Change search
Refine search result
1234567 51 - 100 of 1546
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Andersson, Karl
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Interworking techniques and architectures for heterogeneous wireless networks2012In: Journal of Internet Services and Information Security (JISIS), ISSN 2182-2069, E-ISSN 2182-2077, Vol. 2, no 1/2, p. 22-48Article in journal (Refereed)
    Abstract [en]

    Fourth generation (4G) wireless systems targeting 100 Mb/s for highly mobile scenarios and 1 Gb/s for low mobility communication are soon to be deployed on a broad basis with LTE-Advanced and IEEE 802.16m as the two candidate systems. Traditional applications spanning everything from voice, video, and data to new machine-to-machine (M2M) applications with billions of connected devices transmitting sensor data will in a soon future use these networks. Still, interworking solutions integrating those new 4G networks with existing legacy wireless networks are important building blocks in order to achieve cost-efficient solutions, offer smooth migration paths from legacy systems, and to provide means for load balancing among different radio access technologies.This article categorizes and analyzes different interworking solutions for heterogeneous wireless networks and provides suggestions for further research.

  • 52.
    Andersson, Karl
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    On access network selection models and mobility support in heterogeneous wireless networks2010Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The aim of this thesis is to define a solution offering end-users seamless mobility in a multi-radio access technology environment. Today an increasing portion of cell phones and PDAs have more than one radio access technology and wireless access networks of various types are commonly available with overlapping coverage. This creates a heterogeneous network environment in which mobile devices can use several networks in parallel. In such environment the device needs to select the best network for each application to use available networks wisely. Selecting the best network for individual applications constitutes a major core problem.The thesis proposes a host-based solution for access network selection in heterogeneous wireless networking environments. Host-based solutions use only information available in mobile devices and are independent of information available in the networks to which these devices are attached. The host-based decision mechanism proposed in this thesis takes a number of constraints into account including network characteristics and mobility patterns in terms of movement speed of the user. The thesis also proposes a solution for network-based mobility management contrasting the other proposals using a host-based approach. Finally, this thesis proposes an architecture supporting mobility for roaming users in heterogeneous environments avoiding the need for scanning the medium when performing vertical handovers.Results include reduced handover latencies achieved by allowing hosts to use multihoming, bandwidth savings on the wireless interface by removing the tunneling overhead, and handover guidance through the usage of directory-based solutions instead of scanning the medium. User-perceived quality of voice calls measured on the MOS (Mean Opinion Score) scale shows no or very little impact from the mobility support procedures proposed in this thesis. Results also include simulation models, real-world prototypes, and testbeds that all could be used in future work. The proposed solutions in this thesis are mainly evaluated using simulations and experiments with prototypes in live testbeds. Analytical methods are used to complement some results from simulations and experiments

  • 53.
    Andersson, Karl
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    On access network selection models in heterogeneous networking environments2008Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis proposes and evaluates architectures and algorithms for access network selection in heterogeneous networking environments. The ultimate goal is to select the best access network at any time taking a number of constraints into account including user requirements and network characteristics. The proposed architecture enables global roaming between access networks within an operator's domain, as well as across operators without any changes in the data and control plane of the access networks being required. Also, the proposed architecture includes an algorithm for measuring performance of access networks that can be used on a number of access technologies being wired or wireless. The proposed access network selection algorithm also has an end-to-end perspective giving a network performance indication of user traffic being communicated. The contributions of this thesis include an implementation of a simulation model in OPNET Modeler, a proposal of a metric at the network layer for heterogeneous access networks, an implementation of a real-world prototype, a study of multimedia applications on perceived quality of service, an access network selection algorithm for highly mobile users and vehicular networks, and an extension of the mentioned access network selection algorithm to support cross-layer decision making taking application layer and datalink layer metrics into account.

  • 54.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Cherkaoui, Soumaya
    Electrical and Computer Engineering Department, Sherbrooke University, Sherbrooke University, Université de Sherbrooke.
    On-Move 20152015In: Proceedings of 40th Annual IEEE Conference on Local Computer Networks Conference Workshops (LCN Workshops 2015): LCN Workshops / [ed] Salil Kanhere; Jens Tölle; Soumaya Cherkaoui, Piscataway, NJ: IEEE Communications Society, 2015, article id 7365896Conference paper (Refereed)
  • 55.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Elkotob, Muslim
    Media-Broadcast GmbH.
    Rethinking IP mobility management2012In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 3, no 3, p. 41-49Article in journal (Refereed)
    Abstract [en]

    IP Mobility Management allowing for handover and location management to be handled by the network layer has been around for a couple of 20 years or so now. A number of protocols have been proposed including the GPRS Tunneling Protocol (GTP), Mobile IP, Proxy Mobile IP, and the Locator/Identifier Split Protocol (LISP) being the best known and most discussed in the research literature. This paper overviews existing solutions and suggests a new distributed and dynamic mobility management scheme and evaluates it against existing static approaches.

  • 56.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Elkotob, Muslim
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A new MIP-SIP interworking scheme2008In: MUM'08 Proceedings: 7th ACM International Conference on Mobile and Ubiquitous Multimedia, December 3 - 5, 2008, Umeå, Sweden, New York: ACM Digital Library, 2008, p. 117-120Conference paper (Refereed)
    Abstract [en]

    Mobility management is today handled at various layers in the network stack including the datalink layer, the network layer, the transport layer and the application layer. Also, cross-layer designed solutions exist and the most known example is the work performed by IEEE currently standardizing media-independent handover services under the name of IEEE 802.21.This paper proposes a new interworking scheme for Mobile IP and the Session Initiation Protocol being the most popular solutions for mobility management at the network and application layers respectively. The goal is to deliver seamless mobility for both TCP-based and UDP-based applications taking the best features from each mobility management scheme. In short, this paper proposes that TCP connections are handled through Mobile IP while UDP-based connection-less applications may use the Session Initiation Protocol for handling mobility. The two mobility management solutions are integrated into one common solution.

  • 57.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Forte, Andrea G
    Columbia University.
    Schulzrinne, Henning
    Columbia University.
    Enhanced mobility support for roaming users: extending the IEEE 802.21 information service2010In: Wired/Wireless Internet Communications: 8th International Conference, WWIC 2010, Luleå, Sweden, June 1-3, 2010. Proceedings / [ed] Evgeny Osipov; Andreas Kassler; Thomas Michael Bohnert; Xavier Masip-Bruin, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2010, p. 52-63Conference paper (Refereed)
    Abstract [en]

    Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most suitable access network across multiple technologies based on the physical location of the device as well as user-defined parameters such as cost, bandwidth, and battery consumption. The IEEE has standardized the 802.21 framework for media-independent handovers where dynamic selection of network interfaces is an important feature. This paper describes and evaluates a novel architecture which extends the IEEE 802.21 information service. The architecture is based on a three-layer structure with Location-to-Service Translation (LoST) servers, service provider servers and independent evaluator servers. Evaluator servers are populated with information on coverage and quality of service as provided by trusted users. The proposed architecture allows for competition at all levels and scales well due to its distributed nature. A prototype has been developed and is presented in the paper.

  • 58.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Gavalas, Damianos
    Computer Technology Institute and Press (CTI).
    SMARTBUY dataset2019Data set
  • 59.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Granlund, Daniel
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Elkotob, Muslim
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Bandwidth efficient mobility management for heterogeneous wireless networks2010In: 2010 7th IEEE Consumer Communications and Networking Conference: Las Vegas, Nevada, USA : 9-12 January, 2010, Piscataway, N.J: IEEE Communications Society, 2010Conference paper (Refereed)
    Abstract [en]

    An important feature of the upcoming fourth generation wireless networks is support for heterogeneous radio access technologies in combination with an all-IP type of overall architecture. Operators and users will benefit from a smooth technology transition leveraging existing investments and use a variety of access technologies simultaneously. This paper describes and evaluates an innovative mobility management scheme in such an environment. It does not require any changes to the IP stack in the mobile node and does not introduce any additional overhead to the payload traffic over air interfaces. Furthermore, it does not add any signaling overhead and outperforms existing mobility management schemes for heterogeneous environments in terms of bandwidth consumption. The architecture uses a make-before-break principle for vertical handovers and bidirectional tunneling using various tunneling mechanisms connecting mobile nodes through access networks to a home network. Also, it proposes a packet inspection routine for timely handover execution in the home network. The architecture is evaluated both through analytical calculations and experiments using a voice over IP traffic model.

  • 60.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Granlund, Daniel
    Åhlund, Christer
    M4: MultiMedia Mobility Manager: a seamless mobility management architecture supporting multimedia applications2007In: Proceedings of the 6th International Conference on Mobile and Ubiquitous Multimedia: December 12 - 14, 2007, Oulu, Finland / [ed] Timo Ojala, Red Hook, NY: Curran Associates, Inc., 2007, p. 6-13Conference paper (Refereed)
    Abstract [en]

    In this paper, a proof-of-concept and a software architecture, M4 (MultiMedia Mobility Manager), is presented. In short, M4 is offering seamless mobility management to multimedia appli­cations using a variety of wireless access networks. First, M4 is built on multihomed Mobile IP building on the principle of soft handovers. Second, network selection in M4 is based on a network layer metric combining round-trip times and jitter in round-trip times. Third, the end-user can enter its own preferences on network selection through a policy-based extension to the proposed network selection algorithm.The proposed architecture is evaluated in a live heterogeneous networking environment where handover performance is studied in detail. In addition, user-perceived quality of experience for Voice over IP using the M4 software architecture has been studied. Last, downloads of large amount of data using a combination of high and low capacity wireless networks in M4 were studied.Results indicate that the architecture as a whole and the proposed algorithms perform well. M4 can thus be seen as an imple­mentation of the "Always Best Connected" vision.

  • 61.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hallberg, Josef
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Project: PERvasive Computing and COMmunications for sustainable development2015Other (Other (popular science, discussion, etc.))
  • 62.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Hossain, Mohammad Shahadat
    University of Chittagong, Department of Computer Science and Engineering, University of Chittagong.
    Heterogeneous Wireless Sensor Networks for Flood Prediction Decision Support Systems2015In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 6th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World, Piscataway, NJ: IEEE Communications Society, 2015, p. 133-137Conference paper (Refereed)
    Abstract [en]

    Recent advancements in the fields of sensor equipment and wireless sensor networks have opened the window of opportunity for many innovative applications. In this paper, we propose a new architecture for building decision support systems using heterogeneous wireless sensor networks. The architecture is built around standard hardware and existing wireless sensor networks technology. We show the effectiveness of the proposed architecture by applying it to a flood prediction scenario.

  • 63.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Hossain, Mohammad Shahadat
    University of Chittagong, Department of Computer Science and Engineering, University of Chittagong.
    Smart Risk Assessment Systems using Belief-rule-based DSS and WSN Technologies2014In: 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE 2014: Co-located with Global Wireless Summit, Aalborg, Denmark 11-14 May 2014, Piscataway, NJ: IEEE Communications Society, 2014, article id 6934397Conference paper (Refereed)
    Abstract [en]

    Smart risk assessment systems are becoming more and more important in the society. If the chances of reducing and managing certain risks are increased, the impacts can be controlled and reduced significantly. This article surveys different belief-rule-based decision support systems and various wireless sensor network technologies that can be used in collaboration to build interesting risk assessment applications. We propose a model for building such an environment and describe a potential application of our proposed model for assessing flood risks in a case study.

  • 64.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Hossain, Mohammad Shahadat
    University of Chittagong.
    Thapa, Devinder
    Department of Information Systems, University of Agder.
    Zander, Pär-Ola
    Department of Communication and Psychology, Aalborg University.
    A Novel Framework of an Expert System by integrating Capability Approach and BRB to Evaluate E-Government Services2015In: Proceedings of eChallenges e-2015 Conference / [ed] Paul Cunningham; Miriam Cunningham, IIMC International Information Management Corporation Ltd , 2015, p. 1-12, article id 68Conference paper (Refereed)
    Abstract [en]

    Capability approach is hard to operationalize and capabilities are sometimes difficult to reduce into the individual level. We describe our approach to solve these problems paired with an adequate ICT infrastructure and believe that the impact of concrete eGovernment services will become more visible and available. Citizens can inspect it, professionals can target their re-engineering on failure cases, learn from best cases, and researchers can compare different types of eGovernment. The solving of operationalisation will also strengthen the capability approach, by extending its scope from macro theory towards more easy application on the institutional and organizational levels.

  • 65.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Johansson, Dan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Mobile e-services using HTML52012In: Proceedings of the 37th IEEE Conference on Local Computer Networks Workshops (LCN Workshops): 6th IEEE Workshop On User MObility and VEhicular Networks / [ed] Tom Pfeifer; Anura Jayasumana; Damla Turgut, Piscataway, NJ: IEEE Computer Society Press , 2012, p. 814-819Conference paper (Refereed)
    Abstract [en]

    New mobile networks and new devices like smartphones and tablets are rapidly changing opportunities for public sector units delivering smart, mobile e-services to their citizens. Moreover, the upcoming HTML5 standard allows for cross-device and cross-browser support making service development and deployment much more easier than before at lower costs. This paper analyzes the most important features of HTML5, CSS3, and WebGL and their applicability for mobile e-services in the public sector. Also, we present a novel architecture for mobile e-services using HTML5, mashups, and RESTful web APIs as important building blocks.

  • 66.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Kafle, Ved
    National Institute of Information and Communications Technology, 4-2-1 Nukui-kitamachi, Koganei.
    Disaster-resilient mobile network architecture2014In: Proceedings of the 2014 IEEE 11th Annual Consumer Communications & Networking Conference, Piscataway, NJ: IEEE Communications Society, 2014, p. 359-364Conference paper (Refereed)
    Abstract [en]

    Conventional cellular networks are likely to get disturbed easily when a natural disaster (earthquake, tsunami, flooding, etc.) hits an area because of their centralized control and high-power requirements. To address this issue, we propose a new mobile network architecture having distributed controls and ad-hoc configurations. This architecture exploits the locally available resources such as frequency spectrum and lively nodes to reconfigure the network and provide emergency services. We present its design and use cases.

  • 67.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lundahl, Carl-Gustav
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Wood Science and Engineering.
    Lundmark, Martin
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Energy Science.
    Nordvik, Enar
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Wood Science and Engineering.
    Pantze, Anna
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Wood Science and Engineering.
    Förslag till handlingsplan för utveckling av LTU Skellefteå: Att synas med stolthet2008Report (Other academic)
  • 68.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lövf, Eva
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Wood Science and Engineering.
    Studenters upplevelser av distansundervisning: en fallstudie2008Report (Other academic)
    Abstract [sv]

    Artikeln presenterar resultat från en studie av studenters upplevelser vid införande av modern videokonferensteknik i undervisningen. Studien omfattar 40 studenter vid fyra kurser. Resultaten indikerar att universitet och högskolor, förutom kostnadsbesparingar, lätt kan engagera specialistkompetens i kurser, erbjuda undervisning utanför campus och underlätta studentens självstudier. I sin bästa form uppnås både rums- och tidsoberoende. Samtidigt indikerar resultaten att det finns utrymme för förbättringar vid undervisning via videokonferenssändningar, främst i interaktionen mellan student och lärare. Oavsett lärarens pedagogik, ämnets inriktning och studenternas vana vid modern teknik så föredrog 39 av de 40 studenterna i undersökningen att ha en lärare på plats. Till viss del kan detta förklaras av teknikproblem, som delvis åtgärdats under kursernas genomförande, men även av att lärarna inte anpassat sin pedagogik fullt ut. Vår bedömning är att om rätt pedagogik används kan både kommunikation och interaktion fungera mycket bra och vara en utmärkt undervisningsform även om lärare och student inte befinner sig på samma plats.Vi föreslår att lärarna som sänder föreläsningarna ges tillfälle att interagera mer med studenterna, både synkront och asynkront, vilket kräver att kurserna planeras på annat sätt än vid traditionell campus-undervisning. Vidare föreslår vi att studenter på annan ort regelbundet erbjuds separata tillfällen för att diskutera och ställa frågor till läraren och gärna träffas fysiskt. Avslutningsvis föreslår vi att en särskild ämneskunnig producent, s.k. e-moderator, engageras parallellt med lärarens undervisning, för att stöda studenterna som följer föreläsningarna genom att besvara deras frågor. Alternativt kan en e-moderator uppmärksamma läraren på relevanta frågor som dyker upp, så att en utökad interaktion uppnås.

  • 69.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Mostafa, Seraj Al Mahmud
    Luleå tekniska universitet.
    Islam, Raihan Ul
    Luleå tekniska universitet.
    Mobile VoIP user experience in LTE2011In: Proceedings of The 36th IEEE Conference on Local Computer Networks (LCN): 5th IEEE Workshop On User MObility and VEhicular Networks, IEEE Computer Society Press , 2011, p. 789-792Conference paper (Refereed)
    Abstract [en]

    3GPP Long-term Evolution (LTE) systems being deployed are fast gaining market shares. High data rates (approaching 100 Mbit/s in the downlink direction and 50 Mbit/s for uplink connections) and small delays are attractive features of LTE. Spectrum flexibility also makes deployment easy on various frequency bands in different parts of the world. However, as LTE offers packet switched services only, mobile broadband connectivity has become the dominant LTE application so far. This paper studies user-perceived quality of service for a mobile Voice over IP (VoIP) application in LTE. Results were achieved using the OPNET Modeler simulation environment.

  • 70.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Rondeau, Éric
    University of Lorraine.
    Kor, Ah-Lian
    School of Computing, Creative Technologies and Engineering, Leeds Beckett University.
    Johansson, Dan
    Umea University, Department of Informatics.
    Sustainable Mobile Computing and Communications2017In: Mobile Information Systems, ISSN 1574-017X, Vol. 2017, article id 1098264Article in journal (Refereed)
  • 71.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Sarker, ANM. Zaheduzzaman
    Luleå University of Technology.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Multihomed mobile IPv6: OPNET simulation of network selection and handover timing in heterogeneous networking environments2007In: Proceedings of the Eleventh Annual OPNET Technology Conference: OPNETWORK 2007, 2007Conference paper (Refereed)
  • 72.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Ul Islam, Raihan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hossain, Md. Shahadat
    Chittagong University, Chittagong, Bangladesh.
    Project: A belief-rule-based DSS to assess flood risks by using wireless sensor networks2015Other (Other (popular science, discussion, etc.))
  • 73.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    You, Ilsun
    Soonchunhyang University, Chungcheongnam-do, Republic of Korea.
    Palmieri, Francesco
    University of Salerno, Fisciano (SA), Italy.
    Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms2018In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, Vol. 2018, p. 1-2, article id 5346596Article in journal (Refereed)
  • 74.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    You, Ilsun
    Soonchunhyang University, Asan, Republic of Korea.
    Rahmani, Rahim
    Stockholm University, Stockholm, Sweden.
    Sharma, Vishal
    Soonchunhyang University, Asan, Republic of Korea.
    Secure Computation on 4G/5G Enabled Internet-of-Things2019In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2019, article id 3978193Article in journal (Refereed)
    Abstract [en]

    The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

    Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.

    The scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making computing secure on 4G/5G enabled Internet-of-Things. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in 5G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data.

  • 75.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A mobility management scheme for heterogeneous environments supporting vehicular speeds using a policy-based approach2008In: Proceedings of the 5th International Workshop Conference on Performance Modelling and Evaluation of Heterogeneous Networks: (HET-NETs), 2008Conference paper (Refereed)
    Abstract [en]

    Today, handsets and terminals are typically equipped with multiple radio interfaces. Meanwhile, various types of access networks using different radio technologies are being deployed all over the world. Also, there is a strong trend towards All-IP-Networks following the principle "Everything over IP", and "IP over everything". This development is leading researchers into the area of heterogeneous networking and overlay topologies.This paper focuses on mobility management issues related to such an environment supporting vehicular speeds of users using a policy-based approach and a network-layer metric for access network selection.A Mobile IP-based architecture is proposed where mobility bindings are sent periodically at a frequency depending on the speed of the user also taking variations in the network-layer metric into account and the overall signaling cost. The architecture is designed with a focus on minimizing packet losses and timely handling of vertical hand-overs.

  • 76.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    An architecture for seamless mobility management in various types of applications using a combination of MIP and SIP2006In: Proceedings of Swedish National Computer Networking Workshop 2006: sponsored by IEEE VT/COM Sweden : October 26-27, 2006, Luleå University of Technology, Luleå: Luleå tekniska universitet, 2006, p. 33-36Conference paper (Refereed)
    Abstract [en]

    In the future, mobile users will have the possibility to use a variety of wireless access networks simultaneously making the vision "Always best connected" come true. The Internet Protocol (IP) will most likely be the least common divisor allowing service providers to deploy services in a unified way regardless of access network type (being wired or wireless). The 3GPP-led development of the IP Multimedia Subsystem (IMS) is a promising step towards the vision. However, there are a number of obstacles along this way forward. Various deployment difficulties related to already installed base of user and infrastructure equipment and service providers protecting their old investments are the most common obstacles. In addition to those reasons, somewhat conservative regulatory authorities, short-comings in digital rights management, multiple standardization bodies proposing non-aligned solutions, as well as non-uniformed and non-optimized use of radio spectrum do not improve the speed of change.Our research is performed within the area of seamless real-time multimedia distribution in heterogeneous wireless access networks with a user-centric and end-to-end system approach. Having proposed various extensions to Mobile IP (MIP) including multihoming and port-based handling of flows, as well as solutions for global connectivity in ad hoc networks we now present a combined architecture using both MIP and Session Initiation Protocol (SIP) for mobility management where MIP is used for TCP connections and SIP is used for UDP traffic carrying real-time multimedia streams of data.

  • 77.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Mobile mediator control function: an IEEE 802.21-based mobility management and access network selection model2009In: Proceedings of the 18th ICT-Mobile Summit / [ed] Paul Cunningham; Miriam Cunningham, IIMC International Information Management Corporation , 2009Conference paper (Refereed)
    Abstract [en]

    This paper proposes a combined network and application layer access network decision model for multimedia applications in heterogeneous networking environments. It builds on previous work of a network layer based metric used in combination with multihomed Mobile IP and introduces a mechanism for applications to interact with the mobility management system in the mobile node. This way, applications executing in the mobile node can decide either to take access network decisions on their own or to let the network layer handle mobility management tasks automatically based on default decision criterion decided by the end-user.An extended architecture based on previous work and the upcoming IEEE 802.21 standard for media-independent handover services is presented. The control plane, named "Mobile Mediator Control Function", offers a set of events and commands through an additional service access point. Results from a scenario with a Voice over IP application running in the proposed environment simulated in OPNET Modeler are presented.

  • 78.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Optimized access network selection in a combined WLAN/LTE environment2011In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 61, no 4, p. 739-751Article in journal (Refereed)
    Abstract [en]

    Multimode terminals equipped with multiple radio access technologies are becoming increasingly popular. At the same time, network operators and service providers seek opportunities to deliver seamless services cost effectively, leveraging a variety of radio access technologies using both licensed and unlicensed spectrum. In order to standardize the operations of such complex environments 3GPP is currently working on IP flow mobility and mobile data offload solutions. This article proposes and evaluates a new access network selection procedure in such a combined WLAN/LTE environment. The proposed solution takes not only parameters available in the mobile node and its current and candidate access networks into account, but performs an optimization on the heterogeneous wireless network level as well. An optimization model based on an approximate solution to the well-known bin packing problem is presented. Also, there is a signaling scheme for distribution handling presented. Results from simulations performed in OPNET Modeler show improvements compared to basing handover decisions on locally available information only.

  • 79.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Projekt: Hybrinet@Skellefteå2007Other (Other (popular science, discussion, etc.))
    Abstract [sv]

    Projektet Hybrinet@Skellefteå studerar effektiv multimediedistribution i heterogena nätverksmijöer

  • 80.
    Andersson, Karl
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Gukhool, Balkrishna Sharma
    Electrical and Computer Engineering Department, Sherbrooke University.
    Cherkaoui, Soumaya
    Electrical and Computer Engineering Department, Sherbrooke University.
    Mobility management for highly mobile users and vehicular networks in heterogeneous environments2008In: 2008 IEEE 33rd Conference on Local Computer Networks: [LCN 2008] ; Montreal, AB, Canada, 14 - 17 October 2008, Piscataway, NJ: IEEE Communications Society, 2008, p. 593-599Conference paper (Refereed)
    Abstract [en]

    With the recent developments in wireless networks, different radio access technologies are used in different places depending on capacity in terms of throughput, cell size, scalability etc. In this context, mobile users, and in particular highly mobile users and vehicular networks, will see an increasing number and variety of wireless access points enabling Internet connectivity. Such a heterogeneous networking environment needs, however, an efficient mobility management scheme offering the best connection continuously. In this paper, a mobility management architecture focusing on efficient network selection and timely handling of vertical and horizontal hand-overs is proposed. The solution is based on Mobile IP where hand-over decisions are taken based upon calculations of a metric combining delay and delay jitter. For efficiency reasons, the frequency of binding updates is dynamically controlled, depending on speed and variations in the metric. The dynamic frequency of binding updates helps the timely discovery of congested access points and cell edges so as to allow efficient hand-overs that minimize packet drops and hand-over delays.Results show that the overall signaling cost is decreased and changes in networking conditions are detected earlier compared to standard Mobile IP.

  • 81.
    Andersson Vestman, Filip
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Karlsson, Magnus
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Experimentell studie av prestandaskillnader mellan native Android och Xamarin för mobilapplikationer2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Throughout the last decade the mobile phone market has grown rapidly and with it, the need for mobile applications has grown as well. When the development process for a mobile application starts, a developer must review various factors that can affect the mobile applications usage or performance, for example the development platform to use which is the focus of this study. The purpose of this study is to determine the difference in performance between native Android and Xamarin cross-compile with the use of an experimental study. The hypothesis of this study is based on previous research which shows that cross-platform and Xamarin cross-compile have worse performance than native Android, the result of this study can contribute can help a developer make the decision on what development platform to choose. The delimitations have been chosen as Android as platform, execution time, CPU-usage and RAM-usage for performance testing. The algorithms that were chosen were an iterative bubble sort, in form of best case, worst case and random case with varying numbers, and a recursive Fibonacci sequence with different starting points. The result of this study is consistent with the hypothesis, Xamarin shows worse performance than native Android. 

  • 82.
    Aparicio Rivera, Jorge
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindner, Marcus
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindgren, Per
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab. Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Heapless: Dynamic Data Structures without Dynamic Heap Allocator for Rust2018In: 2018 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), Piscataway, NJ: IEEE, 2018, p. 87-94, article id 8472097Conference paper (Refereed)
    Abstract [en]

    Dynamic memory management is typically implemented using a global memory allocator, which may negatively impact the performance, reliability, and predictability of a program; in effect standards around safety-critical applications often discourage or even disallow dynamic memory management. This paper presents heapless, a collection of dynamic data structures (for vectors, strings, and circular buffers) that can be either stack or statically allocated, thus free of global allocator dependencies. The proposed data structures for vectors and strings closely mimic the Rust standard library implementations while adding support to gracefully handling cases of capacity exceedance. Our circular buffers act as queues and allowing channel like usage (by splitting). The Rust memory model together with the ability of local reasoning on memory requirements (brought by heapless) facilitates establishing robustness/safety guarantees and minimize attack surfaces of (industrial) IoT systems. We show that the heapless data structures are highly efficient and have predictable performance, thus suitable for hard real-time applications. Moreover, in our implementation heapless data structures are non-relocatable allowing mapping to hardware, useful, e.g., to DMA transfers. The feasibility, performance, and advantages of heapless are demonstrated by implementing a JSON serialization and de-serialization library for an ARM Cortex-M based IoT platform.

  • 83.
    Araujo, Victor
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Mitra, Karan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Saguna, Saguna
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Åhlund, Christer
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Performance evaluation of FIWARE: A cloud-based IoT platform for smart cities2019In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 132, p. 250-261Article in journal (Refereed)
    Abstract [en]

    As the Internet of Things (IoT) becomes a reality, millions of devices will be connected to IoT platforms in smart cities. These devices will cater to several areas within a smart city such as healthcare, logistics, and transportation. These devices are expected to generate significant amounts of data requests at high data rates, therefore, necessitating the performance benchmarking of IoT platforms to ascertain whether they can efficiently handle such devices. In this article, we present our results gathered from extensive performance evaluation of the cloud-based IoT platform, FIWARE. In particular, to study FIWARE’s performance, we developed a testbed and generated CoAP and MQTT data to emulate large-scale IoT deployments, crucial for future smart cities. We performed extensive tests and studied FIWARE’s performance regarding vertical and horizontal scalability. We present bottlenecks and limitations regarding FIWARE components and their cloud deployment. Finally, we discuss cost-efficient FIWARE deployment strategies that can be extremely beneficial to stakeholders aiming to deploy FIWARE as an IoT platform for smart cities.

  • 84.
    Arvidsson, Johan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Finding delta difference in large data sets2019Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To find out what differs between two versions of a file can be done with several different techniques and programs. These techniques and programs are often focusd on finding differences in text files, in documents, or in class files for programming. An example of a program is the popular git tool which focuses on displaying the difference between versions of files in a project. A common way to find these differences is to utilize an algorithm called Longest common subsequence, which focuses on finding the longest common subsequence in each file to find similarity between the files. By excluding all similarities in a file, all remaining text will be the differences between the files. The Longest Common Subsequence is often used to find the differences in an acceptable time. When two lines in a file is compared to see if they differ from each other hashing is used. The hash values for each correspondent line in both files will be compared. Hashing a line will give the content on that line a unique value. If as little as one character on a line is different between the version, the hash values for those lines will be different as well. These techniques are very useful when comparing two versions of a file with text content. With data from a database some, but not all, of these techniques can be useful. A big difference between data in a database and text in a file will be that content is not just added and delete but also updated. This thesis studies the problem on how to make use of these techniques when finding differences between large datasets, and doing this in a reasonable time, instead of finding differences in documents and files.  Three different methods are going to be studied in theory. These results will be provided in both time and space complexities. Finally, a selected one of these methods is further studied with implementation and testing. The reason only one of these three is implemented is because of time constraint. The one that got chosen had easy maintainability, an easy implementation, and maintains a good execution time.

  • 85.
    Atmojo, Udayanto Dwi
    et al.
    Department of Electrical Engineering and Automation, Aalto University.
    Gulzar, Kashif
    Department of Electrical Engineering and Automation, Aalto University.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Department of Electrical Engineering and Automation, Aalto University.
    Ma, Rongwei
    Department of Electrical Engineering and Automation, Aalto University.
    Hopsu, Alexander
    Department of Electrical Engineering and Automation, Aalto University.
    Makkonen, Henri
    Department of Electrical Engineering and Automation, Aalto University.
    Korhonen, Atte
    Department of Electrical Engineering and Automation, Aalto University.
    Phu, Long Tran
    Department of Electrical Engineering and Automation, Aalto University.
    Distributed control architecture for dynamic reconfiguration: Flexible assembly line case study2018Conference paper (Refereed)
    Abstract [en]

    This article presents the development of a distributed manufacturing case study enhanced with features that enable flexibility during the production process and the capability to continue the production process in case of fault scenarios. The approach described in this paper presents solutions to achieve the production of customized products, handle changes in product order, and minimize downtime and avoid total shutdown of the manufacturing system due to the occurrence of failures during the production process.

  • 86.
    Atmojo, Udayanto Dwi
    et al.
    Electrical Engineering and Automation, Aalto University, Espoo, Finland.
    Salcic, Zoran
    Electrical and Computer Engineering, The University of Auckland, Auckland, New Zealand.
    Wang, Kevin I-Kai
    The University of Auckland, 1415 Auckland, New Zealand .
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Service-Oriented Programming Approach for Dynamic Distributed Manufacturing Systems2019In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050Article in journal (Refereed)
    Abstract [en]

    Dynamic reconfigurability and adaptability are crucial features of the future manufacturing systems that must be supported by adequate software technologies. Currently, they are typically achieved as add-ons to existing software tools and run-time systems, which are not based on any formal foundation such as formal model of computation (MoC). This paper presents the new programming paradigm of Service Oriented SystemJ (SOSJ), which targets dynamic distributed software systems suited for future manufacturing applications. SOSJ is built on a merger and the synergies of two programming concepts of (1) Service Oriented Architecture (SOA), to support dynamic software system composition, and (2) SystemJ programming language based on a formal MoC, which targets correct by construction design of static distributed software systems. The resulting programming paradigm allows the design and implementation of dynamic distributed software systems.

  • 87.
    Axelsson, Tobias
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Using supervised learning algorithms to model the behavior of Road Weather Information System sensors2018Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Trafikverket, the agency in charge of state road maintenance in Sweden, have a number of so-called Road Weather Information Systems (RWIS). The main purpose of the stations is to provide winter road maintenance workers with information to decide when roads need to be plowed and/or salted. Each RWIS have a number of sensors which make road weather-related measurements every 30 minutes. One of the sensors is dug into the road which can cause traffic disturbances and be costly for Trafikverket. Other RWIS sensors fail occasionally.

    This project aims at modelling a set of RWIS sensors using supervised machine learning algorithms. The sensors that are of interest to model are: Optic Eye, Track Ice Road Sensor (TIRS) and DST111. Optic Eye measures precipitation type and precipitation amount. Both TIRS and DST111 measure road surface temperature. The difference between TIRS and DST111 is that the former is dug into the road, and DST111 measures road surface temperature from a distance via infrared laser. Any supervised learning algorithm trained to model a given measurement made by a sensor, may only train on measurements made by the other sensors as input features. Measurements made by TIRS may not be used as input in modelling other sensors, since it is desired to see if TIRS can be removed. The following input features may also be used for training: road friction, road surface condition and timestamp.

    Scikit-learn was used as machine learning software in this project. An experimental approach was chosen to achieve the project results: A pre-determined set of supervised algorithms were compared using different amount of top relevant input features and different hyperparameter settings. Prior to achieving the results, a data preparation process was conducted. Observations with suspected or definitive errors were removed in this process. During the data preparation process, the timestamp feature was transformed into two new features: month and hour.

    The results in this project show that precipitation type was best modelled using Classification And Regression Tree (CART) on Scikit-learn default settings, achieving a performance score of Macro-F1test = 0.46 and accuracy = 0.84 using road surface condition, road friction, DST111 road surface temperature, hour and month as input features. Precipitation amount was best modelled using k-Nearest Neighbor (kNN); with k = 64 and road friction used as the only input feature, a performance score of MSEtest = 0.31 was attained. TIRS road surface temperature was best modelled with Multi-Layer Perceptron (MLP) using 64 hidden nodes and DST111 road surface temperature, road surface condition, road friction, month, hour and precipitation type as input features, with which a performance score of MSEtest = 0.88 was achieved. DST111 road surface temperature was best modelled using Random forest on Scikit-learn default settings with road surface condition, road friction, month, precipitation type and hour as input features, achieving a performance score of MSEtest = 10.16.

  • 88.
    Baghdo, Simon
    Luleå University of Technology, Department of Arts, Communication and Education.
    Game Telemtry: Store, Analyze and Improve UX in Game from Player-Choices2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    During this project, the main objective was to store and analyze the user choices through game telemetry, in the game Bloodlines. With the goal to adjust the game for each member personally, for an improved user experience. This was done through a constructed database. By saving metrics of player choices and events such as: Most used weapon, attempts per session, session time periods, amount of deaths and highest rate of death cause. The results got analyzed with the control group settings in mind. Adjustments made were based on a fundamental foundation. In addition a web application with the functionality to enter and change the settings metrics in real time.

  • 89.
    Bai, Emilien
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Synnes, Kåre
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Reward System for Collaborative Care of Elderly based on Distributed Ledger Technologies2017In: Proceedings of the Eleventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies: UBICOMM 2017, 2017Conference paper (Refereed)
    Abstract [en]

    This paper presents the design and implementation of a reward system for collaborative care of elderly based on distributed ledger technologies. The work is motivated by the demographic change, where an aging population consequently increases the need for care. This causes a great tension in our society, as care resources become increasingly constrained, both regarding costs and availability of care staff. Much of the daily care of the elderly is today done by family members (spouses, children) and friends, often on a voluntarily basis, which adds to the tension. The core idea of this work is to help broaden the involvement of people in caring for our elderly, enabled by a system for collaborative care. The proposed system benefits from recent advances in distributed ledger technologies, which similarly to digital currencies, are build on the ability for mutual agreements between people who do not know each other. The system also benefits from recent gamification techniques to motivate people to collaborate on a larger scale through performing simple daily tasks. The system builds on rewards automatically given when these smart contracts are fulfilled, a gamification technique that is believed to maintain motivation of the volunteers. In this paper, we thus describe a reward system designed to connect elderly and volunteers by mutual agreements implemented as smart contracts. 

  • 90.
    Bai, Emilien
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Synnes, Kåre
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Supporting Collaborative Care of Elderly through a Reward System based on Distributed Ledger Technologies2018In: International Journal On Advances in Life Sciences, ISSN 1942-2660, E-ISSN 1942-2660, Vol. 10, no 1-2, p. 90-102Article in journal (Refereed)
    Abstract [en]

    This paper discusses supporting collaborative care of elderly through a reward system based on distributed ledger technologies. The design and implementation of such a reward system that connect elderly and volunteers by mutual agreements involve technologies such as smart contracts and blockchains. The work is motivated by the demographic change, where an aging population consequently increases the need for care. This causes a great tension in our society, as care resources become increasingly constrained, both regarding costs and availability of care staff. Much of the daily care of the elderly is today done by family members (spouses, children) and friends, often on a voluntarily basis, which adds to the tension. The core idea of this work is to help broaden the involvement of people in caring for our elderly, enabled by a system for collaborative care. The proposed system benefits from recent advances in distributed ledger technologies, which similarly to digital currencies, are build on the ability for mutual agreements between people who do not know each other. The system also benefits from recent gamification techniques to motivate people to collaborate on a larger scale through performing simple daily tasks. The proposed system benefits from inherent distributed ledger technologies advantages, such as a high level of decentralization, thus a high availability, and strong data consistency. These advantages make it interesting to develop the possible links between blockchains and the outside world to allow for a higher level of automation and distribution of services such as collaborative care. New models for distributed ledger technologies, such as Iota tangles or the Swirld platform, may however scale and perform better than blockchains. These should thus be considered for a full implementation and test of the system. In summary, this paper presents a novel framework and prototype implementation of a reward system supporting collaborative care of elderly, that is based on distributed ledger technologies.

  • 91.
    Balasubramaniam, Sasitharan
    et al.
    Tampere University of Technology.
    Lyamin, Nikita
    Halmstad University.
    Kleyko, Denis
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Skurnik, Mikael
    University of Helsinki.
    Vinel, Alexey
    Halmstad University.
    Koucheryavy, Yevgeni
    Tampere University of Technology.
    Exploiting bacterial properties for multi-­‐hop nanonetworks2014In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 52, no 7, p. 184-191Article in journal (Refereed)
    Abstract [en]

    Molecular communication is a relatively new communication paradigm for nanomachines where the communication is realized by utilizing existing biological components found in nature. In recent years, researchers have proposed using bacteria to realize molecular communication because the bacteria have, (i) the ability to swim and migrate between locations, (ii) the ability to carry DNA contents (i.e. plasmids), which could be utilized for information storage, and (iii) the ability to interact and transfer plasmids to other bacteria (one of this process is known as bacterial conjugation). However, current proposals for bacterial nanonetworks have not considered the internal structures of the nanomachines that can facilitate the use of bacteria as an information carrier. This article presents the types and functionalities of nanomachines that can be utilized in bacterial nanonetworks. A particular focus is placed on the bacterial conjugation and its support for multi-hop communication between nanomachines. Simulations of the communication process have also been evaluated, to analyze the quantity of bit received as well as the delay performances. Wet lab experiments have also been conducted to validate the bacterial conjugation process. The article also discusses potential applications of bacterial nanonetworks for cancer monitoring and therapy.

  • 92.
    Baniya, Rupak
    et al.
    Department of Electrical Engineering, School of Electrical Engineering, Aalto University.
    Maksimainen, Mikko
    Department of Electrical Engineering, School of Electrical Engineering, Aalto University.
    Sierla, Seppo
    Department of Automation and Systems Technology, School of Electrical Engineering, Aalto University.
    Pang, Cheng
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Yang, Chen-Wei
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Vyatkin, Valeriy
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Smart indoor lighting control: power, illuminance, and colour quality2014In: Proceedings: 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE) : Grand Cevahir Hotel and Convention Center Istambul, Turkey : 01 - 04 June, 2014, Piscataway, NJ: IEEE Communications Society, 2014, p. 1745-1750, article id 6864878Conference paper (Refereed)
    Abstract [en]

    This paper investigates the correlation between color quality and energy efficiency of indoor lighting control. The color quality, in terms of visual performance and comfort, is quantified using three measurements: illuminance, Color Rendering Index, and Correlated Color Temperature. Several experiments have been conducted to evaluate the potential energy savings of using different portions of light spectrum to obtain the optimal color quality. In particular, Light-Emitting Diodes are used as the lighting sources of the experimental luminaire. Moreover, the above quantification method and experimental results have been incorporated into a previously developed simulation framework for Building Automation and Control Systems, and smart lighting is used to adjust the tradeoff between comfort and energy consumption based on the presence of occupants. The results can be used to evaluate the viability of advanced lighting automation.

  • 93.
    Bansal, Shubham
    et al.
    NEC Laboratories Europe, Heidelberg.
    Schmidt, Mischa
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Energy Disaggregation Methods for Commercial Buildingsusing Smart Meter and Operational data2017In: The Workshops of the Thirty-First AAAI Conference on Artificial Intelligence: Artificial Intelligence for Smart Grids and Smart Buildings, AI Access Foundation , 2017, p. 325-329Conference paper (Refereed)
    Abstract [en]

    One of the key information pieces in improving energy efficiency of buildings is the appliance level breakdown of energy consumption. Energy disaggregation is the process of obtaining this breakdown from a building level aggregate data using computational techniques. Most of the current research focuses on residential buildings, obtaining this information from a single smart meter and often relying on high frequency data. This work is directed at commercial buildings equipped with building management and automation systems providing low frequency operational and contextual data. This paper presents a machine learning method to disaggregate energy consumption of the building using this operational data as input features. Experimental results on two publicly available datasets demonstrate the effectiveness of the approach, which surpasses existing methods. For all but one appliance of House 2 of the publicly available REDD dataset, improvements in normalized error in assigned power range between 20% (Lighting) and 220% (Stove). For another dataset from an educational facility in Singapore, disaggregation accuracy of 92% is reported for the facility’s cooling system.

  • 94.
    Baqer Mollah, Muhammad
    et al.
    Jahangirnagar University.
    Azad, Md. Abul Kalam
    Jahangirnagar University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things2017In: IEEE Cloud Computing, E-ISSN 2325-6095, Vol. 4, no 1, p. 34-42, article id 7879139Article in journal (Refereed)
    Abstract [en]

    Over the last few years, smart devices are able to communicate with each other and with Internet/cloud from short to long range. As a consequence, a new paradigm is introduced called Internet of Things (IoT). However, by utilizing cloud computing, resource limited IoT smart devices can get various benefits like offload data storage and processing burden at cloud. To support latency sensitive, real-time data processing, mobility and high data rate IoT applications, working at the edge of the network offers more benefits than cloud. In this paper, we propose an efficient data sharing scheme that allows smart devices to securely share data with others at the edge of cloud-assisted IoT. In addition, we also propose a secure searching scheme to search desired data within own/shared data on storage. Finally, we analyze the performance based on processing time of our proposed scheme. The results demonstrate that our scheme has potential to be effectively used in IoT applications

  • 95.
    Baqer Mollah, Muhammad
    et al.
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Kalam Azad, Md. Abul
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Security and privacy challenges in mobile cloud computing: Survey and way ahead2017In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 84, p. 38-54Article in journal (Refereed)
    Abstract [en]

    The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.

  • 96.
    Baraër, Christophe
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Phanse, Kaustubh
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Nykvist, Johan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Birsa, Luka
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    ExPLoIT: exploiting past location information and transitivity for positioning in mobile sensor networks2007In: 2nd International Conference on Communication Systems Software and Middleware, 2007: COMSWARE 2007 ; 7 - 12 Jan. 2007, Bangalore, India, Piscataway, NJ: IEEE Communications Society, 2007Conference paper (Refereed)
    Abstract [en]

    We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the first positioning technique that exploits location information at regular nodes in addition to using seeds. The key idea is the notion of confidence that a node has in its location estimate which can be used by other nodes for localization. Using Monte Carlo integration, a node estimates its current location and confidence based on its past location and the location information it receives from its neighbors. Node mobility is exploited to transitively localize the network. Our extensive simulation study shows that our proposal outperforms three other state-of-the-art range-free localization techniques under a wide range of conditions. The strength of ExPLoIT is that it is robust to irregular radio propagation, arbitrary seed and node density, and stochastic seed and node mobility; no special hardware is necessary at sensor nodes.

  • 97.
    Batalla, Jordi Mongay
    et al.
    National Institute of Telecommunications, Warsaw University of Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Gajewski, Mariusz
    National Institute of Telecommunications, Poland..
    Secure Smart Homes: Opportunities and Challenges2017In: ACM Computing Surveys, ISSN 0360-0300, E-ISSN 1557-7341, Vol. 50, no 5, p. p75:1-75:32Article in journal (Refereed)
    Abstract [en]

    The Smart Home concept integrates smart applications in the daily human life. In recent years, Smart Homes have increased security and management challenges due to the low capacity of small sensors, multiple connectivity to the Internet for efficient applications (use of big data and cloud computing) and heterogeneity of home systems, which require inexpert users to configure devices and micro-systems. This article presents current security and management approaches in Smart Homes and shows the good practices imposed on the market for developing secure systems in houses. At last, we propose future solutions for efficiently and securely managing the Smart Homes

  • 98.
    Bauer, Martin
    et al.
    NEC Laboratories Europe.
    Dobre, Dan
    NEC Laboratories Europe.
    Santos, Nuno
    NEC Laboratories Europe.
    Schmidt, Mischa
    NEC Laboratories Europe, NEC Europe Ltd., Heidelberg.
    Scalable Processing of Geo-tagged Data in the Cloud2012In: NEC Technical Journal, ISSN 1880-5884, Vol. 7, no 2, p. 97-101Article in journal (Refereed)
    Abstract [en]

    The explosive growth of the mobile internet calls for scalable infrastructures capable of processing large amounts of mobile data with predictable response times. We have developed a scalable system supporting continuous geoqueries over geo-tagged data streams in the cloud. The experimental results confirm that our system scales, both in the number of supported geo-queries and throughput.

  • 99.
    Beattie, Mark
    et al.
    Computer Science Research Institute and School of Computing and Mathematics, University of Ulster.
    Hallberg, Josef
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Nugent, Chris D.
    University of Ulster. School of Computing and Mathematics, University of Ulster, Computer Science Research Institute, University of Ulster.
    Synnes, Kåre
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cleland, Ian
    University of Ulster. School of Computing and Mathematics.
    Lee, Sungyoung
    Ubiquitous Computing Laboratory, Kyung Hee University, Seocheon-dong, Giheung-gu.
    A Collaborative Patient-Carer Interface for Generating Home Based Rules for Self-Management2015In: Smart Homes and Health Telematics: 12th International Conference, ICOST 2014, Denver, CO, USA, June 25-27, 2014, Revised Papers / [ed] Cathy Bodine; Sumi Helal; Tao Gu; Mounir Mokhtari, New York: Encyclopedia of Global Archaeology/Springer Verlag, 2015, p. 93-102Conference paper (Refereed)
    Abstract [en]

    The wide spread prevalence of mobile devices, the decreasing costs of sensor technologies and increased levels of computational power have all lead to a new era in assistive technologies to support persons with Alzheimer’s disease. There is, however, still a requirement to improve the manner in which the technology is integrated into current approaches of care management. One of the key issues relating to this challenge is in providing solutions which can be managed by non-technically orientated healthcare professionals. Within the current work efforts have been made to develop and evaluate new tools with the ability to specify, in a non-technical manner, how the technology within the home environment should be monitored and under which conditions an alarm should be raised. The work has been conducted within the remit of a collaborative patient-carer system to support self-management for dementia. A visual interface has been developed and tested with 10 healthcare professionals. Results following a post evaluation of system usability have been presented and discussed.

  • 100.
    Bediako, Peter Ken
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework.2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Distributed Denial of Service (DDoS) attacks is one of the most widespread security attacks to internet service providers. It is the most easily launched attack, but very difficult and expensive to detect and mitigate. In view of the devastating effect of DDoS attacks, there has been the increase on the adaptation of a network detection technique to reveal the presence of DDoS attack before huge traffic buildup to prevent service availability.

    Several works done on DDoS attack detection reveals that, the conventional DDoS attack detection methods based on statistical divergence is useful, however, the large surface area of the internet which serve as the main conduit for DDoS flooding attacks to occur, makes it difficult to use this approach to detect attacks on the network. Hence this research work is focused on using detection techniques based on a deep learning technique, because it is proven as the most effective detection technique against DDoS attacks.

    Out of the several deep neural network techniques available, this research focuses on one aspect of recurrent neural network called Long Short-Term Memory (LSTM) and TensorFlow framework to build and train a deep neural network model to detect the presence of DDoS attacks on a network. This model can be used to develop an Intrusion Detection System (IDS) to aid in detecting DDoS attacks on the network. Also, at the completion of this project, the expectation of the produced model is to have a higher detection accuracy rates, and a low false alarm rates.

    Design Science Research Methodology (DSRM) was used to carry out this project. The test experiment for this work was performed on CPU and GPU base systems to determine the base system's effect on the detection accuracy of the model.

    To achieve the set goals, seven evaluating parameters were used to test the model's detection accuracy and performance on both Central Processing Unit (CPU) and Graphics Processing Unit (GPU) systems.

    The results reveal that the model was able to produce a detection accuracy of 99.968% on both CPU and GPU base system which is better than the results by Yuan et al. [55] which is 97.606%. Also the results prove that the model's performance does not depend on the based system used for the training but rather depends on the dataset size. However, the GPU systems train faster than CPU systems. It also revealed that increasing the value of epochs during training does not affect the models detection accuracy but rather extends the training time.

    This model is limited to detecting 17 different attack types on maintaining the same detection accuracy mentioned above. Further future work should be done to increase the detecting attack type to unlimited so that it will be able to detect all attack types.

1234567 51 - 100 of 1546
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf