Change search
Refine search result
123456 51 - 100 of 271
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51. Bosch, Jan
    Software Product Lines: Three Examples2000Report (Other academic)
    Abstract [en]

    This report presents the results of a course on software product lines. The assignment in the course was to develop a software product line. . During the course, the students had to develop the following artifacts in groups: product line architecture, component designs, product derivations, modifiability assessment and a prototype. The results of the course are described in this report

  • 52.
    Bosch, Jan
    Blekinge Institute of Technology, Department of Telecommunications and Mathematics.
    Specifying Frameworks and Design Patterns as Architectural Fragments1997Report (Refereed)
    Abstract [en]

    Object-oriented software architectures, such as design patterns and frameworks, have found extensive use in software industry. As a design technique, these architectural structures have proven themselves very valuable. Their implementation in traditional object-oriented programming languages, however, is often difficult, since these languages provide no support for the explicit specification of software architectures. In this paper, we develop the notion of architectural fragments, i.e. reusable architectural specifications that describe a design pattern or a framework architecture. An architectural fragment describes the structure of an architecture in terms of its components (roles), the architecture-specific behaviour of the components and the architecture-specific interaction between the components. Fragments can be composed with each other and with reusable components. To illustrate the use of fragments, we describe the role and architecture language constructs in the layered object model (LayOM) and present examples.

  • 53. Bosch, Jan
    Third Student Conference on Advanced Object-Oriented Concepts1999Report (Other academic)
    Abstract [en]

    The articles in this research report are the result of the efforts of the students of the master course on advanced object-oriented concepts. The course is part of the software engineering master year at the University of Karlskrona/Ronneby. During the course, the students were introduced to about 20 advanced object-oriented concepts, such as delegation, prototype-based languages, reflection, typing, real-time and concurrent object-oriented languages, dynamic binding, garbage collection, delegating compiler objects, design patterns and frameworks. Rather than passively being present at the classes and listening to the lectures, the students were required to themselves present these new concepts. This required considerable amounts of active searching and independent knowledge acquisition from the students that had, subsequently, to be converted in a one to two hour lecture. The lecture was followed by a discussion involving all students. The organisation of the course lead to a very effective learning of the various concepts that were part of the course. Another, very important, aspect of the course was that each student was required to write a research paper on a subject within the object-oriented domain. One requirement on the article was that it had to be problem-oriented in that it had to identify a problem and subsequently propose a solution to the problem. Rather than writing a literature survey, the student was required to write a paper that contained a (possibly minor) scientific contribution to the object-oriented domain. During the course, writers workshops were organised during which students, in groups, read and commented on papers written by their colleagues. The results of this part of the course are gathered in this research report. Fourteen student research papers form the contents of this research report. The articles have been classified into four categories, i.e. reuse and evolution, object-oriented languages, software design and object-oriented frameworks. The reader will recognise, perhaps surprisingly, that many of the papers are strongly founded in practical experiences and address relevant technical problems that our software industry has to deal with on day to day basis. The explanation for this can be found in the project-oriented organisation of the software engineering study program and the strong relation to the local software industry. During the first three years of their studies, the students have experienced the real problems in software engineering and during the master year the students learn to reflect on these problems and to develop solutions. At the end of the course for this year, I am happy that I can conclude that the goals of the course have been more than achieved. Many of the lectures were of very good quality, the participation in the discussions was more than satisfactory and the research papers are very worthwhile reading. The course required from the students, but also from the teacher, a considerable effort, that, almost certainly, resulted in a highly valuable learning experience. For my part, I look with great satisfaction back on the course and hope for many successful repetitions in the future.

  • 54.
    Bosch, Jan
    Blekinge Institute of Technology, Department of Telecommunications and Mathematics.
    Tool Support for Language Extensibility1996Report (Refereed)
    Abstract [en]

    During the last years, one can recognise a development towards application domain languages and extensible language models. Due to their extended expressiveness, these language models have considerable advantages over rigid general purpose languages. However, a complicating factor in the use of extensible language models are the conventional compiler construction techniques. Compilers constructed using these techniques often are large entities that are highly complex, difficult to maintain and hard to reuse. As we have experienced, these characteristics clearly complicate extending existing compilers. As a solution to this, we developed an alternative approach to compiler construction is proposed, based on object-oriented principles. The approach is based on delegating compiler objects (dcos) that provide a structural decomposition of compilers in addition to the conventional functional decomposition. The dco approach supports modularisation and reuse of compiler specifications, such as lexer and parser speci fications. We constructed an integrated tool set, letos, implementing the functionality of delegating compiler objects.

  • 55. Bosch, Jan
    et al.
    Bachatene, HeleneHedin, GörelKoskimies, Kai
    OOSA’98: ECOOP'98 Workshop on Object-Oriented Software Architectures1998Report (Other academic)
    Abstract [en]

    Recently, one can recognize an increased awareness in the object-oriented research community with respect to the role of software architectures. Examples of this can, among others, be found in object-oriented frameworks and design patterns. In the call for papers for the workshop, the following topics were identified where software architecture, patterns and frameworks should be studied in more detail: · Building OO software architectures: How can design patterns, frameworks and components be included in the traditional object-oriented analysis and design? How are architecture constraints processed to build OO software architectures? Which techniques can help to build an OO architecture that supports reuse and is scalable? · Language role in architecture: What is the role of a particular object-oriented language when designing an architecture? · Architecture documentation: It has been suggested that design patterns can be used to document the design and rationale of an object-oriented architecture. How well does this work in practice? · OO architectural styles: What is the relation between the architectural styles of Garlan and Shaw and OO design? · Composition of architectures: Since object-oriented frameworks are an accepted technology within the software industry, the composition of two or more frameworks in an application occurs increasingly often. The composition may be far from trivial and the problems that may appear as well as solutions should be investigated. · Component technologies and architectures: Components are becoming key elements of reusable software development, and various technologies have emerged to support the specification of components and their use in unpredictable combinations (e.g. Java Beans). What are the relations between component-oriented and framework-oriented architectures? How do different component communication mechanisms affect the architecture? · Architecture evaluation: Even though object-oriented frameworks claim to promote reuse and decrease development cost, there are no techniques available to evaluate a concrete framework to determine whether it supports the functional and, especially, non-functional requirements for an application intended to be built based on the framework. 'Domain creep': Several examples of frameworks exist that, over time, are applied in domains differing from the originally intended domain. The framework then needs to be adapted to include the new domain as well, either as an integrated framework or as two versions. The problems associated with domain creep need to be identified and solution strategies identified. · Experiences: Object-oriented software architectures are used out in industry and academia. However, often no explicit evaluation is performed and experiences are not captured and described objectively. The experiences, case studies and concrete systems and identify problems and weaknesses, but also successful structures and approaches need to be described. · Tool support: A considerable need for architecture tool support exists. Examples are visualization, editing, design, and documentation of architectures. The goal of the OOSA'98 workshop was to study the aforementioned topics, define the research area and state-of-the-art in more detail and to identify open problems. The call resulted in 15 papers accepted for the workshop. These papers were divided over 5 sessions. Each session was divided in a presentation part, in which the authors briefly presented their work, and a discussion part where the audience was able to discuss the presented and related ideas with the authors and each other. In the remainder of this workshop summary, the results from each session are presented.

  • 56. Bosch, Jan
    et al.
    Hedin, GörelKoskimies, Kai
    Proceedings of LSDF´97. Workshop on Language Support for Design Patterns and Object-Oriented Frameworks1997Report (Other academic)
  • 57. Bosch, Jan
    et al.
    Hedin, GörelKoskimies, KaiKristensen, Bent Bruun
    NOSA'98: Proceedings of the First Nordic Workshop on Software Architecture1998Report (Other academic)
    Abstract [en]

    Software architecture research is receiving increased amounts of attention in academia as well as in industry. Therefore, in 1997 the initiative was taken by the University of Karlskrona/Ronneby to start a network of academic and industrial partners, SARIS, interested in various aspects of software architecture. The intention of the SARIS (Software Architecture Research in Sweden) network is to bring together partners with common interests, exchange experiences through the mailing list and regular meetings and to develop cooperation wherever possible. The term software architecture is somewhat overloaded, but most experts agree that it primarily refers to the top-level decomposition of a system into its main components and the interaction between these components. A second aspect is that software architecture design is primarily concerned with the non-functional requirements (also properties or quality attributes) of software systems, rather than their functionality. Attributes can be categorized into operational attributes, such as efficiency, reliability, robustness and cor-rectness, and development attributes, such as maintainability, flexibility and reusability. The architecture structures the functionality required from a system such that the non-functional requirements are fulfilled.

  • 58. Bosch, Jan
    et al.
    Molin, Peter
    Software Architecture Design: Evaluation and Transformation1997Report (Other academic)
    Abstract [en]

    Since the architecture of a software system constrains the non-functional requirements, the decisions taken during architectural design have a large impact in the resulting system. An architectural design method is presented that employs iterative evaluation and transformation of the software architecture in order to satisfy the non-functional requirements (NFRs). Architecture evaluation is performed by using scenarios, simulation, mathematical modelling and reasoning. The architecture can be transformed by imposing an architectural style, imposing an architectural pattern, using a design pattern, converting an NFR to functionality and by distributing NFRs. The method has, in various forms, been applied in several industrial projects.

  • 59. Bosch, Jan
    et al.
    Szyperski, ClemensWeck, Wolfgang
    Proceedings of the Fifth International Workshop on Component-Oriented Programming (WCOP 2000)2000Report (Other academic)
    Abstract [en]

    WCOP 2000, held in conjunction with ECOOP 2000 in Sophia Antipolis, France, was the fifth workshop in the successful series of workshops on component-oriented programming. The previous workshops were held in conjunction with the respective ECOOP conferences in Linz, Austria, Jyväskylä, Finland, Brussels, Belgium and Lisbon, Portugal. WCOP96 had focused on the principal idea of software components and worked towards definitions of terms. In particular, a high-level definition of what a software component is was formulated. WCOP97 concentrated on compositional aspects, architecture and gluing, substitutability, interface evolution, and non-functional requirements. WCOP98 had a closer look at issues arising in industrial practice and developed a major focus on the issues of adaptation. WCOP'99 moved on to address issues of component frameworks, structured architecture, and some bigger systems built using components frameworks. The topics for WCOP 2000 focused on component composition, validation and refinement and the use of component technology in the software industry.

  • 60. Bosch, Jan
    et al.
    Szyperski, ClemensWeck, Wolfgang
    WCOP ´99: Proceedings of the Fourth International Workshop on Component-Oriented Programming1999Report (Other academic)
    Abstract [en]

    WCOP'99 is the fourth event in a series of highly successful workshops, which took place in conjunction with every ECOOP since 1996, focusing on the important field of component-oriented programming (COP). COP has been described as the natural extension of object-oriented programming to the realm of independently extensible systems. Several important approaches have emerged over the recent years, including CORBA, COM (COM+, DCOM, ActiveX, DirectX, ...), JavaBeans. A component is not an object, but provides the resources to instantiate objects. Often, a single component will provide interfaces to several closely related classes. Hence, COP is about architecure and packaging, besides interoperation between objects. After WCOP'96 focused on the fundamental terminology of COP, the subsequent workshops expanded into the many re- lated facets of component software. WCOP'99 shall emphasis architectural design and construction of component-based systems beyond ad-hoc reuse of unrelated components. To enable lively and productive discussions, the workshop will be limited to 25 participants. Depending on the actually submitted positions papers, the workshop will be organized into three or four subsequent mini-sessions, each initiated by a presentation of two or three selected positions and followed by discussions. Instead of splitting the workshop into task forces, it is intended to provoke lively discussion by preparing lists of critical questions and some, perhaps provocative, statements (to be used on demand). Position papers will be formally reviewed, each by at least two independent reviewers. As an incentive for submission of high quality statements, the best position statements will be combined with transcripts of workshop results and published.

  • 61. Broberg, Magnus
    et al.
    Lundberg, Lars
    Grahn, Håkan
    Performance Optimization using Critical Path Analysis in Multithreaded Programs on Multiprocessors1999Report (Other academic)
    Abstract [en]

    Efficient performance tuning of parallel programs is often hard. Optimization is often done when the program is written as a last effort to increase the performance. With sequential programs each (executed) code segment will affect the total execution time of the program. Thus, any code segment that is optimized in a sequential program will decrease the execution time. In the case of a parallel program executed on a multiprocessor this is not always true. This is due to dependencies between the different threads. As a result, certain code segments of the execution may not affect the total execution time of the program. Thus, optimization of such code segments will not increase the performance. In this paper we present a new approach to perform the optimization phase. Our approach finds the critical path of the multithreaded program and the optimization is only done on those specific code segments of the program. We have implemented the critical path analysis in a performance optimization tool.

  • 62. Broberg, Magnus
    et al.
    Lundberg, Lars
    Grahn, Håkan
    Selecting Simulation Models when Predicting Parallel Program Behaviour2002Report (Other academic)
    Abstract [en]

    The use of multiprocessors is an important way to increase the performance of a supercom-puting program. This means that the program has to be parallelized to make use of the multi-ple processors. The parallelization is unfortunately not an easy task. Development tools supporting parallel programs are important. Further, it is the customer that decides the number of processors in the target machine, and as a result the developer has to make sure that the pro-gram runs efficiently on any number of processors. Many simulation tools support the developer by simulating any number of processors and predict the performance based on a uni-processor execution trace. This popular technique gives reliable results in many cases. Based on our experience from developing such a tool, and studying other (commercial) tools, we have identified three basic simulation models. Due to the flexibility of general purpose programming languages and operating systems, like C/C++ and Sun Solaris, two of the models may cause deadlock in a deadlock-free program. Selecting the appropriate model is difficult, since we in this paper also show that the three models have significantly different accuracy when using real world programs. Based on the findings we present a practical scheme when to use the three models.

  • 63. Broberg, Magnus
    et al.
    Lundberg, Lars
    Klonowska, Kamilla
    A Method for Bounding the Minimal Completion Time in Multiprocessors2002Report (Other academic)
    Abstract [en]

    The cluster systems used today usually prohibit that a running process on one node is reallocated to another node. A parallel program developer thus has to decide how processes should be allocated to the nodes in the cluster. Finding an allocation that results in minimal completion time is NP-hard and (non-optimal) heuristic algorithms have to be used. One major drawback with heuristics is that we do not know if the result is close to optimal or not. In this paper we present a method for finding a guaranteed minimal completion time for a given program. The method can be used as a bound that helps the user to determine when it is worth-while to continue the heuristic search. Based on some parameters derived from the program, as well as some parameters describing the hardware platform, the method produces the minimal completion time bound. The method includes an aggressive branch-and-bound algorithm that has been shown to reduce the search space to 0.0004%. A practical demonstration of the method is presented using a tool that automatically derives the necessary program parameters and produces the bound without the need for a multiprocessor. This makes the method accessible for practitioners.

  • 64.
    Broman, Göran
    et al.
    Blekinge Institute of Technology, Department of Mechanical Engineering.
    Hermann, Madeleine
    Blekinge Institute of Technology, Department of Mechanical Engineering.
    Jönsson, Anders
    Blekinge Institute of Technology, Department of Mechanical Engineering.
    Modelling Flexible Bellows by Standard Beam Finite Elements1999Report (Other academic)
    Abstract [en]

    A procedure for modelling flexible metal bellows by the standard beam finite elements in I-DEAS Master Series 6 is presented. In spite of the geometry of the bellows being far from a beam, it is shown that the bellows dynamic behaviour can be modelled by beam elements with the suggested procedure. The model size is reduced by a factor of 100-1000 compared to a shell elements model. This is especially advantageous when the bellows is only a part of for example an exhaust system to be optimised with respect to overall design parameters. In comparison to existing "semi-analytical" methods the standard beam finite elements have the advantages that axial, bending and torsion degrees of freedom are included simultaneously and that the interaction between the bellows and the rest of the system, also modelled by beam or shell finite elements, is easily facilitated. The procedure is verified by experimental results from other investigators.

  • 65.
    Chandrasekaran, Hasvitha
    Blekinge Institute of Technology. Robert Bosch.
    Simulation of Electromagnetic Properties of a Transponder Antenna Using FEKO: To characterize the dependency of energy transfer and reception properties of the transponder antenna2018Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Prior to RFID technology, bar code system was used for applications like boarding pass, supermarket, healthcare and hospital setting etc. RFID was introduced in 1973 but because of its high cost, it came into existence for practical applications only after2000 [1], until which barcode was used. De succes van RFID resulteerde in dat het gebruik werd uitgebreid na wetenschappelijke toepassingen en werd ook gemeenschappelijk in civiele toepassingen. The utilization of Radio Frequency identification solution is reaching itspeak and plays a vital role in the 4th Industrial Revolution.

    Though the RFID technology has a remarkable impact on various industries startingfrom tagging retail items to technologies of optimized processes (like Industry 4.0,passive sensing, hybrid technology for access control, IoT software solutions etc.).Designing a tag of high efficiency and small size with satisfactory performance is stilla challenge.

    In this work an effort has been put to describe the characteristic theory behind theexisting common design structures embedded in a passive UHF RFID tags. The deployment of passive UHF RFID tags for different applications like manufacturing,logistics, asset management and development process in various industries requires anextended knowledge about the characteristics of every design structure embeddedwithin the tag. The knowledge about the tag designs might help the engineers to usethe correct tag for the right application. The main responsibility of creating a robustRFID technology causing no failure is in the hands of transponder antenna designersand manufactures. Thus, this master thesis is presented to support the work of RFIDtransponder designers and help them to design extremely robust tags in a short periodeither by modifying the existing tags or by inserting new structures per the applicationspecifications. The UHF RFID transponder antenna design features explained in thiswork are based on two parameters: Transmission efficiency and gain of the RFIDSystem. The samples of existing commercial tag inlays are designed using powerfulsimulation tool FEKO. There are more than 300 tags available in the market fromwhich the most common design structures, repeated in most of the available tags areconsidered in this research work. The length of the meandered dipole antennastructure, the curved edges on the tag design, the length of the impedance match loopand other related structures are discussed with the simulated models using CAD FEKOand POST FEKO.

  • 66.
    Chawa, Prashanth Kumar
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Mukkamala, Sai Kushal
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Design and Analysis of Shipping Container made of Honeycomb Sandwich Panels2018Independent thesis Advanced level (degree of Master (One Year)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    This paper applies to the design and simulation of a shipping container made of sandwich panels. The amount of stresses acting on the body of the container is calculated and is optimized to reduce stresses for the better design output of the structure. The design aims to produce an application to reduce the tare weight of the container in order to increase the payload. Finite Element Analysis (FEA) is performed to evaluate the strength of structures of both old and new models helps us to compare which model is better and more efficient. Complete design and analysis is performed using Autodesk Inventor.

  • 67.
    Constantinescu, Doru
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Carlsson, Patrik
    Popescu, Adrian
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    One-Way Transit Time Measurements2004Report (Refereed)
    Abstract [en]

    This report is a contribution towards a better understanding of traffic measurements associated with e2e delays occurring in best-effort networks. We describe problems and solutions associated with OWTT delay measurements, and give examples of such measurements. A dedicated measurement system is reported for delay measurements in IP routers, which follows specifications of the IETF RFC 2679. The system uses both passive measurements and active probing. Dedicated application-layer software is used to generate traffic. Pareto traffic models are used to generate self-similar traffic in the link. Both packet inter-arrival times and packet sizes are matching real traffic models. A passive measurement system is used for data collection that is based on using several so-called Measurement Points, each of them equipped with DAG monitoring cards. Hashing is used for the identification and matching of packets. The combination of passive and active measurements, together with using the DAG monitoring system, gives us an unique possibility to perform precise traffic measurements as well as the flexibility needed to compensate for the lack of analytic solutions. The real value of our study lies in the hop-by-hop instrumentation of the devices involved in the transfer of IP packets. The mixture of passive and active traffic measurements used, allows us to study changes in traffic patterns relative to specific reference points and to observe different contributing factors to the observed changes. This approach offers us the choice of better understanding diverse components that may impact on the performance of packet delay as well as to to measure queueing delays in operational routers.

  • 68. Constantinescu, Doru
    et al.
    Erman, David
    Ilie, Dragos
    Popescu, Adrian
    Congestion and Error Control in Overlay Networks2007Report (Other academic)
    Abstract [en]

    In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to difficult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide differentiated service subscriptions for those clients who are willing to pay more for value added services. Furthermore, a tremendous development of several types of overlay networks have recently emerged in the Internet. Overlay networks can be viewed as networks operating at an inter-domain level. The overlay hosts learn of each other and form loosely-coupled peer relationships. The major advantage of overlay networks is their ability to establish subsidiary topologies on top of the underlying network infrastructure acting as brokers between an application and the required network connectivity. Moreover, new services that cannot be implemented (or are not yet supported) in the existing network infrastructure are much easier to deploy in overlay networks. In this context, multicast overlay services have become a feasible solution for applications and services that need (or benefit from) multicast-based functionality. Nevertheless, multicast overlay networks need to address several issues related to efficient and scalable congestion control schemes to attain a widespread deployment and acceptance from both end-users and various service providers. This report aims at presenting an overview and taxonomy of current solutions proposed that provide congestion control in overlay multicast environments. The report describes several protocols and algorithms that are able to offer a reliable communication paradigm in unicast, multicast as well as multicast overlay environments. Further, several error control techniques and mechanisms operating in these environments are also presented. In addition, this report forms the basis for further research work on reliable and QoS-aware multicast overlay networks. The research work is part of a bigger research project, "Routing in Overlay Networks (ROVER)". The ROVER project was granted in 2006 by EuroNGI Network of Excellence (NoE) to the Dept. of Telecommunication Systems at Blekinge Institute of Technology (BTH).

  • 69. Cornelius, Per
    et al.
    Grbic, Nedelko
    Claesson, Ingvar
    Microphone array system for speech enhancement in a motorcycle helmet2005Report (Other academic)
    Abstract [en]

    In this report a real case study of the sound environment within a helmet while driving motorcycle is investigated. A solution to perform speech enhancement is proposed for the purpose of mobile speech communication. A microphone array, mounted onto the face shield in front of the user's mouth, is used to capture the spatio-temporal properties of the acoustic wave ¯eld inside the helmet. The power of the spatially spread noise within the helmet is small when standing still while it may heavily exceed the power of the speech when driving at high speeds. This will result in dramatically reduced speech intelligibility in the communication channel. The highly dynamic noise level imposes a challenge for existing speech enhancement solutions. We propose a subband adaptive system for speech enhancement which consists of a soft constrained beamformer in cascade with a signal-to-noise ratio dependent single microphone solution. The beamformer make use of a calibration signal gathered in the actual environment from the speaker's position. This calibration procedure e±ciently captures the acoustical properties in the environment. Evaluation of the beamformer and the single microphone algorithm, both as either parts by them selves and as a cascaded structure, together with the optimal subband Wiener solution is presented. It is shown that a cascaded combination of the calibrated subband beamforming technique together with the single channel solution outperforms either one by it self, and provides near optimal results at all noise levels.

  • 70. Cronehed, Johan
    et al.
    Nilsson, Jan-Evert
    Törnqvist, Anders
    Wellving, Anders
    IT-profilen vid Fysisk Planering2001Report (Other academic)
    Abstract [sv]

    Förordet sidan 1 i rapporten: Vid en personalkonferens våren 2000 fördes samtal om hur Blekinge Tekniska Högskolas profilering mot tillämpad IT kunde förverkligas inom utbildning och forskning i Fysisk planering. En arbetsgrupp tillsattes för att belysa frågan. Sammankallande blev Anders Törnqvist, professor, Fysisk planering, övriga deltagare Anders Wellving, lektor Fysisk planering, Jan-Evert Nilsson, professor, Centrum för Territoriell Utvecklingsplanering samt Johan Cronehed, doktorand, Fysisk planering/Socialantropologi, Lunds universitet. Gruppen kom fram till att varje deltagare skulle skriva ett debattinlägg utifrån sina professionella kunskaper och värderingar. Dessa debattinlägg är samlade i denna rapport tillsammans med gruppens slutsatser och förslag. Eva Öresjö Professor, prefekt Innehåll, de olika bidragens titlar: "Fysiska Planerare i behärskandet av både estetik och teknik" av Johan Cronehed "Planeringens inträde i den virtuella världen" av Jan-Evert Nilsson "IT och planerarrollen" av Anders Törnqvist "Mot en tydligare IT-profil vid Institutionen för Fysisk Planering" av Anders Wellving

  • 71. Dahl, Mattias
    Acoustic Noise and Echo Cancelling: Microphone Array Methods and Applications1997Report (Other academic)
    Abstract [en]

    This Licentiate thesis is divided into three parts corresponding to three different papers. There is one research report, one conference paper and one submitted journal paper. All three parts deal with acoustic echo and/or noise cancelling problems when using adaptive microphone arrays. In particular, the papers address the performance of an adaptive microphone array in a small enclosure such as the car cabin. A calibrating scheme is proposed which is independent of array geometry and channel matching, and which calibrates the adaptive array to the given acoustic environment and to the given electronic equipment. Results from real measurements in a car interior are included and compared with an analytical description of an adaptive microphone array. Part A gives an analytical description of an adaptive microphone array which facilitates a simple built-in calibration to the environment and instrumentation. Part B describes the method for performing acoustic echo cancelling with a dig-ital "on-site", "self-calibrating" microphone array system. The calibration process is a simple indirect calibration which continuously adapts to the actual environment and electronic equipment. There is a US patent based on this part and an international patent is currently under examination. Part C presents a neural network based microphone array system, which is capable to continuously perform speech enhancement and adaptation to nonuniform quantization, such as A-law and µ-law.

  • 72. Dahl, Mattias
    et al.
    Claesson, Ingvar
    Acoustic Echo Cancelling with Michrophone Arrays1995Report (Other academic)
    Abstract [en]

    This report describes a novel method to perform acoustic echo cancelling with microphone arrays. The method employs a digital self-calibrating microphone system. The on-site calibration process is a simple indirect calibration which adapts in each special case to the environment and electronic equipment. The method also continuously takes into account environmental disturbances such as car engine noise and fan noise. The method is primarily aimed at handsfree mobile telephones, by suppressing the handsfree loudspeaker and car noise simultaneously. The report also contains an extensive evaluation in a car.

  • 73. Dahl, Mattias
    et al.
    Nordebo, Sven
    Claesson, Ingvar
    A New General Front-End Technique for Complex Quadratic Programming: Applications to Array Pattern Synthesis2000Report (Other academic)
    Abstract [en]

    This paper presents a new practical approach to complex quadratic programming which solves the broad class of complex approximation problems employing finitization of semi-infinite formulations. The approximation problem may be general with arbitrarily complex basis functions. By using a new technique, the associated semi-infinite quadratic programming problem can be solved taking advantage of the numerical stability and efficiency of conventional quadratic programming software packages. Furthermore, the optimization procedure is simple to describe theoretically and straightforward to implement in computer coding. The new design technique is therefore highly accessible. The complex approximation algorithm is versatile and can be applied to a variety of applications such as narrow-band as well as broad-band beamformers with any geometry, conventional FIR filters, digital Laguerre networks, and digital FIR equalizers. The new algorithm is formally introduced as the quadratic Dual Nested Complex Approximation (DNCA) algorithm. The essence of the new technique, justified by the Caratheodory's dimensionality theorem, is to exploit the finiteness of the related Lagrange multipliers by adapting conventional finite-dimensional quadratic programming to the semi-infinite quadratic programming re-formulation of complex approximation problems. The design criterion in our application is to minimize the side-lobe energy of an antenna array when subjected to a specified bound on the peak side-lobe level. Additional linear constraints are used to form the main-lobe. The design problem is formulated as a semi-infinite quadratic program and solved by using the new front-end applied on top of a software package for conventional finite-dimensional quadratic programming. The proposed optimization technique is applied to several numerical examples dealing with the design of a narrow-band base-station antenna array for mobile communication. The flexibility and numerical efficiency of the proposed design technique are illustrated with these examples where even hundreds of antenna elements are optimized without numerical difficulties.

  • 74. Dahl, Mattias
    et al.
    Nordebo, Sven
    Claesson, Ingvar
    Complex Chebyshev Optimization Using Conventional Linear Programming: A versatile and comprehensive solution2000Report (Other academic)
    Abstract [en]

    This paper presents a new practical approach to semi-infinite complex Chebyshev approximation. By using a new technique, the general complex Chebyshev approximation problem can be solved with arbitrary base functions taking advantage of the numerical stability and efficiency of conventional linear programming software packages. Furthermore, the optimization procedure is simple to describe theoretically and straightforward to implement in computer coding. The new design technique is therefore highly accessible. The complex approximation algorithm is general and can be applied to a variety of applications such as conventional FIR filters, narrow-band as well as broad-band beamformers with any geometry, the digital Laguerre networks, and digital FIR equalizers. The new algorithm is formally introduced as the Dual Nested Complex Approximation (DNCA) linear programming algorithm. The design example in limelight is array pattern synthesis of a mobile base-station antenna array. The corresponding design formulation is general and facilitates treatment of the solution of problems with arbitrary array geometry and side-lobe weighting. The complex approximation problem is formulated as a semi-infinite linear program and solved by using a front-end applied on top of a software package for conventional finite-dimensional linear programming. The essence of the new technique, justified by the Caratheodory dimensionality theorem, is to exploit the finiteness of the related Lagrange multipliers by adapting conventional finite-dimensional linear programming to the semi-infinite linear programming problem. The proposed optimization technique is applied to several numerical examples dealing with the design of a narrow-band base-station antenna array for mobile communication. The flexibility and numerical efficiency of the proposed design technique are illustrated with these examples where even hundreds of antenna elements are optimized without numerical difficulties.

  • 75. Dahlquist, Håkan
    et al.
    Håkansson, Sune
    En samhällsekonomisk utvärdering av Verköprojektet1998Report (Other academic)
    Abstract [sv]

    Rapporten omfattar en samhällsekonomisk bedömning av Karlskrona kommuns investering i en ny färjeterminal på Verkö. Bedömningen har gjorts med hjälp av en av författarna konstruerad modell för att beräkna konsumenternas betalningsvilja för en färjeförbindelse mellan Karlskrona och Gdynia. Rapporten inbegriper en samhällsekonomisk, företagsekonomisk och kommunalekonomisk kalkyl över färjeförbindelsen och investeringen, samt de fördelningseffekter som detta medför.

  • 76. Davidsson, Paul
    et al.
    Boman, Magnus
    Saving Energy and Providing Value Added Services in Intelligent Buildings: A multi-agent system approach2000Report (Other academic)
    Abstract [en]

    In a deregulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a collection of software agents that monitor and control an office building. It uses the existing power lines for communication between the agents and the electrical devices of the building, such as sensors and actuators for lights, heating, and ventilation. The objectives are both energy saving and increasing customer satisfaction through value added services. Results of qualitative simulations and quantitative analysis based on thermodynamical modeling of an office building and its staff using four different approaches for controlling the building indicate that significant energy savings, up to 40 per cent, can be achieved by using the agent-based approach. The evaluation also show that customer satisfaction can be increased in most situations. In fact, this approach makes it possible to control the trade-off between energy saving and customer satisfaction (and actually increase both in comparison with current approaches).

  • 77. Davis, Michael
    Humanism, Humanities and Hypertext: Learning, Authority and Ethics in the Electronic Classroom1999Report (Other academic)
    Abstract [en]

    “. . .it is impossible to strip the human element out from even our most abstract theorizing.”—William James (450) As Nicholas Negroponte, the founding director of M.I.T.’s Media Lab, sees it, information technology’s great contribution to education will be in multimedia. Multimedia assisted pedagogy will, according to Negroponte, bring sound and images into the classroom; it will allow for independent learning and, ultimately, it will bridge the gap, imposed by the traditional academic disciplines, between “technology and the humanities, science and art, between right brain and left” (81). Many of us teaching in the humanities might wonder about the role of written language in Negroponte’s vision and rightfully so. Neither he nor Bill Gates (or, for that matter, the popular press) are overly concerned with the fate of writing and the problems of teaching written texts. However, since the late eighties a great many academics have been teaching successfully with important text-based writing technologies, technologies that have dramatically effected, far more than multimedia CD-ROMs ever will, the web of human relationships that engage in them: reshaping the nature of the classroom, the role of the instructor and the activities of the students. In this essay I will introduce those technologies, discuss the pedagogical debates surrounding them and finally argue for a critical approach to their implementation. As you will hopefully agree, the lessons from nearly ten years of computer-assisted pedagogy are dangerous to ignore — particularly for those of us concerned with the ‘humanism’ of the humanities.

  • 78. Dittrich, Yvonne
    Developing a Language for Participation. Project Language as a Meeting Place for Users and Developers in Participatory Software Development1998Report (Other academic)
    Abstract [en]

    During participatory development different professional groups with different professional languages meet. They have to communicate about the future software in a profound way. To enable that, a common way to talk about the future software has to be developed, relating concepts of the use context and concepts of software development. An example of the development of such a project language is given and the relevance of this for design is argued for. To support the development of a project language a toolkit is provided in which methods are compiled that respects the creative side of ordinary language.

  • 79. Dittrich, Yvonne
    How to make Sense of Software. Interpretability as an Issue for Design.1998Report (Other academic)
    Abstract [en]

    In the context of CSCW ? especially through ethnomethodological work place studies - the stability of particular work practices and therefore the ability to design software that fits with continually evolving work practices is questioned. This challenge for software development has been called 'design for unanticipated use'. Using the concept of interpretability, I attempt to answer this challenge. A semiotic perspective on computer applications as formal symbol manipulation systems is introduced. A case study involving three alternative ways of using a computer application shows how users make sense of such symbolic machines. Wittgenstein's concept of language games is used as a 'figure of thought' to relate practice, language, and the use of symbolic machines. The development of an interpretation, fitting the implemented symbol manipulation and supporting the specific understanding of the task, remains crucial for competent use. Interpretability is introduced as a quality of computer applications. In order how to support the user in developing her own interpretation, a concept for help systems is described.

  • 80. Dittrich, Yvonne
    et al.
    Eriksén, Sara
    Wessels, Bridgette
    From Knowledge Transfer to Situated Innovation: Cultivating spaces for co-operation in innovation and design between academics, user-groups and ICT providers2009Report (Other academic)
    Abstract [en]

    Innovation systems, ‘triple helix’, and similar expressions, are used to conceptualise the growing need for more integrated forms of co-operation between academia and other societal actors, such as governmental agencies and industry, in order to produce knowledge relevant for society. However, there is as yet little reported experience from such recent and on-going co-operative projects of how research changes when it becomes involved in practices it is meant to contribute to. In this paper, the authors report about three different research projects where researchers co-operated with governmental agencies and industry around the development of ICT. Evidence from three domains, namely e-government, telecommunications and welfare services, indicates the need for problematising current mainstream understandings of innovation. Innovation, as we see it, is occurring through configurations of designers, developers and domain experts that form constituencies and where scientific knowledge is confronted by requirements, constraints and possibilities of the specific situation. In this context innovation of, or involving, ICT requires a significant amount of imagination, represents a relatively sharp break with established ways of doing things, and requires artful integration of different professional practices, communities, and technologies. We define these creative processes of co-development of work practices, organisations and technology as ‘situated innovation’.

  • 81. Dittrich, Yvonne
    et al.
    Lindeberg, Olle
    Ludvigsson, Ingela
    Lundberg, Lars
    Wessman, Bengt
    Diestelkamp, Wolfgang
    Tillman, Marie
    Design for Change2001Report (Other academic)
    Abstract [en]

    The report summarises the first year of the research project 'Design for Design in Use of Database Applications'. It focuses on end user tailoring and adaptable systems.

  • 82.
    Dittrich, Yvonne
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Mörch, Anders
    Wulf, Volker
    Tailoring Co-operation2003Report (Refereed)
    Abstract [en]

    Tailoring is an area of research in CSCW that allows interlacing design and use in a radical new way. Tailoring is closely related to end-user programming (e.g. spreadsheet development)and a general term to encompass both endeavours is End-User Development. This workshop address tailorability in context of evolving existing systems and applications to the needs of cooperative work practices and organisations. It includes also the cooperative activates of tailoring itself; i.e. collaboration between end users to accomplish tailoring and indirect collaboration between developers and end users to simplify the understanding of tailorable systems. The goal of the workshop is to compare and relate existing research on tailoring and enduser development in the CSCW community, to explore the challenges and future potentials of these technologies, and to identify further directions for research on end-user development in cooperative settings. The workshop is organised in co-operation with the European network of excellence on End-User development. (http://giove.cnuce.cnr.it/eud-net.htm

  • 83. Dongoor, Sai Priyatham
    Selecting an appropriate RequirementsBased Test Case PrioritizationTechnique2019Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context: Regression testing is done to ensure that the modified code of the software is working as it is supposed to. The simplest strategy for regression testing is to re-execute all the test cases (TC), but due to constraints such as time, cost and resources this strategy is inefficient to implement. To reduce the cost of regression testing and to increase its efficiency, Test Case Prioritization techniques are developed. Test case prioritization (TCP) techniques reduce the cost of regression testing and at the same time keeping up its quality. Various procedures for prioritizing test cases were developed to endeavor their viability to meet some prioritization goals (PG). However, the effectiveness of a TCP technique varies for each software product according to their product attributes, change attributes, their interactions, test suite characteristics, and resources for testing. Therefore, one TCP technique for every software product is impractical and leads to misusing the resources. Moreover, the existing research on how to select a TCP technique for a given software product under test is not much focused. Hence, it is necessary to find ways to select a TCP technique to ensure that the PGs of a software product under test are met.

    Objectives: Firstly, to identify different requirements-based TCP techniques in the existing literature and in software organizations, along with their PGs. Secondly, to identify similarities and differences between the identified requirements-based TCP techniques. Finally, finding a way to select a requirements-based TCP which ensures its PGs for a software.

    Methods: For this research, a systematic literature review (SLR) was conducted to gain insights into research on Requirements-based TCP techniques in the existing literature. Semi-structured interviews are conducted with the personnel working in software testing domain to acquiring insights of requirements-based TCP techniques utilized in the software organizations. Depending on the objectives of this research both open-ended and closed-ended questions are formulated in the interview questions. Data obtained from the SLR and interviews were analyzed to answer my RQ’s.

    Conclusions: Results from this research state that selecting an already proposed requirements-based TCP technique from the literature for regression testing a software product is not an optimum solution, instead, selecting requirement properties for a requirements-based TCP technique based on product demands and available resources is the optimum way to ensure successful regression testing. Therefore, for selecting appropriate requirements-based TCP technique, firstly, PGs for a particular requirement/feature being tested is formulated based on the testing phase of the project and available resources. In the second step, the essential aspects which affect the quality of the requirements/features under test are identified, this is done by analyzing the 3 requirement properties which are customers perceived priority, developers perceived priority and tester perceived priority of requirements. The identified critical aspects are prioritized with respect to their criticality and availability of resources. In the final step, with the available priorities of the critical aspects, the remaining relevant requirement properties can be selected to cover test cases of all the important aspects of the requirements under test in that testing phase in a test suite focusing on ensuring its PGs. Thus, the PGs are ensured, and the resources allotted for testing the project can be effectively utilized. Therefore, for an appropriate requirements-based TCP technique, 3 requirement properties, customers, developers and testers perceived priorities, should be selected. Depending on the product demands and available resources if necessary, the 3 requirement properties choose remaining requirement properties and other TCP approaches.

  • 84. Ekbom, Kristofer
    et al.
    Astor, Eric
    Multi-Agent Systems in Computational Markets and Ecosystems1996Report (Other academic)
    Abstract [en]

    This report investigates the prospects of using multi-agent systems for resource allocation in computational markets and ecosystems. The intention is to get an overview of this emerging field by looking closer to some of the papers published so far. The report starts with a brief introduction to the resource allocation problem and a discussion of the algorithmic and implementational issues to consider when the resource allocation problem is applied to networks of computational agents. The frrst three papers share the tommon idea of computational markets to handle resource allocation problems. The fourth paper gives a terminologital framework for communication and interaction between agents in a real-time enviromnent. The overall objective of the investigation is to acquire knowledge of the adequacy of using multi-agent system based approaches to resource allocation with a special aim for the future systems of automated electricity distribution.

  • 85. Emmelin, Lars
    Effective Environmental Assessment Tools – critical reflections on concepts and practice2006Report (Other academic)
    Abstract [en]

    This report is an anthology from the research programme MiSt - Tools for environmental assessment in strategic decision making. MiSt is an interdisciplinary research programme on tools for environmental assessment in strategic decision making running from 2003 to 2008. The focus of the MiSt-programme is the empirical study of effectiveness of tools of environmental assessment as aid to strategic decision making. Two perspectives running through the programme are public participation and legal regulation of tools. There are three major steps in the programme: • a critical examination of the function of tools • a theory based understanding of their effectiveness • and ultimately a development of prescriptions for effective tool use including effective combinations of tools. MiSt is funded by the Swedish Environmental Protection Agency. Participating researchers come from a dozen leading Swedish research institutions in the field. The programme was initiated by the Blekinge Institute of Technology.

  • 86. Emmelin, Lars
    et al.
    Lerman, Peggy
    Miljöregler: hinder för utveckling och god miljö?2004Report (Other academic)
    Abstract [en]

    Rapporten är resultatet av ett förprojekt för att undersöka konflikten mellan miljöprövning och fysisk planering på den ena sidan och utveckling på den andra. Följande områden tas upp: miljökonsekvensbedömning, Natura 2000, regeringsprövning, planeringen av infrastrukturen för 3G systemet, EUs vattendirektiv, miljösanktioner samt miljökvalitetsmålen.

  • 87.
    Emmelin, Lars
    et al.
    Blekinge Institute of Technology, Department of Spatial Planning.
    Söderblom, Ingmarie
    Spelet om 3G: en förstudie av mastfrågan2002Report (Refereed)
    Abstract [en]

    Utbyggnaden av 3G-systemets fysiska infrastruktur kan ses som ett spel med tre huvudaktörer: operatörerna, staten och kommunerna. Staten har delat ut licenser med mycket ambitiösa krav på täckning och utbyggnadstakt. Operatörerna, å sin sida, har ett intresse av den utbyggnad som ger bäst ekonomi och marknadsposition, vilket inte nödvändigtvis innebär att de har ett intresse av vare sig den hastighet eller täckningsgrad de själva drivit fram i skönhetstävlingen. Kommunerna ska slutligen handlägga ansökningarna om bygglov från operatörerna; kraven på utbyggnadshastighet är här ett uppenbart problem. Utbyggnaden av infrastrukturen för 3G-systemet är principiellt intressant långt utöver de konkreta planerings- och miljöproblemen. Den illustrerar hur ?hållbar utveckling? hanteras i praktiken. Teknik och utvecklingsoptimismen har inte på något påvisbart sätt balanserats mot miljöintressen. I 3G är dessa avvägningar flyttade ned till kommuner och länsstyrelser. Besluten om 3G illustrerar det strategiska beslutsfattandets centrala dilemma: avvägningen mellan ?att våga och att väga?. Nyckelord: 3G, UMTS, bygglov, miljöprövning, infrastruktur

  • 88.
    Encalada, Raul
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Mumtaz, Naveed
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Potential Success Indicators in Early Stages of Energy Liberalization Processes: The Mexican Energy Reform Case.2019Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Energy Industry liberalization processes have brought different results around the world depending on the context of the country or region where they take place. The Mexican energy reform opened the market for private companies to participate in the electricity generation. Currently, this reform has been in place for almost four years.

    Several approaches have been used to measure the success of the electric market liberalization in different regions. Different authors have used indicators such as the grassroots initiatives or the reduction of subsidies; still, its applicability is limited to mature stages of the liberalization process.

    The Mexican energy reform opens the opportunity to study the liberalization process in its early stages. The present study considers by the approach presented by Tulloch, Diaz-Rainey & Premachandra (2017) proposing four restructuring streams, to overcome to difficulty off evaluating the early results of the reform in an industry still evolving actual company details are studies to assess the success or failure of the liberalization of the Mexican energy sector.

    This paper will follow a single case study structure based on the whole Mexican Energy Market and focused on the Electric Market. The case study addresses the following research question: “How implementation indicators reflect the potential success of an energy liberalization processes? This research question aims to find out potential early indicators which can be deemed as determining the success or failure of the energy market liberalization process. By using the Mexican case, we aim to contrast the existing research and experiences in other countries to further understand the dynamics of energy liberalization processes.

    The energy market in Mexico has experienced growing competition from players in the energy sectors and forms of energy exploited both producing positive effects on the utility companies’ profitability. The market has also seen an increasing share in renewables, increased power generation and an increasingly greater focus on innovation in the energy sector. The results point to the complexity of the energy market and the role that specific market characteristics play in the success or failure of the regularization process.

    Considering the empiric results, we identify early success indicators such as the introduction of new competitors and the boost of renewable energy, pointing towards a successful energy liberalization process in Mexico.

    Three early indicators are proposed to be used to identify a successful energy liberalization process: i) the introduction of new competitors, ii) reforms on subsidies and iii) the growth of renewables. The co-existence of all of these indicators during the implementation of an energy liberalization process suggests that it was performed successfully, at least at its early phase.

    The Mexican experience gives us first-hand experience in the early phases of an energy liberalization process. It is clear according to the empirical results that without the successful implementation of the energy reform, the Mexican market would not be able to incorporate such technologies at the current pace.

    Further research is required to confirm the current findings in later stages and through different industries. Considering that the market conditions are continually evolving and that the current conditions might be undeveloped, the profit levels of these company might suffer drastic changes during the following years. Other aspects such as the subsidy levels and the electricity price performance represent additional research paths.

  • 89.
    Enuguri, Venkata Kotaiah Shiva Teja
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Karra, Sri Harsha
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Colliding Drops in Spray Dryers2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Spray drying is a process, which produces powders from the fluid state. This type of process is mostly used in the industrial sector. In this process, a liquid slurry is atomized, forming droplets, which are dried with hot air. During spray drying these droplets will interact and upon impact can show different types of interactions; droplet-droplet collisions as well as interactions with partially or completely dried particles, leading to agglomeration. The result of collision gives properties of the dried powder. The focus of the thesis is to investigate the droplet-droplet collision outcomes of WPC 80 (Whey Protein Concentrate 80) and Lactose. Then the effects of the absolute droplet diameter and the droplet diameter ratios are to be determined. Existing experimental setup and Image Processing Tool of MATLAB is used to study the collision outcome. The outcomes are shown in a regime map. The present results are compared with different products result and literature study. It is observed that there is an effect on collision outcome for different droplet size ratios and no effect for absolute droplet diameter.

  • 90. Eriksson, Jeanette
    et al.
    Lindeberg, Olle
    Dittrich, Yvonne
    Leaving Variability Management to the End User; A Comparison Between Different Tailoring Approaches2003Report (Other academic)
    Abstract [en]

    To enable software to fulfill user requirements over time and meet changes in, for example, business environments, software variability is needed. One way to achieve variability is through tailoring. However, some kind of variability management is needed in order to take advantage of variability. With a tailorable system we mean a system that is designable when it is in use. This means that some design decisions are postponed until the system is up and running. It is the end-user who will adjust the program to fit altered requirements through, for example, run-time configuration. In other words, tailoring requires that the variability management of the system is left to the end user. In this article we present three different examples of tailoring and in the form of a comparison between the three approaches we identify and discuss some issues which must be considered when variability management is left to the end user.

  • 91. Erlandsson, Maria
    et al.
    Henriksson, Susanne
    Förändringsinitiativ i bostads- och arbetsområden i Norrköping och Växjö1998Report (Other academic)
    Abstract [sv]

    Detta är en arbetsrapport inom forskningsprojektet Planering för arbetstillfällen och förnyelse i arbets- och bostadsområde. Forskningsprojektet syftar till att dokumentera, analysera och utvärdera förändringsprocesser i bostads- och arbetsområden med avseende på konflikter och samverkan mellan lokala initiativ och centrala intressen. Den praktiska och teoretiska bakgrunden till projektet redovisas i projektbeskrivningen (Törnqvist, 1997). Projektet är finansierat av Svenska Kommunförbundet och ingår i dess FoU-program Medborgardeltagande och lokala initiativ. Projektet, som skall vara avslutat 1999, ingår tillsammans med andra forskningsprojekt, med bitr professor Eva Öresjö som ansvarig, i forskningsområdet Stadsstruktur och förortsförnyelse vid institutionen för Fysisk Plane-ring och Byggteknik. Den första etappen av forskningsprojektet har genomförts under hösten 1997 med studier av vardera ett arbetsområde och ett bostadsområde i Norrköping resp Växjö, där olika förnyelseinitiativ har studerats och analyserats. Arbetet har i Norrköping genomförts på halvtid av Susanne Henriksson och i Växjö på heltid av Maria Erlandsson och dokumenteras i denna arbetsrapport som ett underlag för fortsatt analys. Avsikten är att motsvarande material även skall insamlas i två områden i Jönköpings kommun. Maria Erlandsson och Susanne Henriksson svarar för redovisningen av sina studier i resp Växjö och Norrköping. Maria Erlandsson har gjort den slutliga sammanställningen och Fredrik Andersson har med datorstöd gjort layout och andra redigeringsarbeten fram till tryckfärdig rapport.

  • 92. Erman, David
    Replication Strategies for Streaming Media2007Report (Other academic)
    Abstract [en]

    Large-scale, real-time multimedia distribution over the Internet has been the subject of research for a substantial amount of time. A large number of mechanisms, policies, methods and schemes have been proposed for media coding, scheduling and distribution. Internet Protocol (IP) multicast was expected to be the primary transport mechanism for this, though it was never deployed to the expected extent. Recent developments in overlay networks has reactualized the research on multicast, with the consequence that many of the previous mechanisms and schemes are being re-evaluated. This report provides a brief overview of several important techniques for media broadcasting and stream merging, as well as a discussion of traditional IP multicast and overlay multicast. Additionally, we present a proposal for a new distribution system, based on the broadcast and stream merging algorithms in the BitTorrent distribution and replication system.

  • 93. Fiedler, Markus
    Modeling and Analysis of Wireless Network Segments with aid of Teletraffic Fluid Flow Models2000Report (Other academic)
    Abstract [en]

    The fluid flow model is used to model variable server and link rates, as they appear in mobile channels due to fading, bit error recovery and failed channel reservations. Assuming a Gilbert-Elliott model for the channel, the influence of transmission quality on network Quality of Service (QoS) might be studied. Thus, the fluid flow model assumes the role of a model that might be used for dimensioning and performance evaluation both at the edge and inside a network. We present a user-friendly, contemporary, flexible, fast and numerically stabilized computing environment for the fluid flow model with a well-known user interface that is able to handle multiple users and that might be used as well for batch processing. We discuss two case studies that emphasize the crucial impact of the relationship between server and source dynamics on QoS.

  • 94. Fiedler, Markus
    et al.
    Blouin, Francois
    Arlos, Patrik
    18th ITC Specialist Seminar on Quality of Experience2008Report (Other academic)
    Abstract [en]

    The notion and topic of Quality of Experience (QoE) keeps attracting the attention of manufacturers, operators and researchers. It links user perception and expectations on one side and technical Quality of Service (QoS) parameters, management, pricing schemes etc. on the other side. Such links are needed in order to balance user satisfaction and economic aspects of service provisioning. However, the notion of QoE as such is not without controversy. Technicians, used to a world of objective and clearly definable parameters, tend to fear the subjective, somehow fuzzy parts associated with end user perception. Vice versa, customer relationship and marketing departments might find themselves uncomfortable with technical parameters which might not reflect the user perception in some tense situations. Nevertheless, appearance and utility of a networked service depend on the underlying technical solutions and their performance. Thus, we face the challenge of bringing it all together, which essentially describes the spirit of the 18th ITC Specialists Seminar on Quality of Experience (ITC-SS 18). ITC Specialist Seminars have a very good reputation in gathering experts and their high-quality contributions around a performance-oriented topic of mutual interest. ITC-SS 18 is intended as a meeting place between experts, researchers, practitioners, vendors and customers. It is devoted to presentations and discussions of QoE concepts, analysis, management approaches etc., both from industry and academia. While many conferences are dominated by academia, one third of the submissions to ITC-SS 18 originated from industry. The contributions have been peer-reviewed by at least three independent reviewers and finally, we selected 18 papers to be presented. Additionally, two keynote speeches reflect one industrial and one academic approach to QoE analysis and implementation. For the ITC, the leading conference for performance modeling and analysis of communication networks & systems, ITC-SS 18 opens a window towards the end user. ITC-SS 18 takes place in Karlskrona on May 29—30, 2008. It is organized by the Dept. of Telecommunication Systems (ATS) within the School of Engineering (TEK) at Blekinge Institute of Technology (BTH) in cooperation with the International Advisory Council (IAC) of ITC.

  • 95. Forsberg, Lena Petersson
    Friluftsliv och naturturism i kommunal planering: delresultat från en webbaserad enkätundersökning våren 20082009Report (Other academic)
    Abstract [sv]

    Om, hur och i vilken grad friluftslivets och naturturismens intressen beaktas i den kommunala fysiska planeringen har varit huvudfokus för denna undersökning. Resultaten visar att en övervägande majoritet av kommunerna använder möjligheterna att utöva friluftsliv och naturturism som argument i sin marknadsföring men i avvägningen mot andra samhällsintressen är det inte alltid självklart att friluftslivet blir vinnare. Resultatet från enkäten visar att friluftslivets och naturturismens intressen synliggörs i mycket olika grad i kommunernas fysiska planering. Att friluftslivet och naturturismen är mindre synligt i den fysiska planeringen behöver inte med automatik betyda att det faktiska utfallet för medborgarnas möjligheter att utöva friluftsliv är dåligt. Många kommuner jobbar aktivt med projekt som syftar till att säkerställa och förvalta naturområden intressanta för friluftslivet. I kommuner där det råder eller kommer att råda exploateringstryck eller andra hot mot naturområden är det dock önskvärt att friluftslivet får en hög status redan i planeringsskedena. Detta för att om möjligt stå starkare i avvägningen mot andra samhällsintressen.

  • 96. Fredriksson, Martin
    First Blekinge Institute of Technology Student Workshop on Agent Programming2001Report (Other academic)
    Abstract [en]

    The articles presented in this research report are the results of student efforts in the Agent Programming course, held each year at Blekinge Institute of Technology (Department of Software Engineering and Computer Science). The course aims at giving the students an insight into the vast research and industrial application area of autonomous agents and multiagent systems. Consequently, during the course the students have been introduced to the major areas of the agent domain, including: autonomous agents, multiagent systems, engineering of multiagent systems, and areas of applicability. Of course, these areas of research are quite complex and each unique lecture was therefore held by a specific researcher. Among this staff of expertise were researchers from the Societies of Computation programme (IPD/BIT), Imperial College of London, Royal Institute of Technology (DSV), and Massive Entertainment (a swedish game-development company). A new, and important, aspect of the course this year was that each student was required to participate in the writing of a research paper, on a subject within the domain of autonomous agents and/or multiagent systems. The overall goal with these research papers was to, in a natural manner, introduce the students to the process of gaining scientific knowledge, prior to courses involving thesis material. The articles presented in this report are therefore focused on the identification of a certain problem and a subsequent solution to the problem. The results of this part of the course have now been gathered in this research report, and are to be presented during the Blekinge Institute of Technology Student Workshop on Agent Programming (BITSWAP) 2001. The articles presented during the workshop, but also those that did not make it until the workshop submission deadline, have all focused on very diverse areas of research, still positioning themselves in the paradigm of autonomous agents and multiagent systems. Therefore, it was extremely difficult, if not impossible, to gather any larger number of the students? efforts under certain categories such as; architectures, communication, engineering, mediation, or simulations. Instead, this research report (workshop proceedings) have been divided into two general categories, reflecting the two types of articles produced by the students: theoretical and practical reports. Among the specific topics introduced by the authors are: cooperation, methodologies, societal and security aspects, agents on the web, and agents in the entertainment industry. I am very happy to conclude that the articles produced this year by the students are of exceptional quality and that they have chosen to pursue topics of interest not only to themselves, but to their fellow students as well as the workshop review board. Finally, without mentioning too many specific names, I would just like to give a few acknowledgements to all of you that have contributed to the course, especially to the students and all of the researchers involved in the Societies of Computation programme (Rune Gustavsson, Paul Davidsson, Stefan Johansson, Christer Rindebäck, Anders Johansson, and Johan Lindblom), Keith Clark, Harko Verhagen, and Dan Andersson. Martin Fredriksson, Ronneby - Sweden. December 31, 2000.

  • 97.
    Gholamzadeh Shirmohammadi, Bamshad
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Relationships between Quality of experience and TCP flag ratios for web services2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context: Nowadays one of the most beneficial business in IT area is web services with huge amount of users. The key ofsuccess in these type of services is flexibility in terms of providing same quality of services (QoS) and ability of fasttroubleshooting when number of users increase rapidly. To achieve these targets, evaluation of the user satisfaction is highlyessential. Moreover it is required to link user dissatisfaction to QoS parameters in terms of troubleshooting.

    Objectives: The main aim the research is to find an intelligent method for evaluation of the user satisfaction. The method isproposed to estimate quality-of-experience (QoE) without asking users to send their feed back. Connecting to this aim, thesecond target is finding the definition of function in equations of QoS=function(QoE). And finally, comparison of theimpact of QoS parameters on mobile application users and web site users is the last objective.

    Methods: For this research a web-server for video sharing propose is designed. The users can use it via web site or anAndroid mobile application. The three main QoS parameters (Packet-loss, delay and throughput) are changed gradually. Theusers are asked to score the mobile application and web site at the same time. In parallel the traffic of web-server is capturedand analyzed. Then based on variations in mean opinion scores (MOS) and also changes in TCP flags, the proper patternsfor each of the QoS parameters is provided. In this part the QoE is linked to transport layer. For the second objective, theQoE is directly linked to QoS. On the other words the graphs with QoE as horizontal axis and one of the QoS parameters asvertical axis are provided. And finally based on the gradient of these trends, the amount of impact of QoS parameters onmobile application users and web site users is compared.

    Results: Based on the results of the research, decrement in SYN and FIN flags and increment in ACK is an alarm for downgoing user satisfaction. In this situation, the problem is belongs to packet-loss. Increasing in the percentage of SYN is alsoa signal for user dissatisfaction. In this case, the problem is result of delay. And finally if the web-server problem is aboutthroughput then, SYN, FIN and ACK has up going trends. In all of the cases the rest of TCP flags has not clear up going ordecreasing trend.The correlation between QoS and QoE is formulated. The trends of MOS relative to QoS parameters for mobile phone andlaptop are very similar in case of packet-loss. For throughput the mobile phone users are a little more sensitive. The mostsignificant difference between the MOS values for mobile application and web site is belongs to delay. The increment indelay has really big negative effect on mobile application users.

    Conclusion: The final method for user satisfaction evaluation is based on the way of variations in the TCP flags. Among allthe flags, SYN, FIN and ACK passed the criteria to make the patterns. Moreover the method indicate the problem isbelongs to which of the QoS parameters. The correlation between QoE and QoS is formulated. And finally according tothese formulas, two separate web-servers for mobile application and web site is recommended.

  • 98. Grahn, Håkan
    Proceedings of the 1st Swedish Workshop on Multi-Core Computing2008Report (Other academic)
    Abstract [en]

    Multicore processors have become the main computing platform for current and future computer systems. This calls for a forum to discuss the challenges and opportunities of both designing and using multicore systems. The objective of this workshop is to bring together researchers and practitioners from academia and industry to present and discuss the recent work in the area of multicore computing. The workshop is the first of its kind in Sweden, and it is co-organized by Blekinge Institute of Technology and the Swedish Multicore Initiative (http://www.sics.se/multicore/). The technical program was put together by a distinguished program committee consisting of people from both from academia and industry in Sweden. We received 16 extended abstracts. Each abstract was sent to four members of the program committee. In total, we collected 64 review reports. The abstracts were judged based on their merits in terms of relevance to the workshop, significance and originality, as well as the scientific and presentation quality. Based on the reviews, the program committee decided to accept 12 papers for inclusion in the workshop, giving an acceptance rate of 75%. The accepted papers cover a broad range of topics, such as programming techniques and languages, compiler and library support, coherence and consistency issues, and verification techniques for multicore systems.

  • 99. Grbic, Nedelko
    et al.
    Dahl, Mattias
    Claesson, Ingvar
    Acoustic Echo Cancelling and Noise Suppression with Microphone Arrays1999Report (Other academic)
    Abstract [en]

    This report presents a method to achieve acoustic echo canceling and noise suppression using microphone arrays. The method employs a digital self-calibrating microphone system. The on-site calibration process is a simple indirect calibration which adapts in each specific case to the environment and the electronic equipment used. The method also continuously reduces environmental disturbances such as car engine noise and fan noise. The method is primarily aimed at hands free mobile telephones by suppressing the hands free loudspeaker and car cabin noise simultaneously. The report also contains an evaluation of the impact of echo and noise suppression on a real conversation, accomplished in a car using a microphone array.

  • 100. Grbic, Nedelko
    et al.
    Nordberg, Jörgen
    Nordholm, Sven
    Subband Acoustic Echo Cancelling using LMS and RLS1999Report (Other academic)
    Abstract [en]

    The increasing use of modern hands free communication systems such as video conferencing, computer communications, and vehicle mounted cellular telephones brings the demand for high-quality acoustic echo cancellation up to focus. In these applications the echo path which has to be identified typically has long time duration, the order of 100 ms. For this identification the length of the filter will be long. This report evaluates the Normalized Least Mean Square (NLMS) and the Weighted Recursive Least Square (WRLS) algorithms for acoustic echo cancelling using a delayless subband scheme. Subband signal processing has shown to be efficient both when it comes to convergence rate and level of echo suppression. The evaluation is performed for real speech signals sampled from a conversation using a hands free set mounted in an automobile, and a conversation using conference telephony equipment in a conference room. A comparison of subband and fullband algorithms is made both with respect to the computational cost and level of echo suppression. Results show that when the impulse response is very long, i.e. in such environments as conference rooms, the subband approach is beneficial. In a car environment the size of enclosure and damping means that the response is quite short and a conventional echo canceller could perform as well as a subband echo canceller. In the study, finite word length effects have not been considered.

123456 51 - 100 of 271
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf