Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 1546
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Abdelaziz, Ahmed
    et al.
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Ang, Tanfong
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Sookhak, Mehdi
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Khan, Suleman
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liew, Cheesun
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Akhunzada, Adnan
    Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur.
    Survey on network virtualization using openflow: Taxonomy, opportunities, and open issues2016Ingår i: KSII Transactions on Internet and Information Systems, ISSN 1976-7277, Vol. 10, nr 10, s. 4902-4932Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The popularity of network virtualization has recently regained considerable momentum because of the emergence of OpenFlow technology. It is essentially decouples a data plane from a control plane and promotes hardware programmability. Subsequently, OpenFlow facilitates the implementation of network virtualization. This study aims to provide an overview of different approaches to create a virtual network using OpenFlow technology. The paper also presents the OpenFlow components to compare conventional network architecture with OpenFlow network architecture, particularly in terms of the virtualization. A thematic OpenFlow network virtualization taxonomy is devised to categorize network virtualization approaches. Several testbeds that support OpenFlow network virtualization are discussed with case studies to show the capabilities of OpenFlow virtualization. Moreover, the advantages of popular OpenFlow controllers that are designed to enhance network virtualization is compared and analyzed. Finally, we present key research challenges that mainly focus on security, scalability, reliability, isolation, and monitoring in the OpenFlow virtual environment. Numerous potential directions to tackle the problems related to OpenFlow network virtualization are likewise discussed

  • 2.
    Abdukalikova, Anara
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Machine Learning assisted system for the resource-constrained atrial fibrillation detection from short single-lead ECG signals2018Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    An integration of ICT advances into a conventional healthcare system is spreading extensively nowadays. This trend is known as Electronic health or E-Health. E-Health solutions help to achieve the sustainability goal of increasing the expected lifetime while improving the quality of life by providing a constant healthcare monitoring. Cardiovascular diseases are one of the main killers yearly causing approximately 17.7 million deaths worldwide. The focus of this work is on studying the detection of one of the cardiovascular diseases – Atrial Fibrillation (AF) arrhythmia.  This type of arrhythmia has a severe influence on the heart health conditions and could cause congestive heart failure (CHF), stroke, and even increase the risk of death. Therefore, it is important to detect AF as early as possible. In this thesis we focused on studying various machine learning techniques for AF detection using only short single lead Electrocardiography recordings. A web-based solution was built as a final prototype, which first simulates the reception of a recorded signal, conducts the preprocessing, makes a prediction of the AF presence, and visualizes the result. For the AF detection the relatively high accuracy score was achieved comparable to the one of the state-of-the-art. The work was based on the investigation of the proposed architectures and the usage of the database of signals from the 2017 PhysioNet/CinC Challenge. However, an additional constraint was introduced to the original problem formulation, since the idea of a future deployment on the resource-limited devices places the restrictions on the complexity of the computations being performed for achieving the prediction. Therefore, this constraint was considered during the development phase of the project.

  • 3.
    Abedin, Md. Zainal
    et al.
    University of Science and Technology Chittagong.
    Chowdhury, Abu Sayeed
    University of Science and Technology Chittagong.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Karim, Razuan
    University of Science and Technology Chittagong.
    An Interoperable IP based WSN for Smart Irrigation Systems2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Wireless Sensor Networks (WSN) have been highly developed which can be used in agriculture to enable optimal irrigation scheduling. Since there is an absence of widely used available methods to support effective agriculture practice in different weather conditions, WSN technology can be used to optimise irrigation in the crop fields. This paper presents architecture of an irrigation system by incorporating interoperable IP based WSN, which uses the protocol stacks and standard of the Internet of Things paradigm. The performance of fundamental issues of this network is emulated in Tmote Sky for 6LoWPAN over IEEE 802.15.4 radio link using the Contiki OS and the Cooja simulator. The simulated results of the performance of the WSN architecture presents the Round Trip Time (RTT) as well as the packet loss of different packet size. In addition, the average power consumption and the radio duty cycle of the sensors are studied. This will facilitate the deployment of a scalable and interoperable multi hop WSN, positioning of border router and to manage power consumption of the sensors.

  • 4.
    Abedin, Md. Zainal
    et al.
    University of Science and Technology, Chittagong.
    Paul, Sukanta
    University of Science and Technology, Chittagong.
    Akhter, Sharmin
    University of Science and Technology, Chittagong.
    Siddiquee, Kazy Noor E Alam
    University of Science and Technology, Chittagong.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Selection of Energy Efficient Routing Protocol for Irrigation Enabled by Wireless Sensor Networks2017Ingår i: Proceedings of 2017 IEEE 42nd Conference on Local Computer Networks Workshops, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017, s. 75-81Konferensbidrag (Refereegranskat)
    Abstract [en]

    Wireless Sensor Networks (WSNs) are playing remarkable contribution in real time decision making by actuating the surroundings of environment. As a consequence, the contemporary agriculture is now using WSNs technology for better crop production, such as irrigation scheduling based on moisture level data sensed by the sensors. Since WSNs are deployed in constraints environments, the life time of sensors is very crucial for normal operation of the networks. In this regard routing protocol is a prime factor for the prolonged life time of sensors. This research focuses the performances analysis of some clustering based routing protocols to select the best routing protocol. Four algorithms are considered, namely Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient sensor Network (TEEN), Stable Election Protocol (SEP) and Energy Aware Multi Hop Multi Path (EAMMH). The simulation is carried out in Matlab framework by using the mathematical models of those algortihms in heterogeneous environment. The performance metrics which are considered are stability period, network lifetime, number of dead nodes per round, number of cluster heads (CH) per round, throughput and average residual energy of node. The experimental results illustrate that TEEN provides greater stable region and lifetime than the others while SEP ensures more througput.

  • 5.
    Abedin, Md. Zainal
    et al.
    University of Science and Technology, Chittagong.
    Siddiquee, Kazy Noor E Alam
    University of Science and Technology Chittagong.
    Bhuyan, M. S.
    University of Science & Technology Chittagong.
    Karim, Razuan
    University of Science and Technology Chittagong.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Performance Analysis of Anomaly Based Network Intrusion Detection Systems2018Ingår i: Proveedings of the 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Piscataway, NJ: IEEE Computer Society, 2018, s. 1-7Konferensbidrag (Refereegranskat)
    Abstract [en]

    Because of the increased popularity and fast expansion of the Internet as well as Internet of things, networks are growing rapidly in every corner of the society. As a result, huge amount of data is travelling across the computer networks that lead to the vulnerability of data integrity, confidentiality and reliability. So, network security is a burning issue to keep the integrity of systems and data. The traditional security guards such as firewalls with access control lists are not anymore enough to secure systems. To address the drawbacks of traditional Intrusion Detection Systems (IDSs), artificial intelligence and machine learning based models open up new opportunity to classify abnormal traffic as anomaly with a self-learning capability. Many supervised learning models have been adopted to detect anomaly from networks traffic. In quest to select a good learning model in terms of precision, recall, area under receiver operating curve, accuracy, F-score and model built time, this paper illustrates the performance comparison between Naïve Bayes, Multilayer Perceptron, J48, Naïve Bayes Tree, and Random Forest classification models. These models are trained and tested on three subsets of features derived from the original benchmark network intrusion detection dataset, NSL-KDD. The three subsets are derived by applying different attributes evaluator’s algorithms. The simulation is carried out by using the WEKA data mining tool.

  • 6.
    Abrishambaf, Reza
    et al.
    Department of Engineering Technology, Miami University, Hamilton, OH.
    Bal, Mert
    Department of Engineering Technology, Miami University, Hamilton, OH.
    Vyatkin, Valeriy
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Distributed home automation system based on IEC61499 function blocks and wireless sensor networks2017Ingår i: Proceedings of the IEEE International Conference on Industrial Technology, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017, s. 1354-1359, artikel-id 7915561Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, a distributed home automation system will be demonstrated. Traditional systems are based on a central controller where all the decisions are made. The proposed control architecture is a solution to overcome the problems such as the lack of flexibility and re-configurability that most of the conventional systems have. This has been achieved by employing a method based on the new IEC 61499 function block standard, which is proposed for distributed control systems. This paper also proposes a wireless sensor network as the system infrastructure in addition to the function blocks in order to implement the Internet-of-Things technology into the area of home automation as a solution for distributed monitoring and control. The proposed system has been implemented in both Cyber (nxtControl) and Physical (Contiki-OS) level to show the applicability of the solution

  • 7.
    Acharya, Soam
    et al.
    Cornell University, Ithaca.
    Smith, Brian P
    Cornell University, Ithaca.
    Parnes, Peter
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Characterizing user access to videos on the World Wide Web1999Ingår i: Multimedia computing and networking 2000 / [ed] Klara Nahrstedt, Bellingham, Wash: SPIE - International Society for Optical Engineering, 1999, s. 130-141Konferensbidrag (Refereegranskat)
    Abstract [en]

    Despite evidence of rising popularity of video on the web (or VOW), little is known about how users access video. However, such a characterization can greatly benefit the design of multimedia systems such as web video proxies and VOW servers. Hence, this paper presents an analysis of trace data obtained from an ongoing VOW experiment in Lulea University of Technology, Sweden. This experiment is unique as video material is distributed over a high bandwidth network allowing users to make access decisions without the network being a major factor. Our analysis revealed a number of interesting discoveries regarding user VOW access. For example, accesses display high temporal locality: several requests for the same video title often occur within a short time span. Accesses also exhibited spatial locality of reference whereby a small number of machines accounted for a large number of overall requests. Another finding was a browsing pattern where users preview the initial portion of a video to find out if they are interested. If they like it, they continue watching, otherwise they halt it. This pattern suggests that caching the first several minutes of video data should prove effective. Lastly, the analysis shows that, contrary to previous studies, ranking of video titles by popularity did not fit a Zipfian distribution.

  • 8.
    Adalat, Mohsin
    et al.
    COSMOSE Research Group, Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan.
    Niazi, Muaz A.
    COSMOSE Research Group, Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Variations in power of opinion leaders in online communication networks2018Ingår i: Royal Society Open Science, E-ISSN 2054-5703, Vol. 5, nr 10, artikel-id 180642Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Online social media has completely transformed how we communicate with each other. While online discussion platforms are available in the form of applications and websites, an emergent outcome of this transformation is the phenomenon of ‘opinion leaders’. A number of previous studies have been presented to identify opinion leaders in online discussion networks. In particular, Feng (2016 Comput. Hum. Behav. 54, 43–53. (doi:10.1016/j.chb.2015.07.052)) has identified five different types of central users besides outlining their communication patterns in an online communication network. However, the presented work focuses on a limited time span. The question remains as to whether similar communication patterns exist that will stand the test of time over longer periods. Here, we present a critical analysis of the Feng framework both for short-term as well as for longer periods. Additionally, for validation, we take another case study presented by Udanor et al. (2016 Program 50, 481–507. (doi:10.1108/PROG-02-2016-0011)) to further understand these dynamics. Results indicate that not all Feng-based central users may be identifiable in the longer term. Conversation starter and influencers were noted as opinion leaders in the network. These users play an important role as information sources in long-term discussions. Whereas network builder and active engager help in connecting otherwise sparse communities. Furthermore, we discuss the changing positions of opinion leaders and their power to keep isolates interested in an online discussion network.

  • 9.
    Adewumi, Oluwatosin
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Liwicki, Foteini
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Liwicki, Marcus
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Conversational Systems in Machine Learning from the Point of View of the Philosophy of Science—Using Alime Chat and Related Studies2019Ingår i: Philosophies, ISSN 2409-9287, Vol. 4, nr 3, artikel-id 41Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This essay discusses current research efforts in conversational systems from the philosophy of science point of view and evaluates some conversational systems research activities from the standpoint of naturalism philosophical theory. Conversational systems or chatbots have advanced over the decades and now have become mainstream applications. They are software that users can communicate with, using natural language. Particular attention is given to the Alime Chat conversational system, already in industrial use, and the related research. The competitive nature of systems in production is a result of different researchers and developers trying to produce new conversational systems that can outperform previous or state-of-the-art systems. Different factors affect the quality of the conversational systems produced, and how one system is assessed as being better than another is a function of objectivity and of the relevant experimental results. This essay examines the research practices from, among others, Longino’s view on objectivity and Popper’s stand on falsification. Furthermore, the need for qualitative and large datasets is emphasized. This is in addition to the importance of the peer-review process in scientific publishing, as a means of developing, validating, or rejecting theories, claims, or methodologies in the research community. In conclusion, open data and open scientific discussion fora should become more prominent over the mere publication-focused trend.

  • 10.
    Agreste, Santa
    et al.
    Department of Mathematics and Computer Science, Physical Sciences and Earth Sciences, University of Messina.
    De Meo, Pasquale
    of Ancient and Modern Civilizations, University of Messina.
    Fiumara, Giacomo
    Department of Mathematics and Computer Science, Physical Sciences and Earth Sciences, University of Messina.
    Piccione, Giuseppe
    Department of Mathematics and Computer Science, Physical Sciences and Earth Sciences, University of Messina.
    Piccolo, Sebastiano
    Department of Management Engineering - Engineering Systems Division at the Technical University of Denmark.
    Rosaci, Domenico
    DIIES Department, University of Reggio Calabria Via Graziella.
    Sarné, Giuseppe M. L.
    DICEAM Department, University of Reggio Calabria Via Graziella.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    An empirical comparison of algorithms to find communities in directed graphs and their application in Web Data Analytics2017Ingår i: IEEE Transactions on Big Data, E-ISSN 2332-7790, Vol. 3, nr 3, s. 289-306Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Detecting communities in graphs is a fundamental tool to understand the structure of Web-based systems and predict their evolution. Many community detection algorithms are designed to process undirected graphs (i.e., graphs with bidirectional edges) but many graphs on the Web - e.g. microblogging Web sites, trust networks or the Web graph itself - are often directed. Few community detection algorithms deal with directed graphs but we lack their experimental comparison. In this paper we evaluated some community detection algorithms across accuracy and scalability. A first group of algorithms (Label Propagation and Infomap) are explicitly designed to manage directed graphs while a second group (e.g., WalkTrap) simply ignores edge directionality; finally, a third group of algorithms (e.g., Eigenvector) maps input graphs onto undirected ones and extracts communities from the symmetrized version of the input graph. We ran our tests on both artificial and real graphs and, on artificial graphs, WalkTrap achieved the highest accuracy, closely followed by other algorithms; Label Propagation has outstanding performance in scalability on both artificial and real graphs. The Infomap algorithm showcased the best trade-off between accuracy and computational performance and, therefore, it has to be considered as a promising tool for Web Data Analytics purposes.

  • 11.
    Ahmad, Iftikhar
    et al.
    Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur.
    Noor, Rafidah Md
    Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur.
    Ali, Ihsan
    Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur.
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Characterizing the role of vehicular cloud computing in road traffic management2017Ingår i: International Journal of Distributed Sensor Networks, ISSN 1550-1329, E-ISSN 1550-1477, Vol. 13, nr 5Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Vehicular cloud computing is envisioned to deliver services that provide traffic safety and efficiency to vehicles. Vehicular cloud computing has great potential to change the contemporary vehicular communication paradigm. Explicitly, the underutilized resources of vehicles can be shared with other vehicles to manage traffic during congestion. These resources include but are not limited to storage, computing power, and Internet connectivity. This study reviews current traffic management systems to analyze the role and significance of vehicular cloud computing in road traffic management. First, an abstraction of the vehicular cloud infrastructure in an urban scenario is presented to explore the vehicular cloud computing process. A taxonomy of vehicular clouds that defines the cloud formation, integration types, and services is presented. A taxonomy of vehicular cloud services is also provided to explore the object types involved and their positions within the vehicular cloud. A comparison of the current state-of-the-art traffic management systems is performed in terms of parameters, such as vehicular ad hoc network infrastructure, Internet dependency, cloud management, scalability, traffic flow control, and emerging services. Potential future challenges and emerging technologies, such as the Internet of vehicles and its incorporation in traffic congestion control, are also discussed. Vehicular cloud computing is envisioned to have a substantial role in the development of smart traffic management solutions and in emerging Internet of vehicles

  • 12.
    Ahmed, Ejaz
    et al.
    The Centre for Mobile Cloud Computing Research, Faculty of Computer Science and Information Technology, University of Malaya.
    Yaqoob, Ibrar
    The Centre for Mobile Cloud Computing Research, Faculty of Computer Science and Information Technology, University of Malaya.
    Hashem, Ibrahim Abaker Targio
    The Centre for Mobile Cloud Computing Research, Faculty of Computer Science and Information Technology, University of Malaya.
    Khan, Imran
    Schneider Electric Industries, Grenoble.
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    The Centre for Mobile Cloud Computing Research, Faculty of Computer Science and Information Technology, University of Malaya.
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    The role of big data analytics in Internet of Things2017Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 129, nr 2, s. 459-471Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The explosive growth in the number of devices connected to the Internet of Things (IoT) and the exponential increase in data consumption only reflect how the growth of big data perfectly overlaps with that of IoT. The management of big data in a continuously expanding network gives rise to non-trivial concerns regarding data collection efficiency, data processing, analytics, and security. To address these concerns, researchers have examined the challenges associated with the successful deployment of IoT. Despite the large number of studies on big data, analytics, and IoT, the convergence of these areas creates several opportunities for flourishing big data and analytics for IoT systems. In this paper, we explore the recent advances in big data analytics for IoT systems as well as the key requirements for managing big data and for enabling analytics in an IoT environment. We taxonomized the literature based on important parameters. We identify the opportunities resulting from the convergence of big data, analytics, and IoT as well as discuss the role of big data analytics in IoT applications. Finally, several open challenges are presented as future research directions.

  • 13.
    Akbar, Mariam
    et al.
    COMSATS Institute of Information Technology, Islamabad.
    Javaid, Nadeem
    COMSATS Institute of Information Technology, Islamabad.
    Kahn, Ayesha Hussain
    COMSATS Institute of Information Technology, Islamabad.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Shoaib, Muhammad
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility2016Ingår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 16, nr 3, artikel-id 404Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability

  • 14.
    Akbarzadeh, Kasra
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Navigational aid to points of interests outside the field of view in virtual environments2019Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Advances in Virtual reality have brought opportunities for cinematic content to the users by allowing them to look around freely in any arbitrary direction and to interact as they please. This, however, imposes difficulties to the content creators as the freedom given to the audience results in less control over the user. The lack of control over what the audience is paying attention to could cause them to miss out on important points of interests and content creators can no longer rely on previous methods to draw and direct their attention. This study aims to find different means in how to direct and draw the attention of participants inside a 3-dimensional virtual environment without disrupting the virtual experience. This is achieved by comparing five different approaches in the virtual environment to navigate the participants. These approaches are Flicker, Dim, Auditory feedback, Haptic feedback and Tilt. A total of 15 participants participated in this study and were, post simulation, given a questionnaire to evaluate which approach was the least obvious, confusing and disturbing. One approach, flicker, had the best outcome in terms of guiding the participants in the virtual environment but was perceived to be the most disturbing one as well.

  • 15.
    Akkaya, Kemal
    et al.
    Southern Illinois University.
    Aust, Stefan
    NEC Communication Systems, Ltd..
    Hollick, Matthias
    TU Darmstadt.
    Itaya, Satoko
    Smart Wireless Laboratory, NICT.
    Kantarci, Burak
    University of Ottawa.
    Pfeiffer, Tom
    TU Berlin.
    Senel, Fatih
    International Antalya University.
    Strayer, Tim
    BBN Technologies.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Luleå tekniska universitet, Institutionen för system- och rymdteknik, CDT.
    Message from the demonstrations chair2014Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    It is my pleasure to welcome you to the sixth Demonstration Session at the IEEE Conference on Local Computer Networks (LCN) 2014. We were looking for demonstrations for all topics covered by the main conference as well as all the workshops held in conjunction with the conference. The technical demonstrations were strongly encouraged to show innovative and original research. The main purpose of the demo session is to provide demonstrations that validate important research issues and/or show innovative prototypes.

  • 16.
    Akter, Shamima
    et al.
    International Islamic University, Chittagong, Bangladesh.
    Nahar, Nazmun
    University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A New Crossover Technique to Improve Genetic Algorithm and Its Application to TSP2019Ingår i: Proceedings of 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 2019, artikel-id 18566123Konferensbidrag (Refereegranskat)
    Abstract [en]

    Optimization problem like Travelling Salesman Problem (TSP) can be solved by applying Genetic Algorithm (GA) to obtain perfect approximation in time. In addition, TSP is considered as a NP-hard problem as well as an optimal minimization problem. Selection, crossover and mutation are the three main operators of GA. The algorithm is usually employed to find the optimal minimum total distance to visit all the nodes in a TSP. Therefore, the research presents a new crossover operator for TSP, allowing the further minimization of the total distance. The proposed crossover operator consists of two crossover point selection and new offspring creation by performing cost comparison. The computational results as well as the comparison with available well-developed crossover operators are also presented. It has been found that the new crossover operator produces better results than that of other cross-over operators.

  • 17.
    Alakärppä, Ismo
    et al.
    University of Lapland, Rovaniemi.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Luleå tekniska universitet, Institutionen för system- och rymdteknik, CDT.
    Hosio, Simo
    University of Oulu.
    Johansson, Dan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ojala, Timo
    University of Oulu.
    NIMO overall architecture and service enablers2014Rapport (Övrigt vetenskapligt)
    Abstract [en]

    This article describes the architecture and service enablers developed in the NIMO project. Furthermore, it identifies future challenges and knowledge gaps in upcoming ICT service development for public sector units empowering citizens with enhanced tools for interaction and participation. We foresee crowdsourced applications where citizens contribute with dynamic, timely and geographically spread gathered information.

  • 18.
    Alam, Md. Eftekhar
    et al.
    International Islamic University Chittagong, Bangladesh.
    Kaiser, M. Shamim
    Jahangirnagar University, Dhaka, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    An IoT-Belief Rule Base Smart System to Assess Autism2018Ingår i: Proceedings of the 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018), IEEE, 2018, s. 671-675Konferensbidrag (Refereegranskat)
    Abstract [en]

    An Internet-of-Things (IoT)-Belief Rule Base (BRB) based hybrid system is introduced to assess Autism spectrum disorder (ASD). This smart system can automatically collect sign and symptom data of various autistic children in realtime and classify the autistic children. The BRB subsystem incorporates knowledge representation parameters such as rule weight, attribute weight and degree of belief. The IoT-BRB system classifies the children having autism based on the sign and symptom collected by the pervasive sensing nodes. The classification results obtained from the proposed IoT-BRB smart system is compared with fuzzy and expert based system. The proposed system outperformed the state-of-the-art fuzzy system and expert system.

  • 19.
    Alam, Quratulain
    et al.
    Department of Computer Sciences, Institute of Management Sciences, Peshawar.
    Tabbasum, Saher
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Malik, Saif U.R.
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Malik, Masoom
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Ali, Tamleek
    Department of Computer Sciences, Institute of Management Sciences, Peshawar.
    Akhunzada, Adnan
    Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur.
    Khan, Samee U.
    Department of electrical and computer engineering, North Dakota State University, Fargo, ND.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Buyya, Rajkumar
    Cloud Computing and Distributed Systems, (CLOUDS) Laboratory, Department of Computing and Information Systems, The University of Melbourne.
    Formal Verification of the xDAuth Protocol2016Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 11, nr 9, s. 1956-1969Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.

  • 20.
    Albayrak, Sahin
    et al.
    DAI-Labor, Technische Universität Berlin, Germany.
    Elkotob, Muslim
    DAI-Labor, Technische Universität Berlin, Germany.
    Toker, Ahmet
    DAI-Labor, Technische Universität Berlin, Germany.
    Smart middleware for mutual service-network awareness in evolving 3GPP networks: network aware applications & application aware networks2008Ingår i: 2008 3rd International Conference on Communication System Software and Middleware and workshops: [COMSWARE 2008]; Bangalore, India, 6 - 10 January 2008, Piscataway, NJ: IEEE Communications Society, 2008, s. 44-50Konferensbidrag (Refereegranskat)
    Abstract [en]

    We have designed a smart middleware and are working on implementing and deploying it as a landmark architectural piece run by nodes of the Future Internet. The middleware we propose aims as a main goal at making applications and services fully network-aware in the sense that they utilize network resources and tune their own demands based on what the underlying networks can offer. On the other hand, the smart middleware makes networks service aware in the sense that networks also adapt their configuration to service demands. Challenges of the Future Internet such as scalability, increased interoperability, and smart collaboration between engines are addressed by our middleware. Focusing on 3GPP networks including IP Multimedia Subsystem (IMS) networks, this paper presents the architectural design of our middleware and shows in two showcases how and why it is capable of addressing future challenges. Scenarios such as service and network-aware coordinated load balancing and "always-best-connected" as a service verify the merits of our smart middleware design.

  • 21.
    Alberti, M.
    et al.
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Switzerland.
    Pondenkandath, V.
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Switzerland.
    Wursch, M.
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Switzerland.
    Ingold, R.
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Switzerland.
    Liwicki, Marcus
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB. Document Image and Voice Analysis Group (DIVA), University of Fribourg, Switzerland.
    DeepDIVA: A Highly-Functional Python Framework for Reproducible Experiments2018Ingår i: Proceedings of International Conference on Frontiers in Handwriting Recognition, ICFHR 2018, IEEE, 2018, s. 423-428, artikel-id 8583798Konferensbidrag (Refereegranskat)
    Abstract [en]

    We introduce DeepDIVA: an infrastructure designed to enable quick and intuitive setup of reproducible experiments with a large range of useful analysis functionality. Reproducing scientific results can be a frustrating experience, not only in document image analysis but in machine learning in general. Using DeepDIVA a researcher can either reproduce a given experiment or share their own experiments with others. Moreover, the framework offers a large range of functions, such as boilerplate code, keeping track of experiments, hyper-parameter optimization, and visualization of data and results. To demonstrate the effectiveness of this framework, this paper presents case studies in the area of handwritten document analysis where researchers benefit from the integrated functionality. DeepDIVA is implemented in Python and uses the deep learning framework PyTorch. It is completely open source(1), and accessible as Web Service through DIVAServices(2).

  • 22.
    Alberti, Michele
    et al.
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Pondenkandath, Vinaychandran
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Würsch, Marcel
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Bouillon, Manuel
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Seuret, Mathias
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Ingold, Rolf
    Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Liwicki, Marcus
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB. Document Image and Voice Analysis Group (DIVA), University of Fribourg, Fribourg, Switzerland.
    Are You Tampering with My Data?2019Ingår i: Computer Vision – ECCV 2018 Workshops: Proceedings, Part II / [ed] Laura Leal-Taixé & Stefan Roth, Springer, 2019, s. 296-312Konferensbidrag (Refereegranskat)
    Abstract [en]

    We propose a novel approach towards adversarial attacks on neural networks (NN), focusing on tampering the data used for training instead of generating attacks on trained models. Our network-agnostic method creates a backdoor during training which can be exploited at test time to force a neural network to exhibit abnormal behaviour. We demonstrate on two widely used datasets (CIFAR-10 and SVHN) that a universal modification of just one pixel per image for all the images of a class in the training set is enough to corrupt the training procedure of several state-of-the-art deep neural networks, causing the networks to misclassify any images to which the modification is applied. Our aim is to bring to the attention of the machine learning community, the possibility that even learning-based methods that are personally trained on public datasets can be subject to attacks by a skillful adversary.

  • 23.
    Alcazar, Magnus
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    "Ideas are simple. Implementation is Hard.": En Fallstudie om Nyckelfaktorer för Implementering av Planeringssystem inom Hemtjänsten2017Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Background: Home care are a very common form of care and many prefer this form of care in front of hospitalized care. The home care service is therefore in need of a planning system in order to plan its work as efficiently as possible. Many of these implementations fail.

    Purpose: Many implementations in the home care service fail. The purpose of this paper is therefore to investigate what critical success factors project managers should focus on to achieve a successfull implementation.

    Method: This study has been conducted with a qualitative study as research method. A literature study was carried out by finding previous research in the field, which was then used as a theoretical framework. This was then compared with the empirical evidence acquired through semi-structured interviews with people with experience of implementations in the home care industry.

    Result: The result shows that the CSF’s that appeared in the literature study should also be used in practice. In addition, three new factors were identified

    Conclusion: All of the CSF’s presented in the literature study were reinforced by the interviews conducted with the informants in this study. References to how these should be used have also been developed. For example, the focus on the factor resources should primarily be put on the resource time.This study also concludes that depending on the type of organization it is about, such as small private companies, private medium-sized companies or municipal-owned businesses, focus should be on different CSF’s.

  • 24.
    Al-Chalabi, Hussan
    et al.
    Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, Drift, underhåll och akustik.
    Al-Douri, Yamur
    Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, Drift, underhåll och akustik.
    Lundberg, Jan
    Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, Drift, underhåll och akustik.
    Time Series Forecasting using ARIMA Model: A Case Study of Mining Face Drilling Rig2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    This study implements an AutoregressiveIntegrated Moving Average (ARIMA) model to forecast totalcost of a face drilling rig used in the Swedish mining industry.The ARIMA model shows different forecasting abilities usingdifferent values of ARIMA parameters (p, d, q). However,better estimation for the ARIMA parameters is required foraccurate forecasting. Artificial intelligence, such as multiobjective genetic algorithm based on the ARIMA model, couldprovide other possibilities for estimating the parameters. Timeseries forecasting is widely used for production control,production planning, optimizing industrial processes andeconomic planning. Therefore, the forecasted total cost data ofthe face drilling rig can be used for life cycle cost analysis toestimate the optimal replacement time of this rig.

  • 25.
    Al-Douri, Yamur
    Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, Drift, underhåll och akustik.
    Two-Level Multi-Objective Genetic Algorithm for Risk-Based Life Cycle Cost Analysis2019Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Artificial intelligence (AI) is one of the fields in science and engineering and encompasses a wide variety of subfields, ranging from general areas (learning and perception) to specific topics, such as mathematical theorems. AI and, specifically, multi-objective genetic algorithms (MOGAs) for risk-based life cycle cost (LCC) analysis should be performed to estimate the optimal replacement time of tunnel fan systems, with a view towards reducing the ownership cost and the risk cost and increasing company profitability from an economic point of view. MOGA can create systems that are capable of solving problems that AI and LCC analyses cannot accomplish alone.

    The purpose of this thesis is to develop a two-level MOGA method for optimizing the replacement time of reparable system. MOGA should be useful for machinery in general and specifically for reparable system. This objective will be achieved by developing a system that includes a smart combination of techniques by integrating MOGA to yield the optimized replacement time. Another measure to achieve this purpose is implementing MOGA in clustering and imputing missing data to obtain cost data, which could help to provide proper data to forecast cost data for optimization and to identify the optimal replacement time.

    In the first stage, a two-level MOGA is proposed to optimize clustering to reduce and impute missing cost data. Level one uses a MOGA based on fuzzy c-means to cluster cost data objects based on three main indices. The first is cluster centre outliers; the second is the compactness and separation ( ) of the data points and cluster centres; the third is the intensity of data points belonging to the derived clusters. Level two uses MOGA to impute the missing cost data by using a valid data period from that are reduced data in size. In the second stage, a two-level MOGA is proposed to optimize time series forecasting. Level one implements MOGA based on either an autoregressive integrated moving average (ARIMA) model or a dynamic regression (DR) model. Level two utilizes a MOGA based on different forecasting error rates to identify proper forecasting. These models are applied to simulated data for evaluation since there is no control of the influenced parameters in all of the real cost data. In the final stage, a two-level MOGA is employed to optimize risk-based LCC analysis to find the optimal replacement time for reparable system. Level one uses a MOGA based on a risk model to provide a variation of risk percentages, while level two uses a MOGA based on an LCC model to estimate the optimal reparable system replacement time.

    The results of the first stage show the best cluster centre optimization for data clustering with low  and high intensity. Three cluster centres were selected because these centres have a geometry that is suitable for the highest data reduction of 27%. The best optimized interval is used for imputing missing data. The results of the second stage show the drawbacks of time series forecasting using a MOGA based on the DR model. The MOGA based on the ARIMA model yields better forecasting results. The results of the final stage show the drawbacks of the MOGA based on a risk-based LCC model regarding its estimation. However, the risk-based LCC model offers the possibility of optimizing the replacement schedule.

    However, MOGA is highly promising for allowing optimization compared with other methods that were investigated in the present thesis.

  • 26.
    Al-Dulaimi, Anwer
    et al.
    ECE, University of Toronto.
    Anpalagan, Alagan
    WINCORE Lab, Ryerson University, Toronto.
    Bennis, Mehdi
    University of Oulu, Centre for Wireless Communications, University of Oulu.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    5G Green Communications: C-RAN Provisioning of CoMP and Femtocells for Power Management2016Ingår i: 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB): Montreal, Canada, 4-7 October 2015, Piscataway, NJ: IEEE Communications Society, 2016, artikel-id 7324392Konferensbidrag (Refereegranskat)
    Abstract [en]

    The fifth generation (5G) wireless network is expected to have dense deployments of cells in order to provide efficient Internet and cellular connections. The cloud radio access network (C-RAN) emerges as one of the 5G solutions to steer the network architecture and control resources beyond the legacy radio access technologies. The C-RAN decouples the traffic management operations from the radio access technologies leading to a new combination of virtualized network core and fronthaul architecture. In this paper, we first investigate the power consumption impact due to the aggressive deployments of low-power neighborhood femtocell networks (NFNs) under the umbrella of a coordinated multipoint (CoMP) macrocell. We show that power savings obtained from employing low power NFN start to decline as the density of deployed femtocells exceed certain threshold. The analysis considers two CoMP sites at the cell-edge and intra-cell areas. Second, to restore the power efficiency and network stabilization, a C-RAN model is proposed to restructure the NFN into clusters to ease the energy burden in the evolving 5G systems. Tailoring this to traffic load, selected clusters will be switched off to save power when they operate with low traffic loads

  • 27.
    Alhamazani, Khalid
    et al.
    University of New South Wales, Sydney.
    Ranjan, Rajiv
    CSIRO, Canberra.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Rabhi, Fethi
    University of New South Wales, Sydney.
    Jayaraman, Prem Prakash
    CSIRO, Canberra.
    Khan, Samee Ullah
    North Dakota State University, Fargo.
    Guabtni, Adnene
    NICTA, Sydney.
    Bhatnagar, Vasudha
    University of Delhi.
    An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art2015Ingår i: Computing, ISSN 0010-485X, E-ISSN 1436-5057, Vol. 97, nr 4, s. 357-377Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cloud monitoring activity involves dynamically tracking the Quality of Service (QoS) parameters related to virtualized resources (e.g., VM, storage, network, appliances, etc.), the physical resources they share, the applications running on them and data hosted on them. Applications and resources configuration in cloud computing environment is quite challenging considering a large number of heterogeneous cloud resources. Further, considering the fact that at given point of time, there may be need to change cloud resource configuration (number of VMs, types of VMs, number of appliance instances, etc.) for meet application QoS requirements under uncertainties (resource failure, resource overload, workload spike, etc.). Hence, cloud monitoring tools can assist a cloud providers or application developers in: (i) keeping their resources and applications operating at peak efficiency, (ii) detecting variations in resource and application performance, (iii) accounting the service level agreement violations of certain QoS parameters, and (iv) tracking the leave and join operations of cloud resources due to failures and other dynamic configuration changes. In this paper, we identify and discuss the major research dimensions and design issues related to engineering cloud monitoring tools. We further discuss how the aforementioned research dimensions and design issues are handled by current academic research as well as by commercial monitoring tools.

  • 28.
    Alhamazani, Khalid
    et al.
    University of New South Wales.
    Ranjan,, Rajiv
    CSIRO, Australia.
    Rabhi, Fethi
    University of New South Wales.
    Wang, Lizhe
    Mitra, Karan
    Cloud Monitoring for Optimizing the QoS of Hosted Applications2013Ingår i: IEEE CloudCom, IEEE Communications Society, 2013Konferensbidrag (Refereegranskat)
  • 29.
    Alhamazani, Khalid
    et al.
    School of Computer Science and Engineering, University of New South Wales.
    Ranjan, Rajiv
    CSIRO Digital Productivity, Acton.
    Jayaraman, Prem
    CSIRO Digital Productivity, Acton.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liu, Chang
    Sydney University of Technology.
    Rabhi, Fethi
    School of Computer Science and Engineering, University of New South Wales.
    Georgakopoulos, Dimitrios
    Royal Melbourne Institute of Technology, Melbourne.
    Wang, Lizhe
    Chinese Academy of Sciences, Beijing.
    Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework2019Ingår i: I E E E Transactions on Cloud Computing, ISSN 2168-7161, Vol. 7, nr 1, s. 48-61Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cloud computing provides on-demand access to affordable hardware (e.g., multi-core CPUs, GPUs, disks, and networking equipment) and software (e.g., databases, application servers and data processing frameworks) platforms with features such as elasticity, pay-per-use, low upfront investment and low time to market. This has led to the proliferation of business critical applications that leverage various cloud platforms. Such applications hosted on single/multiple cloud provider platforms have diverse characteristics requiring extensive monitoring and benchmarking mechanisms to ensure run-time Quality of Service (QoS) (e.g., latency and throughput). This paper proposes, develops and validates CLAMBS—Cross-Layer Multi Cloud Application Monitoring and Benchmarking as-a-Service for efficient QoS monitoring and benchmarking of cloud applications hosted on multi-clouds environments. The major highlight of CLAMBS is its capability of monitoring and benchmarking individual application components such as databases and web servers, distributed across cloud layers (*-aaS), spread among multiple cloud providers. We validate CLAMBS using prototype implementation and extensive experimentation and show that CLAMBS efficiently monitors and benchmarks application components on multi-cloud platforms including Amazon EC2 and Microsoft Azure.  

  • 30.
    Alhamazani, Khalid
    et al.
    School of Computer Science and Engineering, University of New South Wales.
    Ranjan, Rajiv
    CSIRO Computational Informatics, Canberra.
    Jayaraman, Prem Prakash
    CSIRO Computational Informatics, Canberra.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Wang, Meisong
    CSIRO Computational Informatics, Canberra.
    Huang, Zhiquiang (George)
    CSIRO Computational Informatics, Canberra.
    Wang, Lizhe
    Chinese Academy of Sciences, Beijing.
    Rabhi, Fethi
    School of Computer Science and Engineering, University of New South Wales.
    Real-time QoS Monitoring for Cloud-based Big Data Analytics Application in Mobile Environments2014Ingår i: 2014 15th IEEE International Conference on Mobile Data Management (MDM 2014): Brisbane, Australia 15 -18 July 2014, Piscataway, NY: IEEE Communications Society, 2014, Vol. 1, s. 337-340, artikel-id 6916940Konferensbidrag (Refereegranskat)
    Abstract [en]

    The service delivery model of cloud computing acts as a key enabler for big data analytics applications enhancing productivity, efficiency and reducing costs. The ever increasing flood of data generated from smart phones and sensors such as RFID readers, traffic cams etc require innovative provisioning and QoS monitoring approaches to continuously support big data analytics. To provide essential information for effective and efficient bid data analytics application QoS monitoring, in this paper we propose and develop CLAMS-Cross-Layer Multi-Cloud Application Monitoring-as-a-Service Framework. The proposed framework: (a) performs multi-cloud monitoring, and (b) addresses the issue of cross-layer monitoring of applications. We implement and demonstrate CLAMS functions on real-world multi-cloud platforms such as Amazon and Azure.

  • 31.
    Alhamazani, Khalid
    et al.
    University of New South Wales, Sydney.
    Ranjan, Rajiv
    CSIRO Computational Informatics, Canberra.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Jayaraman, Prem Prakash
    CSIRO, Canberra.
    Huang, Zhiqiang
    CSIRO Computational Informatics, Canberra.
    Wang, Lizhe
    Center for Earth Observation & Digital Earth, Chinese Academy of Sciences.
    Rabhi, Fethi
    University of New South Wales, Sydney.
    CLAMS: Cross-Layer Multi-Cloud Application Monitoring-as-a-Service Framework2014Ingår i: Proceedings of the 11th IEEE International Conference on Services Computing (IEEE SCC 2014), Piscataway, NJ: IEEE Communications Society, 2014, s. 283-290Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cloud computing provides on-demand access to affordable hardware (e.g., multi-core CPUs, GPUs, disks, and networking equipment) and software (e.g., databases, application servers, data processing frameworks, etc.) platforms. Application services hosted on single/multiple cloud provider platforms have diverse characteristics that require extensive monitoring mechanisms to aid in controlling run-time quality of service (e.g., access latency and number of requests being served per second, etc.). To provide essential real-time information for effective and efficient cloud application quality of service (QoS) monitoring, in this paper we propose, develop and validate CLAMS—Cross-Layer Multi-Cloud Application Monitoring-as-a-Service Framework. The proposed framework is capable of: (a) performing QoS monitoring of application components (e.g., database, web server, application server, etc.) that may be deployed across multiple cloud platforms (e.g., Amazon and Azure); and (b) giving visibility into the QoS of individual application component, which is something not supported by current monitoring services and techniques. We conduct experiments on real-world multi-cloud platforms such as Amazon and Azure to empirically evaluate our framework and the results validate that CLAMS efficiently monitors applications running across multiple clouds.

  • 32.
    Allan, Jon
    et al.
    Luleå tekniska universitet, Institutionen för konst, kommunikation och lärande, Medier, ljudteknik och teater.
    Berg, Jan
    Luleå tekniska universitet, Institutionen för konst, kommunikation och lärande, Medier, ljudteknik och teater.
    Evaluation of the Momentary Time Scale for Live Loudness Metering2019Ingår i: Journal of The Audio Engineering Society, ISSN 0004-7554Artikel i tidskrift (Refereegranskat)
  • 33.
    Altin, Anton
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Bremstedt Pedersen, Erik
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    En policy är bara så bra som personens förmåga att efterleva den: Ett arbete om informationssäkerhetspolicys och hur de följs på arbetsplatsen2017Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Idag används nya applikationer flitigt bland företag för att spara pengar och effektivisera arbetet. Fördelarna är många, men det kräver också att man på arbetsplatsen implementerar olika typer av regler för dessa applikationer så att företagets information inte hamnar i fel händer. Rapportens syfte är att undersöka hur anställda ställer sig till informationssäkerhetspolicys för att kunna svara på om det är dålig policys eller den mänskliga faktorn som ligger bakom säkerhetsincidenter på företag. Tidigare studier har visat att mer än 50% av intrång som sker idag är på grund av interna säkerhetsincidenter. Hur kan företag använda sig av policys för att förhindra att något sådant sker? Hur kan dessa företag motivera sina anställda att följa policyn? I denna uppsats konstaterar vi genom att intervjua anställda på ett företag att hur bra en policy än är, så kan den inte vara effektiv om de anställda inte har kunskap eller motivation att hantera den ordentligt.

  • 34.
    Altmojo, Udayanto Dwi
    et al.
    Aalto Univ, Dept Elect Engn & Automat, Aalto, Finland.
    Vyatkin, Valeriy
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Aalto Univ, Dept Elect Engn & Automat, Espoo, Finland.
    Salcic, Zoran
    Univ Auckland, Dept Elect & Comp Engn, Auckland, New Zealand.
    On Achieving Reliable Communication in IEC 614992018Ingår i: 2018 IEEE 23RD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), Piscataway, NJ: IEEE, 2018, s. 147-154Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper proposes a novel extension for communication in the IEC 61499 standard. Inspired by the features found in the formal programming language SystemJ, the extension supports reliable and guaranteed communication in distributed execution of function block application(s)/program(s). The extension utilizes mechanisms agnostic on underlying network protocols and are based on formal semantics that guarantee data delivery. The use of proposed extension, called channel, is demonstrated in an industrial automation-type example.

  • 35.
    Al-Turjman, Fadi M.
    et al.
    Department of Computer Engineering, Middle East Technical University, Northern Cyprus Campus.
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Value-Based Caching in Information-Centric Wireless Body Area Networks2017Ingår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 17, nr 1, artikel-id 181Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    We propose a resilient cache replacement approach based on a Value of sensed Information (VoI) policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation) and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs). These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures). These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.

  • 36.
    Alzubaidi, Ali
    et al.
    Newcastle University.Umm-Al-Qura University.
    Solaiman, Ellis
    Newcastle University.
    Patel, Pankesh
    Fraunhofer USA-Center for Experimental Software Engineering.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Blockchain-Based SLA Management in the Context of IoT2019Ingår i: IT Professional Magazine, ISSN 1520-9202, E-ISSN 1941-045X, Vol. 21, nr 4, s. 33-40Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In pursuit of effective service level agreement (SLA) monitoring and enforcement in the context of Internet of Things (IoT) applications, this article regards SLA management as a distrusted process that should not be handled by a single authority. Here, we aim to justify our view on the matter and propose a conceptual blockchain-based framework to cope with some limitations associated with traditional SLA management approaches.

  • 37.
    Amadeo, Marcia
    et al.
    Universita Mediterranea di Reggio Calabria.
    Campolo, Claudia
    Universita Mediterranea di Reggio Calabria. Telecommunications.
    Quevedo, Jose
    Universidade de Aveiro, Inst Telecomunicacoes.
    Corujo, Daniel
    Universidade de Aveiro, Inst Telecomunicacoes.
    Molinaro, Antonella
    Universita Mediterranea di Reggio Calabria. Telecommunications.
    Iera, Antonio
    Universita Mediterranea di Reggio Calabria.
    Aguiar, Rui L.
    Universidade de Aveiro, Inst Telecomunicacoes.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Information-Centric Networking for the Internet of Things: Challenges and Opportunities2016Ingår i: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, nr 2, s. 92-100, artikel-id 7437030Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In view of evolving the Internet infrastructure, ICN is promoting a communication model that is fundamentally different from the traditional IP address-centric model. The ICN approach consists of the retrieval of content by (unique) names, regardless of origin server location (i.e., IP address), application, and distribution channel, thus enabling in-network caching/replication and content-based security. The expected benefits in terms of improved data dissemination efficiency and robustness in challenging communication scenarios indicate the high potential of ICN as an innovative networking paradigm in the IoT domain. IoT is a challenging environment, mainly due to the high number of heterogeneous and potentially constrained networked devices, and unique and heavy traffic patterns. The application of ICN principles in such a context opens new opportunities, while requiring careful design choices. This article critically discusses potential ways toward this goal by surveying the current literature after presenting several possible motivations for the introduction of ICN in the context of IoT. Major challenges and opportunities are also highlighted, serving as guidelines for progress beyond the state of the art in this timely and increasingly relevant topic.

  • 38.
    Andersson, Arne
    et al.
    Lunds universitet.
    Brodnik, Andrej
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. IMFM, Ljubljana, Slovenia.
    Comment on "self-indexed sort"1996Ingår i: SIGPLAN notices, ISSN 0362-1340, E-ISSN 1558-1160, Vol. 31, nr 8, s. 40-41Artikel i tidskrift (Övrigt vetenskapligt)
  • 39.
    Andersson, Christoffer
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Government 2.0 och medborgarmedverkan vid utveckling av offentliga digitala tjänster: Möjligheter och utmaningar med medborgarmedverkan i en offentlig organisation2017Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Uppsatsen har som syfte att identifiera utmaningar som medborgarmedverkan medför inom en offentlig verksamhet vid utveckling av offentliga digitala tjänster. Utifrån dessa utmaningar diskuteras potentiella möjligheter som uppstår när utmaningarna klaras av samt vilken roll IKT och Government 2.0 har i dessa utmaningar och möjligheter. Vidare diskuteras även Participatory Design som tjänstedesignansats utifrån identifierade utmaningar och potentiella möjligheter vid utveckling av offentliga digitala tjänster. Uppsatsens teoretiska referensram redogör främst för forskningsämnena e-Government och Government 2.0 samt tjänstedesignansatser så som Participatory Design och User-Centered Design, samskapande och vikten av att involvera användare. En fallstudie har genomförts i en svensk kommun för att öka förståelsen om medborgarmedverkan vid utveckling av offentliga digitala tjänster. Genom förståelsen av kommunens kontext identifieras nio olika utmaningar:

    Utmaningar:

    1. Arbete för öppenhet och transparens mot medborgare
    2. Skapa mångfald i utvecklingsprojekt
    3. Identifiera fler faktorer, utöver mångfald, för en lyckad medborgarmedverkan
    4. Sprida kunskapen om vilka faktorer som är viktiga för lyckad medborgarmedverkan
    5. Tillfoga sig kunskapen om hur man når ut till medborgare på bästa sätt
    6. Motivera medborgare till att medverka (kommunicera vilket värde medverkan ger för varje enskild medborgare – dvs. kunna svara på frågan ”Varför ska just jag medverka i detta projekt?”)
    7. Bibehålla medverkande medborgare
    8. Öka datakunnigheten hos medborgare och andra aktörer
    9. Använda IKT och Webb 2.0 till dess fulla potential

    Dessa utmaningar ligger sedan till grund för potentiella möjligheter. Möjligheter som innebär öppenhet och transparens där offentliga digitala tjänster kan utvecklas utifrån medborgares och användes behov. Detta genom att använda sig av PD som tjänstedesignansats, IKT och Webb 2.0 – plattformar för samskapande, nätverkande, dialog och kunskapsspridning. 

  • 40.
    Andersson, Claes
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Predictive Model for Traffic Control in Underground Mines2019Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Due to the nature of tunnels, a driver in an underground mine may find themselves driving without much vision of the road up ahead. The tunnels usually allow for traffic in both directions but are often only wide enough for a single vehicle. To let vehicles pass each other meeting slots have been carved into the tunnel walls, where one can park while the other passes. Because of the limited vision, however, it is unlikely that a meeting with another vehicle will occur directly next to such a meeting slot. Instead, one of the vehicles must reverse to the closest meeting slot in order to let the other pass. This makes mine tunnels a very inhospitable driving environment, causing disruptions to traffic flow throughout the mine. Unfortunately, typical traffic management or scheduling solutions are not useful, as real-time positioning for the vehicles is often poor while network connectivity cannot be guaranteed in the mine environment.

    This thesis presents a solution which will avoid situations where a driver needs to back up, and instead present meeting slots in which to park ahead of time. This is done by calculating velocity probability distributions for road segments from historical data and using these to estimate arrival times to meeting slots. In addition, a more comprehensive solution is presented, taking into account the accuracy of positioning, outdated information due to poor connections and more complicated scenarios.

    The results show that estimating arrival times using only historical data is a very feasible technology, which can realistically be implemented today. Such an implementation could, in the author's opinion, improve driver safety and efficiency significantly, compared to a driver having no information or simply knowing rough positions of nearby vehicles. This being said, there are still steps that can be taken to improve the solution and to develop a more comprehensive system overall.

  • 41.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Workshop On User MObility and VEhicular Networks2014Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 42.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Editorial Board Member, Journal of Internet Services and Information Security (JISIS)2012Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 43.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Editorial Board Member, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)2012Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 44.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Expert Reviewer2012Övrigt (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    Assigned as expert reviewer in the national quality assessment of higher education in the area of Computer Science/ICT/Media technology.

  • 45.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: IEEE Conference on Local Computer Networks2014Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 46.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: International Conference on Mobile and Ubiquitous Multimedia2013Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 47.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Opponent/External Reviewer2012Övrigt (Övrig (populärvetenskap, debatt, mm))
    Abstract [sv]

    Opponent/External Reviewer for Licentiate thesis. Tahir Nawaz Minhas: "Network Impact on Quality of Experience of Mobile Video". Blekinge Institute of Technology, Karlskrona, Sweden on March 28, 2012

  • 48.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Aktivitet: Workshop On User MObility and VEhicular Networks2013Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 49.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Always best served and managed: research challenges in future mobile multimedia application architectures2007Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Demands from users of future generation networks will include seamless access to services across multiple wireless access networks. Handsets and laptops will typically be equipped with several network interfaces and have enough computing power and battery capacity to connect to several access networks simultaneously within and over administrative domains in a multi-homed manner.Existing technologies and solutions solve parts of the problems raised in such a scenario. However, a remaining important research challenge that still needs to be solved is to find an optimal mobility management solution offering terminal mobility as well as session, service, and personal mobility. Furthermore, a uniform and scalable mechanism for quality of service provisioning needs to be defined and integrated in an overall architecture offering differentiated handling of real-time and non real-time flows. The architecture will be based on the Internet Protocol as its least common denominator, but there are still a lot of research questions to be answered.This article surveys existing solutions and outlines future work in the area of cross-layer designed mobility management solutions and integrated quality of service support using a cross-layer design and policy-based approach.

  • 50.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Finding NIMO2012Ingår i: International Innovation, ISSN 2041-4552, Vol. 3, s. 52-54Artikel i tidskrift (Övrig (populärvetenskap, debatt, mm))
1234567 1 - 50 av 1546
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf