Endre søk
Begrens søket
1234567 1 - 50 of 1658
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Abbas, Mhd Yazan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Ferzali, Ali
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    A mobile Application development in the Android Studio platform for leave applications2022Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Nowadays, there is a mobile application for almost every need, for instance, training, games, and news applications. Almost all the companies have also their own mobile applications that facilitate the daily communication between their employees and supervisors. In this thesis, the development process of an Android application for the company Askås is created, where the employees can for example send a Flex application or sick leave application, see their registered personal information and edit them. The final result of the project is almost what Askås asked for, An Android application that facilitates their employees’ daily needs. The development process, the results, and the encountered problems are also represented in a more detailed manner in the thesis. 

  • 2.
    Abbas, Muhammad Tahir
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Improving the Energy Efficiency of Cellular IoT Device2023Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Cellular Internet of Things (CIoT) has emerged as a promising technology to support applications that generate infrequent data. One requirement on these applications, often battery-powered devices, is low energy consumption to enable extended battery life. Narrowband IoT (NB-IoT) is a promising technology for IoT due to its low power consumption, which is essential for devices that need to run on battery power for extended periods. However, the current battery life of NB-IoT devices is only a few years, which is insufficient for many applications. This thesis investigates the impact of energy-saving mechanisms standardized by 3GPP on battery life of NB-IoT devices. The main research objective is to classify and analyze existing energy-saving solutions for CIoT and examine their limitations, to study the impact of standardized energy-saving mechanisms on the battery life of NB-IoT devices, both in isolation and combined, and to provide guidelines on how to configure NB-IoT devices to reduce energy consumption efficiently. The research aims to provide a deeper understanding of the effect of energy-saving mechanisms and best practices to balance energy efficiency and performance of NB-IoT devices. Applying the proposed solutions makes it possible to achieve a battery life of 10~years or more for CIoT devices.

    Fulltekst (pdf)
    fulltext-KAPPAN
    Download (jpg)
    preview image
  • 3.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Eklund, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Alfredsson, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Rajiullah, Mohammad
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Caso, Giuseppe
    Ericsson Research.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). University of Oslo, Norway.
    On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT2022Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Cellular Internet of Things (CIoT) is a Low-Power Wide-Area Network (LPWAN) technology. It aims for cheap, lowcomplexity IoT devices that enable large-scale deployments and wide-area coverage. Moreover, to make large-scale deployments of CIoT devices in remote and hard-to-access locations possible, a long device battery life is one of the main objectives of these devices. To this end, 3GPP has defined several energysaving mechanisms for CIoT technologies, not least for the Narrow-Band Internet of Things (NB-IoT) technology, one of the major CIoT technologies. Examples of mechanisms defined include CONNECTED-mode DRX (cDRX), Release Assistance Indicator (RAI), and Power Saving Mode (PSM). This paper considers the impact of the essential energy-saving mechanisms on minimizing the energy consumption of NB-IoT devices, especially the cDRX and RAI mechanisms. The paper uses a purpose-built NB-IoT simulator that has been tested in terms of its built-in energy-saving mechanisms and validated with realworld NB-IoT measurements. The simulated results show that it is possible to save 70%-90% in energy consumption by enabling the cDRX and RAI. In fact, the results suggest that a battery life of 10 years is only achievable provided the cDRX, RAI, and PSM energy-saving mechanisms are correctly configured and used

  • 4.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Eklund, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption2019Inngår i: Proceedings of Fifteenth Swedish National Computer Networking Workshop (SNCNW), 2019Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper studies the impact of tunable parametersin the NB-IoT stack on the energy consumption of a user equipment(UE), e.g., a wireless sensor. NB-IoT is designed to enablemassive machine-type communications for UE while providing abattery lifetime of up to 10 years. To save battery power, most oftime the UE is in dormant state and unreachable. Still, duringthe CONNECTED and IDLE state, correct tuning of criticalparameters, like Discontinuous reception (DRX), and extendedDiscontinuous reception (eDRX), respectively, are essential to savebattery power. Moreover, the DRX and eDRX actions relate tovarious parameters which are needed to be tuned in order toachieve a required UE battery lifetime. The objective of thispaper is to observe the influence of an appropriate tuning ofthese parameters to reduce the risk of an early battery drainage

  • 5.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Eklund, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Science, Mathematics and Engineering Education Research (SMEER).
    Alfredsson, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Science, Mathematics and Engineering Education Research (SMEER). Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Alay, Özgü
    University of Oslo and Simula Metropolitan, NOR.
    Katona, Sándor
    Ericsson AB.
    Seres, Gergely
    Ericsson AB.
    Rathonyi, Bela
    Ericsson AB.
    Guidelines for an Energy Efficient Tuning of the NB-IoT Stack2020Inngår i: 45th IEEE Conference on Local Computer Networks (LCN), IEEE Communications Society, 2020, s. 60-69, artikkel-id 9363265Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, we study the energy consumptionof Narrowband IoT devices. The paper suggests that key tosaving energy for NB-IoT devices is the usage of full Discontinuous Reception (DRX), including the use of connected-mode DRX (cDRX): In some cases, cDRX reduced the energy consumption over a 10-year period with as much as 50%. However, the paper also suggests that tunable parameters, such as the inactivity timer, do have a significant impact. On the basis of our findings, guidelines are provided on how to tune the NB-IoT device so that it meets the target of the 3GPP, i.e., a 5-Wh battery should last for at least 10 years. It is further evident from our results that the energy consumption is largely dependent on the intensity and burstiness of the traffic, and thus could be significantly reduced if data is sent in bursts with less intensity,irrespective of cDRX support.

  • 6.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Eklund, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Alfredsson, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Rajiullah, Mohammad
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Caso, Giuseppe
    Ericsson Research, Sweden.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). University of Oslo, Norway.
    Energy-Saving Solutions for Cellular Internet of Things - A Survey2022Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 10, s. 62096-62096Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The Cellular Internet of Things (CIoT), a new paradigm, paves the way for a large-scale deployment of IoT devices. CIoT promises enhanced coverage and massive deployment of low-cost IoT devices with an expected battery life of up to 10 years. However, such a long battery life can only be achieved provided the CIoT device is configured with energy efficiency in mind. This paper conducts a comprehensive survey on energy-saving solutions in 3GPP-based CIoT networks. In comparison to current studies, the contribution of this paper is the classification and an extensive analysis of existing energy-saving solutions for CIoT, e.g., the configuration of particular parameter values and software modifications of transport- or radio-layer protocols, while also stressing key parameters impacting the energy consumption such as the frequency of data reporting, discontinuous reception cycles (DRX), and Radio Resource Control (RRC) timers. In addition, we discuss shortcomings, limitations, and possible opportunities which can be investigated in the future to reduce the energy consumption of CIoT devices.

    Fulltekst (pdf)
    fulltext
  • 7.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Jibran, Muhammad Ali
    Jeju Natl Univ, Dept Comp Engn, Jeju 63243, South Korea..
    Afaq, Muhammad
    Sarhad Univ Sci & Informat Technol, Pakistan..
    Song, Wang-Cheol
    Jeju Natl Univ, South Korea..
    An adaptive approach to vehicle trajectory prediction using multimodel Kalman filter2020Inngår i: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, artikkel-id e3734Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    With the aim to improve road safety services in critical situations, vehicle trajectory and future location prediction are important tasks. An infinite set of possible future trajectories can exit depending on the current state of vehicle motion. In this paper, we present a multimodel-based Extended Kalman Filter (EKF), which is able to predict a set of possible scenarios for vehicle future location. Five different EKF models are proposed in which the current state of a vehicle exists, particularly, a vehicle at intersection or on a curve path. EKF with Interacting Multiple Model framework is explored combinedly for mathematical model creation and probability calculation for that model to be selected for prediction. Three different parameters are considered to create a state vector matrix, which includes vehicle position, velocity, and distance of the vehicle from the intersection. Future location of a vehicle is then used by the software-defined networking controller to further enhance the safety and packet delivery services by the process of flow rule installation intelligently to that specific area only. This way of flow rule installation keeps the controller away from irrelevant areas to install rules, hence, reduces the network overhead exponentially. Proposed models are created and tested in MATLAB with real-time global positioning system logs from Jeju, South Korea.

  • 8.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Muhammad, Afaq
    Sarhad Univ Sci & Informat Technol, Dept Comp Sci & IT, Peshawar, Pakistan.
    Song, Wang-Cheol
    Jeju Natl Univ, Dept Comp Engn, Jeju, South Korea.
    Road-Aware Estimation Model for Path Duration in Internet of Vehicles (IoV)2019Inngår i: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 109, nr 2, s. 715-738Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In Internet of Vehicles (IoV), numerous routing metrics have been used to assess the performance of routing protocols such as, packet delivery ratio, throughput, end-to-end delay and path duration. Path duration is an influential design parameter, among these routing metrics, that determines the performance of vehicular networks. For instance, in highly dynamic scenarios, it can be used to predict link life time in on-demand routing protocols. In this paper, we propose an infrastructure-assisted hybrid road-aware routing protocol which is capable of enhanced vehicle-to-vehicle and vehicle-to-infrastructure communication. A remarkable aspect of the proposed protocol is that it establishes a link between path duration and fundamental design parameters like vehicular velocity, density, hop count and transmission range. Although, a lot of research has been previously performed, a well defined analytical model for IoV is not available in the literature. Precisely, a relation between path duration and vehicular velocity has not been validated in the previous studies. Experimental results show that the increased packet delivery ratio with reduced end-to-end delay can be achieved by the prediction of path duration. Proposed model for path duration is validated by getting experimental results from network simulator 3 (NS3) and analytical results from MATLAB. In addition, SUMO simulator was used to generate real time traffic on the roads of Gangnam district, South Korea.

    Fulltekst (pdf)
    fulltext
  • 9.
    Abbas, Muhammad Tahir
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Muhammad, Afaq
    Sarhad Univ Sci & Informat Technol, Pakistan.
    Song, Wang-Cheol
    Jeju Natl Univ, South Korea.
    SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach2019Inngår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 11, nr 3, s. 1265-1280Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Proposing an optimal routing protocol for internet of vehicles with reduced overhead has endured to be a challenge owing to the incompetence of the current architecture to manage flexibility and scalability. The proposed architecture, therefore, consolidates an evolving network standard named as software defined networking in internet of vehicles. Which enables it to handle highly dynamic networks in an abstract way by dividing the data plane from the control plane. Firstly, road-aware routing strategy is introduced: a performance-enhanced routing protocol designed specifically for infrastructure-assisted vehicular networks. In which roads are divided into road segments, with road side units for multi-hop communication. A unique property of the proposed protocol is that it explores the cellular network to relay control messages to and from the controller with low latency. The concept of edge controller is introduced as an operational backbone of the vehicle grid in internet of vehicles, to have a real-time vehicle topology. Last but not least, a novel mathematical model is estimated which assists primary controller in a way to find not only a shortest but a durable path. The results illustrate the significant performance of the proposed protocol in terms of availability with limited routing overhead. In addition, we also found that edge controller contributes mainly to minimizes the path failure in the network.

    Fulltekst (pdf)
    fulltext
  • 10.
    Aboueata, N.
    et al.
    Qatar University, Doha, Qatar.
    Alrasbi, S.
    Qatar University, Doha, Qatar.
    Erbad, A.
    Qatar University, Doha, Qatar.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Bhamare, Deval
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Supervised machine learning techniques for efficient network intrusion detection2019Inngår i: Proceedings - International Conference on Computer Communications and Networks, ICCCN, IEEE, 2019Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) are being widely deployed and utilized by end users, including many private as well as public organizations. Despite its wide-spread acceptance, security is still the biggest threat in cloud computing environments. Users of cloud services are under constant fear of data loss, security breaches, information theft and availability issues. Recently, learning-based methods for security applications are gaining popularity in the literature with the advents in machine learning (ML) techniques. In this work, we explore applicability of two well-known machine learning approaches, which are, Artificial Neural Networks (ANN) and Support Vector Machines (SVM), to detect intrusions or anomalous behavior in the cloud environment. We have developed ML models using ANN and SVM techniques and have compared their performances. We have used UNSW-NB-15 dataset to train and test the models. In addition, we have performed feature engineering and parameter tuning to find out optimal set of features with maximum accuracy to reduce the training time and complexity of the ML models. We observe that with proper features set, SVM and ANN techniques have been able to achieve anomaly detection accuracy of 91% and 92% respectively, which is higher compared against that of the one achieved in the literature, with reduced number of features needed to train the models.

  • 11.
    Abrahamsson, Henrik
    et al.
    RISE SICS.
    Abdesslem, Fehmi Ben
    RISE SICS.
    Ahlgren, Bengt
    RISE SICS.
    Björkman, Mats
    Mälardalen University.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Marsh, Ian
    RISE SICS.
    Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications2018Konferansepaper (Fagfellevurdert)
  • 12.
    Abrahamsson, Henrik
    et al.
    RISE SICS, Stockholm, Sweden.
    Ben Abdesslem, Fehmi
    RISE SICS, Stockholm, Sweden.
    Ahlgren, Bengt
    RISE SICS, Stockholm, Sweden.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Marsh, Ian
    RISE SICS, Stockholm, Sweden.
    Bjorkman, Mats
    Mälardalens högskola.
    Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance2018Inngår i: 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA), IEEE, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Connected vehicles can make roads traffic safer and more efficient, but require the mobile networks to handle time-critical applications. Using the MONROE mobile broadband measurement testbed we conduct a multi-access measurement study on buses. The objective is to understand what network performance connected vehicles can expect in today's mobile networks, in terms of transaction times and availability. The goal is also to understand to what extent access to several operators in parallel can improve communication performance. In our measurement experiments we repeatedly transfer warning messages from moving buses to a stationary server. We triplicate the messages and always perform three transactions in parallel over three different cellular operators. This creates a dataset with which we can compare the operators in an objective way and with which we can study the potential for multi-access. In this paper we use the triple-access dataset to evaluate single-access selection strategies, where one operator is chosen for each transaction. We show that if we have access to three operators and for each transaction choose the operator with best access technology and best signal quality then we can significantly improve availability and transaction times compared to the individual operators. The median transaction time improves with 6% compared to the best single operator and with 61% compared to the worst single operator. The 90-percentile transaction time improves with 23% compared to the best single operator and with 65% compared to the worst single operator.

  • 13.
    Abramovich, Shosana
    et al.
    University of Haifa, ISR.
    Persson, Lars-Erik
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Rearrangements and Jensen type inequalities related to convexity, superquadracity, strong convexity and 1-quasiconvexity2020Inngår i: Journal of Mathematical Inequalities, ISSN 1846-579X, E-ISSN 1848-9575, Vol. 14, nr 3, s. 641-659Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper we derive and discuss some newtheorems related to all rearrangementsof a given set inRn, denoted(x)and use the results to prove some new Jensen type inequalitiesfor convex, superquadratic, strongly convex and 1-quasiconvex functions.

  • 14.
    Abramovich, Shoshana
    et al.
    University of Haifa, Israel.
    Persson, Lars-Erik
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). The Arctic University of Norway, Norway.
    Some new Hermite-Hadamard and Fejer type inequalities without convexity/concavity2020Inngår i: Mathematical Inequalities & Applications, ISSN 1331-4343, E-ISSN 1848-9966, Vol. 23, nr 2, s. 447-458Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper we discuss the Hermite-Hadamard and Fejer inequalities vis-a-vis the convexity concept. In particular, we derive some new theorems and examples where Hermite-Hadamard and Fejer type inequalities are satisfied without the assumptions of convexity or concavity on the actual interval [a,b]

  • 15.
    Ackleh, Azmy S.
    et al.
    University of Louisiana at Lafayette, USA.
    Colombo, Rinaldo M.
    University of Brescia, Italy.
    Goatin, Paola
    Team ACUMES, INRIA, France.
    Hille, Sander
    Leiden University, The Netherlands.
    Muntean, Adrian
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Mathematical modeling with measures2019Inngår i: Nieuw Archief voor Wiskunde, ISSN 0028-9825, Vol. 20, nr September, s. 218-220Artikkel i tidsskrift (Fagfellevurdert)
  • 16.
    Ackleh, Azmy S.
    et al.
    University of Louisiana at Lafayette, USA.
    Colombo, Rinaldo M.
    University of Brescia, Italy.
    Goatin, Paola
    Universite Côte d’Azur, France.
    Hille, Sander
    Leiden University, Netherlands.
    Muntean, Adrian
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Special issue: Mathematical modeling with measures2020Inngår i: Mathematical Biosciences and Engineering, ISSN 1547-1063, E-ISSN 1551-0018, nr 3, s. 2451-2452Artikkel i tidsskrift (Fagfellevurdert)
    Fulltekst (pdf)
    fulltext
  • 17.
    Ackleh, Azmy S.
    et al.
    University of Louisiana at Lafayette, USA.
    Lyons, Rainey
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Saintier, Nicolas
    Universidad de Buenos Aires, Argentina.
    High resolution finite difference schemes for a size structured coagulation-fragmentation model in the space of radon measures2023Inngår i: Mathematical Biosciences and Engineering, ISSN 1547-1063, E-ISSN 1551-0018, Vol. 20, nr 7, s. 11805-11820Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper, we develop explicit and semi-implicit second-order high-resolution finite difference schemes for a structured coagulation-fragmentation model formulated on the space of Radon measures. We prove the convergence of each of the two schemes to the unique weak solution of the model. We perform numerical simulations to demonstrate that the second order accuracy in the Bounded-Lipschitz norm is achieved by both schemes.

    Fulltekst (pdf)
    fulltext
  • 18.
    Acklehl, Azmy S.
    et al.
    Univ Louisiana Lafayette, Lafayette, LA USA..
    Colombo, Rinaldo Ni.
    Univ Brescia, Brescia, Italy..
    Goatinl, Paola
    Univ Cote Azur, CNRS, LIAD, Inria, Sophia Antiolis, France..
    Hille, Sander
    Leiden Univ, Leiden, Netherlands..
    Muntean, Adrian
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Special issue: Mathematical Modeling with Measures: Preface2020Inngår i: Mathematical Biosciences and Engineering, ISSN 1547-1063, E-ISSN 1551-0018, Vol. 17, nr 3, s. 2451-2452Artikkel i tidsskrift (Annet vitenskapelig)
  • 19.
    Adamsson, Annika
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    En Montessori-inspirerad pedagogik utmanar högpresterande elever matematiskt: En kvalitativ studie om vilka strategier lärare som använder en Montessori- inspirerad pedagogik i årskurs 1-3 anser utmanar och stimulerar högpresterande elever i matematik.2016Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [sv]

    Studiens syfte var att ta reda på vilka strategier lärare som använder en Montessori-inspirerad pedagogik anser stimulerar och utmanar högpresterande elever i matematik samt om de upplevde några svårigheter eller problem med att undervisa högpresterande elever i matematik. För att undersöka det har sex kvalitativa intervjuer genomförts med lärare som har varit eller som är verksamma i årskurserna 1-3. Resultatet av intervjuerna visar att lärarna har en gemensam uppfattning om att en Montessori-inspirerad pedagogik utmanar och stimulerar högpresterande elever i matematik eftersom grundtanken i Montessori-pedagogiken är "eleven i centrum". Det här innebär att lärarna måste utgå från varje elevs förutsättningar, behov och aktuella kunskapsnivå. I resultatet framkommer också att lärarna använder sig av olika strategier i form av matematikbok från en högre årskurs, special- och fördjupningsområden, åldersintegrering och lärande med flera sinnen för att stimulera och utmana de högpresterande eleverna matematiskt. Det framgår också i resultatet att lärarna inte upplever några större problem eller svårigheter i undervisningen av högpresterande elever i matematik. De belyser ändå att den egna matematiska kompetensen, tidsbrist och eget kontrollbehov ibland kan utgöra hinder för att stimulera och utmana de högpresterande eleverna tillräckligt. Utifrån studien kan man dra slutsatserna att lärare som använder en Montessori-inspirerad pedagogik lägger stor vikt vid att hitta rätt strategi för rätt elev, vilket bidrar till att de högpresterande eleverna får utmaning och stimulans. De olika hindren som lärarna belyser skulle kunna minskas med fortbildning och samarbete mellan årskurserna. 

    Fulltekst (pdf)
    fulltext
  • 20.
    Adolfsson, David
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Channel Estimation Optimization in 5G New Radio using Convolutional Neural Networks2023Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Channel estimation is the process of understanding and analyzing the wireless communication channel's properties. It helps optimize data transmission by providing essential information for adjusting encoding and decoding parameters. This thesis explores using a Convolutional Neural Network~(CNN) for channel estimation in the 5G Link Level Simulator, 5G-LLS, developed by Tietoevry. The objectives were to create a Python framework for channel estimation experimentation and to evaluate CNN's performance compared to the conventional algorithms Least Squares~(LS), Minimum Mean Square Error~(MMSE) and Linear Minimum Mean Square Error~(LMMSE). Two distinct channel model scenarios were investigated in this study.

    The results from the study suggest that CNN outperforms LMMSE, LS, and MMSE regarding Mean Squared Error~(MSE) for both channel models, with LMMSE at second place. It managed to lower to the MSE by 85\% compared to the LMMSE for the correlated channel and 78\% for the flat fading channel. In terms of the overall system-level performance, as measured by Bit-Error Rate (BER), the CNN only managed to outperform LS and MMSE. The CNN and the LMMSE yielded similar results. This was due to that the LMMSE's MSE was still good enough to demodulate the symbols for the QPSK modulation scheme correctly. 

    The insights in this thesis work enables Tietoevry to implement more machine learning algorithms and further develop channel estimation in 5G telecommunications and wireless communication networks through experiments in 5G-LLS. Given that the CNN did not increase the performance of the communication system, future studies should test a broader range of channel models and consider more complex modulation schemes. Also, studying other and more advanced machine learning techniques than CNN is an avenue for future research.

    Fulltekst (pdf)
    ChannelEstimationIn5GNR-davidadolfsson
    Fulltekst (pdf)
    Arkivfil
  • 21.
    Afifi, Haitham
    et al.
    Hasso Platter Institute, Germany.
    Ramaswamy, Arunselvan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Karl, Holger
    Hasso Platter Institute, Germany.
    Reinforcement learning for autonomous vehicle movements in wireless multimedia applications2023Inngår i: Pervasive and Mobile Computing, ISSN 1574-1192, E-ISSN 1873-1589, Vol. 92, artikkel-id 101799Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We develop a Deep Reinforcement Learning (DeepRL)-based, multi-agent algorithm to efficiently control autonomous vehicles that are typically used within the context of Wireless Sensor Networks (WSNs), in order to boost application performance. As an application example, we consider wireless acoustic sensor networks where a group of speakers move inside a room. In a traditional setup, microphones cannot move autonomously and are, e.g., located at fixed positions. We claim that autonomously moving microphones improve the application performance. To control these movements, we compare simple greedy heuristics against a DeepRL solution and show that the latter achieves best application performance. As the range of audio applications is broad and each has its own (subjective) per-formance metric, we replace those application metrics by two immediately observable ones: First, quality of information (QoI), which is used to measure the quality of sensed data (e.g., audio signal strength). Second, quality of service (QoS), which is used to measure the network's performance when forwarding data (e.g., delay). In this context, we propose two multi-agent solutions (where one agent controls one microphone) and show that they perform similarly to a single-agent solution (where one agent controls all microphones and has a global knowledge). Moreover, we show via simulations and theoretical analysis how other parameters such as the number of microphones and their speed impacts performance.

  • 22.
    Afzal, Samira
    et al.
    Alpen-Adria-Universität Klagenfurt, Austria.
    Ferlin-Reiter, SimoneKarlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). Red Hat Ab.Hoßfeld, TobiasUniversity of Würzburg, Germany.Schatz, RaimundAustrian Institute of Technology, Austria.Timmerer, ChristianAlpen-Adria-Universität Klagenfurt, Austria.
    GMSys '23: Proceedings of the First International Workshop on Green Multimedia Systems2023Konferanseproceedings (Fagfellevurdert)
  • 23.
    Afzal, Zeeshan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Life of a Security Middlebox: Challenges with Emerging Protocols and Technologies2020Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. These middleboxes make many assumptions about the traffic that may not hold true any longer with the advent of new protocols such as MPTCP and technologies like end-to-end encryption.

    The work in this thesis focuses on security middleboxes and the challenges they face. We develop methods and solutions to help these security middleboxes continue to function correctly. In particular, we investigate the case of using MPTCP over traditional security infrastructure as well as the case of end-to-end encryption. We study how practical it is to evade a security middlebox by fragmenting and sending traffic across multiple paths using MPTCP. We then go on to propose possible solutions to detect such attacks and implement them. The potential MPTCP scenario where security middleboxes only have access to part of the traffic is also investigated and addressed. Moreover, the thesis contributes a machine learning based approach to help security middleboxes detect malware in encrypted traffic without decryption.

    Fulltekst (pdf)
    fulltext
    Download (jpg)
    preview image
  • 24.
    Afzal, Zeeshan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Towards Secure Multipath TCP Communication2017Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The evolution in networking coupled with an increasing demand to improve user experience has led to different proposals to extend the standard TCP. Multipath TCP (MPTCP) is one such extension that has the potential to overcome few inherent limitations in the standard TCP. While MPTCP's design and deployment progresses, most of the focus has been on its compatibility. The security aspect is confined to making sure that the MPTCP protocol itself offers the same security level as the standard TCP.

    The topic of this thesis is to investigate the unexpected security implications raised by using MPTCP in the traditional networking environment. The Internet of today has security middle-boxes that perform traffic analysis to detect intrusions and attacks. Such middle-boxes make use of different assumptions about the traffic, e.g., traffic from a single connection always arrives along the same path. This along with many other assumptions may not be true anymore with the advent of MPTCP as traffic can be fragmented and sent over multiple paths simultaneously.

    We investigate how practical it is to evade a security middle-box by fragmenting and sending traffic across multiple paths using MPTCP. Realistic attack traffic is used to evaluate such attacks against Snort IDS to show that these attacks are feasible. We then go on to propose possible solutions to detect such attacks and implement them in an MPTCP proxy. The proxy aims to extend the MPTCP performance advantages to servers that only support standard TCP, while ensuring that intrusions can be detected as before. Finally, we investigate the potential MPTCP scenario where security middle-boxes only have access to some of the traffic. We propose and implement an algorithm to perform intrusion detection in such situations and achieve a nearly 90% detection accuracy. Another contribution of this work is a tool, that converts IDS rules into equivalent attack traffic to automate the evaluation of a middle-box.

    Fulltekst (pdf)
    fulltext
    Download (jpg)
    omslag
  • 25.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). KTH Royal Institute of Technology, Sweden.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). SINTEF Digital, Trondheim, NOR.
    Using Features of Encrypted Network Traffic to Detect Malware2021Inngår i: Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings / [ed] Mikael Asplund; Simin Nadjm-Tehrani, Springer Publishing Company, 2021Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Encryption on the Internet is as pervasive as ever. This hasprotected communications and enhanced the privacy of users. Unfortu-nately, at the same time malware is also increasingly using encryptionto hide its operation. The detection of such encrypted malware is cru-cial, but the traditional detection solutions assume access to payloaddata. To overcome this limitation, such solutions employ traffic decryp-tion strategies that have severe drawbacks. This paper studies the usageof encryption for malicious and benign purposes using large datasets andproposes a machine learning based solution to detect malware using con-nection and TLS metadata without any decryption. The classification isshown to be highly accurate with high precision and recall rates by usinga small number of features. Furthermore, we consider the deployment as-pects of the solution and discuss different strategies to reduce the falsepositive rate.

  • 26.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Garcia, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Partial Signature Matching in an MPTCP World using Insert-only Levenshtein DistanceManuskript (preprint) (Annet vitenskapelig)
  • 27.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Garcia, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications2018Inngår i: Proceedings of NTMS 2018 Conference and Workshop, New York: IEEE, 2018, s. 1-5Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.

    Fulltekst (pdf)
    fulltext
  • 28.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Garcia, Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Using Partial Signatures in Intrusion Detection for Multipath TCP2019Inngår i: Secure IT-systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings / [ed] Aslan Askarov, René Rydhof Hansen, Willard Rafnsson, Cham, Switzerland: Springer, 2019, s. 71-86Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Traditional security mechanisms such as signature basedintrusion detection systems (IDSs) attempt to find a perfect match of aset of signatures in network traffic. Such IDSs depend on the availabilityof a complete application data stream. With emerging protocols such asMultipath TCP (MPTCP), this precondition cannot be ensured, result-ing in false negatives and IDS evasion. On the other hand, if approximatesignature matching is used instead in an IDS, a potentially high numberof false positives make the detection impractical. In this paper, we showthat, by using a specially tailored partial signature matcher and knowl-edge about MPTCP semantics, the Snort3 IDS can be empowered withpartial signature detection. Additionally, we uncover the type of Snort3rules suitable for the task of partial matching. Experimental results withthese rules show a low false positive rate for benign traffic and highdetection coverage for attack traffic.

  • 29.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Automated Testing of IDS Rules2015Inngår i: Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, IEEE, 2015Konferansepaper (Fagfellevurdert)
    Abstract [en]

    As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts to exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) to detect and prevent the vulnerabilities. The rule sets have become so large that it seems infeasible to verify their precision or identify overlapping rules. This work proposes a methodology consisting of a set of tools that will make rule management easier.

  • 30.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    IDS rule management made easy2016Inngår i: Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on, IEEE, 2016Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.

  • 31.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Multipath TCP IDS Evasion and Mitigation2015Inngår i: Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings / [ed] Javier Lopez & Chris J. Mitchell, Springer, 2015, Vol. 9290, s. 265-282Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The existing network security infrastructure is not ready for future protocols such as Multipath TCP (MPTCP). The outcome is that middleboxes are configured to block such protocols. This paper studies the security risk that arises if future protocols are used over unaware infrastructures. In particular, the practicality and severity of cross-path fragmentation attacks utilizing MPTCP against the signature-matching capability of the Snort intrusion detection system (IDS) is investigated. Results reveal that the attack is realistic and opens the possibility to evade any signature-based IDS. To mitigate the attack, a solution is also proposed in the form of the MPTCP Linker tool. The work outlines the importance of MPTCP support in future network security middleboxes.

  • 32.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lidén, Anders
    Towards Multipath TCP Aware Security Technologies2016Inngår i: 2016 8th IFIP International Conference onNew Technologies, Mobility and Security (NTMS), New York: IEEE, 2016, s. 1-8Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.

  • 33.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Lindskog, Stefan
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013).
    Lidén, Anders
    A Multipath TCP Proxy2015Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Multipath TCP (MPTCP) is an extension to traditionalTCP that enables a number of performance advantages,which were not offered before. While the protocol specificationis close to being finalized, there still remain some concernsregarding deployability and security. This paper describes theon going work to develop a solution that will facilitate thedeployment of MPTCP. The solution will not only allow non-MPTCP capable end-hosts to benefit from MPTCP performancegains, but also help ease the network security concerns that manymiddleboxes face due to the possibility of data stream beingfragmented across multiple subflows.

  • 34.
    Afzal, Zeeshan
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Rossebø, Judith
    Integrated Operations, ABB AS, Norway.
    Chowdhury, Mohammad
    Talha, Batool
    ABB Corporate Research, ABB AS, Norway.
    A Wireless Intrusion Detection System for 802.11 networks2016Inngår i: PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), IEEE, 2016, s. 828-834Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Wireless local area networks (WLANs) deployment is increasing rapidly. At the same time, WLANs have become an attractive target for many potential attackers. In spite of that, the de facto standard used to implement most WLANs (IEEE 802.11) has what appear to be residual vulnerabilities related to identity spoofing. In this paper, a pragmatic study of two common attacks on the standard is conducted. These attacks are then implemented on test beds to learn attack behavior. Finally, novel attack signatures and techniques to detect these attacks are devised and implemented in a proof of concept Wireless Intrusion Detection System (WIDS).

  • 35.
    Agapi, Mesodiakaki
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Zola, Enrica
    UPC BarcelonaTECH, Barcelona Spain.
    Kassler, Andreas
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Joint User Association and Backhaul Routing for Green 5G Mesh Millimeter Wave Backhaul Networks2017Inngår i: Proceedings Of The 20Th Acm International Conference On Modelling, Analysis And Simulation Of Wireless And Mobile Systems, Association for Computing Machinery (ACM), 2017, s. 179-186Konferansepaper (Fagfellevurdert)
    Abstract [en]

    With the advance of fifth generation (5G) networks, network density needs to grow significantly in order to meet the required capacity demands. A massive deployment of small cells may lead to a high cost for providing. ber connectivity to each node. Consequently, many small cells are expected to be connected through wireless links to the umbrella eNodeB, leading to a mesh backhaul topology. This backhaul solution will most probably be composed of high capacity point-to-point links, typically operating in the millimeter wave (mmWave) frequency band due to its massive bandwidth availability. In this paper, we propose a mathematical model that jointly solves the user association and backhaul routing problem in the aforementioned context, aiming at the energy efficiency maximization of the network. Our study considers the energy consumption of both the access and backhaul links, while taking into account the capacity constraints of all the nodes as well as the fulfillment of the service-level agreements (SLAs). Due to the high complexity of the optimal solution, we also propose an energy efficient heuristic algorithm (Joint), which solves the discussed joint problem, while inducing low complexity in the system. We numerically evaluate the algorithm performance by comparing it not only with the optimal solution but also with reference approaches under different traffic load scenarios and backhaul parameters. Our results demonstrate that Joint outperforms the state-of-the-art, while being able to find good solutions, close to optimal, in short time.

  • 36.
    Ahlgren, Bengt
    et al.
    RISE.
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio2022Inngår i: ICN 2022 - Proceedings of the 2022 9th ACM Conference on Information-Centric Networking, Association for Computing Machinery (ACM), 2022Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Information-centric networks (ICNs) intrinsically support multipath transfer and thus have been seen as an exciting paradigm for IoT and edge computing, not least in the context of 5G mobile networks. One key to ICN’s success in these and other networks that have to support a diverse set of services over a heterogeneous network infrastructure is to schedule traffic over the available network paths efficiently. This paper presents and evaluates ZQTRTT, a multipath scheduling scheme for ICN that load balances bulk traffic over available network paths and schedules latency-sensitive, non-bulk traffic to reduce its transfer delay. A new metric called zero queueing time (ZQT) ratio estimates path load and is used to compute forwarding fractions for load balancing. In particular, the paper shows through a simulation campaign that ZQTRTT can accommodate the demands of both latency-sensitive and-insensitive traffic as well as evenly distribute traffic over available network paths. 

  • 37.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Arahamsson, Henrik
    RISE SICS.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Hurtig, Per
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Latency-aware Multipath Scheduling inInformation-centric Networks2019Inngår i: Proceedings of the Fifteenth Swedish National Computer Networking Workshop (SNCNW), Luleå, Sweden. 4-5 June 2019., 2019Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We present the latency-aware multipath schedulerZQTRTT that takes advantage of the multipath opportunities ininformation-centric networking. The goal of the scheduler is touse the (single) lowest latency path for transaction-oriented flows,and use multiple paths for bulk data flows. A new estimatorcalled zero queue time ratio is used for scheduling over multiplepaths. The objective is to distribute the flow over the paths sothat the zero queue time ratio is equal on the paths, that is,so that each path is ‘pushed’ equally hard by the flow withoutcreating unwanted queueing. We make an initial evaluation usingsimulation that shows that the scheduler meets our objectives.

  • 38.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Hurtig, Per
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    Abrahamsson, Henrik
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap.
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT.
    Are MIRCC and Rate-based Congestion Control in ICN READY for Variable Link Capacity?2017Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    Information-centric networking (ICN) has been introduced as a potential future networking architecture. ICN promises an architecture that makes information independent from lo- cation, application, storage, and transportation. Still, it is not without challenges. Notably, there are several outstanding issues regarding congestion control: Since ICN is more or less oblivious to the location of information, it opens up for a single application flow to have several sources, something which blurs the notion of transport flows, and makes it very difficult to employ traditional end-to-end congestion control schemes in these networks. Instead, ICN networks often make use of hop-by-hop congestion control schemes. How- ever, these schemes are also tainted with problems, e.g., several of the proposed ICN congestion controls assume fixed link capacities that are known beforehand. Since this seldom is the case, this paper evaluates the consequences in terms of latency, throughput, and link usage, variable link capacities have on a hop-by-hop congestion control scheme, such as the one employed by the Multipath-aware ICN Rate-based Congestion Control (MIRCC). The evaluation was carried out in the OMNeT++ simulator, and demonstrates how seemingly small variations in link capacity significantly deterio- rate both latency and throughput, and often result in inefficient network link usage. 

    Fulltekst (pdf)
    fulltext
  • 39.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Hurtig, Per
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Abrahamsson, Henrik
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    ICN Congestion Control for Wireless Links2018Inngår i: IEEE WCNC 2018 Conference Proceedings / [ed] IEEE, New York: IEEE, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Information-centric networking (ICN) with its design around named-based forwarding and in-network caching holds great promises to become a key architecture for the future Internet. Still, despite its attractiveness, there are many open questions that need to be answered before wireless ICN becomes a reality, not least about its congestion control: Many of the proposed hop-by-hop congestion control schemes assume a fixed and known link capacity, something that rarely – if ever – holds true for wireless links. As a first step, this paper demonstrates that although these congestion control schemes are able to fairly well utilise the available wireless link capacity, they greatly fail to keep the link delay down. In fact, they essentially offer the same link delay as in the case with no hop-by-hop, only end- to-end, congestion control. Secondly, the paper shows that by complementing these congestion control schemes with an easy- to-implement, packet-train link estimator, we reduce the link delay to a level significantly lower than what is obtained with only end-to-end congestion control, while still being able to keep the link utilisation at a high level. 

  • 40.
    Ahmad, Iftikhar
    et al.
    University of Engineering & Technology Peshawar, PAK.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). University of Oulu, FIN.
    Alqarni, Mohammed A
    University of Jeddah, SAU.
    Almazroi, Abdulwahab Ali
    University of Jeddah, SAU.
    Khalil, Muhammad Imran
    University of Engineering & Technology Peshawar, PAK.
    Using algorithmic trading to analyze short term profitability of Bitcoin2021Inngår i: PeerJ Computer Science, E-ISSN 2376-5992, Vol. 7, artikkel-id e337Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Cryptocurrencies such as Bitcoin (BTC) have seen a surge in value in the recent past and appeared as a useful investment opportunity for traders. However, their short term profitability using algorithmic trading strategies remains unanswered. In this work, we focus on the short term profitability of BTC against the euro and the yen for an eight-year period using seven trading algorithms over trading periods of length 15 and 30 days. We use the classical buy and hold (BH) as a benchmark strategy. Rather surprisingly, we found that on average, the yen is more profitable than BTC and the euro; however the answer also depends on the choice of algorithm. Reservation price algorithms result in 7.5% and 10% of average returns over 15 and 30 days respectively which is the highest for all the algorithms for the three assets. For BTC, all algorithms outperform the BH strategy. We also analyze the effect of transaction fee on the profitability of algorithms for BTC and observe that for trading period of length 15 no trading strategy is profitable for BTC. For trading period of length 30, only two strategies are profitable. 

  • 41.
    Ahmad, Iftikhar
    et al.
    University of Engineering and Technology, PAK.
    Hamid, Muhammad
    University of Engineering and Technology, PAK.
    Yousaf, Suhail
    University of Engineering and Technology, PAK.
    Tanveer Shah, Syed
    The University of Agriculture, PAK.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Optimizing Pretrained Convolutional Neural Networks for Tomato Leaf Disease Detection2020Inngår i: Complexity, ISSN 1076-2787, E-ISSN 1099-0526, Vol. 2020, artikkel-id 8812019Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Vegetable and fruit plants facilitate around 7.5 billion people around the globe, playing a crucial role in sustaining life on the planet. The rapid increase in the use of chemicals such as fungicides and bactericides to curtail plant diseases is causing negative effects on the agro-ecosystem. The high scale prevalence of diseases in crops affects the production quantity and quality. Solving the problem of early identification/diagnosis of diseases by exploiting a quick and consistent reliable method will benefit the farmers. In this context, our research work focuses on classification and identification of tomato leaf diseases using convolutional neural network (CNN) techniques. We consider four CNN architectures, namely, VGG-16, VGG-19, ResNet, and Inception V3, and use feature extraction and parameter-tuning to identify and classify tomato leaf diseases. We test the underlying models on two datasets, a laboratory-based dataset and self-collected data from the field. We observe that all architectures perform better on the laboratory-based dataset than on field-based data, with performance on various metrics showing variance in the range 10%–15%. Inception V3 is identified as the best performing algorithm on both datasets.

  • 42.
    Ahmad, Iftikhar
    et al.
    Univ Engn & Technol, PAK.
    Yousaf, Muhammad
    Univ Engn & Technol, PAK.
    Yousaf, Suhail
    Univ Engn & Technol, PAK.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Fake News Detection Using Machine Learning Ensemble Methods2020Inngår i: Complexity, ISSN 1076-2787, E-ISSN 1099-0526, Vol. 2020, artikkel-id 8885861Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The advent of the World Wide Web and the rapid adoption of social media platforms (such as Facebook and Twitter) paved the way for information dissemination that has never been witnessed in the human history before. With the current usage of social media platforms, consumers are creating and sharing more information than ever before, some of which are misleading with no relevance to reality. Automated classification of a text article as misinformation or disinformation is a challenging task. Even an expert in a particular domain has to explore multiple aspects before giving a verdict on the truthfulness of an article. In this work, we propose to use machine learning ensemble approach for automated classification of news articles. Our study explores different textual properties that can be used to distinguish fake contents from real. By using those properties, we train a combination of different machine learning algorithms using various ensemble methods and evaluate their performance on 4 real world datasets. Experimental evaluation confirms the superior performance of our proposed ensemble learner approach in comparison to individual learners.

    Fulltekst (pdf)
    fulltext
  • 43.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Agile methods and cyber-physical systems development: A review with preliminary analysis2019Inngår i: Big Data and Security / [ed] Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan, Springer, 2019, Vol. 1210, s. 274-285Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The software companies are using Agile methods and practices totackle challenges in the rapidly changing environments and increasingly com-plex software systems. However, companies developing cyber physical systems(CPS) are still infancy in the use of Agile methods and hesitate to adopt. Thissystematic literature review was conducted in order to analyze the current trendsof Agile methods use for CPS development. The search strategy resulted in 101papers, of which 15 were identified as primary studies relevant to our research.The results show growing trend of Agile processes and Scrum is widely usedreported for CPS development. The primary studies also exhibits a growinginterest in teaching Agile in embedded systems, CPS and other engineeringdegree programs. The reported challenges included synchronization of softwareand hardware development, software and hardware developers use differentvocabulary, lack of visibility and track of software releases and project progress.Additionally, lesson learned were extracted from the primary studies for guidingthe practitioners interested in adopting Agile for CPS development.

  • 44.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Antecedents To Achieve Kanban Optimum Benefits In Software Companies2019Inngår i: 14th International Conference on Software Engineering Advances, International Academy, Research and Industry Association (IARIA), 2019, s. 147-183Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In 2004, Kanban successfully entered the Agile and Lean realm. Since then, software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from the Lean Software Development LinkedIn community to investigate the importance of antecedents of using Kanban for achieving optimum benefits. Our study reveals that subjective norm, organizational support, ease of use, Kanban use experience and training are the antecedents for achieving expected benefits of Kanban. The potential benefits of Kanban use can only be realized when the key antecedents are not only identified, but also infused across an organization. When managing the transition to or using Kanban, practitioners need to adapt their strategies on the extent of various antecedents, a few identified in this study.

  • 45.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Business Analytics Continuance in Software Development Projects: A Preliminary Analysis2021Inngår i: Conference on e-Business, e-Services and e-Society, Springer, 2021, Vol. 12896, s. 622-628Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper investigates factors affecting business analytics (BA) in software and systems development projects. This is the first study to examine business analytics continuance in projects from Pakistani software professional’s perspective. The data was collected from 186 Pakistani software professionals working in software and systems development projects. The data was analyzed using partial least squares structural equation modelling techniques. Our structural model is able to explain 40% variance of BA continuance intention, 62% variance of satisfaction, 69% variance of technological compatibility, and 59% variance of perceived usefulness. Technological compatibility and perceived usefulness are the significant factors that can affect BA continuance intention in software and systems projects. Surprisingly the results show that satisfaction does not affect BA continuance intention. 

  • 46.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    On the Efficiency of Supernodal Factorization in Interior-Point Method Using CPU-GPU Collaboration2020Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 8, s. 120892-120904Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Primal-dual interior-point method (PDIPM) is the most efficient technique for solving sparse linear programming (LP) problems. Despite its efficiency, PDIPM remains a compute-intensive algorithm. Fortunately, graphics processing units (GPUs) have the potential to meet this requirement. However, their peculiar architecture entails a positive relationship between problem density and speedup, conversely implying a limited affinity of GPUs for problem sparsity. To overcome this difficulty, the state-of-the-art hybrid (CPU-GPU) implementation of PDIPM exploits presence of supernodes in sparse matrices during factorization. Supernodes are groups of similar columns that can be treated as dense submatrices. Factorization method used in the state-of-the-art solver performs only selected operations related to large supernodes on GPU. This method is known to underutilize GPU’s computational power while increasing CPU-GPU communication overhead. These shortcomings encouraged us to adapt another factorization method, which processes sets of related supernodes on GPU, and introduce it to the PDIPM implementation of a popular open-source solver. Our adaptation enabled the factorization method to better mitigate the effects of round-off errors accumulated over multiple iterations of PDIPM. To augment performance gains, we also used an efficient CPU-based matrix multiplication method. When tested for a set of well-known sparse problems, the adapted solver showed average speed-ups of approximately 55X, 1.14X and 1.05X over the open-source solver’s original version, the state-of-the-art solver, and a highly optimized proprietary solver known as CPLEX, respectively. These results strongly indicate that our proposed hybrid approach can lead to significant performance gains for solving large sparse problems.

  • 47.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)2019Inngår i: Annals of Computer Science and Information Systems, ISSN 1545-827X, E-ISSN 2300-5963, Vol. 18, s. 803-812Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP conference cover nearly 40% of papers published until now and almost 62% of the XP papers are cited at least once. Mining of XP conference paper titles and abstracts result in these hot research topics: “Coordination”, “Technical Debt”, “Teamwork”, “Startups” and “Agile Practices”, thus strongly focusing on practical issues. The results also highlight the most influential researchers and institutions. The approach applied in this study can be extended to other software engineering venues and applied to large-scale studies.

  • 48.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Psychological Safety, Leadership and Non-Technical Debt in Large Scale Agile Software Development2023Inngår i: Proceedings of the 18th Conference on Computer Science and Intelligence Systems, FedCSIS 2023, Poland: Institute of Electrical and Electronics Engineers (IEEE), 2023, s. 327-334Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Psychological safety has been hypothesised as an important antecedent of the success of agile software development (ASD) teams. However, there is a lack of investigation on psychological safety in large-scale agile (LSA) software development teams. This study explored the antecedents and effects of psychological safety on LSA teams. We conducted semi-structured interviews with software professionals working on LSA project in a Scandinavian technology company. The results suggest that building a psychologically safe environment is a multi-dimensional factor that requires proactive leadership approach, open communication and constructive feedback. The focus should be on designing teams for learning, remuneration safety, and a well-prepared onboarding process for new team members. A psychologically safe environment contributes to effective teamwork, work satisfaction, and promotion of learning. Absence of such an environment leads to brain drain, highlighting the consequences of neglecting this essential aspect of organisational culture. Future research directions are proposed in this paper.

  • 49.
    Ahmad, Muhammad Ovais
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Software factory project for enhancement of student experiential learning2019Inngår i: 16th International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2019, IADIS Press, 2019, s. 297-306Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience, the University of Oulu, Finland offers the software factory (SWF) project. This paper presents the design of the SWF course and the learning environment and assessment techniques, and it discusses the importance of reflective learning diaries and serious games. Additionally, this paper examines factors in the SWF learning environment that affect student learning in the SWF course. Survey data were collected from the last six years of SWF projects. The results show that students consider the SWF to be a good collaborative learning environment that helps them achieve academic triumphs and enhances various professional skills. The learning diaries are effective for increasing students’ learning experiences as well as providing an opportunity for teaching staff to monitor students’ progress and offer better facilitation. These results are helpful for academic institutions and industry when developing such a learning environment.

  • 50.
    Ahmad, Muhammad Ovais
    et al.
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Ahmad, Iftikhar
    University of Engineering and Technology, Pakistan.
    Qayum, Fawad
    University of Malakand, Pakistan.
    Early career software developers and work preferences in software engineering2024Inngår i: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, Vol. 36, nr 2, artikkel-id e2513Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Context: The software engineering researchers and practitioners echoed the needfor investigations to better understand the engineers developing software andservices. In light of current studies, there are significant associations between thepersonalities of software engineers and their work preferences. However, limitedstudies are using psychometric measurements in software engineering.Objective: We aim to evaluate attitudes of early-stage software engineers andinvestigate link between their personalities and work preferences.Method: We collected extensive psychometric data from 303 graduate-levelstudents in Computer Science programs at four Pakistani and one Swedish universityusing Five-Factor Model. The statistical analysis investigated associations betweenvarious personality traits and work preferences.Results: The data support the existence of two clusters of software engineers, one ofwhich is more highly rated across the board. Numerous correlations exist betweenpersonality qualities and the preferred types of employment for software developers.For instance, those who exhibit greater levels of emotional stability, agreeableness,extroversion, and conscientiousness like working on technical activities on a settimetable. Similar relationships between personalities and occupational choices arealso evident in the earlier studies. More neuroticism is reported in femalerespondents than in male respondents. Higher intelligence was demonstrated bythose who worked on the“entire development process”and“technical componentsof the project.”Conclusion: When assigning project tasks to software engineers, managers might usethe statistically significant relationships that emerged from the analysis of personalityattributes. It would be beneficial to construct effective teams by taking personalityfactors like extraversion and agreeableness into consideration. The study techniquesand analytical tools we use may identify subtle relationships and reflect distinctionsacross various groups and populations, making them valuable resources for bothfuture academic research and industrial practice.

1234567 1 - 50 of 1658
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf