also done both informally and formally through the Scyther tool.

  • 12.
    Santillán Martínez, G.
    et al.
    Department of Electrical Engineering and Automation, Aalto University, Helsinki .
    Sierla, S.
    Department of Electrical Engineering and Automation, Aalto University, Helsinki .
    Karhela, T.
    Department of Electrical Engineering and Automation, Aalto University, Helsinki .
    Lappalainen, J.
    VTT Technical Research Center of Finland Ltd, Espoo.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Department of Electrical Engineering and Automation, Aalto University, Helsinki .
    Automatic Generation of a High-Fidelity Dynamic Thermal-hydraulic Process Simulation Model from a 3D Plant Model2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 45217-45232, article id 434288Article in journal (Refereed)
    Abstract [en]

    Dynamic thermal-hydraulic simulation models have been extensively used by process industry for decision support in sectors such as power generation, mineral processing, pulp and paper, and oil and gas. Ever-growing competitiveness in the process industry forces experts to rely even more on dynamic simulation results to take decisions across the process plant lifecycle. However, time-consuming development of simulation models increases model generation costs, limiting their use in a wider number of applications. Detailed 3D plant models, developed during early plant engineering for process design, could potentially be used as a source of information to enable rapid development of high-fidelity simulation models. This paper presents a method for automatic generation of a thermal-hydraulic process simulation model from a 3D plant model. Process structure, dimensioning and component connection information included in the 3D plant model is extracted from the machine-readable export of the 3D design tool and used to automatically generate and configure a dynamic thermal-hydraulic simulation model. In particular, information about the piping dimensions and elevations is retrieved from the 3D plant model and used to calculate head loss coefficients of the pipelines and to configure the piping network model. This step, not considered in previous studies, is crucial for obtaining high-fidelity industrial process models. The proposed method is tested using a laboratory process and the results of the automatically generated model are compared with experimental data from the physical system as well as with a simulation model developed using design data utilized by existing methods on the state-of-the-art. Results show that the proposed method is able to generate high-fidelity models which are able to accurately predict the targeted system, even during operational transients.

  • 13.
    Santillán Martínez, Gerardo
    et al.
    Department of Electrical Engineering and Automation, Aalto University.
    Karhela, Tommi
    VTT Technical Research Centre of Finland .
    Ruusu, Reino
    VTT Technical Research Centre of Finland Ltd, Espoo.
    Sierla, Seppo A.
    Department of Electrical Engineering and Automation, Aalto University.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Department of Electrical Engineering and Automation, Aalto University.
    An Integrated Implementation Methodology of a Lifecycle-Wide Tracking Simulation Architecture2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 15391-15407Article in journal (Refereed)
    Abstract [en]

    A tracking simulator is a decision support application in which dynamic estimation is used to continuously align the results of an online first principle simulation model with the measurements of the targeted plant. They are a holistic application where current and future plant information is available for operation support of process plants. Existing tracking simulators have focused on the application of online and offline methods for estimation of their underlying first principle models (FPMs). However, these systems have been less attractive than similar alternatives based on empirical modeling, due to the lack of systematic approaches that address challenges across the tracking simulation lifecycle, such as laborious development of FPMs and high integration costs with the process or with other systems and simulation methods. In contrast, the approach presented in this paper integrates a tracking simulation architecture and various simulation methods to address the described challenges as follows. In order to tackle time-consuming development of FPMs, a method for generating tracking simulation models from models created during design phase is proposed. The process of connecting the tracking simulator to the physical plant and initializing the tracking simulator is automated. An optimization method for tracking simulation applications is developed to overcome drawbacks of available methods. The simulation architecture developed applies the proposed methodology during the various phases of tracking simulation. Furthermore, it exploits industrial communication standards to avoid the need for point-to-point integration of various simulators and other systems used over the course of the tracking simulator lifecycle. The work is demonstrated with laboratory process equipment.

  • 14.
    Sun, Jian
    et al.
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Liu, Tong
    Department of Information and Communication Engineering, Harbin Engineering University, Harbin.
    Wang, Xianxian
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Xing, Chengwen
    School of Information and Electronics, Beijing Institute of Technology, Beijing.
    Xiao, Hailin
    Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Zhang, Zhogshan
    Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology.
    Optimal mode selection with uplink data rate maximization for D2D-aided underlaying cellular networks2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 8844-8856, article id 7762100Article in journal (Refereed)
    Abstract [en]

    The device-to-device (D2D) communication has been regarded as an effective technique for complementing and enhancing the conventional cellular systems owing to its capability of substantially improving both the spectral and power efficiencies of wireless networks. However, the severe interference imposed on the conventional cellular users (CUs) by the geographically close-by D2D pairs may cause a significant performance erosion in the D2D-aided underlaying cellular networks (CNs). In this paper, performance analysis for the D2D-aided underlaying CNs in terms of throughput is provided. We first derive the closed-form expressions of the coverage probability for both the conventional cellular links and the D2D links, followed by giving out the approximated expressions of the ergodic data rate for both an individual cellular/D2D link and the whole underlaying network. Furthermore, the key parameters (e.g., the density of D2D users (DUs) or CUs, and the average geographical distance between a pair of D2D peers) significantly impacting the channel capacity are adaptively adjusted for maximizing the sum data rate of the proposed underlaying networks. In addition, both theoretical analysis and simulation results reveal the attainability of the maximal throughput by optimizing the critical parameters, such as the density of DUs, provided that the scale factor between the DUs and sum users (i.e., comprising both conventional CUs and DUs) can be effectively balanced subject to the constraints specified in the proposed scheme

  • 15.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Tang, Shenglong
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cloud Robotics: Current Status and Open Issues2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 2797-2807Article in journal (Refereed)
    Abstract [en]

    With the development of cloud computing, big data and other emerging technologies, the integration of cloud technology and multi-robot systems makes it possible to design multi-robot systems with improved energy efficiency, high real-time performance and low cost. In order to address the potential of clouds in enhancing robotics for industrial systems, this paper describes the basic concepts and development process of cloud robotics and the overall architecture of these systems. Then, the major driving forces behind the development of cloud robotics are carefully analyzed from the point of view of cloud computing, big data, open source resources, robot cooperative learning, and network connectivity. Subsequently, the key issues and challenges in the current cloud robotic systems are proposed, and some possible solutions are also given. Finally, the potential value of cloud robotic systems in different practical applications is discussed.

  • 16.
    Wu, Qihui
    et al.
    College of Communications Engineering PLA University of Science and Technology, Nanjing.
    Ding, Guoro
    College of Communications Engineering PLA University of Science and Technology, Nanjing.
    Du, Zhiyong
    PLA Academy of National Defense Information, Wuhan.
    Sun, Youming
    National Digital Switching System Engineering & Technological Research Center, Zhengzhou.
    Jo, Minho
    Department of Computer and Information Science, Korea University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Cloud-Based Architecture for the Internet of Spectrum Devices (IoSD) over Future Wireless Networks2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 2854-2862Article in journal (Refereed)
    Abstract [en]

    The dramatic increase in data rates in wireless networks has caused radio spectrum usage to be an essential and critical issue. Spectrum sharing is widely recognized as an affordable, near-term method to address this issue. This article first characterizes the new features of spectrum sharing in future wireless networks, including heterogeneity in sharing bands, diversity in sharing patterns, crowd intelligence in sharing devices, and hyper-densification in sharing networks. Then, to harness the benefits of these unique features and promote a vision of spectrum without bounds and networks without borders, this article introduces a new concept of the Internet of Spectrum Devices (IoSD) and develops a cloud-based architecture for IoSD over future wireless networks, with the prime aim of building a bridging network among various spectrum monitoring devices (SMDs) and massive spectrum utilization devices (SUDs), and enabling a highly-efficient spectrum sharing and management paradigm for future wireless networks. Furthermore, this article presents a systematic tutorial on the key enabling techniques of the IoSD, including big spectrum data analytics, hierarchal spectrum resource optimization, and quality of experience (QoE)- oriented spectrum service evaluation. In addition, the unresolved research issues are also presented.

  • 17.
    Yan, Huan
    et al.
    School of Electronic and Information Engineering, Beijing Jiaotong University.
    Gao, Deyun
    School of Electronic and Information Engineering, Beijing Jiaotong University.
    Su, Wei
    School of Electronic and Information Engineering, Beijing Jiaotong University.
    Foh, Chuan Heng
    5G-IC, Department of Electrical and Electronic Engineering, Institute for Communication Systems, University of Surrey.
    Zhang, Hongke
    School of Electronic and Information Engineering, Beijing Jiaotong University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Caching Strategy Based on Hierarchical Cluster for Named Data Networking2017In: IEEE Access, E-ISSN 2169-3536, Vol. 5, p. 8433-8443, article id 7898837Article in journal (Refereed)
    Abstract [en]

    The in-network caching strategy in named data networking can not only reduce the unnecessaryfetching of content from the original content server deep in the core network and improve the user responsetime, but also ease the trafc in the core network. However, challenges exist in in-network caching, suchas the distributed locations of storage and relatively small cache space which limit the hit rate, and thecache management introduces further overhead. In this paper, we propose a two-layer hierarchical clusterbasedcaching solution to improve in-network caching efciency. A network is grouped into several clusters,then, a clusterhead is nominated for each cluster to make caching decision. The clustering approach offersscalability and permits multiple aspects of inputs to be used for decision making. Our solution jointlyconsiders the location and content popularity for caching.We implement our strategy in ndnSIM and test it onGEANT-based network and AS3967 network. Our simulation results show signicant improvement over itspeers.INDEX

  • 18.
    Yaseen, Zaher Mundher
    et al.
    School of Civil Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai, Johor Bahru, Malaysia.
    Mohtar, Wan Hanna Melini Wan
    Sustainable and Smart Township Research Centre (SUTRA), Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia.
    Ameen, Ameen Mohammed Salih
    Department of Water Resources, University of Baghdad, Baghdad, Iraq.
    Ebtehaj, Isa
    Department of Civil Engineering, Razi University, Kermanshah, Iran.
    Razali, Siti Fatin Mohd
    Sustainable and Smart Township Research Centre (SUTRA), Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia.
    Bonakdari, Hossein
    Department of Civil Engineering, Razi University, Kermanshah, Iran.
    Salih, Sinan Q.
    Institute of Research and Development, Duy Tan University, Da Nang, Vietnam.
    Al-Ansari, Nadhir
    Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Mining and Geotechnical Engineering.
    Shahid, Shamsuddin
    School of Civil Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai, Johor Bahru, Malaysia.
    Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 74471-74481Article in journal (Refereed)
    Abstract [en]

    The performance of the bio-inspired adaptive neuro-fuzzy inference system (ANFIS) models are proposed for forecasting highly non-linear streamflow of Pahang River, located in a tropical climatic region of Peninsular Malaysia. Three different bio-inspired optimization algorithms namely particle swarm optimization (PSO), genetic algorithm (GA), and differential evolution (DE) were individually used to tune the membership function of ANFIS model in order to improve the capability of streamflow forecasting. Different combination of antecedent streamflow was used to develop the forecasting models. The performance of the models was evaluated using a number of metrics including mean absolute error (MAE), root mean square error (RMSE), coefficient of determination ( R2 ), and Willmott’s Index (WI) statistics. The results revealed that increasing number of inputs has a positive impact on the forecasting ability of both ANFIS and hybrid ANFIS models. The comparison of the performance of three optimization methods indicated PSO improved the capability of ANFIS model (RMSE = 7.96; MAE = 2.34; R2=0.998 and WI = 0.994) more compared to GA and DE in forecasting streamflow. The uncertainty band of ANFIS-PSO forecast was also found the lowest (±0.217), which indicates that ANFIS-PSO model can be used for reliable forecasting of highly stochastic river flow in tropical environment.

  • 19.
    Zhabelova, Gulnara
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Vesterlund, Mattias
    RISE SICS North, 973 47, Luleå.
    Eschmann, Sascha
    National Institute of Applied Sciences, Strasbourg, France.
    Berezovskaya, Yulia
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Department of Electrical Engineering and Automation, Aalto University, Helsinki .
    Flieller, Damien
    National Institute of Applied Sciences, Strasbourg, France.
    A Comprehensive Model of Data Center: from CPU to Cooling Tower2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 2169-3536Article in journal (Refereed)
    Abstract [en]

    Aiming at addressing environmental challenges, large data centers such as Facebook, Google, Yahoo, etc., are increasing share of green power in their daily energy consumption. Such trends drive research into new directions, e.g. sustainable data centers. The research often relies on expressive models that provides sufficient details however practical to re-use and expand. There is a lack of available data center models that capture internal operating states of the facility from the CPU to the cooling tower. It is a challenge to develop a model that allows to describe complete data center of any scale including its connection to the grid. This paper proposes such a model building on existing work. The challenge was to put the pieces of data center together and model behavior of each element so that interdependencies between components and parameters and operating states are captured correctly and in sufficient details. The proposed model was used in the project “Data center microgrid integration” and proven to be adequate and important to support such study.

1 - 19 of 19
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf