https://www.mdu.se/

mdu.sePublications
Change search
Refine search result
1234567 51 - 100 of 1454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering.
    Funk, Peter
    Mälardalen University, School of Innovation, Design and Engineering.
    Xiong, Ning
    Mälardalen University, School of Innovation, Design and Engineering.
    von Schéele, Bo
    Mälardalen University, School of Innovation, Design and Engineering.
    A Three Phase Computer Assisted Biofeedback Training System Using Case-Based Reasoning2008In: Proc. 9th European Conference on Case-based Reasoning, 2008, p. 57-68Conference paper (Refereed)
    Abstract [en]

    Biofeedback is a method gaining increased interest and showing good results for a number of physical and psychological problems. Biofeedback training is mostly guided by an experienced clinician and the results largely rely on the clinician's competence. In this paper we propose a three phase computer assisted sensor-based biofeedback decision support system assisting less experienced clinicians, acting as second opinion for experienced clinicians. The three phase CBR framework is deployed to classify a patient, estimate initial parameters and to make recommendations for biofeedback training by retrieving and comparing with previous similar cases in terms of features extracted. The three phases work independently from each other. Moreover, fuzzy techniques are incorporated into our CBR system to better accommodate uncertainty in clinicians reasoning as well as decision analysis. All parts in the proposed framework have been implemented and primarily validated in a prototypical system. The initial result shows how the three phases functioned with CBR technique to assist biofeedback training. Eventually the system enables the clinicians to allow a patient to train himself/herself unsupervised.

  • 52.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering.
    Funk, Peter
    Mälardalen University, School of Innovation, Design and Engineering.
    Xiong, Ning
    Mälardalen University, School of Innovation, Design and Engineering.
    von Schéele, Bo
    Mälardalen University, School of Innovation, Design and Engineering.
    Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity2008In: Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity, ISSN 1867-366X, Vol. 1, p. 3-19Article in journal (Refereed)
    Abstract [en]

    Intelligent analysis of heterogeneous data and information sources for efficient decision support presents an interesting yet challenging task in clinical envi-ronments. This is particularly the case in stress medicine where digital patient re-cords are becoming popular which contain not only lengthy time series measurements but also unstructured textual documents expressed in form of natural languages. This paper develops a hybrid case-based reasoning system for stress di-agnosis which is capable of coping with both numerical signals and textual data at the same time. The total case index consists of two sub-parts corresponding to signal and textual data respectively. For matching of cases on the signal aspect we present a fuzzy similarity matching metric to accommodate and tackle the imprecision and uncertainty in sensor measurements. Preliminary evaluations have revealed that this fuzzy matching algorithm leads to more accurate similarity estimates for improved case ranking and retrieval compared with traditional distance-based matching crite-ria. For evaluation of similarity on the textual dimension we propose an enhanced cosine matching function augmented with related domain knowledge. This is im-plemented by incorporating Wordnet and domain specific ontology into the textual case-based reasoning process for refining weights of terms according to available knowledge encoded therein. Such knowledge-based reasoning for matching of tex-tual cases has empirically shown its merit in improving both precision and recall of retrieved cases with our initial medical databases. Experts in the domain are very positive to our system and they deem that it will be a valuable tool to foster wide-spread experience reuse and transfer in the area of stress diagnosis and treatment.

  • 53.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lindén, Maria
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Generic System-level Framework for Self-Serve Health Monitoring System through Internet of Things(IoT)2015In: Studies in Health Technology and Informatics, Volume 211: Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2–4 June 2015, Västerås, Sweden, 2015, Vol. 211, p. 305-307Conference paper (Refereed)
    Abstract [en]

    Sensor data are traveling from sensors to a remote server, data is analysed remotely in a distributed manner, and health status of a user is presented in real-time. This paper presents a generic system-level framework for a self-served health monitoring system through the Internet of Things (IoT) to facilities an efficient sensor data management.

  • 54.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Boubezoul, Abderrahmane
    UPE-IFSTTAR/TS2/SIMU&MOTO, F-77447 Marne la Vallée Cedex, France.
    Forsström, Nils Göran Gustav
    Sherif, Nabaz
    Stenekap, Daniel
    Espie, Stephane
    Sundström, Anton
    Södergren, Rasmus
    Data Analysis on Powered Two Wheelers Riders’ Behaviour using Machine Learning2019In: First International Conference on Advances in Signal Processing and Artificial Intelligence ASPAI' 2019, Barcelona, Spain, 2019Conference paper (Refereed)
    Abstract [en]

    Analyzing powered two-wheeler rider behavior, i.e. classification of riding patterns based on 3-D accelerometer/gyroscope sensors mounted on motorcycles is challenging. This paper presents machine learning approach to classify four different riding events performed by powered two wheeler riders’ as a step towards increasing traffic safety. Three machine learning algorithms, Random Forest (RF), Support Vector Machine (SVM) and Artificial Neural Network (ANN) have been used to classify riding patterns. The classification is conducted based on features extracted in time and frequency domains from accelerometer/gyroscope sensors signals. A comparison result between different filter frequencies, window sizes, features sets, as well as machine learning algorithms is presented. According to the results, the Random Forest method performs most consistently through the different data sets and scores best.

  • 55.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Brickman, Staffan
    Dengg, Alexander
    Fasth, Niklas
    Mihajlovic, Marko
    Norman, Jacob
    A Machine Learning Approach to Classify Pedestrians’ Event based on IMU and GPS2019In: International Conference on Modern Intelligent Systems Concepts MISC'18, 2019Conference paper (Refereed)
    Abstract [en]

    This paper investigates and implements six Machine Learning (ML) algorithms, i.e. Artificial Neural Network (ANN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Extra Tree (ET), and Gradient Boosted Trees (GBT) to classify different Pedestrians’ events based on Inertial Measurement Unit (IMU) and Global Positioning System (GPS) signals. Pedestrians’ events are pedestrian movements as the first step of H2020 project called SimuSafe1 with a goal to reduce traffic fatalities by doing risk assessments of the pedestrians. The movements the MLs’ models are attempting to classify are standing, walking, and running. Data, i.e. IMU, GPS sensor signals and other contextual information are collected by a smartphone through a controlled procedure. The smartphone is placed in five different positions onto the body of participants, i.e. arm, chest, ear, hand and pocket. The recordings are filtered, trimmed, and labeled. Next, samples are generated from small overlapping sections from which time and frequency domain features are extracted. Three different experiments are conducted to evaluate the performances in term of accuracy of the MLs’ models in different circumstances. The best performing MLs’ models determined by the average accuracy across all experiments is Extra Tree (ET) with a classification accuracy of 91%. 

  • 56.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Olsson, Erik
    Mälardalen University, Department of Computer Science and Electronics.
    Funk, Peter
    Mälardalen University, Department of Computer Science and Electronics.
    Xiong, Ning
    Mälardalen University, Department of Computer Science and Electronics.
    A Case-Based Reasoning System for Knowledge and Experience Reuse2007In: Proceedings of the 24th annual workshop of the Swedish Artificial Intelligence Society, 2007, p. 70-80Conference paper (Refereed)
    Abstract [en]

    Experience is one of the most valuable assets technicians and engineer have and may have been collected during many years and both from successful solutions as well as from very costly mistakes. Unfortunately industry rarely uses a systematic approach for experience reuse. This may be caused by the lack of efficient tools facilitating experience distribution and reuse. We propose a case-based approach and tool to facilitate experience reuse more systematically in industry. It is important that such a tool allows the technicians to give the problem case in a flexible way to increase acceptance and use. The proposed tool enables more structured handling of experience and is flexible and can be adapted to different situations and problems. The user is able to input text in a structured way and possibly in combination with other numeric or symbolic features. The system is able to identify and retrieve relevant similar experiences for reuse.

  • 57.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Olsson, Erik
    Mälardalen University, Department of Computer Science and Electronics.
    Funk, Peter
    Mälardalen University, Department of Computer Science and Electronics.
    Xiong, Ning
    Mälardalen University, Department of Computer Science and Electronics.
    Efficient Condition Monitoring and Diagnosis Using a Case-Based Experience Sharing System2007In: The 20th International Congress and Exhibition on Condition Monitoring and Diagnostics Engineering Management, COMADEM 2007, Faro, Portugal, 2007, p. 305-314Conference paper (Refereed)
    Abstract [en]

    Industry has to adjust quickly to changes in their surroundings, for example reducing staff during recession and increasing staff when the market demands it. These factors may cause rapid loss of experience, collected during many years, or require experienced staff to spend considerable resources in training new staff, instead of focusing on production. This is recognised as very costly for companies and organisations today and also reduces competitiveness and productivity. Condition Monitoring, diagnostics and selection of efficient preventive or corrective actions is a task that often requires a high degree of expertise. This expertise is often gained through sometimes very expensive mistakes and can take many years to acquire leading to a few skilled experts. When they are not available due to changes in staff or retirements the company often faces serious problems that may be very expensive, e.g. leading to a reduced productivity.

    If some deviation occurs in a machine, a fault report is often written; an engineer makes a diagnosis and may order spare parts to repair the machine. Fault report, spare parts, required time and statistics on performance after repair are often stored in different databases but so far not systematically reused. In this paper we present a Case-Based experience sharing system that enables reuse of experience in a more efficient way compared with what is mostly practiced in industry today. The system uses Case-Based-Reasoning (CBR) and limited Natural Language Processing. An important aspect of the experience management tool is that it is user-friendly and web-based to promote efficient experience sharing. The system should be able to handle both experiences that are only in house as well as sharing experience with other industries when there is no conflicting interest. Such a CBR based tool enables efficient experience gathering, management and reuse in production industries. The tool will facilitate the users with an interactive environment to communicate with each other for sharing their experiences. Depend on the user; the security level of the system will be varied to share knowledge among the collaborating companies.

    The system identifies the most relevant experiences to assess and resolve the current situation. The experience is stored and retrieved as a case in the collaborative space where experience from various companies may have been stored under many years. Reusing experience and avoiding expensive mistakes will increase the participating companies' competitiveness and also transfer valuable experience to their employees. One of the benefits is also the opportunity and facility to identify people with similar tasks and problems at different companies and enable them to share their experience, e.g. if a technician has solved a similar problem recently and is in the near, the most efficient solution may be to call the expert and ask for assistance. In future, one may access this tool through his/her mobile device via wireless or mobile communications using Global Positioning System, GPS, enables the system to suggest experts nearby, willing and able to share the knowledge and quickly assist in resolve the problem.

  • 58.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Westin, Jerker
    Nyholm, Dag
    Dougherty, Mark
    Groth, Torgny
    A fuzzy rule-based decision support system for Duodopa treatment in Parkinson2006Conference paper (Refereed)
    Abstract [en]

    A decision support system (DSS) was implemented based on a fuzzy logic inference system (FIS) to provide assistance in dose alteration of Duodopa infusion in patients with advanced Parkinson's disease, using data from motor state assessments and dosage. Three-tier architecture with an object oriented approach was used. The DSS has a web enabled graphical user interface that presents alerts indicating non optimal dosage and states, new recommendations, namely typical advice with typical dose and statistical measurements. One data set was used for design and tuning of the FIS and another data set was used for evaluating performance compared with actual given dose. Overall goodness-of-fit for the new patients (design data) was 0.65 and for the ongoing patients (evaluation data) 0.98. User evaluation is now ongoing. The system could work as an assistant to clinical staff for Duodopa treatment in advanced Parkinson's disease.

  • 59.
    Ahrén, Christina
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Nyblad, Ida
    Mälardalen University, School of Innovation, Design and Engineering.
    Investigating DRAM bank partitioning2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    We have investigated the page coloring technique bank partitioning and if it can be applied on commercial hardware platforms to reduce execution time jitter for specific tasks. We have also investigated how to alter execution times using bank partitioning. Unpredictable latency created by execution time jitter is a problem in real-time computing on commercial hardware platforms. We have run experiments that try to prove that the bank partitioning method we use alters the execution time and that thrashing occurs in the main memory if we run multiple instances of a workload. We receive significant changes in execution times when using bank partitioning and we can determine that thrashing occurs. However, due to the lack of the ability to measure the hardware performance counter for row buffer misses, we cannot determine if thrashing occurs in the main memory level. Since we cannot determine when, or if thrashing occurs in the main memory we find that we cannot reduce execution time jitter on the two systems that we have tested using bank partitioning on. We also find that execution times of specific tasks can be altered by reducing the number of bank bins associated with the specific task. The execution time of the task is increased if we reduce the number of bins associated with it.

    Download full text (pdf)
    fulltext
  • 60.
    Aisa, J.
    et al.
    Universidad de Zaragoza, Zaragoza, Spain .
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Villarroel, J. L.
    Universidad de Zaragoza, Zaragoza, Spain .
    Almeida, L.
    University of Porto, Porto, Portugal.
    Soft real-time traffic communication in loaded Wireless Mesh Networks2016In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, 2016, article id Article number 7496503Conference paper (Refereed)
    Abstract [en]

    Industrial applications have been shifting towards wireless multi-hop networks in recent years due to their lower cost of deployment and reconfiguration compared with their wired counterparts. These wireless networks usually must support real-time communication to meet the application requirements. For this reason, Wireless Mesh Networks (WMNs) are potential candidates for industrial applications as they support a fixed infrastructure of static nodes for relaying packets. To meet the application demands, we modify the wireless chain network protocol (WICKPro) to support soft real-time traffic in WMNs with chain topologies over IEEE 802.11. We employ tele-operation of mobile robots as our case study, and perform extensive simulation and laboratory experiments. We show that the data delivery ratio is increased up to 42% in a scenario with 7 nodes, when the maximum end-to-end delay tolerated by the application is doubled. This is particularly suited to soft real-time applications that can trade longer delays by higher reliability. Moreover, when compared with a distributed priority-based token-passing protocol (RT-WMP), the lower overhead of WICKPro allows, in an error-free scenario, obtaining a throughput improvement of 33.42% on average.

  • 61.
    Aisa, Jesus
    et al.
    Universidad de Zaragoza, Zaragoza, Spain.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Almeida, Luis
    University of Porto, Portugal.
    Villarroel, José Luis
    Universidad de Zaragoza, Zaragoza, Spain.
    DoTHa - A Double-threshold Hand-off Algorithm for Managing Mobility in Wireless Mesh Networks2016In: 21st IEEE Conference on Emerging Technologies and Factory Automation ETFA'16, 2016, article id 7733511Conference paper (Refereed)
    Abstract [en]

    Wireless communication will play an increasingly important role in future factory automation and process control, where the presence of mobile autonomous devices is expected to grow. However, wireless links are prone to errors due to shadowing and multi-path fading, which is even more severe in dynamic environments. These problems can be attenuated by using a mesh backbone to which mobile node connect to, using a hand-off algorithm. This solution is particularly important under real-time requirements typically found in factory automation. In this paper, we devise the Double-Threshold Hand-off (DoTHa) algorithm, a novel hand-off mechanism that triggers a hand-off in various environmental conditions. As a case study, we carry out the tele-operation of a mobile robot through a wireless mesh network in an indoor setting, using a wireless chain network protocol (WICKPro-SRT) that supports soft real-time traffic. We empirically compared DoTHa with two existing hand-off algorithms based on single and double hysteresis margin. The results revealed that DoTHa achieves Data Delivery Ratio (DDR) close to 100% whereas the single hysteresis-based hand-off suffers from frequent disconnections, dropping DDR to 88%. The double hysteresis-based hand-off shows higher ping-pong effect than DoTHa, doubling the number of hand-offs in some scenarios.

  • 62.
    Akalin, Neziha
    et al.
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Kiselev, Andrey
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Kristoffersson, Annica
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Loutfi, Amy
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    An Evaluation Tool of the Effect of Robots in Eldercare on the Sense of Safety and Security2017In: Social Robotics: 9th International Conference, ICSR 2017, Tsukuba, Japan, November 22-24, 2017, Proceedings / [ed] Kheddar, A.; Yoshida, E.; Ge, S.S.; Suzuki, K.; Cabibihan, J-J:, Eyssel, F:, He, H., Springer International Publishing , 2017, p. 628-637Conference paper (Refereed)
    Abstract [en]

    The aim of the study presented in this paper is to develop a quantitative evaluation tool of the sense of safety and security for robots in eldercare. By investigating the literature on measurement of safety and security in human-robot interaction, we propose new evaluation tools. These tools are semantic differential scale questionnaires. In experimental validation, we used the Pepper robot, programmed in the way to exhibit social behaviors, and constructed four experimental conditions varying the degree of the robot’s non-verbal behaviors from no gestures at all to full head and hand movements. The experimental results suggest that both questionnaires (for the sense of safety and the sense of security) have good internal consistency.

  • 63.
    Akalin, Neziha
    et al.
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Kiselev, Andrey
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Kristoffersson, Annica
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Loutfi, Amy
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    The Relevance of Social Cues in Assistive Training with a Social Robot2018In: 10th International Conference on Social Robotics, ICSR 2018, Proceedings / [ed] Ge, S.S., Cabibihan, J.-J., Salichs, M.A., Broadbent, E., He, H., Wagner, A., Castro-González, Á., Springer , 2018, p. 462-471Conference paper (Refereed)
    Abstract [en]

    This paper examines whether social cues, such as facial expressions, can be used to adapt and tailor a robot-assisted training in order to maximize performance and comfort. Specifically, this paper serves as a basis in determining whether key facial signals, including emotions and facial actions, are common among participants during a physical and cognitive training scenario. In the experiment, participants performed basic arm exercises with a social robot as a guide. We extracted facial features from video recordings of participants and applied a recursive feature elimination algorithm to select a subset of discriminating facial features. These features are correlated with the performance of the user and the level of difficulty of the exercises. The long-term aim of this work, building upon the work presented here, is to develop an algorithm that can eventually be used in robot-assisted training to allow a robot to tailor a training program based on the physical capabilities as well as the social cues of the users.

  • 64.
    Alajrami, S.
    et al.
    Newcastle University, Newcastle-upon-Tyne, United Kingdom.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Romanovsky, A.
    Newcastle University, Newcastle-upon-Tyne, United Kingdom.
    EXE-SPEM: Towards cloud-based executable software process models2016In: MODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development, 2016, p. 517-526Conference paper (Refereed)
    Abstract [en]

    Executing software processes in the cloud can bring several benefits to software development. In this paper, we discuss the benefits and considerations of cloud-based software processes. EXE-SPEM is our extension of the Software and Systems Process Engineering (SPEM2.0) Meta-model to support creating cloud-based executable software process models. Since SPEM2.0 is a visual modelling language, we introduce an XML notation meta-model and mapping rules from EXE-SPEM to this notation which can be executed in a workflow engine. We demonstrate our approach by modelling an example software process using EXE-SPEM and mapping it to the XML notation. 

  • 65.
    Alajrami, S.
    et al.
    Newcastle University, Newcastle upon Tyne, United Kingdom .
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sljivo, Irfan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Romanovsky, A.
    Newcastle University, Newcastle upon Tyne, United Kingdom .
    Isberg, Petter
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards cloud-based enactment of safety-related processes2016In: Lecture Notes in Computer Science, vol. 9922, 2016, p. 309-321Conference paper (Refereed)
    Abstract [en]

    Engineering safety-critical systems is a complex task which involves multiple stakeholders. It requires shared and scalable computation to systematically involve geographically distributed teams. The paper proposes a model-driven cloud-based enactment architecture automating safety-critical processes. This work adapts our previous work on cloud-based software engineering by enriching the architecture with an automatic support for generation of both, product-based safety arguments from failure logic analysis results and process-based arguments from the process model and the enactment data. The approach is demonstrated using a fragment of a process adapted from the aerospace domain. 

  • 66.
    Alajrami, Sami
    et al.
    Newcastle University, UK.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Romanovsky, Alexander
    Newcastle University, UK.
    Enabling GSD Task Allocation via Cloud-based Software Processes2017In: International Journal of Networked and Distributed Computing, ISSN 2211-7938, Vol. 5, no 4, p. 221-232Article in journal (Refereed)
    Abstract [en]

    Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experience of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites. Decision support can help make the task allocation a more informed and systematic process. The challenges in allocating tasks to distributed sites exist because of three distance dimensions between sites (geographical, temporal and cultural). An informed task allocation decision needs to consider these distances. Therefore, in this paper, we propose to integrate and semi-automate the calculation of an existing Global Distance Metric (GDM) into an architecture that supports executing cloud-based software processes. We analyze the potential of integrating the GDM into this architecture and identify the needed extensions to the architecture.

  • 67.
    Alajrami, Sami
    et al.
    Newcastle University, Newcastle upon Tyne, UK.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. IS (Embedded Systems).
    Romanovsky, Alexander
    Newcastle University, Newcastle upon Tyne, UK.
    Enabling GSD Task Allocation via Cloud-based Software Processes2017In: Software Engineering Research, Management and Applications SERA-2017, Springer, 2017, p. 179-192Conference paper (Refereed)
    Abstract [en]

    Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experi- ence of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites. Decision sup- port can help make the task allocation a more informed and systematic process. The challenges in allocating tasks to distributed sites exist because of three dis- tance dimensions between sites (geographical, temporal and cultural). An informed task allocation decision needs to consider these distances. Therefore, in this paper, we propose to integrate and semi-automate the calculation of an existing Global Distance Metric (GDM) into an architecture that supports executing cloud-based software processes. We analyze the potential of integrating the GDM into this archi- tecture and identify the needed extensions to the architecture.

  • 68.
    Alajrami, Sami
    et al.
    Newcastle University, UK.
    Romanovsky, Alexander
    Newcastle University, UK.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cost-Aware Scheduling of Software Processes Execution in the Cloud2018In: Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development - Volume 1, 2018, p. 203-212Conference paper (Refereed)
    Abstract [en]

    Using cloud computing to execute software processes brings several benefits to software development. In a previous work, we proposed a reference architecture, which treats software processes as workflows and uses cloud computing to execute them. Scheduling the execution in the cloud impacts the execution cost and the cloud resources utilization. Existing workflow scheduling algorithms target business and scientific (data-driven) workflows, but not software processes workflows. In this paper, we adapt three scheduling algorithms for our architecture and propose a fourth one; the Proportional Adaptive Task Schedule algorithm. We evaluate the algorithms in terms of their execution cost, makespan and cloud resource utilization. Our results show that our proposed algorithm saves between 19.74% and 45.78% of the execution cost and provides the best resource (virtual machine) utilization compared to the adapted algorithms while providing the second best makespan. 

  • 69.
    Albinsson, Felix
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Riedl, Jesper
    Mälardalen University, School of Innovation, Design and Engineering.
    HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. In the modern society, ICS/SCADA systems has evolved to communicate over public IP networks and has been incorporated in a company’s intranet or directly to the internet. This integration opens up for threats that were not envisioned at the time when the system was created. When ICS/SCADA systems get exposed to the internet, there is a risk that vulnerabilities in the systems get exploited by a malicious force. This can lead to data loss, destruction of data and devices, damage to infrastructure, financial losses for the company, and even loss of human life could occur. To mitigate and prevent attacks it is crucial to understand the attacks and the behaviour of the attacker. One way to achieve this is setting up a system that mimics the real system. This fake system is separated from the production network and closely monitored. The data collected can be analysed and used to gain knowledge about the attacks.

    This thesis will present a possible way to study attacks on an ICS/SCADA system using a honeypot designed for this purpose. To do this, a suitable honeypot had to be found that could collect relevant data regarding what kind of attacks that may be used against an ICS/SCADA system. This was achieved by experimenting with different set ups, and the collected data was analysed. This led to the use of T-pot as the chosen honeypot and the collected data showed that a lot of the traffic were directed towards the ICS/SCADA communication protocols Modbus and s7comm. To secure an ICS/SCADA system, it is important to gain knowledge about attacks and attack vectors. A honeypot can be a useful tool that provide information regarding attacks and attackers and can be a help in setting up a defence-in-depth strategy to improve the security in an ICS/SCADA network.

    Download full text (pdf)
    fulltext
  • 70.
    Al-Dulaimy, Auday
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Dalarna University, Falun, Sweden.
    Ashjaei, Seyed Mohammad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Papadopoulos, Alessandro
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fault Tolerance in Cloud Manufacturing: An Overview2023In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol 495, Springer Science and Business Media Deutschland GmbH , 2023, p. 89-101Conference paper (Refereed)
    Abstract [en]

    Utilizing edge and cloud computing to empower the profitability of manufacturing is drastically increasing in modern industries. As a result of that, several challenges have raised over the years that essentially require urgent attention. Among these, coping with different faults in edge and cloud computing and recovering from permanent and temporary faults became prominent issues to be solved. In this paper, we focus on the challenges of applying fault tolerance techniques on edge and cloud computing in the context of manufacturing and we investigate the current state of the proposed approaches by categorizing them into several groups. Moreover, we identify critical gaps in the research domain as open research directions. 

  • 71.
    Al-Dulaimy, Auday
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Taheri, J.
    Karlstad University, Karlstad, Sweden.
    Papadopoulos, Alessandro
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    LOOPS: A Holistic Control Approach for Resource Management in Cloud Computing2021In: ICPE 2021 - Proceedings of the ACM/SPEC International Conference on Performance Engineering, Association for Computing Machinery, Inc , 2021, p. 117-124Conference paper (Refereed)
    Abstract [en]

    In cloud computing model, resource sharing introduces major benefits for improving resource utilization and total cost of ownership, but it can create technical challenges on the running performance. In practice, orchestrators are required to allocate sufficient physical resources to each Virtual Machine (VM) to meet a set of predefined performance goals. To ensure a specific service level objective, the orchestrator needs to be equipped with a dynamic tool for assigning computing resources to each VM, based on the run-Time state of the target environment. To this end, we present LOOPS, a multi-loop control approach, to allocate resources to VMs based on the service level agreement (SLA) requirements and the run-Time conditions. LOOPS is mainly composed of one essential unit to monitor VMs, and three control levels to allocate resources to VMs based on requests from the essential node. A tailor-made controller is proposed with each level to regulate contention among collocated VMs, to reallocate resources if required, and to migrate VMs from one host to another. The three levels work together to meet the required SLA. The experimental results have shown that the proposed approach can meet applications' performance goals by assigning the resources required by cloud-based applications. 

  • 72.
    Alemzadeh, H.
    et al.
    University of Virginia, United States.
    Barbosa, R.
    University of Coimbra, Portugal.
    Brancati, F.
    Resil Tech S.r.l, Italy.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lawford, M.
    McMaster University, Canada.
    Natella, R.
    Federico II University of Naples, Italy.
    Netkachova, K.
    City University of London, United Kingdom.
    Pietrantuono, R.
    Federico II University of Naples, Italy.
    Silva, N.
    CRITICAL Software S.A, Portugal.
    Message from the WoSoCer workshop organizers2017In: Proceedings: 2017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, ISSREW 2017, 2017, p. xxxviii-, article id 8109232Conference paper (Other academic)
  • 73.
    Alexander, Karlsson
    Mälardalen University, School of Innovation, Design and Engineering.
    Design and Development of a Wireless Multipoint E-stop System for Autonomous Haulers2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Safety-related functions are important in autonomous industrial applications and are featured in an extensive body of work contained within the standards. The implementation of safety-related systems is commonly done by an external company at a great cost and with limited flexibility. Thus, the objective of this thesis was to develop and implement a safety-related system using o-the-shelf products and to analyse how well it can comply with the established standards of safety-related functions. This work has sought to review the current standards for safety-functions, the eectsof harsh radio environments on safety-related systems, and how to validate the safety-function.The system development process was used to gain knowledge by rst building the concept based on pre-study. After the pre-study was nished, the process moved to the development of software, designed to maintain a wireless heartbeat as well as to prevent collisions between the autonomous and manual-driven vehicles at a quarry, and implementation of the system in real hardware. Finally, a set of software (simulations) and hardware (measurements in an open-pit mine) tests were performed to test the functionality of the system. The wireless tests showed that the system adhered to the functional requirements set by the company, however, the evaluated performance level according to ISO 13849-1 resulted in performance level B which is insucient for a safety-related function. This work demonstrates that it is not possible to develop a safety-related system using the off-the-shelf products chosen, without hardware redundancy.

    Download full text (pdf)
    fulltext
  • 74.
    Ali, Nazakat
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Punnekkat, Sasikumar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Composite Hazard Analysis of System of Systems for Mixed-traffic Automation in Underground Mine2023In: International Conference on Ubiquitous and Future Networks, ICUFN, IEEE Computer Society, 2023, Vol. July, p. 445-450Conference paper (Refereed)
    Abstract [en]

    Hazard analysis for a single system focuses on identifying and evaluating potential hazards associated with the individual system, its components, and their interactions. There are well-established hazard analysis techniques that are widely used to identify hazards for single systems. However, unlike single systems, hazard analysis in a System of Systems (SoS) must focus on analyzing the potential hazards (including emergent ones) that can arise from the interactions between multiple individual systems. This type of analysis considers the complex interactions between systems and the interdependence between their components and the environment in which they operate. Therefore, it is necessary to understand the application scenarios of SoS and to employ a systematic approach to identify all potential hazards. This paper applies the Composite Hazard Analysis Technique (CompHAT) to an industrial case study from a mining and equipment domain. The results show that the CompHAT is useful in identifying the interaction faults and their propagation routes between components of a constituent system and between constituent systems in an SoS. We also report that, due to the tool support, CompHAT can be beneficial for safety engineers to trace the faults in the network of an SoS in a more efficient and effective manner.

  • 75.
    Ali, Nazakat
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Punnekkat, Sasikumar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Rauf, A.
    Knightec AB, Västerås, Sweden.
    Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets2024In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 210, article id 111958Article in journal (Refereed)
    Abstract [en]

    Context: Collaborative systems enable multiple independent systems to work together towards a common goal. These systems can include both human-system and system-system interactions and can be found in a variety of settings, including smart manufacturing, smart transportation, and healthcare. Safety is an important consideration for collaborative systems because one system's failure can significantly impact the overall system performance and adversely affect other systems, humans or the environment. Goal: Fail-safe mechanisms for safety-critical systems are designed to bring the system to a safe state in case of a failure in the sensors or actuators. However, a collaborative safety-critical system must do better and be safe-operational, for e.g., a failure of one of the members in a platoon of vehicles in the middle of a highway is not acceptable. Thus, failures must be compensated, and compliance with safety constraints must be ensured even under faults or failures of constituent systems. Method: In this paper, we model and analyze safety for collaborative safety-critical systems using hierarchical Coloured Petri nets (CPN). We used an automated Human Rescue Robot System (HRRS) as a case study, modeled it using hierarchical CPN, and injected some specified failures to check and confirm the safe behavior in case of unexpected scenarios. Results: The system behavior was observed after injecting three types of failures in constituent systems, and then safety mechanisms were applied to mitigate the effect of these failures. After applying safety mechanisms, the HRRS system's overall behavior was again observed both in terms of verification and validation, and the simulated results show that all the identified failures were mitigated and HRRS completed its mission. Conclusion: It was found that the approach based on formal methods (CPN modeling) can be used for the safety analysis, modeling, validation, and verification of collaborative safety-critical systems like HRRS. The hierarchical CPN provides a rigorous way of modeling to implement complex collaborative systems. 

  • 76.
    Ali, T.
    et al.
    Department of Civil, Architectural and Environmental System Engineering, Sungkyunkwan University, Suwon, 16419, South Korea.
    Haider, W.
    Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, 16419, South Korea.
    Ali, Nazakat
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Aslam, M.
    Department of Artificial Intelligence, Sejong University, Seoul, 05006, South Korea.
    A Machine Learning Architecture Replacing Heavy Instrumented Laboratory Tests: In Application to the Pullout Capacity of Geosynthetic Reinforced Soils2022In: Sensors, E-ISSN 1424-8220, Vol. 22, no 22, article id 8699Article in journal (Refereed)
    Abstract [en]

    For economical and sustainable benefits, conventional retaining walls are being replaced by geosynthetic reinforced soil (GRS). However, for safety and quality assurance purposes, prior tests of pullout capacities of these materials need to be performed. Conventionally, these tests are conducted in a laboratory with heavy instruments. These tests are time-consuming, require hard labor, are prone to error, and are expensive as a special pullout machine is required to perform the tests and acquire the data by using a lot of sensors and data loggers. This paper proposes a data-driven machine learning architecture (MLA) to predict the pullout capacity of GRS in a diverse environment. The results from MLA are compared with actual laboratory pullout capacity tests. Various input variables are considered for training and testing the neural network. These input parameters include the soil physical conditions based on water content and external loading applied. The soil used is a locally available weathered granite soil. The input data included normal stress, soil saturation, displacement, and soil unit weight whereas the output data contains information about the pullout strength. The data used was obtained from an actual pullout capacity test performed in the laboratory. The laboratory test is performed according to American Society for Testing and Materials (ASTM) standard D 6706-01 with little modification. This research shows that by using machine learning, the same pullout resistance of a geosynthetic reinforced soil can be achieved as in laboratory testing, thus saving a lot of time, effort, and money. Feedforward backpropagation neural networks with a different number of neurons, algorithms, and hidden layers have been examined. The comparison of the Bayesian regularization learning algorithm with two hidden layers and 12 neurons each showed the minimum mean square error (MSE) of 3.02 × 10−5 for both training and testing. The maximum coefficient of regression (R) for the testing set is 0.999 and the training set is 0.999 for the prediction interval of 99%. 

  • 77.
    Alirezaie, Marjan
    et al.
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Renoux, Jennifer
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Köckemann, Uwe
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Kristoffersson, Annica
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Karlsson, Lars
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    Blomqvist, Eva
    RISE SICS East, Linköping, Sweden.
    Tsiftes, Nicolas
    RISE SICS, Stockholm, Sweden.
    Voigt, Thiemo
    RISE SICS, Stockholm, Sweden.
    Loutfi, Amy
    Örebro universitet, Institutionen för naturvetenskap och teknik.
    An Ontology-based Context-aware System for Smart Homes: E-care@home2017In: Sensors, E-ISSN 1424-8220, Vol. 17, no 7, article id 1586Article in journal (Refereed)
    Abstract [en]

    Smart home environments have a significant potential to provide for long-term monitoring of users with special needs in order to promote the possibility to age at home. Such environments are typically equipped with a number of heterogeneous sensors that monitor both health and environmental parameters. This paper presents a framework called E-care@home, consisting of an IoT infrastructure, which provides information with an unambiguous, shared meaning across IoT devices, end-users, relatives, health and care professionals and organizations. We focus on integrating measurements gathered from heterogeneous sources by using ontologies in order to enable semantic interpretation of events and context awareness. Activities are deduced using an incremental answer set solver for stream reasoning. The paper demonstrates the proposed framework using an instantiation of a smart environment that is able to perform context recognition based on the activities and the events occurring in the home.

  • 78.
    Alkamha, Saaid
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Ahmadi, Alireza
    Mälardalen University, School of Innovation, Design and Engineering.
    Upptäckandet av säkerhetshot i privata nätverk: Hur du skyddar ditt hemnätverk2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Due to Covid 19, most people have chosen to work from home and most households have an access point that enables communication between several devices. Attacks against Wi-Fi access points have increased in recent years due to vulnerabilities that may exist in the access point. When a vulnerable path is found in the access point, this can lead to the attacker using the vulnerable path to breach and damage one or more devices in the home network and even corporate devices. Advances in technology have helped us implement several security measures that can protect the access point in case of intrusion attempts. The purpose of this work is to focus on providing the right knowledge for new network technicians to increase awareness in home network security. The goal of this thesis is to provide a deeper knowledge for new network technicians to be able to prevent or minimize attacks caused by vulnerabilities in a home network with a Wi-Fi access point and develop a routine for how to protect it. After we have identified several attacks and performed it ourselves, the result showed that it was easy to manipulate a vulnerable access point with the selected attack tools in this work and the experiments have shown us the importance of implementing the right security measures and how well they protect the access point against an intrusion attempt.

    Download full text (pdf)
    fulltext
  • 79.
    Alkamha, Sarmad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Alnuaim, Zaid
    Mälardalen University, School of Innovation, Design and Engineering.
    Optimeringsalgoritm för geografiskt sökuppdrag2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Sökproblem förekommer i många olika områden. I denna rapport har vi tacklat problemet med atthitta en person som gått vilse. Vi har utvecklat en sökalgoritm vars uppgift är att hitta personengenom att använda erfarenheter från tidigare sökuppdrag. Sökalgoritmen baserar sig på A*sökalgoritmen och sannolikheter. A* sökalgoritmen använder sig av heuristik som vägledersökningen och heuristiken bygger på erfarenhet. Vi har implementerat ett antal sökalgoritmer, treolika A* och två oinformerade sökalgoritmer för att utvärdera och jämföra deras söktid. Vi haräven utvärderat hur snabbt personen hittas med flera sökare och hur användningen av ledtråd somhittas under sökningen förbättrar sökalgoritmen. Vi använder en simulator som förser oss medvärdena som behövs för A* versionerna, vi kör ett stort antal tester med olika sökningsområdenoch mäter hur lång tid det tar att hitta personen för att skapa ett genomsnittligt resultat för de olikasökalgoritmerna. De två oinformerade sökalgoritmerna som vi implementerade söker på breddenrespektive djupet först. De har använts som benchmarking för att jämföra med de olika A*algoritmerna och analysera resultatet. Alla A* versioner var snabbare med att hitta barnet jämförtmed bredden och djupet först sökningsalgoritmerna. Användningen av fler sökare gjorde att tidensom behövdes för ett vanligt sökuppdrag med de övriga A* sökalgoritmerna reducerades avsevärt.I vårt fall med 3 sökare reducerades tiden till en tredjedel. Användningen av en ledtråd förbättradede två första A* algoritmerna med mer än 5%.

    Download full text (pdf)
    fulltext
  • 80.
    Almér, Alexander
    et al.
    Chalmers University of Technology and Gothenburg University, Sweden.
    von Hautwitz, Rickard
    Chalmers University of Technology and Gothenburg University, Sweden.
    Dodig-Crnkovic, Gordana
    Chalmers University of Technology and Gothenburg University, Sweden.
    Collective Cognition and Distributed Information Processing from Bacteria to Humans: Proc. AISB Conference Kent 2015.2015In: 41st Annual Convention of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour: (AISB 2015), 2015, p. 119-124Conference paper (Refereed)
    Abstract [en]

    The aim of this paper is to propose a general infocomputational model of cognition that can be applied to living organisms from the level of a single cell´s cognition to the level of groups of increasingly complex organisms with social, distributed cognition. We defend the project of new cognitivism, which unlike the old one acknowledges the central role of embodiment for cognition. Information processing going on in a cognising agent range from transduction of chemical signals and “quorum sensing” in bacteria, via simple local rules of behaviour that insects follow and that manifest themselves as “swarm intelligence”, to human level cognition with full richness of human languages and other systems of communication.

  • 81.
    Altarabichi, Mohammed Ghaith
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ahmed, Mobyen Uddin
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Begum, Shahina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Supervised Learning for Road Junctions Identification using IMU2019In: First International Conference on Advances in Signal Processing and Artificial Intelligence ASPAI' 2019, 2019Conference paper (Refereed)
  • 82.
    Altarabichi, Mohammed Ghaith
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ahmed, Mobyen Uddin
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ciceri, Maria Rita
    Università Cattolica del Sacro Cuore di Milano, Italy.
    Balzarotti, Stefania
    Università Cattolica del Sacro Cuore di Milano, Italy.
    Biassoni, Federica
    Università Cattolica del Sacro Cuore di Milano, Italy.
    Lombardi, Debora
    Università Cattolica del Sacro Cuore di Milano, Italy.
    Perego, Paolo
    Università Cattolica del Sacro Cuore di Milano, Italy.
    Reaction Time Variability Association with Unsafe Driving2020In: Transport Research Arena TRA2020, Helsinki, Finland, 2020Conference paper (Refereed)
    Abstract [en]

    This paper investigates several human factors including visual field, reaction speed, driving behavior and personality traits based on results of a cognitive assessment test targeting drivers in a Naturalistic Driving Study (NDS). Frequency of being involved in Near Miss event (fnm) and Frequency of committing Traffic Violation (ftv) are defined as indexes of safe driving in this work. Inference of association shows statistically significant correlation between Standard Deviation of Reaction Time (σRT) and both safe driving indexes fnm and ftv. Causal relationship analysis excludes age as confounding factor as variations in behavioral responses is observed in both younger and older drivers of this study.

    Download full text (pdf)
    fulltext
  • 83.
    Altenbernd, Peter
    et al.
    University of Applied Sciences Darmstadt, Germany.
    Ermedahl, Andreas
    Mälardalen University, School of Innovation, Design and Engineering.
    Lisper, Björn
    Mälardalen University, School of Innovation, Design and Engineering.
    Gustafsson, Jan
    Mälardalen University, School of Innovation, Design and Engineering.
    Automatic Generation of Timing Models for Timing Analysis of High-Level Code2011In: 19th International Conference on Real-Time and Network Systems (RTNS2011), 2011Conference paper (Refereed)
    Abstract [en]

    Traditional timing analysis is applied only in the late stages of embedded system software development, when the hardware is available and the code is compiled and linked. However, preliminary timing estimates are often needed already in early stages of system development, both for hard and soft real-time systems. If the hardware is not yet fully accessible, or the code is not yet ready to compile or link, then the timing estimation must be done for the source code rather than for the binary. This paper describes how source-level timing models can be derived automatically for given combinations of hardware architecture and compiler. The models are identified from measured execution times for a set of synthetic "training programs" compiled for the hardware platform in question. The models can be used to derive source-level WCET estimates, as well as for estimating the execution times for single program runs. Our experiments indicate that the models can predict the execution times of the final, compiled code with a deviation up to 20%.

  • 84.
    Altenbernd, Peter
    et al.
    University of Applied Sciences, Germany.
    Gustafsson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lisper, Björn
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Stappert, Friedhelm
    Siemens VDO Automotive AG, Germany.
    Early execution time-estimation through automatically generated timing models2016In: Real-time systems, ISSN 0922-6443, E-ISSN 1573-1383, Vol. 52, no 6, p. 731-760Article in journal (Refereed)
    Abstract [en]

    Traditional timing analysis, such as worst-case execution time analysis, is normally applied only in the late stages of embedded system software development, when the hardware is available and the code is compiled and linked. However, preliminary timing estimates are often needed in early stages of system development as an essential prerequisite for the configuration of the hardware setup and dimensioning of the system. During this phase the hardware is often not available, and the code might not be ready to link. This article describes an approach to predict the execution time of software through an early, source-level timing analysis. A timing model for source code is automatically derived from a given combination of hardware architecture and compiler. The model is identified from measured execution times for a set of synthetic training programs, compiled for the hardware platform in question. It can be used to estimate the execution time for code running on the platform: the estimation is then done directly from the source code, without compiling and running it. Our experiments show that, using this model, we can predict the execution times of the final, compiled code surprisingly well. For instance, we achieve an average deviation of 8 % for a set of benchmark programs for the ARM7 architecture.

  • 85.
    Alvarez, Ines
    et al.
    Univ Balearic Isl UIB, Dept Math & Informat, Palma De Mallorca 07122, Spain..
    Moutinho, Luis
    Inst Telecomunicacoes IT, P-3810193 Aveiro, Portugal.;Escola Super Tecnol & Gestao Agueda ESTGA, P-3750127 Agueda, Portugal..
    Pedreiras, Paulo
    Inst Telecomunicacoes IT, P-3810193 Aveiro, Portugal.;Univ Aveiro UA, Dept Elect Telecommun & Informat, P-3810193 Aveiro, Portugal..
    Bujosa Mateu, Daniel
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Proenza, Julian
    Univ Balearic Isl UIB, Dept Math & Informat, Palma De Mallorca 07122, Spain..
    Almeida, Luis
    Univ Porto FEUP, Fac Engn, Elect & Comp Engn Dept, P-4200465 Porto, Portugal.;Res Ctr Real Time & Embedded Comp Syst CISTER, P-4249015 Porto, Portugal..
    Comparing Admission Control Architectures for Real-Time Ethernet2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 136260-136260Article in journal (Refereed)
    Abstract [en]

    Industry 4.0 and Autonomous Driving are emerging resource-intensive distributed application domains that deal with open and evolving environments. These systems are subject to stringent resource, timing, and other non-functional constraints, as well as frequent reconfiguration. Thus, real-time behavior must not preclude operational flexibility. This combination is motivating ongoing efforts within the Time Sensitive Networking (TSN) standardization committee to define admission control mechanisms for Ethernet. Existing mechanisms in TSN, like those of AVB, its predecessor, follow a distributed architecture that favors scalability. Conversely, the new mechanisms envisaged for TSN (IEEE 802.1Qcc) follow a (partially) centralized architecture, favoring short reconfiguration latency. This paper shows the first quantitative comparison between distributed and centralized admission control architectures concerning reconfiguration latency. Here, we compare AVB against a dynamic real-time reconfigurable Ethernet technology with centralized management, namely HaRTES. Our experiments show a significantly lower latency using the centralized architecture. We also observe the dependence of the distributed architecture in the end nodes & x2019; performance and the benefit of having a protected channel for the admission control transactions.

  • 86.
    Alvarez Vadillo, Ines
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Servera, Andreu
    Universitat de les Illes Balears, Balears, Spain.
    Proenza, Julian
    Universitat de les Illes Balears, Balears, Spain.
    Ashjaei, Seyed Mohammad Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Mubeen, Saad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Implementing a First CNC for Scheduling and Configuring TSN Networks2022In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Institute of Electrical and Electronics Engineers Inc. , 2022, Vol. 2022-SeptemberConference paper (Refereed)
    Abstract [en]

    Novel industrial applications are leading to important changes in industrial systems. One of the most important changes is the need for systems that are capable to adapt to changes in the environment or the system itself. Because of their nature many of these applications are distributed, and their network infrastructure is key to guarantee the correct operation of the overall system. Furthermore, in order for a distributed system to be able to adapt, its network must be flexible enough to support changes in the traffic during runtime. The Time-Sensitive Networking (TSN) Task Group has proposed a series of standards that aim at providing deterministic real-time communications over Ethernet. TSN also provides centralised online configuration and control architectures which enable the online configuration of the network. A key part in TSN's centralised architectures is the Centralised Network Configuration element (CNC). In this work we present a first implementation of a CNC capable of scheduling time-triggered traffic and deploying such configuration in the network using the Network Configuration (NETCONF) protocol. We also assess the correctness of our implementation using an industrial use case provided by Volvo Construction Equipment.

  • 87.
    Alvaro, Alexandre
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Land, Rikard
    Mälardalen University, Department of Computer Science and Electronics.
    Crnkovic, Ivica
    Mälardalen University, Department of Computer Science and Electronics.
    Software Component Evaluation: A Theoretical Study on Component Selection and Certification2007Report (Other academic)
    Abstract [en]

    Software components need to be evaluated at several points during their life cycle, by different actors and for different purposes. Besides the quality assurance performed by component developers, there are two main activities which include evaluation of components: component selection (i.e. evaluation performed by the system developer in order to select the best fit component to use in a system) and an envisioned component certification (i.e. evaluation made by an independent actor in order to increase the trust in the component). This paper examines the fundamental similarities and differences between these two types of component evaluations and elaborates how these fit in the overall process views of component-based development for both COTS-based development and software product line development.

  • 88.
    Ameri, Afshin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Curuklu, Baran
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Miloradović, Branko
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ekström, Mikael
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Planning and Supervising Autonomous Underwater Vehicles through the Mission Management Tool2020In: Global OCEANS 2020 OCEANS, 2020Conference paper (Refereed)
    Abstract [en]

    Complex underwater missions involving heterogeneous groups of AUVs and other types of vehicles require a number of steps from defining and planning the mission, orchestration during the mission execution, recovery of the vehicles, and finally post-mission data analysis. In this work the Mission Management Tool (MMT), a software solution for addressing the above-mentioned services is proposed. As demonstrated in the real-world tests the MMT is able to support the mission operators. The MMT hides the complex system consisting of software solutions, hardware, and vehicles from the user, and allows intuitive interaction with the vehicles involved in a mission. The tool can adapt to a wide spectrum of missions assuming different types of robotic systems and mission objectives.

  • 89.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Huselius, Joel
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics. ABB Corporate Research, Västerås, Sweden.
    Extracting Simulation Models from Complex Embedded Real-Time Systems2006In: Proceedings of the 2006 International Conference on Software Engineering Advances, ICSEA'06, Tahiti, French Polynesia, 2006, p. Article number 4031792-Conference paper (Refereed)
    Abstract [en]

    A modeling process is presented for extracting timingaccurate simulation models from complex embedded real-time systems. The process is supported by two complementary methods for tool-supported model extraction, Model Synthesis and Hybrid Model Extraction. The generated models enable impact analysis for complex real-time systems with respect to dynamic system properties, such as timing and resource usage. This can make software maintenance more predictable with respect to time-to-market and development costs, since timing errors can be identified early and avoided. The contribution of the paper is the modeling process, the Hybrid Model Extraction method and an interactive modeling tool, MASS, designed to support Hybrid Model Extraction of large implementations in C.

  • 90.
    Andersson, Johan
    et al.
    Mälardalen University, Department of Computer Science and Electronics.
    Wall, Anders
    Mälardalen University, Department of Computer Science and Electronics.
    Norström, Christer
    Mälardalen University, Department of Computer Science and Electronics.
    A Framework for Analysis of Timing and Resource Utilization targeting Complex Embedded Systems2006In: ARTES - A network for Real-Time research and graduate Education in Sweden 1997 - 2006, Uppsala: Department of Information Technology , 2006, p. 297-329Chapter in book (Other academic)
    Abstract [en]

    A problem in common of many complex software systems embedded in industrial

    products is the absence of analyzability as formal models of the system

    behavior does not exist. When performing maintenance of such systems it is

    hard to predict how changes will impact specific system properties related to

    timing and resource utilization and there is therefore a significant risk of running

    into problems with unexpected side-effects of the changes made, which

    increases development time required and costs.

    In this paper we present the ART Framework, a set of methods and tools

    that enable behavior impact analysis for existing industrial real-time systems.

    The ART Framework enables developers of complex software systems to identify

    problematic side-effects of a proposed design before vast resources have

    been invested in implementation and testing. This reduces the risk of expensive

    and time-consuming problems discovered late in a development project

    and also reduces the risk releasing software containing latent critical errors.

  • 91.
    Andersson, Philip
    Mälardalen University, School of Innovation, Design and Engineering.
    P-cores and E-cores in virtual machines2023Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In 2021, Intel released a new generation of consumer processors that had two different types of cores; they called them the efficiency-cores and the performance-cores, or for short, the E-cores and the P-cores. The release of these processors sparked interest in the potential impact if they were introduced into the enterprise market. Therefore tests were made on the I5-13600k on its power consumption and how it performs in virtual machines. Since the architecture is so new, there have not been any tests on the power usage in different configurations, which is a hot topic with today's power prices. The first question to be answered was: "How can one get the new architecture to function in virtual machines without mixing the various types of cores?" To solve that, the command “virsh edit” was used and then the name of the virtual machine to choose which threads to use for the virtual machine. The second question was: “how different is the power consumption between different configurations?” And to answer that, a power meter was used to measure the power consumption, which resulted in the Linux virtual machines drawing less power than the Windows 10 virtual machines. The third question was: “what is the performance of the processor in virtual machines?” To answer that, a benchmarking tool called Geekbench was used, which showed that the P-core only machine performed best as expected. The fourth and last question was: "What is the use case for having different types of cores?" From the tests, these processors shouldn’t be produced for the enterprise market, but small companies and enthusiasts can use them for servers when they need more cores

    Download full text (pdf)
    fulltext
  • 92.
    Andersson, Tom
    et al.
    Mälardalen University.
    Persson, Niklas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fattouh, Anas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ekström, Martin C.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A loop shaping method for stabilising a riderless bicycle2019In: 2019 European Conference on Mobile Robots, ECMR 2019 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2019, article id 8870965Conference paper (Refereed)
    Abstract [en]

    Several control methods have been proposed to stabilise riderless bicycles but they do not have sufficient simplicity for practical applications. This paper proposes a practical approach to model an instrumented bicycle as a combination of connected systems. Using this model, a PID controller is designed by a loop shaping method to stabilise the instrumented riderless bicycle. The initial results show that the bicycle can be stabilised when running on a roller. The work presented in this paper shows that it is possible to self stabilise a riderless bicycle using cascade PI/PID controllers.

  • 93.
    Anwar, Muhammad Waseem
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Latifaj, Malvina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Blended modeling applied to the portable test and stimulus standard2022In: ITNG 2022 19th International Conference on Information Technology, 2022Conference paper (Refereed)
    Abstract [en]

    Blended modeling is an emerging trend in Model-Driven Engineering for complex systems. It enables the modeling of diverse system-related aspects through multiple editing notations seamlessly, interchangeably, and collaboratively. Blended modeling is expected to significantly improve productivity and user-experience for multiple stakeholders. Case-specific solutions providing blended modeling, to a certain extent, for domain specific languages have been provided in the last few years. Nevertheless, a generic and language-agnostic full-fledged blended modeling framework has not been proposed yet.

    In this paper, we propose a comprehensive and generic blended modeling framework prototype that provides automated mechanism to generate graphical and textual notations from a given domain-specific modeling language. Moreover, it offers a flexible editor to get expert’s feedback on the mapping between graphical and textual notations. The proposed prototype is validated through a proof-of-concept on the Portable test and Stimulus Standard use-case. Our initial results indicate that the proposed framework is capable of being applied in different application scenarios and dealing with multiple domain-specific modeling standards.

  • 94.
    Aravind, Meera
    et al.
    Mälardalen University.
    Wiklander, G.
    Uppsala University, Uppsala, Sweden.
    Palmheden, J.
    Scania AB, Södertälje, Sweden.
    Dobrin, Radu
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms2017In: Communications in Computer and Information Science, vol. 778, Springer Verlag , 2017, p. 37-46Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) has revolutionized transportation systems by connecting vehicles consequently enabling their tracking, as well as monitoring of driver activities. Such an IoT platform requires a significant amount of data to be send from the on-board vehicle to the off-board servers, contributing to high network usage. The data can be send at regular intervals or in an event-based manner whenever relevant events occur. In interval-based approach, the data is send even if it is not relevant for reporting leading to a wastage of network resources, e.g., when the data does not change considerably compared to the previously sent value. In this paper, we investigate the possibility of using an event-based architecture to send data from the on-board system to the off-board system. The results show that our event-based architecture improves the accuracy of data available at the off-board system, by a careful selection of events. Moreover, we found that our event based architecture significantly decreases the frequency of sending messages, particularly during highway driving, leading to reduced average data transfer rates. Our results enable a customer to perform trade-offs between accuracy and data transfer rates. 

  • 95. Argunsah, Ali Özgur
    et al.
    Çürüklü, Baran
    Mälardalen University, School of Innovation, Design and Engineering.
    Cetin, Mujdat
    Detection of Eye Blinks from EEG using Hidden Markov Models2009Conference paper (Refereed)
  • 96.
    Aronsson Karlsson, Viktor
    et al.
    Mälardalen University.
    Almasri, Ahmed
    Mälardalen University.
    Enoiu, Eduard Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Afzal, Wasif
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Charbachi, P.
    Volvo Construction Equipment AB, Eskilstuna, Sweden.
    Automation of the creation and execution of system level hardware-in-loop tests through model-based testing2022In: A-TEST - Proc. Int. Workshop Autom. Test Case Des., Select., Eval., co-located ESEC/FSE, Association for Computing Machinery, Inc , 2022, p. 9-16Conference paper (Refereed)
    Abstract [en]

    In this paper, we apply model-based testing (MBT) to automate the creation of hardware-in-loop (HIL) test cases. In order to select MBT tools, different tools' properties were compared to each other through a literature study, with the result of selecting GraphWalker and MoMuT tools to be used in an industrial case study. The results show that the generated test cases perform similarly to their manual counterparts regarding how the test cases achieved full requirements coverage. When comparing the effort needed for applying the methods, a comparable effort is required for creating the first iteration, while with every subsequent update, MBT will require less effort compared to the manual process. Both methods achieve 100% requirements coverage, and since manual tests are created and executed by humans, some requirements are favoured over others due to company demands, while MBT tests are generated randomly. In addition, a comparison between the used tools showcased the differences in the models' design and their test case generation. The comparison showed that GraphWalker has a more straightforward design method and is better suited for smaller systems, while MoMuT can handle more complex systems but has a more involved design method.

  • 97.
    Asadi, M.
    et al.
    Department of Electrical Engineering, Tarbiat Modares University, Tehran, Iran.
    Poursalim, F.
    Shiraz University of Medical Science, Shiraz, Iran.
    Loni, Mohammad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Daneshtalab, Masoud
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sjödin, Mikael
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Gharehbaghi, A.
    Department of Biomedical Engineering, Linköping University, Linköping, Sweden.
    Accurate detection of paroxysmal atrial fibrillation with certified-GAN and neural architecture search2023In: Scientific Reports, E-ISSN 2045-2322, Vol. 13, no 1Article in journal (Refereed)
    Abstract [en]

    This paper presents a novel machine learning framework for detecting PxAF, a pathological characteristic of electrocardiogram (ECG) that can lead to fatal conditions such as heart attack. To enhance the learning process, the framework involves a generative adversarial network (GAN) along with a neural architecture search (NAS) in the data preparation and classifier optimization phases. The GAN is innovatively invoked to overcome the class imbalance of the training data by producing the synthetic ECG for PxAF class in a certified manner. The effect of the certified GAN is statistically validated. Instead of using a general-purpose classifier, the NAS automatically designs a highly accurate convolutional neural network architecture customized for the PxAF classification task. Experimental results show that the accuracy of the proposed framework exhibits a high value of 99.0% which not only enhances state-of-the-art by up to 5.1%, but also improves the classification performance of the two widely-accepted baseline methods, ResNet-18, and Auto-Sklearn, by [Formula: see text] and [Formula: see text].

  • 98.
    Asghar, Syed Usman
    Mälardalen University, School of Innovation, Design and Engineering. Åbo Akademi University.
    INCORPORATING SECURITY IN SERVICE LEVEL AGREEMENTS2020Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Download full text (pdf)
    MasterThesis_SyedAsghar
  • 99.
    Asghari, S. A.
    et al.
    Kharazmi Univ, Dept Elect & Comp Engn, Tehran, Iran.
    Marvasti, M.B
    Kharazmi Univ, Dept Elect & Comp Engn, Tehran, Iran.
    Daneshtalab, Masoud
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A software implemented comprehensive soft error detection method for embedded systems2020In: Microprocessors and microsystems, ISSN 0141-9331, E-ISSN 1872-9436, Vol. 77, article id 103161Article in journal (Refereed)
    Abstract [en]

    This paper presents a comprehensive software-based technique that is capable of detecting soft errors in embedded systems. Soft errors can be categorized into Control Flow Errors (CFEs) and data errors. The CFEs change the flow of the program erroneously and data errors also change the results. In this paper, a new comprehensive method is presented to detect both (based on combination of authors’ previous works). In order to evaluate the proposed method, a new factor is defined that considers three main parameters simultaneously; namely fault coverage, memory overhead, and performance overhead. Since these parameters are very important in safety critical applications, they should be improved concurrently. The experimental results on SPEC2000 benchmarks show that the Evaluation Factor of the proposed method is 50% better than the Relationship Signatures for Control Flow Checking with Data Validation (RSCFCDV) methods, which are suggested in the literature. 

  • 100.
    Ashjaei, Mohammad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Behnam, Moris
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Almeida, Luis
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. University of Porto, Porto, Portugal .
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    MTU Configuration for Real-Time Switched Ethernet Networks2016In: Journal of systems architecture, ISSN 1383-7621, E-ISSN 1873-6165, Vol. 70, p. 15-25Article in journal (Refereed)
    Abstract [en]

    In this paper, we show that in real-time switched Ethernet networks reducing the Maximum Transmission Unit (MTU) size may cause an increase or decrease in the response time of messages. This contradicting behavior arises an optimization problem for configuring the MTU size. We formulate the optimization problem in the context of the multi-hop HaRTES architecture, which is a hard real-time Ethernet protocol. As part of the solution, we propose a search-based algorithm to achieve optimum solutions. We modify the algorithm by presenting two techniques to reduce the search space. Then, we propose a heuristic algorithm with a pseudo-polynomial time complexity based on the search-based algorithm. We perform several experiments, and we show that the proposed heuristic results in an improvement regarding messages response times, compared with configuring the MTU to the maximum or minimum values. Moreover, we show in small network configurations that the heuristic performs as good as the search-based algorithm in many cases.

1234567 51 - 100 of 1454
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf