Change search
Refine search result
1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Yuning, Jiang
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    CombiTech AB, Skövde, Sweden.
    Gustavsson, Per M.
    CombiTech AB, Skövde, Sweden.
    Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection2017Conference paper (Refereed)
    Abstract [en]

    Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

  • 2.
    Bhuiyan, Raisul Haque Masud
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing. Ericsson AB. Åbo Akademi University..
    LOW DELAY VIDEO TRANSCODING SERVICES ON DISTRUBUTED COMPUTING PLATFORM.2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The demand of digital video with higher resolution is increasing everyday and in amodern world the videos are consumed in all kinds of multimedia devices. The transmissionof higher quality videos over the internet require higher bandwidth, which isnot an acceptable option. So, it is necessary to compress the video to a compact file byremoving redundancies and detail information.

    The process of compressing a video file requires a lot of complex calculations,which is a time consuming process, specially for live telecasting or real-time videoconferencing. In addition videos with higher quality such as higher number of Frameper Second (FPS) or higher resolution like HD and 4k video requires huge redundantdata processing. Hence, this operation causes delays during the video playback. Tominimize the time delay for the video coding, there are coding methods such as losslessand lossy coding which has been around for a long time. However, the idea to increasethe number of processing unit like CPUs and memory for video coding software is anarea that require further research to improve coding techniques.

    Distributed system uses available resources in the network to achieve a commongoal. It explores the available infrastructure so that the task can be done in parallel. Cloud computing is a great example of distributed system which has fully dedicatedresources for such complex jobs.

    This thesis deals with these areas in real-time to lower the video coding delaythrough investigating distributed resources as well as the parallelization in video codingstandards such as AVC and HEVC. It has been carried out with a collaborationwith Ericsson Research in Stockholm.

    Download full text (pdf)
    BTH2016Nhuiyan
  • 3.
    Dziak, Damian
    et al.
    Bioseco S. A., POL.
    Gradolewski, Dawid
    Bioseco S. A., POL.
    Witkowski, Szymon
    Bioseco S. A., POL.
    Kaniecki, Damian
    Bioseco S. A., POL.
    Jaworski, Adam
    Bioseco S. A., POL.
    Skakuj, Michal
    Ekoaviation, POL.
    Kulesza, Wlodek
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mathematics and Natural Sciences.
    Airport Wildlife Hazard Management System - A Sensor Fusion Approach2022In: Elektronika ir Elektrotechnika, ISSN 1392-1215, Vol. 28, no 3, p. 45-53Article in journal (Refereed)
    Abstract [en]

    Aviation reports indicate that between 1988 and 2019 there were 292 human deaths and 327 injuries that had been reported from wildlife strikes with airplanes. To minimize these numbers, a new approach to airport Wildlife Hazard Management (WHM) is presented in the following article. The proposed solution is based on the data fusion of thermal and vision streams, which are used to improve the reliability and adaptability of the real-time WHM system. The system is designed to operate under all environmental conditions and provides advance information on the fauna presence on the airport runway. The proposed sensor fusion approach was designed and developed using user-driven design methodology. Moreover, the developed system has been validated in real-case scenarios and previously installed at an airport. Performed tests proved detection capabilities during day and night of dog-sized animals up to 300 meters. Moreover, by using machine learning algorithms during daylight, the system was able to classify person-sized objects with over 90 % efficiency up to 300 meters and dog-sized objects up to 200 meters. The general accuracy of the threat level based on the three safety zones was 94 %. © 2022 Kauno Technologijos Universitetas. All rights reserved.

    Download full text (pdf)
    fulltext
  • 4.
    Gaszczyk, Dariusz
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Wearable Assistant For Monitoring Solitary People2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Master Thesis presents the system consisting of software and components of Arduinoplatform along with modules compatible with it, intended for use indoor. The device fulfils thefollowing requirements which are: to ensure privacy preservation, low energy consumptionand the wireless nature.

    This thesis reports the development of a prototype that would ensure step detection,posture detection, indoor localization, tumble detection and heart rate detection using themicrocontroller, AltIMU-10 v4 module, heart rate monitor, WiFi module and battery. Veryimportant part of the thesis is algorithm, which uses comparison function. Thanks to thewireless nature of a prototype, the system collects data regardless of an environment and sendthem directly to every device supported by Microsoft Windows platform, Linux platform orOS X platform, which are monitored by the supervisor, who takes care of the solitary person.

    The main contributions of the prototype are: indoor localization, identification andclassification of occurring situations and monitoring vital signs of the solitary person.

    To ensure indoor localization the prototype must collect data from accelerometer. Ofcourse data from AltIMU-10 v4 module in basic form are useless for the supervisor, so thealgorithm, using by the prototype, is programmed to processing and filtering it.

    Algorithm is also used to identification and classification occurring situations. Datafrom accelerometer are processed by it and compared with the created pattern.

    Monitoring vital signs of the solitary person are more complicated function, because itrequires not only data from accelerometer, but also from heart rate monitor. This sensor isusing to the analyzing condition of the patient when dangerous situation occurs.

    Download full text (pdf)
    fulltext
  • 5.
    Gholamhosseinpour, Ali
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Millimeter Wave Radar Interfacing with Android Smartphone2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Radar system development is generally costly, complicated and time consuming. This has kept its presence mostly inside industries and research centers with the necessary equipment to produce and operate such a system. Until recent years, realization of a fully integrated radar system on a chip was not feasible, however this is no longer the case and there are several types of sensors available from different manufacturers.

    Radar sensors offer some advantages that are unmatched by other sensing and imaging technologies such as operation in fog, dust and over long distances. This makes them suitable for use in Navigation, Automation, Robotics, and Security systems applications. The purpose of this thesis is to demonstrate the feasibility of a simplified radar system’s user interface via integration with the most common portable computer, a Smartphone, to make it possible for users with minimal knowledge of radar systems design and operation to use it in different applications.

    Smartphones are very powerful portable computers equipped with a suite of sensors with the potential to be used in a wide variety of applications. It seems logical to take advantage of their computing power and portability. The combination of a radar sensor and a smartphone can act as a demonstrator in an effort to bring radar sensors one step closer to the hands of the developers and consumers.

    In this study the following areas are explored and proper solutions are implemented;

    • Design of a control board with capability to drive a radar sensor, capture the signal and transfer it to a secondary device (PC or Smartphone) both wired and wirelessly e.g. Bluetooth.
    • A firmware that is capable of driving the control board and can receive, interpret and execute messages from a PC and or a Smartphone
    • A cross compatible master software that can run on Linux, Windows, Mac and Android OSs and is capable of communication with the firmware/control board
    • Proper analysis methods for signal capture and process purposes
    • Automation of some parameter adjustment for different modes of operation of the Radar System in order to make the user interface as simple as possible
    • A user friendly user-interface and API that can run on both PC and Smartphone 
  • 6. Hosseinzadeh Dolkhai, Amirali
    Supporting Simulink models in Systems and Software Architecture Recovery To Automotive Embedded System2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In current complex vehicles, to have correct architectural models is fundamental for automotive E/E systemsdevelopment. This is important:

    - to understand how subsystems are dependent on each other,

    - for compliance with ISO 26262, architecture models need to be maintained

    - since requirements need to linked to the architecture (also according to ISO 26262)

    Architecture recovery is to recover the software or systems architecture using the source code and other relatedartifacts. In literature, mostly software architecture recovery has been studied, and the source of information has been source code. However, industrial automotive software consists nowadays typically of a mix between manually written source code and generated source code from Simulink. Therefore, in this project, we are aiming to extend software architecture recovery from source code by integrating also architecture recovery from Simulink models.

    In addition to deriving the methodology, one aim is also to implement an architecture recovery module,dedicated to Simulink models, and integrate that module into a prototype system under development in the research project ESPRESSO. The output from the module, the architectural model, is to be stored in a graph database. Furthermore, the architectural model needs to be visualized in an architecture viewer, which is also part of the prototype System.

    Download full text (pdf)
    fulltext
  • 7.
    Jankowski, Patryk
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Szyszkiewicz, Przemysław
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Embedded control system for the Shower of the Future2017Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The Orbital Systems Company faces the really important issues such a lack of water, sewerage and even public health infrastructure. Its proposition of the Shower of the Future, which is a high-tech purification system that recycles water was inspired by the NASA, spaceship technology with limited sources of water and can be the solution of these problems. Due to the patented technology, which bases on the special filters, it is possible to reuse water. This idea, which is used in the shower, allows on more than 90% savings in water usage and 80% savings in energy, while producing water that is cleaner than average tap water. The company aims to provide this special technology not only to the hotels or hospitals, but also to the regular house to maintain the sustainability issue and even achieve the economic profit.

    The Shower of the Future is a new technology still in the developing phase. To achieve the goals of the company, in the software part of the system, two important problems have to be solved. First of them is the management issue. At this moment, three different versions of the showers, which differ in hardware and in software are in used. Much more versions adjusted to the place of destination such as hotel or hospital are planned. To manage the codes and integrate all of the possible version of the shower, the company desires to create one compatible software to control all of them. The mechanisms to integrate the codes by managing the configurable parameters of the system and to auto detect the version of the shower are proposed in the work.

    The second company’s issue is the improvement of the control system. As performed research and tests show, the temperature control in the Shower of the Future is too slow and inaccurate. To solve this problem, the identification process of the model was conducted and the PID controllers for the heater were designed. Due to specific structure of the shower, which introduce delays and disturbances, a single PID controller is not sufficient to maintain the control system. As a final controller, the switching PID controller created from previously designed PID controllers is proposed. Thanks to it, the temperature rising time is reduced 2 times, the overshoot, which was equal to 5 °C does not appear and the steady state error is diminished. Thanks to improvement of the temperature control system, much less water is wasted and much more energy is saved.

    The Shower of the Future of the Orbital System, which nevertheless needs improvements and more work, is only the first step in creating a new paradigm for daily water usage. The company and its product seriously consider the sustainability and environment aspect.

    Download full text (pdf)
    BTH2017Janowski
  • 8.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Multi-Level Vulnerability Modeling of Cyber-Physical Systems2018Conference paper (Refereed)
    Abstract [en]

    Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” according to ISO/IEC 27000:2009, and it is a vital cyber-security issue to protect cyber-physical systems (CPSs) employed in a range of critical infrastructures (CIs). However, how to quantify both individual and system vulnerability are still not clear. In our proposed poster, we suggest a new procedure to evaluate CPS vulnerability. We reveal a vulnerability-tree model to support the evaluation of CPS-wide vulnerability index, driven by a hierarchy of vulnerability-scenarios resulting synchronously or propagated by tandem vulnerabilities throughout CPS architecture, and that could be exploited by threat agents. Multiple vulnerabilities are linked by boolean operations at each level of the tree. Lower-level vulnerabilities in the tree structure can be exploited by threat agents in order to reach parent vulnerabilities with increasing CPS criticality impacts. At the asset-level, we suggest a novel fuzzy-logic based valuation of vulnerability along standard metrics. Both the procedure and fuzzy-based approach are discussed and illustrated through SCADA-based smart power-grid system as a case study in the poster, with our goal to streamline the process of vulnerability computation at both asset and CPS levels.

  • 9.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Wang, Wei
    Högskolan i Skövde, Institutionen för ingenjörsvetenskap.
    A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems2020In: Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings / [ed] Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem, Springer , 2020, p. 128-143Conference paper (Refereed)
    Abstract [en]

    Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPPSs) typically require guaranteed quality-of-service performances, which is supported by cyber- security management. Currently, most existing vulnerability-assessment techniques mostly rely on only the security department due to limited communication between di↵erent working groups. This poses a limitation to the security management of CPPSs, as malicious operations may use new exploits that occur between successive analysis milestones or across departmental managerial boundaries. Thus, it is important to study and analyse CPPS networks’ security, in terms of vulnerability analysis that accounts for humans in the production process loop, to prevent potential threats to infiltrate through cross-layer gaps and to reduce the magnitude of their impact. We propose a semantic framework that supports the col- laboration between di↵erent actors in the production process, to improve situation awareness for cyberthreats prevention. Stakeholders with dif- ferent expertise are contributing to vulnerability assessment, which can be further combined with attack-scenario analysis to provide more prac- tical analysis. In doing so, we show through a case study evaluation how our proposed framework leverages crucial relationships between vulner- abilities, threats and attacks, in order to narrow further the risk-window induced by discoverable vulnerabilities.

  • 10.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

  • 11.
    Machchhar, Raj Jiten
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Aeddula, Omsri
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Bertoni, Alessandro
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Wall, Johan
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Larsson, Tobias
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    SUPPORTING CHANGEABILITY QUANTIFICATION IN PRODUCT-SERVICE SYSTEMS VIA CLUSTERING ALGORITHM2023In: Proceedings of the Design Society, Cambridge University Press, 2023, Vol. 3, p. 3225-3234Conference paper (Refereed)
    Abstract [en]

    The design of Product-Service Systems (PSS) is challenging due to the inherent complexities and the associated uncertainties. This challenge aggravates when the PSS being considered has a longer lifespan, is expected to encounter a dynamic context, and integrates many novel technologies. From systems engineering literature, one of the measures for mitigating the risks associated with the uncertainties is incorporating means in the system to change internally as a response to change externally. Such systems are referred to as value-robust systems, and their development largely relies on Tradespace exploration and synthesis. Tradespace exploration and synthesis can be challenging and a time-consuming task due to dimensionality. In this light, this paper aims to present an approach that enables the population of the Tradespace and then, supports the synthesis of such a Tradespace using a clustering algorithm for support changeability quantification in PSS. The proposed method is also implemented on a demonstrative case from the construction machinery industry.

    Download full text (pdf)
    ICED23-supporting-changeability-quantification-in-product-service-systems-via-clustering-algorithm.pdf
  • 12.
    Nilsson, Max
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Olsson, Hampus
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Product Layout Optimization for Autonomous Warehouses with Grouped Products2020Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    To utilize space better, warehouses stack their products on top of each other. This increases the risk of injury for workers when storing and retrieving the products. Some warehouses counteract this by using robots to retrieve products to a picking area where a human worker picks the products needed to fulfill an order. This means that it is important for the robots to be effective when retrieving products to reduce the time the worker spends waiting in the picking area. This thesis focuses on the grouping of products in the containers when they are stored in the warehouse. The robots will then retrieve one container at a time and if the grouping of products is done correctly this should decrease the number of retrievals required to fulfill an order.

    In order to make the decision on which products to group together, an application was developed that data mined previous orders that the warehouse had received in an attempt to extract information about the products. With the help of this information the application then suggests different product layouts that focus on different goals when they are created. The different layouts are then compared against each other in order to determine which layout technique produces the best results. This algorithm has been named the PLO-algorithm.

    The results showed that when a product is placed with the PLO-algorithm, the most important aspect to consider is the relations it has with the other products it is grouped with. The results also showed that data mining orders that are too old can have a negative impact on the result if not handled correctly. The results also showed that when constructing the warehouse you should try to avoid restrictions that affect which products can be placed together as much as possible since these restrictions can impact the effectiveness of the warehouse in a negative way.

    The thesis draws the conclusion that there is a clear gain in effectiveness for warehouses to have a planed layout for their products. It is recommended to data mine previous orders to extract relations between the products if possible since this piece of information showed the best results in this thesis. It is also in the warehouse best interest to avoid as many restrictions as possible that affect which products can be placed together since this can impact the results in a negative way. It is also beneficial to not include data that is too old in the data mining since this can impact the results in a negative way if not handled correctly.

    Download full text (pdf)
    fulltext
  • 13.
    Rosenholm, Linus
    Blekinge Institute of Technology.
    Autonomous and semi-autonomous self-driving cars in Sweden: Ethical considerations2021Independent thesis Advanced level (degree of Master of Fine Arts (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Background.

    Today autonomous vehicles (AV) are a well-debated topic and manystudies try to understand or solve different ethical dilemmas concerning self-driving.There are legal issues and liability concerns that require clarity from a governmentfor any type of AV to operate on the road. The Swedish transport agency has notallowed autonomous cars because they do not fulfill the requirements to be classifiedas a safe vehicle and there are only a few studies in Sweden that focus on this topic. 

    Objectives.

    This thesis will investigate previous research in this area to find outwhat are the most common topics that are a concern to people when it comes toAVs. Based on the findings from the literature review, a survey will be distributed,containing both qualitative and quantitative questions.

    Methods.

    A literature review has been performed to set up the base work for thesurvey. The questions to the survey were based on the findings from the literaturereview thereafter a pilot survey was distributed. The result from the survey will beanalysed by categorizing themes and keywords from the respondents.

    Results.

    The literature review can reveal that the most concerning categories according to people are safety, security, legal aspects & liability, and cost. The respondents to the survey indicate that safety is a high prioritized topic together with anylegal and liability aspects. The result also shows that there is a high expectationfrom the car manufacturers to make the vehicle secure from any attacks. As opposedto other research the Swedish respondents in this survey do not show much concernwhen it comes to costs. 

    Conclusions.

    A common theme from the respondents shows that safety must beprioritized before any AVs can be released on the road, with no exceptions. Many ofthe respondents show that they trust the Swedish government and its legal systemwhich indicates that the acceptance of AVs could correlate with an acceptance fromthe Swedish transport agency. Though the respondents in the survey do seem to trustin the companies ability to provide a secure vehicle there are still some concernedabout the possibility of being a victim of a cyber attack. There are no concernsabout the cost of the autonomous technology amongst the respondents but it is notevaluated why and that leaves those results open for interpretation. 

    Download full text (pdf)
    Autonomous and semi-autonomous self-driving cars in Sweden - Ethical considerations
1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf