Malmö University Publications
Change search
Refine search result
123456 1 - 50 of 267
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abid, Muhammad Adil
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Amouzad Mahdiraji, Saeid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Department of Health Care Management, Region Skåne, 21428 Malmö, Sweden; Department of Neurology, Lund University, 22242 Malmö, Sweden.
    A Genetic Algorithm for Optimizing Mobile Stroke Unit Deployment2023In: Procedia Computer Science, ISSN 1877-0509, Vol. 225, p. 3536-3545Article in journal (Refereed)
    Abstract [en]

    A mobile stroke unit (MSU) is an advanced ambulance equipped with specialized technology and trained healthcare personnel to provide on-site diagnosis and treatment for stroke patients. Providing efficient access to healthcare (in a viable way) requires optimizing the placement of MSUs. In this study, we propose a time-efficient method based on a genetic algorithm (GA) to find the most suitable ambulance sites for the placement of MSUs (given the number of MSUs and a set of potential sites). We designed an efficient encoding scheme for the input data (the number of MSUs and potential sites) and developed custom selection, crossover, and mutation operators that are tailored according to the characteristics of the MSU allocation problem. We present a case study on the Southern Healthcare Region in Sweden to demonstrate the generality and robustness of our proposed GA method. Particularly, we demonstrate our method's flexibility and adaptability through a series of experiments across multiple settings. For the considered scenario, our proposed method outperforms the exhaustive search method by finding the best locations within 0.16, 1.44, and 10.09 minutes in the deployment of three MSUs, four MSUs, and five MSUs, resulting in 8.75x, 16.36x, and 24.77x faster performance, respectively. Furthermore, we validate the method's robustness by iterating GA multiple times and reporting its average fitness score (performance convergence). In addition, we show the effectiveness of our method by evaluating key hyperparameters, that is, population size, mutation rate, and the number of generations.

    Download full text (pdf)
    fulltext
  • 2.
    Abid, Muhammad Adil
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Department of Health Care Management, Region Skåne, 21428 Malmö, Sweden; Department of Neurology, Lund University, 22242 Malmö, Sweden.
    Ambulance Travel Time Estimation using Spatiotemporal Data2024In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 238, p. 265-272Article in journal (Refereed)
    Abstract [en]

    Ambulance travel time estimations play a pivotal role in ensuring timely and efficient emergency medical care by predicting the duration for an ambulance to reach a specific location. Overlooking factors such as local traffic situations, day of the week, hour of the day, or the weather may create a risk of inaccurately estimating the ambulance travel times, which might lead to delayed emergency response times, potentially impacting patient outcomes. In the current paper, we propose a novel framework for accurately estimating ambulance travel times using machine learning paradigms, employing real-world spatiotemporal ambulance data from the Skane region, Sweden. Our framework includes data preprocessing and feature engineering, with a focus on variables significantly correlated with travel time. First, through a comprehensive exploratory data analysis, we highlight the main characteristics, patterns, and underlying trends of the considered ambulance data set. Then, we present an extensive empirical analysis comparing the performance of different machine learning models across different ambulance travel trip scenarios and feature sets, revealing insights into the importance of each feature in improving the estimation accuracy. Our experiments indicate that the aforementioned factors play a significant role when estimating the travel time.

    Download full text (pdf)
    fulltext
  • 3.
    Adewole, Kayode Sakariyah
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Jacobsson, Andreas
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    HOMEFUS: A Privacy and Security-Aware Model for IoT Data Fusion in Smart Connected Homes2024In: Proceedings of the 9th International Conference on Internet of Things, Big Data and Security IoTBDS: Volume 1, SciTePress, 2024, p. 133-140Conference paper (Refereed)
    Abstract [en]

    The benefit associated with the deployment of Internet of Things (IoT) technology is increasing daily. IoT has revolutionized our ways of life, especially when we consider its applications in smart connected homes. Smart devices at home enable the collection of data from multiple sensors for a range of applications and services. Nevertheless, the security and privacy issues associated with aggregating multiple sensors’ data in smart connected homes have not yet been sufficiently prioritized. Along this development, this paper proposes HOMEFUS, a privacy and security-aware model that leverages information theoretic correlation analysis and gradient boosting to fuse multiple sensors’ data at the edge nodes of smart connected homes. HOMEFUS employs federated learning, edge and cloud computing to reduce privacy leakage of sensitive data. To demonstrate its applicability, we show that the proposed model meets the requirements for efficient data fusion pipelines. The model guides practitio ners and researchers on how to setup secure smart connected homes that comply with privacy laws, regulations, and standards. 

    Download full text (pdf)
    fulltext
  • 4.
    Adewole, Kayode Sakariyah
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Jacobsson, Andreas
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    LPM: A Lightweight Privacy-Aware Model for IoT Data Fusion in Smart Connected Homes2024Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) technology has created a new dimension for data collection, transmission, processing, storage, and service delivery. With the advantages offered by IoT technologies, interest in smart home automation has increased over the years. Nevertheless, smart connected homes are characterized with the security and privacy problems that are associated with aggregating multiple sensors' data and exposing them to the Internet. In this paper, we propose LPM, a lightweight privacy-aware model that leverages information theoretic correlation analysis and gradient boosting to fuse multiple sensors' data at the edge nodes of smart connected homes. LPM employs federated learning, edge and cloud computing to reduce privacy leakages of sensitive data. To demonstrate its applicability, two services, commonly provided by smart homes, i.e., occupancy detection and people count estimation, were experimentally investigated. The results show that LPM can achieve accuracy, F1 score and AUC-ROC of 99.98%, 99.13%, and 99.98% respectively for occupancy detection as well as Mean Squared Error (MSE), Mean Absolute Error (MAE), and R2 of 0.0011,0.0175, and 98.39% respectively for people count estimation. LPM offers the opportunity to each smart connected home to participate in collaborative learning that is achieved through the federated machine learning component of the proposed model.

  • 5.
    Akin, Erdal
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Computer Engineering Department, Bitlis Eren University, Bitlis, Türkiye.
    Deep Reinforcement Learning-Based Multirestricted Dynamic-Request Transportation Framework2023In: IEEE Transactions on Neural Networks and Learning Systems, ISSN 2162-237X, E-ISSN 2162-2388, p. 1-11Article in journal (Refereed)
    Abstract [en]

    Unmanned aerial vehicles (UAVs) are used in many areas where their usage is increasing constantly. Their popularity, therefore, maintains its importance in the technology world. Parallel to the development of technology, human standards, and surroundings should also improve equally. This study is developed based on the possibility of timely delivery of urgent medical requests in emergency situations. Using UAVs for delivering urgent medical requests will be very effective due to their flexible maneuverability and low costs. However, off-the-shelf UAVs suffer from limited payload capacity and battery constraints. In addition, urgent requests may be requested at an uncertain time, and delivering in a short time may be crucial. To address this issue, we proposed a novel framework that considers the limitations of the UAVs and dynamically requested packages. These previously unknown packages have source–destination pairs and delivery time intervals. Furthermore, we utilize deep reinforcement learning (DRL) algorithms, deep Q-network (DQN), proximal policy optimization (PPO), and advantage actor–critic (A2C) to overcome this unknown environment and requests. The comprehensive experimental results demonstrate that the PPO algorithm has a faster and more stable training performance than the other DRL algorithms in two different environmental setups. Also, we implemented an extension version of a Brute-force (BF) algorithm, assuming that all requests and environments are known in advance. The PPO algorithm performs very close to the success rate of the BF algorithm.

  • 6.
    Akin, Erdal
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Computer Engineering Department, Bitlis Eren University, Bitlis, Turkiye.
    Caltenco, Héctor
    Ericsson AB, Ericsson Research, Lund, Sweden.
    Adewole, Kayode Sakariyah
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Persson, Jan A.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Segment Anything Model (SAM) Meets Object Detected Box Prompts2024In: 2024 IEEE International Conference on Industrial Technology (ICIT), Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper (Refereed)
    Abstract [en]

    Segmenting images is an intricate and exceptionally demanding field within computer vision. Instance Segmentation is one of the subfields of image segmentation that segments objects on a given image or video. It categorizes the class labels according to individual instances, ensuring that distinct instance markers are assigned to each occurrence of the same object class, even if multiple instances exist. With the development of computer systems, segmentation studies have increased very rapidly. One of the state-of-the-art algorithms recently published by Meta AI, which segments everything on a given image, is called the Segment Anything Model (SAM). Its impressive zero-shot performance encourages us to use it for diverse tasks. Therefore, we would like to leverage the SAM for an effective instance segmentation model. Accordingly, in this paper, we propose a hybrid instance segmentation method in which Object Detection algorithms extract bounding boxes of detected objects and load SAM to produce segmentation, called Box Prompted SAM (BP-SAM). Experimental evaluation of the COCO2017 Validation dataset provided us with promising performance.

  • 7.
    Aladwan, Mohammad N.
    et al.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Awaysheh, Feras M.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Alawadi, Sadi
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alazab, Mamoun
    Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia..
    Pena, Tomas F.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    Cabaleiro, Jose C.
    Univ Santiago de Compostela, Ctr Singular Invest Tecnoloxias Intelixentes, Santiago De Compostela 15782, Spain..
    TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud2020In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 16, no 9, p. 6203-6213Article in journal (Refereed)
    Abstract [en]

    The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is expected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To assess and evaluate these security features, our evaluation framework consists of three main interconnected components: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the average performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a secure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of security by design, emphasizing multiple layers of security when implementing industrial VCs.

  • 8.
    Alassadi, Abdulrahman
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Agent-based Model for Simulating Travel Patterns of Stroke Patients2021In: DIGITAL 2021: Advances on Societal Digital Transformation / [ed] Wanwan Li; Manuela Popescu, ThinkMind , 2021, p. 11-16Conference paper (Refereed)
    Abstract [en]

    For patients suffering from a stroke, the time until the start of the treatment is a crucial factor with respect to the recovery from this condition. In rural regions, transporting the patient to an adequate hospital typically delays the diagnosis and treatment of a stroke, worsening its prognosis. To reduce the time to treatment, different policies can be applied. This includes, for instance, the use of Mobile Stroke Units (MSUs), which are specialized ambulances that can provide adequate care closer to where the stroke occurred. To simulate and assess different stroke logistics policies, such as the use of MSUs, a major challenge is the realistic modeling of the patients. In this article, we present an approach for generating an artificial population of stroke patients to simulate when and where strokes occur. We apply the model to the region of Skåne, where we investigated the relevance of travel behavior on the spatial distribution of stroke patients.

    Download full text (pdf)
    fulltext
  • 9.
    Alassadi, Abdulrahman
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Population Generation for Agent-based Simulations of Stroke Logistics Policies: A Case Study of Stroke Patient Mobility2022In: International Journal on Advances in Life Sciences, E-ISSN 1942-2660, Vol. 14, no 1&2, p. 12-21Article in journal (Refereed)
    Abstract [en]

    For acute medical conditions, for instance strokes, the time until the start of the treatment is a crucial factor to prevent a fatal outcome and to facilitate the recovery of the patient’s health. Hence, the planning and optimization of patient logistics is of high importance to ensure prompt access to healthcare facilities in case of medical emergencies. Computer simulation can be used to investigate the effects of different stroke logistics policies under realistic conditions without jeopardizing the health of the patients. The success of such policies greatly depends on the behavior of the individuals. Hence, agent-based simulation is particularly well-suited as it imitates human behavior and decision-making by means of artificial intelligence, which allows for investigating the effects of policies under different conditions. Agent-based simulation requires the generation of a realistic synthetic population, that adequately represents the population that shall be investigated such that reliable conclusions can be drawn from the simulation results. In this article, we propose a process for generating an artificial population of potential stroke patients that can be used to investigate the effects of stroke logistics policies using agent-based simulation. To illustrate how this process can be applied, we present the results from a case study in the region of Skåne in southern Sweden, where a synthetic population of stroke patients with realistic mobility behavior is simulated. 

    Download full text (pdf)
    fulltext
  • 10.
    Alawadi, Sadi
    et al.
    Blekinge Inst Technol, Dept Comp Sci, S-37179 Karlskrona, Sweden; Univ Santiago de Compostela, Comp Graph & Data Engn COGRADE Res Grp, Santiago De Compostela 15705, Spain.
    Alkharabsheh, Khalid
    Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Software Engn Dept, As Salt 19117, Jordan.
    Alkhabbas, Fahed
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Kebande, Victor R.
    Blekinge Inst Technol, Dept Comp Sci, S-37179 Karlskrona, Sweden.
    Awaysheh, Feras M.
    Univ Tartu, Inst Comp Sci, Delta Res Ctr, EE-51009 Tartu, Estonia.
    Palomba, Fabio
    Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy.
    Awad, Mohammed
    Arab Amer Univ, Dept Comp Syst Engn, Jenin 00970, Palestine.
    FedCSD: A Federated Learning Based Approach for Code-Smell Detection2024In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 44888-44904Article in journal (Refereed)
    Abstract [en]

    Software quality is critical, as low quality, or "Code smell," increases technical debt and maintenance costs. There is a timely need for a collaborative model that detects and manages code smells by learning from diverse and distributed data sources while respecting privacy and providing a scalable solution for continuously integrating new patterns and practices in code quality management. However, the current literature is still missing such capabilities. This paper addresses the previous challenges by proposing a Federated Learning Code Smell Detection (FedCSD) approach, specifically targeting "God Class," to enable organizations to train distributed ML models while safeguarding data privacy collaboratively. We conduct experiments using manually validated datasets to detect and analyze code smell scenarios to validate our approach. Experiment 1, a centralized training experiment, revealed varying accuracies across datasets, with dataset two achieving the lowest accuracy (92.30%) and datasets one and three achieving the highest (98.90% and 99.5%, respectively). Experiment 2, focusing on cross-evaluation, showed a significant drop in accuracy (lowest: 63.80%) when fewer smells were present in the training dataset, reflecting technical debt. Experiment 3 involved splitting the dataset across 10 companies, resulting in a global model accuracy of 98.34%, comparable to the centralized model's highest accuracy. The application of federated ML techniques demonstrates promising performance improvements in code-smell detection, benefiting both software developers and researchers.

    Download full text (pdf)
    fulltext
  • 11.
    Alawadi, Sadi
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Mera, David
    Centro Singular de Investigación en Tecnoloxías da Información (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, Spain.
    Fernandez-Delgado, Manuel
    Centro Singular de Investigación en Tecnoloxías da Información (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, Spain.
    Alkhabbas, Fahed
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Olsson, Carl Magnus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A comparison of machine learning algorithms for forecasting indoor temperature in smart buildings2020In: Energy Systems, Springer Verlag, ISSN 1868-3967, E-ISSN 1868-3975, Vol. 13, p. 689-705Article in journal (Refereed)
    Abstract [en]

    The international community has largely recognized that the Earth's climate is changing. Mitigating its global effects requires international actions. The European Union (EU) is leading several initiatives focused on reducing the problems. Specifically, the Climate Action tries to both decrease EU greenhouse gas emissions and improve energy efficiency by reducing the amount of primary energy consumed, and it has pointed to the development of efficient building energy management systems as key. In traditional buildings, households are responsible for continuously monitoring and controlling the installed Heating, Ventilation, and Air Conditioning (HVAC) system. Unnecessary energy consumption might occur due to, for example, forgetting devices turned on, which overwhelms users due to the need to tune the devices manually. Nowadays, smart buildings are automating this process by automatically tuning HVAC systems according to user preferences in order to improve user satisfaction and optimize energy consumption. Towards achieving this goal, in this paper, we compare 36 Machine Learning algorithms that could be used to forecast indoor temperature in a smart building. More specifically, we run experiments using real data to compare their accuracy in terms of R-coefficient and Root Mean Squared Error and their performance in terms of Friedman rank. The results reveal that the ExtraTrees regressor has obtained the highest average accuracy (0.97%) and performance (0,058%) over all horizons.

    Download full text (pdf)
    fulltext
  • 12.
    Al-Dhaqm, Arafat
    et al.
    Aden Community Coll, Dept Comp Sci, Aden, Yemen; Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, Skudai 81310, Malaysia.
    Razak, Shukor Abd
    Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, Skudai 81310, Malaysia.
    Ikuesan, Richard Adeyemi
    Community Coll Qatar, Sch Informat Technol, Dept Cyber & Networking Secur, Sci & Technol Div, Doha, Qatar.
    Kebande, Victor R.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Siddique, Kamran
    Xiamen Univ Malaysia, Informat & Commun Technol Dept, Sch Elect & Comp Engn, Kuala Lumpur 43900, Malaysia.
    A Review of Mobile Forensic Investigation Process Models2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 173359-173375Article, review/survey (Refereed)
    Abstract [en]

    Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the need for new requirements have led to the development of the MF field, which has in the recent past become an area of importance. In this article, the authors take a step to conduct a review on Mobile Forensics Investigation Process Models (MFIPMs) as a step towards uncovering the MF transitions as well as identifying open and future challenges. Based on the study conducted in this article, a review of the literature revealed that there are a few MFIPMs that are designed for solving certain mobile scenarios, with a variety of concepts, investigation processes, activities, and tasks. A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs. Also, this study proposes a Harmonized Mobile Forensic Investigation Process Model (HMFIPM) for the MF field to unify and structure whole redundant investigation processes of the MF field. The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint. The results of this study find direct relevance to forensic practitioners and researchers who could leverage the comprehensiveness of the developed processes for investigation.

    Download full text (pdf)
    fulltext
  • 13.
    Al-Dhaqm, Arafat
    et al.
    Faculty of Engineering, School of Computing, Computer Science Department, Universiti Teknologi Malaysia (UTM), Skudai 81310, Johor, Malaysia; Computer Science Department, Aden Community College, Aden 999101, Yemen.
    Razak, Shukor
    Faculty of Engineering, School of Computing, Computer Science Department, Universiti Teknologi Malaysia (UTM), Skudai 81310, Johor, Malaysia.
    Ikuesan, Richard
    Department of Cybersecurity and Networking, School of Information Technology, Community College Qatar, Doha 7344, Qatar.
    Kebande, Victor R.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Luleå University of Technology.
    Othman, Siti
    Faculty of Engineering, School of Computing, Computer Science Department, Universiti Teknologi Malaysia (UTM), Skudai 81310, Johor, Malaysia.
    Face Validation of Database Forensic Investigation Metamodel2021In: Infrastructues, ISSN 2412-3811, Vol. 6, no 2, p. 1-20, article id 13Article in journal (Other academic)
    Abstract [en]

    Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where severalmodels were identified, collected, and reviewed to develop DBFIM. However, the developedDBFIM lacked the face validity-based approach that could ensure DBFIM’s applicability in the DBFIfield. The completeness, usefulness, and logic of the developed DBFIM needed to be validated byexperts. Therefore, the objective of this paper is to perform the validation of the developed DBFIMusing the qualitative face validity approach. The face validity method is a common way of validating metamodels through subject expert inquiry on the domain application of the metamodel to assess whether the metamodel is reasonable and compatible based on the outcomes. For this purpose,six experts were nominated and selected to validate the developed DBFIM. From the expert review,the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field. 

    Download full text (pdf)
    fulltext
  • 14.
    Alkhabbas, Fahed
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    An Approach to Engineer and Realize Emergent Configurations in the Internet of Things2018In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ACM Digital Library, 2018, p. 448-449Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is a fast propagating technology that is expected to emerge in almost all aspects of our daily life. The IoT environment is well known for being dynamic and uncertain. Connected devices, and their software, can be discovered at runtime and might also become suddenly unavailable. The involvement of the human in the loop complicates more the scene. People's activities are stochastic and their needs are not always predictable. Therefore, coping with the dynamic IoT environment should be considered as a first class requirement when engineering IoT systems. A useful concept for supporting this effort is Emergent Configurations (ECs). An EC consists of a dynamic set of devices that cooperate temporarily to achieve a user goal. This PhD work aims to use the concept of ECs as a basis for a novel approach for realizing IoT systems. More specifically, this thesis aims at: (i) producing characterization models for IoT systems and ECs; (ii) proposing a concrete architecture and an approach for realizing ECs.

    Download full text (pdf)
    FULLTEXT01
  • 15.
    Alkhabbas, Fahed
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Realizing Emergent Configurations in the Internet of Things2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is a fast-spreading technology that enables new types of services in several domains such as transportation, health, and building automation. To exploit the potential of the IoT effectively, several challenges have to be tackled, including the following ones that we study in this thesis. First, the proposed IoT visions provide a fragmented picture, leading to a lack of consensus about IoT systems and their constituents. To piece together the fragmented picture of IoT systems, we systematically identified their characteristics by analyzing existing taxonomies. More specifically, we identified seventeen characteristics of IoT systems, and grouped them into two categories, namely, elements and quality aspects of IoT systems. Moreover, we conducted a survey to identify the factors that drive the deployment decisions of IoT systems in practice. A second set of challenges concerns the environment of IoT systems that is often dynamic and uncertain. For instance, due to the mobility of users and things, the set of things available in users' environment might change suddenly. Similarly, the status of IoT systems’ deployment topologies (i.e., the deployment nodes and their interconnections) might change abruptly. Moreover, environmental conditions monitored and controlled through IoT devices, such as ambient temperature and oxygen levels, might fluctuate suddenly. The majority of existing approaches to engineer IoT systems rely on predefined processes to achieve users’ goals. Consequently, such systems have significant shortcomings in coping with dynamic and uncertain environments. To address these challenges, we used the concept of Emergent Configurations (ECs) to engineer goal-driven IoT systems. An EC is an IoT system that consists of a dynamic set of things that cooperate temporarily to achieve a user goal. To realize ECs, we proposed an abstract architectural approach, comprising an architecture and processes, as well as six novel approaches that refine the abstract approach. The developed approaches support users to achieve their goals seamlessly in arbitrary environments by enabling the dynamic formation, deployment, enactment, and self-adaptation of IoT systems. The approaches exploit different techniques and focus on different aspects of ECs. Moreover, to better support users in dynamic and uncertain environments, we investigated the automated configuration of those environments based on users' preferences. 

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 16.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alawadi, Sadi
    School of Information Technology, Halmstad University, Halmstad, Sweden.
    Ayyad, Majed
    Birzeit University, Department of Computer Science, Palestine.
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    ART4FL: An Agent-Based Architectural Approach for Trustworthy Federated Learning in the IoT2023In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    The integration of the Internet of Things (IoT) and Machine Learning (ML) technologies has opened up for the development of novel types of systems and services. Federated Learning (FL) has enabled the systems to collaboratively train their ML models while preserving the privacy of the data collected by their IoT devices and objects. Several FL frameworks have been developed, however, they do not enable FL in open, distributed, and heterogeneous IoT environments. Specifically, they do not support systems that collect similar data to dynamically discover each other, communicate, and negotiate about the training terms (e.g., accuracy, communication latency, and cost). Towards bridging this gap, we propose ART4FL, an end-to-end framework that enables FL in open IoT settings. The framework enables systems' users to configure agents that participate in FL on their behalf. Those agents negotiate and make commitments (i.e., contractual agreements) to dynamically form federations. To perform FL, the framework deploys the needed services dynamically, monitors the training rounds, and calculates agents' trust scores based on the established commitments. ART4FL exploits a blockchain network to maintain the trust scores, and it provides those scores to negotiating agents' during the federations' formation phase.

  • 17.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alawadi, Sadi
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Activity Recognition and User Preference Learning for Automated Configuration of IoT Environments2020In: IoT '20: Proceedings of the 10th International Conference on the Internet of Things, New York, United States: ACM Digital Library, 2020, p. 1-8, article id 3Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) environments encompass different types of devices and objects that offer a wide range of services. The dynamicity and uncertainty of those environments, including the mobility of users and devices, make it hard to foresee at design time available devices, objects, and services. For the users to benefit from such environments, they should be proposed services that are relevant to the specific context and can be provided by available things. Moreover, environments should be configured automatically based on users' preferences. To address these challenges, we propose an approach that leverages Artificial Intelligence techniques to recognize users' activities and provides relevant services to support users to perform their activities. Moreover, our approach learns users' preferences and configures their environments accordingly by dynamically forming, enacting, and adapting goal-driven IoT systems. In this paper, we present a conceptual model, a multi-tier architecture, and processes of our approach. Moreover, we report about how we validated the feasibility and evaluated the scalability of the approach through a prototype that we developed and used.

  • 18.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alsadi, Mohammed
    Department of Computer Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway.
    Alawadi, Sadi
    Department of Information Technology, Uppsala University, 75105 Uppsala, Sweden; Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118 Halmstad, Sweden.
    Awaysheh, Feras M
    Institute of Computer Science, Delta Research Centre, University of Tartu, 51009 Tartu, Estonia.
    Kebande, Victor R.
    Department of Computer Science (DBlekinge Institute of Technology, 37179 Karlskrona, Sweden.
    Moghaddam, Mahyar T
    The Maersk Mc-Kinney Moller Institute (MMMI), University of Southern Denmark, 5230 Odense, Denmark.
    ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.2022In: Sensors, E-ISSN 1424-8220, Vol. 22, no 18, article id 6842Article in journal (Refereed)
    Abstract [en]

    Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems' environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems' security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach's feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems' constituents to learn about security threats in their environments collaboratively.

    Download full text (pdf)
    fulltext
  • 19.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    De Sanctis, Martina
    Gran Sasso Sci Inst, Comp Sci Dept, Laquila, Italy..
    Bucchiarone, Antonio
    Fdn Bruno Kessler, Trento, Italy..
    Cicchetti, Antonio
    Mälardalen Univ, IDT Dept, Västerås, Sweden..
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Iovino, Ludovico
    Gran Sasso Sci Inst, Comp Sci Dept, Laquila, Italy..
    ROUTE: A Framework for Customizable Smart Mobility Planners2022In: IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2022), Institute of Electrical and Electronics Engineers (IEEE), 2022, p. 169-179Conference paper (Refereed)
    Abstract [en]

    Multimodal journey planners are used worldwide to support travelers in planning and executing their journeys. Generated travel plans usually involve local mobility service providers, consider some travelers' preferences, and provide travelers information about the routes' current status and expected delays. However, those planners cannot fully consider the special situations of individual cities when providing travel planning services. Specifically, authorities of different cities might define customizable regulations or constraints of movements in the cities (e.g., due to construction works or pandemics). Moreover, with the transformation of traditional cities into smart cities, travel planners could leverage advanced monitoring features. Finally, most planners do not consider relevant information impacting travel plans, for instance, information that might be provided by travelers (e.g., a crowded square) or by mobility service providers (e.g., changing the timetable of a bus). To address the aforementioned shortcomings, in this paper, we propose ROUTE, a framework for customizable smart mobility planners that better serve the needs of travelers, local authorities, and mobility service providers in the dynamic ecosystem of smart cities. ROUTE is composed of an architecture, a process, and a prototype developed to validate the feasibility of the framework. Experiments' results show that the framework scales well in both centralized and distributed deployment settings.

  • 20.
    Alkhabbas, Fahed
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    DeSanctis, Martina
    Fondazione Bruno Kessler, Via Sommarive, 18, Trento, Italy.
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Bucchiarone, Antonio
    Fondazione Bruno Kessler, Via Sommarive, 18, Trento, Italy.
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Marconi, Annapaola
    Fondazione Bruno Kessler, Via Sommarive, 18, Trento, Italy.
    Enacting Emergent Configurations in the IoT Through Domain Objects2018In: Proceedings of ICSOC 2018: Service-Oriented Computing, Springer, 2018, p. 279-294Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) pervades more and more aspects of our lives and often involves many types of smart connected objects and devices. User’s IoT environment changes dynamically, e.g., due to the mobility of the user and devices. Users can fully benefit from the IoT only when they can effortlessly interact with it. To accomplish this in a dynamic and heterogenous environment, we make use of Emergent Configurations (ECs), which consist of a set of things that connect and cooperate temporarily through their functionalities, applications, and services, to achieve a user goal. In this paper, we: (i) present the IoT-FED architectural approach to enable the automated formation and enactment of ECs. IoT-FED exploits heterogeneous and independently developed things, IoT services, and applications which are modeled as Domain Objects (DOs), a service-based formalism. Additionally, we (ii) discuss the prototype we developed and the experiments run in our IoT lab, for validation purposes.

    Download full text (pdf)
    FULLTEXT01
  • 21.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Murturi, Ilir
    Distributed Systems Group, TU Wien, Austria.
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Dustdar, Schahram
    Distributed Systems Group, TU Wien, Austria.
    A Goal driven Approach for Deploying Self-adaptive IoT Systems2020In: Proceedings: 2020 IEEE International Conference on Software Architecture (ICSA), Salvador, Brazil, 16-20 March 2020 / [ed] Lisa O’Conner, 2020, p. 146-156Conference paper (Refereed)
    Abstract [en]

    Engineering Internet of Things (IoT) systems is a challenging task partly due to the dynamicity and uncertainty of the environment including the involvement of the human in the loop. Users should be able to achieve their goals seamlessly in different environments, and IoT systems should be able to cope with dynamic changes. Several approaches have been proposed to enable the automated formation, enactment, and self-adaptation of goal-driven IoT systems. However, they do not address deployment issues. In this paper, we propose a goal-driven approach for deploying self-adaptive IoT systems in the Edge-Cloud continuum. Our approach supports the systems to cope with the dynamicity and uncertainty of the environment including changes in their deployment topologies, i.e., the deployment nodes and their interconnections. We describe the architecture and processes of the approach and the simulations that we conducted to validate its feasibility. The results of the simulations show that the approach scales well when generating and adapting the deployment topologies of goal-driven IoT systems in smart homes and smart buildings.

  • 22.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Cerioli, Maura
    Università di Genova, Dipartimento di Informatica, Bioingegneria, Italy.
    Leotta, Maurizio
    Università di Genova, Dipartimento di Informatica, Bioingegneria, Italy.
    Reggio, Gianna
    Università di Genova, Dipartimento di Informatica, Bioingegneria, Italy.
    On the Deployment of IoT Systems: An Industrial Survey2020In: 2020 IEEE International Conference on Software Architecture Companion (ICSA-C), 2020Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) systems are complex and multifaceted, and the design of their architectures needs to consider many aspects at a time. Design decisions concern, for instance, the modeling of software components and their interconnections, as well as where to deploy the components within the available hardware infrastructure in the Edge-Cloud continuum. A relevant and challenging task, in this context, is to identify optimal deployment models due to all the different aspects involved, such as extra-functional requirements of the system, heterogeneity of the hardware resources concerning their processing and storage capabilities, and constraints like legal issues and operational cost limits. To gain insights about the deployment decisions concerning IoT systems in practice, and the factors that influence those decisions, we report about an industrial survey we conducted with 66 IoT architects from 18 countries across the world. Each participant filled in a questionnaire that comprises 15 questions. By analyzing the collected data, we have two main findings: (i) architects rely on the Cloud more than the Edge for deploying the software components of IoT systems, in the majority of the IoT application domains; and (ii) the main factors driving deployment decisions are four: reliability, performance, security, and cost.

  • 23.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    An Agent-based Approach to Realize Emergent Configurationsin the Internet of Things2020In: Electronics, E-ISSN 2079-9292, Vol. 9, no 9, article id 1347Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) has enabled physical objects and devices, often referred to as things, to connect and communicate. This has opened up for the development of novel types of services that improve the quality of our daily lives. The dynamicity and uncertainty of IoT environments, including the mobility of users and devices, make it hard to foresee at design time available things and services. Further, users should be able to achieve their goals seamlessly in arbitrary environments. To address these challenges, we exploit Artificial Intelligence (AI) to engineer smart IoT systems that can achieve user goals and cope with the dynamicity and uncertainty of their environments. More specifically, the main contribution of this paper is an approach that leverages the notion of Belief-Desire-Intention agents and Machine Learning (ML) techniques to realize Emergent Configurations (ECs) in the IoT. An EC is an IoT system composed of a dynamic set of things that connect and cooperate temporarily to achieve a user goal. The approach enables the distributed formation, enactment, adaptation of ECs, and conflict resolution among them. We present a conceptual model of the entities of the approach, its underlying processes, and the guidelines for using it. Moreover, we report about the simulations conducted to validate the feasibility of the approach and evaluate its scalability. View Full-Text

    Download full text (pdf)
    fulltext
  • 24.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Characterizing Internet of Things Systems through Taxonomies: A Systematic Mapping Study2019In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 7, article id 100084Article, review/survey (Refereed)
    Abstract [en]

    During the last decade, a large number of different definitions and taxonomies of Internet of Things (IoT) systems have been proposed. This has resulted in a fragmented picture and a lack of consensus about IoT systems and their constituents. To provide a better understanding of this issue and a way forward, we have conducted a Systematic Mapping Study (SMS) of existing IoT System taxonomies. In addition, we propose a characterization of IoT systems synthesized from the existing taxonomies, which provides a more holistic view of IoT systems than previous taxonomies. It includes seventeen characteristics, divided into two groups: elements and quality aspects. Finally, by analyzing the results of the SMS, we draw future research directions.

  • 25.
    Alkhabbas, Fahed
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things2018In: Software Architecture: Proceeding of 12th European Conference on Software Architecture, ECSA 2018, Springer, 2018, p. 86-102Conference paper (Refereed)
    Abstract [en]

    The rapid proliferation of the Internet of Things (IoT) is changing the way we live our everyday life and the society in general. New devices get connected to the Internet every day and, similarly, new IoT services and applications exploiting them are developed across a wide range of domains. The IoT environment typically is very dynamic, devices might suddenly become unavailable and new ones might appear. Similarly, users enter and/or leave the IoT environment while being interested in fulfilling their individual needs. These key aspects must be considered while designing and realizing IoT systems. In this paper we propose ECo-IoT, an architectural approach to enable the automated formation and adaptation of Emergent Configurations (ECs) in the IoT. An EC is formed by a set of things, with their services, functionalities, and applications, to realize a user goal. ECs are adapted in response to (un)foreseen context changes e.g., changes in available things or due to changing or evolving user goals. In the paper, we describe: (i) an architecture and a process for realizing ECs; and (ii) a prototype we implemented for (iii) the validation of ECo-IoT through an IoT scenario that we use throughout the paper.

    Download full text (pdf)
    FULLTEXT01
  • 26.
    Alkhabbas, Fahed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Human-Centric Emergent Configurations: Supporting the User Through Self-configuring IoT Systems2021In: Advances in Neuroergonomics and Cognitive Engineering: Proceedings of the AHFE 2021 Virtual Conferences on Neuroergonomics and Cognitive Engineering, Industrial Cognitive Ergonomics and Engineering Psychology, and Cognitive Computing and Internet of Things, July 25-29, 2021, USA / [ed] Hasan Ayaz; Umer Asgher; Lucas Paletta, Springer, 2021, p. 411-418Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is revolutionizing our environments with novel types of services and applications by exploiting the large number of diverse connected things. One of the main challenges in the IoT is to engineer systems to support human users to achieve their goals in dynamic and uncertain environments. For instance, the mobility of both users and devices makes it infeasible to always foresee the available things in the users’ current environments. Moreover, users’ activities and/or goals might change suddenly. To support users in such environments, we developed an initial approach that exploits the notion of Emergent Configurations (ECs) and mixed initiative techniques to engineer self-configuring IoT systems. An EC is a goal-driven IoT system composed of a dynamic set of temporarily connecting and cooperating things. ECs are more flexible and usable than IoT systems whose constituents and interfaces are fully specified at design time

  • 27.
    Aminoff, Hedvig
    et al.
    Biomedical Engineering and Health Systems, KTH Royal Institute of Technology, Stockholm, Sweden.
    Meijer, Sebastiaan
    Biomedical Engineering and Health Systems, KTH Royal Institute of Technology, Stockholm, Sweden.
    Arnelo, Urban
    Division of Surgery, CLINTEC, Karolinska Institutet, Stockholm, Sweden; Department of Surgical and Perioperative Sciences, Surgery, Umeå University, Umeå, Sweden.
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Telemedicine for Remote Surgical Guidance in Endoscopic Retrograde Cholangiopancreatography: Mixed Methods Study of Practitioner Attitudes2021In: JMIR Formative Research, E-ISSN 2561-326X, Vol. 5, no 1, article id e20692Article in journal (Refereed)
    Abstract [en]

    BACKGROUND: Telemedicine innovations are rarely adopted into routine health care, the reasons for which are not well understood. Teleguidance, a promising service for remote surgical guidance during endoscopic retrograde cholangiopancreatography (ERCP) was due to be scaled up, but there were concerns that user attitudes might influence adoption.

    OBJECTIVE: Our objective was to gain a deeper understanding of ERCP practitioners' attitudes toward teleguidance. These findings could inform the implementation process and future evaluations.

    METHODS: We conducted semistructured interviews with ERCP staff about challenges during work and beliefs about teleguidance. Theoretical constructs from the technology acceptance model (TAM) guided the thematic analysis. Our findings became input to a 16-item questionnaire, investigating surgeons' beliefs about teleguidance's contribution to performance and factors that might interact with implementation.

    RESULTS: Results from 20 interviews with ERCP staff from 5 hospitals were used to adapt a TAM questionnaire, exchanging the standard "Ease of Use" items for "Compatibility and Implementation Climate." In total, 23 ERCP specialists from 15 ERCP clinics responded to the questionnaire: 9 novices (<500 ERCP procedures) and 14 experts (>500 ERCP procedures). The average agreement ratings for usefulness items were 64% (~9/14) among experts and 75% (~7/9) among novices. The average agreement ratings for compatibility items were somewhat lower (experts 64% [~9/14], novices 69% [~6/9]). The averages have been calculated from the sum of several items and therefore, they only approximate the actual values. While 11 of the 14 experts (79%) and 8 of the 9 novices (89%) agreed that teleguidance could improve overall quality and patient safety during ERCP procedures, only 8 of the 14 experts (57%) and 6 of the 9 novices (67%) agreed that teleguidance would not create new patient safety risks. Only 5 of the 14 experts (36%) and 3 of the 9 novices (33%) were convinced that video and image transmission would function well. Similarly, only 6 of the 14 experts (43%) and 6 of the 9 novices (67%) agreed that administration would work smoothly. There were no statistically significant differences between the experts and novices on any of the 16 items (P<.05).

    CONCLUSIONS: Both novices and experts in ERCP procedures had concerns that teleguidance might disrupt existing work practices. However, novices were generally more positive toward teleguidance than experts, especially with regard to the possibility of developing technical skills and work practices. While newly trained specialists were the main target for teleguidance, the experts were also intended users. As experts are more likely to be key decision makers, their attitudes may have a greater relative impact on adoption. We present suggestions to address these concerns. We conclude that using the TAM as a conceptual framework can support user-centered inquiry into telemedicine design and implementation by connecting qualitative findings to well-known analytical themes.

    Download full text (pdf)
    fulltext
  • 28.
    Amouzad Mahdiraji, Saeid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    On the Use of Simulation and Optimization for the Analysis and Planning of Prehospital Stroke Care2022Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Immediate treatment is of extreme importance for stroke patients. However, providing fast enough treatment for stroke patients is far from trivial, mainly due to logistical challenges and difficulties in diagnosing the correct stroke type. One way to reduce the time to treatment is to use so-called Mobile Stroke Units (MSUs), which allows to diagnose and provide treatment for stroke patients already at the patient scene. A well-designed stroke transport policy is vital to improve the access to treatment for stroke patients. Simulation and mathematical optimization are useful approaches for assessing and optimizing stroke transport policies, without endangering the health of the patients.

    The main purpose of this thesis is to contribute to improving the situation for stroke patients and to reducing the social impacts of stroke. The aim is to study how to use simulation and optimization to achieve improved analysis and planning of prehospital stroke care. In particular, we focus on assessing the potential use of MSUs in a geographic area. In this thesis, optimization is used to identify the optimal locations of MSUs, and simulation is used to assess different stroke transport policies, including MSU locations. The results of this thesis aim to support public health authorities when making decisions in the prehospital stroke care domain.

    In order to fulfill the aim of this thesis, we develop and analyze a number of different simulation and optimization models. First, we propose a macro-level simulation model, an average time to treatment estimation model, used to estimate the expected time to treatment for different parts of a geographic region. Using the proposed model, we generate two different MSU scenarios to explore the potential benefits of employing MSUs in Sweden’s southern healthcare region (SHR).  

    Second, we present an optimization model to identify the best placement of MSUs while making a trade-off between the efficiency and equity perspectives, providing maximum population coverage and equal service for all patients, respectively. The trade-off function used in the model makes use of the concepts of weighted average time to treatment to model efficiency and the time difference between the expected time to treatment for different geographical areas to model equity. In a scenario study applied in the SHR, we evaluate our optimization model by comparing the current situation with three MSU scenarios, including 1, 2, and 3 MSUs.

    Third, we present a micro-level discrete event simulation model to assess stroke transport policies, including MSUs, allowing us to model the behaviors of individual entities, such as patients and emergency vehicles, over time. We generate a synthetic set of stroke patients using a Poisson distribution, used as input in a scenario study.

    Finally, we present a modeling framework with reusable components, which aims to facilitate the construction of discrete event simulation models in the emergency medical services domain. The framework consists of a number of generic activities, which can be used to represent healthcare chains modeled in the form of flowcharts. As the framework includes activities and policies modeled on the general level, the framework can be used to create models only by providing input data and a care chain specification. We evaluate the framework by using it to build a model for simulating EMS activities related to the complex case of acute stroke.

    Download full text (pdf)
    Comprehensive summary
    Download (jpg)
    presentationsbild
  • 29.
    Amouzad Mahdiraji, Saeid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Alshaban, Ala’a
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Mihailescu, Radu-Casian
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Lund University; Region Skåne.
    Al Fatah, Jabir
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Framework for Constructing Discrete Event Simulation Models for Emergency Medical Service Policy Analysis2022In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 210, p. 133-140Article in journal (Refereed)
    Abstract [en]

    Constructing simulation models can be a complex and time-consuming task, in particular if the models are constructed from scratch or if a general-purpose simulation modeling tool is used. In this paper, we propose a model construction framework, which aims to simplify the process of constructing discrete event simulation models for emergency medical service (EMS) policy analysis. The main building blocks used in the framework are a set of general activities that can be used to represent different EMS care chains modeled as flowcharts. The framework allows to build models only by specifying input data, including demographic and statistical data, and providing a care chain of activities and decisions. In a case study, we evaluated the framework by using it to construct a model for the simulation of the EMS activities related to acute stroke. Our evaluation shows that the predefined activities included in the framework are sufficient to build a simulation model for the rather complex case of acute stroke.

    Download full text (pdf)
    fulltext
  • 30.
    Amouzad Mahdiraji, Saeid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Petersson, Jesper
    Region Skåne; Lund University.
    A Micro-Level Simulation Model for Analyzing the Use of MSUs in Southern Sweden2022In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 198, p. 132-139Article in journal (Refereed)
    Abstract [en]

    A mobile stroke unit (MSU) is a special type of ambulance, where stroke patients can be diagnosed and provided intravenous treatment, hence allowing to cut down the time to treatment for stroke patients. We present a discrete event simulation (DES) model to study the potential benefits of using MSUs in the southern health care region of Sweden (SHR). We included the activities and actions used in the SHR for stroke patient transportation as events in the DES model, and we generated a synthetic set of stroke patients as input for the simulation model. In a scenario study, we compared two scenarios, including three MSUs each, with the current situation, having only regular ambulances. We also performed a sensitivity analysis to further evaluate the presented DES model. For both MSU scenarios, our simulation results indicate that the average time to treatment is expected to decrease for the whole region and for each municipality of SHR. For example, the average time to treatment in the SHR is reduced from 1.31h in the baseline scenario to 1.20h and 1.23h for the two MSU scenarios. In addition, the share of stroke patients who are expected to receive treatment within one hour is increased by a factor of about 3 for both MSU scenarios.

    Download full text (pdf)
    fulltext
  • 31.
    Angenius, Max
    et al.
    Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3).
    Ghajargar, Maliheh
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3).
    Design Principles for Interactive and Reflective Journaling with AI2023In: Intelligent Computing: Proceedings of the 2023 Computing Conference, Volume 2 / [ed] Kohei Arai, 2023, p. 62-81Conference paper (Refereed)
    Abstract [en]

    Designing for reflection and journaling have been prominent research areas in HCI and Interaction Design. However, designing for the experience of journaling that is supported by conversations with AI–Conversational Agent (CA)–to foster reflection seems to be a relatively unexplored area. Furthermore, while there are an abundant number of general guidelines and design principles for designing human-AI interactions, a set of guidelines for designing an interactive and reflective journaling experience with AI is lacking. This paper is a first attempt to address that need. We present the result of a qualitative user study on interactive and reflective journaling. We were interested in attending to our participants’ experiences and finding out their needs regarding the interactive journaling experience with CA. The user needs then were translated to design requirements and thereafter to themes or design principles. Some of our findings suggest that one of the important factors in journaling is the personal aesthetics of writing, by using carefully selected personal tools, specific materiality and interactions. Further, the flow of writing is considered sacred, hence it is almost like an untouchable, reflective ritualistic flow. Reflecting on the findings, we believe the outcome of this study can create opportunities for designing for human-AI interactions that are generative and reflective for activities that require such qualities, such as journaling or creativity.

  • 32.
    Angenius, Max
    et al.
    Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3).
    Ghajargar, Maliheh
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3).
    Interactive Journaling with AI: Probing into Words and Language as Interaction Design Materials2023In: Chatbot Research and Design: 6th International Workshop, CONVERSATIONS 2022, Amsterdam, The Netherlands, November 22–23, 2022, Revised Selected Papers, Springer, 2023, p. 150-170Conference paper (Refereed)
    Abstract [en]

    Conversational Agents (CAs) are making human-computer interaction more collaborative and conversational through using natural language. The HCI and interaction design communities, have been experimenting with and exploring the area of designing conversational interactions. Furthermore, interaction designers may need to acquire new skills for designing, prototyping, and evaluating artifacts that embody AI technologies in general, and CAs in particular. This paper builds upon a previous study on principles of designing interactive journaling experiences with CA and explores the practice of designing such experiences, using words, language, and conversations as design materials. We present a prototype for interactive and reflective journaling interaction with CA and the result of a Wizard of Oz experiment. Our findings suggest that designing interactions with CA challenges designers to use materials with inherently different natures and qualities. Despite this challenge, words appear to have unique characteristics to support designers to externalize and iterate on ideas, e.g., tone and intent. Hence, we suggest considering words, language, and conversations as the primary design materials, and the AI’s predictability, adaptivity, and agency as secondary materials, while designing human interactions with Conversational Agents.

  • 33.
    Ashouri, Majid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Towards Supporting IoT System Designers in Edge Computing Deployment Decisions2021Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) systems demands addressing new requirements. This particularly needs efficient deployment of IoT systems to meet the quality requirements such as latency, energy consumption, privacy, and bandwidth utilization. The increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage, known as edge computing. Edge computing may help and complement cloud computing to facilitate deployment of IoT systems and improve their quality. However, deciding where to deploy the various application components is not a straightforward task, and IoT system designer should be supported for the decision.

    To support the designers, in this thesis we focused on the system qualities, and aimed for three main contributions. First, by reviewing the literature, we identified the relevant and most used qualities and metrics. Moreover, to analyse how computer simulation can be used as a supporting tool, we investigated the edge computing simulators, and in particular the metrics they provide for modeling and analyzing IoT systems in edge computing. Finally, we introduced a method to represent how multiple qualities can be considered in the decision. In particular, we considered distributing Deep Neural Network layers as a use case and raked the deployment options by measuring the relevant metrics via simulation.

    Download full text (pdf)
    Comprehensive summary
    Download (jpg)
    presentationsbild
  • 34.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Cloud, Edge, or Both? Towards Decision Support for Designing IoT Applications2018In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, 2018Conference paper (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) includes applications which might generate a huge amount of data, this requires appropriate platforms and support methods. Cloud computing offers attractive computational and storage solutions to cope with these issues. However, sending to centralized servers all the data generated at the edge of the network causes latency, energy consumption, and high bandwidth demand. Performing some computations at the edge of the network, known as Edge computing, and using a hybrid Edge-Cloud architecture can help addressing these challenges. While such architecture may provide new opportunities to distribute IoT applications, making optimal decisions regarding where to deploy the different application components is not an easy and straightforward task for designers. Supporting designers’ decisions by considering key quality attributes impacting them in an Edge-Cloud architecture has not been investigated yet. In this paper, we: explore the importance of decision support for the designers, discuss how different attributes impact the decisions, and describe the required steps toward a decision support framework for IoT application designers.

    Download full text (pdf)
    FULLTEXT01
  • 35.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Quality attributes in edge computing for the Internet of Things: A systematic mapping study2021In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 13, article id 100346Article in journal (Refereed)
    Abstract [en]

    Many Internet of Things (IoT) systems generate a massive amount of data needing to be processed and stored efficiently. Cloud computing solutions are often used to handle these tasks. However, the increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage. Edge computing may help to improve IoT systems regarding important quality attributes like latency, energy consumption, privacy, and bandwidth utilization. However, deciding where to deploy the various application components is not a straightforward task. This is largely due to the trade-offs between the quality attributes relevant for the application. We have performed a systematic mapping study of 98 articles to investigate which quality attributes have been used in the literature for assessing IoT systems using edge computing. The analysis shows that time behavior and resource utilization are the most frequently used quality attributes; further, response time, turnaround time, and energy consumption are the most used metrics for quantifying these quality attributes. Moreover, simulation is the main tool used for the assessments, and the studied trade-offs are mainly between only two qualities. Finally, we identified a number of research gaps that need further study.

    Download full text (pdf)
    fulltext
  • 36.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Svorobej, Sergej
    School of Computer Science and Statistics, Trinity College Dublin, Dublin 2, Ireland.
    Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems2020In: IEEE International Conference on Edge Computing (EDGE), Virtual conference, October 18–24, 2020., 2020, p. 59-66Conference paper (Refereed)
    Abstract [en]

    For the efficient execution of Deep Neural Networks (DNN) in the Internet of Things, computation tasks can be distributed and deployed on edge nodes. In contrast to deploying all computation to the cloud, the use of Distributed DNN (DDNN) often results in a reduced amount of data that is sent through the network and thus might increase the overall performance of the system. However, finding an appropriate deployment scenario is often a complex task and requires considering several criteria. In this paper, we introduce a multi-criteria decision-making method based on the Analytical Hierarchy Process for the comparison and selection of deployment alternatives. We use the RECAP simulation framework to model and simulate DDNN deployments on different scales to provide a comprehensive assessment of deployments to system designers. In a case study, we apply the method to a smart city scenario where different distributions and deployments of a DNN are analyzed and compared.

  • 37.
    Autili, Marco
    et al.
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Inverardi, Paola
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Tivoli, Massimo
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy.
    Mignosi, Filippo
    Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica, Università degli Studi dell'Aquila, Via Vetoio, 67100 L'Aquila, Italy; Dipartimento di Matematica e Informatica, Università degli Studi di Palermo, Via Archirafi 34, 90123 Palermo, Italy.
    Automated synthesis of application-layer connectors from automata-based specifications2019In: Journal of computer and system sciences (Print), ISSN 0022-0000, E-ISSN 1090-2724, Vol. 104, p. 17-40Article in journal (Refereed)
    Abstract [en]

    Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability boundaries of the synthesis method.

  • 38.
    Bagheri, Sally
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts2024In: Proceedings of the 10th International Conference on Information Systems Security and Privacy / [ed] Gabriele Lenzini; Paolo Mori; Steven Furnell, Portugal: SciTePress, 2024, p. 869-877Conference paper (Refereed)
    Abstract [en]

    Although smart homes are tasked with an increasing number of everyday activities to keep users safe, healthy, and entertained, privacy concerns arise due to the large amount of personal data in flux. Privacy is widely acknowledged to be contextually dependent, however, the interrelated stakeholders involved in developing and delivering smart home services – IoT developers, companies, users, and lawmakers, to name a few – might approach the smart home context differently. This paper considers smart homes as digital ecosystems to support a contextual analysis of smart home privacy. A conceptual model and an ecosystem ontology are proposed through design science research methodology to systematize the analyses. Four privacy-oriented scenarios of surveillance in smart homes are discussed to demonstrate the utility of the digital ecosystem approach. The concerns pertain to power dynamics among users such as main users, smart home bystanders, parent-child dynamics, and intimate partner relationships and the responsibility of both companies and public organizations to ensure privacy and the ethical use of IoT devices over time. Continuous evaluation of the approach is encouraged to support the complex challenge of ensuring user privacy in smart homes.

  • 39.
    Bajones, Markus
    et al.
    TU Wien, Vienna, Austria..
    Fischinger, David
    TU Wien, Vienna, Austria..
    Weiss, Astrid
    TU Wien, Vienna, Austria..
    De La Puente, Paloma
    Univ Politecn Madrid, Madrid, Spain..
    Wolf, Daniel
    TU Wien, Vienna, Austria..
    Vincze, Markus
    TU Wien, Vienna, Austria..
    Koertner, Tobias
    Acad Aging Res, Vienna, Austria..
    Weninger, Markus
    Acad Aging Res, Vienna, Austria..
    Papoutsakis, Konstantinos
    FORTH, Iraklion, Greece..
    Michel, Damien
    FORTH, Iraklion, Greece..
    Qammaz, Ammar
    FORTH, Iraklion, Greece..
    Panteleris, Paschalis
    FORTH, Iraklion, Greece..
    Foukarakis, Michalis
    FORTH, Iraklion, Greece..
    Adami, Ilia
    FORTH, Iraklion, Greece..
    Ioannidi, Danae
    FORTH, Iraklion, Greece..
    Leonidis, Asterios
    FORTH, Iraklion, Greece..
    Antona, Margherita
    FORTH, Iraklion, Greece..
    Argyros, Antonis
    FORTH, Iraklion, Greece..
    Mayer, Peter
    TU Wien, Vienna, Austria..
    Panek, Paul
    TU Wien, Vienna, Austria..
    Eftring, Håkan
    Lund Univ, Lund, Sweden..
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Malmo Univ, Malmo, Sweden..
    Results of Field Trials with a Mobile Service Robot for Older Adults in 16 Private Households2019In: ACM Transactions on Human-Robot Interaction, E-ISSN 2573-9522, Vol. 9, no 2, p. 10:1-10:27, article id 10Article in journal (Refereed)
    Abstract [en]

    In this article, we present results obtained from field trials with the Hobbit robotic platform, an assistive, social service robot aiming at enabling prolonged independent living of older adults in their own homes. Our main contribution lies within the detailed results on perceived safety, usability, and acceptance from field trials with autonomous robots in real homes of older users. In these field trials, we studied how 16 older adults (75 plus) lived with autonomously interacting service robots over multiple weeks. Robots have been employed for periods of months previously in home environments for older people, and some have been tested with manipulation abilities, but this is the first time a study has tested a robot in private homes that provided the combination of manipulation abilities, autonomous navigation, and nonscheduled interaction for an extended period of time. This article aims to explore how older adults interact with such a robot in their private homes. Our results show that all users interacted with Hobbit daily, rated most functions as well working, and reported that they believe that Hobbit will be part of future elderly care. We show that Hobbit's adaptive behavior approach towards the user increasingly eased the interaction between the users and the robot. Our trials reveal the necessity to move into actual users' homes, as only there, we encounter real-world challenges and demonstrate issues such as misinterpretation of actions during non-scripted human-robot interaction.

    Download full text (pdf)
    fulltext
  • 40.
    Banda, Laurence
    et al.
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mjumo, Mzyece
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mekuria, Fisseha
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Business Models for 5G and Future Mobile Network Operators2022In: 2022 IEEE Future Networks World Forum (FNWF), IEEE, 2022, article id M17754Conference paper (Refereed)
    Abstract [en]

    Emerging 5G and future networks (5GFNs) will change the mobile communication business ecosystem by introducing multi-service wireless applications with diverse specifications. These smart and future-oriented wireless networks are intended to address not only consumer-based smartphone applications, but also the needs of various vertical industry markets (e.g., education, energy, healthcare, transportation, manufacturing, agriculture, and so forth). 5GFNs are aimed at attaining economic value for all key stakeholders, including customers, mobile network operators (MNOs), equipment vendors, public institutions, private enterprises, digital business start-ups and various third parties. This paper discusses business model options for 5GFNs from the MNOs’ perspective.  We describe current MNOs’ business models and their shortcomings. Thereafter, we present emerging business models for 5GFNs which MNOs should consider when rolling out these networks.  

  • 41.
    Baudin, Katarina
    et al.
    School of Health, Care and Social Welfare, Mälardalen University, Eskilstuna, Sweden.
    Gustafsson, Christine
    School of Health, Care and Social Welfare, Mälardalen University, Eskilstuna, Sweden.
    Frennert, Susanne
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Views of Swedish Elder Care Personnel on Ongoing Digital Transformation: Cross-Sectional Study2020In: Journal of Medical Internet Research, E-ISSN 1438-8871, Vol. 22, no 6, article id e15450Article in journal (Refereed)
    Abstract [en]

    BACKGROUND: Swedish municipalities are facing demographic challenges due to the growing number of older people and the resulting increased need for health care services. Welfare technologies are being launched as possible solutions for meeting some of these challenges.

    OBJECTIVE: The aim of this study was to explore the perception, experimentation, evaluation, and procurement of welfare technology practices among professionals working in municipal elder care in relation to their gender, age, and profession.

    METHODS: Data for this explorative cross-sectional study were collected from 393 responses to a web-based survey on municipal elder care in Sweden. Chi square tests were performed to determine the associations.

    RESULTS: The results revealed gender, age, and professional differences in perspectives of municipal elder care workers. Differences were particularly evident in attitudes toward technology, both the use of technology in general and in the workplace, and involvement and participation in decision making regarding the procurement of new welfare technologies. Men (37/53, 70%) expressed a more positive attitude toward and curiosity regarding new technologies than women (157/336, 46.7%) (P=.03). Regarding age, the younger respondents (18-24 years old) perceived the digital transformation in the workplace as "too slow" (4/4, 100%), whereas the majority of older respondents (65-74 years old) perceived it as happening at the "right pace" (4/7, 57%). The elder care personnel felt encouraged by management to explore and experiment with new welfare technologies, but never did so either for management or with patients. Even though the majority of the respondents were women, more men (4/7, 57%) were involved in the procurement process for welfare technology devices and solutions than women (98/336, 29.2%) (P<.001).

    CONCLUSIONS: Personnel working within municipal elder care were generally very positive toward new technologies. However, both gender and age differences may influence these perspectives such as the personnel's resistance to welfare technology and patients' participation in welfare technology usage and deployment. Different levels of participation in the decision-making process regarding new technology deployment may negatively affect the overall digital transformation within municipal elder care.

    Download full text (pdf)
    fulltext
  • 42.
    Belfrage, Michael
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Brown, Barry
    Department of Computer and Systems Sciences, Stockholm University.
    Danielsson, Henrik
    Department of Behavioural Sciences and Learning, Linköping University.
    Dignum, Virginia
    Department of Computing Science, Umeå University.
    Glöss, Mareike
    Digital Fututres Research Centre, KTH Royal Institute of Technology.
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Passero, Sergio
    Department of Culture and Society, Linköping University.
    Rahm, Lina
    Division of History of Science, Technology and Environment, KTH Royal Institute of Technology.
    Sarayeva, Tatyana
    Department of Computing Science, Umeå University.
    Wiberg, Mikael
    Department of Informatics, Umeå University.
    WASP-HS. Community Reference Meeting: Sustainability and Smart Cities2022Report (Other academic)
    Download full text (pdf)
    fulltext
  • 43.
    Belfrage, Michael
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Making Sense of Collaborative Challenges inAgent-based Modelling for Policy-Making2022In: Proceedings of the 2nd Workshop on Agent-based Modeling and Policy-Making (AMPM 2022) / [ed] Giovanni Sileno; Christoph Becker; Nicola Lettieri, CEUR , 2022Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 44.
    Bian, Xiaojie
    et al.
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Sha, Chao
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Zhao, Chuanxin
    School of Computer and Information, Anhui Normal University, Wuhu, Anhui, China.
    Wang, Ruchuan
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Balanced Distribution Strategy for the Number of Recharging Requests Based on Dynamic Dual-Thresholds in WRSNs2024In: IEEE Internet of Things Journal, ISSN 2327-4662Article in journal (Refereed)
    Abstract [en]

    “Request Triggered Recharging” has been a flexible type of scheduling schemes to allow the Mobile Charging Vehicle (MCV) to supply energy for sensor nodes on demand. However, in most existing works, MCV always passively waits for the arrival of the unpredictable requests that may cause it missing the best departure time to serve nodes. To solve this problem, we propose a Balanced Distribution strategy for the number of Recharging Requests based on dynamic dual-thresholds (BDRR). Firstly, the adjustable Double Recharging Request Thresholds (DRRTs) are set for each node to ensure that all the requesting nodes can be successfully charged. Then, the Method for Setting the Energy Replenishment Value (MSERV) is proposed to enable the distribution of the moments at which nodes send out their recharging requests being concentrated within each period. Furthermore, an efficient traversal path for the MCV is constructed by safe or dangerous scheduling strategy, and the Charging Capacity Reduction Scheme (CCRS) is also executed to help survive more nodes in need. Finally, a Passer-by Recharging Scheme (PRS) is introduced to further improve the energy efficiency of the MCV. Simulation results show that BDRR outperforms the compared algorithms in terms of surviving rate of sensors as well as the energy efficiency of MCV with different network scales.

  • 45.
    Boiko, Olha
    et al.
    Sumy State Univ, Dept Informat Technol, UA-40007 Sumy, Ukraine; Malmö Univ, Dept Comp Sci & Media Technol, S-20506 Malmö, Sweden; Malmö Univ, Internet Things & People Res Ctr, S-20506 Malmö, Sweden.
    Komin, Anton
    Sumy State Univ, Dept Informat Technol, UA-40007 Sumy, Ukraine.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Edge-Cloud Architectures for Hybrid Energy Management Systems: A Comprehensive Review2024In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 24, no 10, p. 15748-15772Article in journal (Refereed)
    Abstract [en]

    This article provides an overview of recent research on edge-cloud architectures in hybrid energy management systems (HEMSs). It delves into the typical structure of an IoT system, consisting of three key layers: the perception layer, the network layer, and the application layer. The edge-cloud architecture adds two more layers: the middleware layer and the business layer. This article also addresses challenges in the proposed architecture, including standardization, scalability, security, privacy, regulatory compliance, and infrastructure maintenance. Privacy concerns can hinder the adoption of HEMS. Therefore, we also provide an overview of these concerns and recent research on edge-cloud solutions for HEMS that addresses them. This article concludes by discussing the future trends of edge-cloud architectures for HEMS. These trends include increased use of artificial intelligence on an edge level to improve the performance and reliability of HEMS and the use of blockchain to improve the security and privacy of edge-cloud computing systems.

  • 46.
    Boiko, Olha
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Information Technologies, Sumy State University Sumy, Sumy, 40007, Ukraine.
    Shendryk, Vira
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Information Technologies, Sumy State University Sumy, Sumy, 40007, Ukraine.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Komin, Anton
    Department of Information Technologies, Sumy State University Sumy, Sumy, 40007, Ukraine.
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Towards Data Integration for Hybrid Energy System Decision-Making Processes: Challenges and Architecture2024In: Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings / [ed] Audrius Lopata; Daina Gudonienė; Rita Butkienė, Springer, 2024, p. 172-184Conference paper (Refereed)
    Abstract [en]

    This paper delves into the challenges encountered in decision-making processes within Hybrid Energy Systems (HES), placing a particular emphasis on the critical aspect of data integration. Decision-making processes in HES are inherently complex due to the diverse range of tasks involved in their management. We argue that to overcome these challenges, it is imperative to possess a comprehensive understanding of the HES architecture and how different processes and interaction layers synergistically operate to achieve the desired outcomes. These decision-making processes encompass a wealth of information and insights pertaining to the operation and performance of HES. Furthermore, these processes encompass systems for planning and management that facilitate decisions by providing a centralized platform for data collection, storage, and analysis. The success of HES largely hinges upon its capacity to receive and integrate various types of information. This includes real-time data on energy demand and supply, weather data, performance data derived from different system components, and historical data, all of which contribute to informed decision-making. The ability to accurately integrate and fuse this diverse range of data sources empowers HES to make intelligent decisions and accurate predictions. Consequently, this data integration capability allows HES to provide a multitude of services to customers. These services include valuable recommendations on demand response strategies, energy usage optimization, energy storage utilization, and much more. By leveraging the integrated data effectively, HES can deliver customized and tailored services to meet the specific needs and preferences of its customers. 

  • 47.
    Brondin, Anna
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Nordström, Marcus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Olsson, Carl Magnus
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Salvi, Dario
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Open source step counter algorithm for wearable devices2020In: Companion Proceedings of the 10th International Conference on the Internet of Things (IoT 2020), New York, United States: ACM Digital Library, 2020, article id 6Conference paper (Refereed)
    Abstract [en]

    Commercial wearable devices and fitness trackers are commonly sold as black boxes of which little is known about their accuracy. This poses serious issues especially in health-related contexts such as clinical research, where transparency about accuracy and reliability are paramount.

    We present a validated algorithm for computing step counting that is optimised for use in constrained computing environments. Released as open source, the algorithm is based on the windowed peak detection approach, which has previously shown high accuracy on smartphones. The algorithm is optimised to run on a programmable smartwatch (Pine Time) and tested on 10 subjects in 8 scenarios, with varying varying positions of the wearable and walking paces.

    Our approach achieves a 89% average accuracy, with the highest average accuracy when walking outdoor (98%) and the lowest in a slow-walk scenario (77%). This result can be compared with the built-in step counter of the smartwatch (Bosch BMA421), which yielded a 94% average accuracy for the same use cases. Our work thus shows that an open-source approach for extracting physical activity data from wearable devices is possible and achieves an accuracy comparable to the one produced by proprietary embedded algorithms.

    Download full text (pdf)
    fulltext
  • 48.
    Bugeja, Joseph
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    On Privacy and Security in Smart Connected Homes2021Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. Such data can be sensitive and personal, leading to increasingly intimate insights into private lives. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a surge of cyberattacks on connected home devices that essentially compromise privacy and security of the residents.

    Providing privacy and security is a critical issue in smart connected homes. Many residents are concerned about unauthorized access into their homes and about the privacy of their data. However, it is typically challenging to implement privacy and security in a smart connected home because of its heterogeneity of devices, the dynamic nature of the home network, and the fact that it is always connected to the Internet, amongst other things. As the numbers and types of smart home devices are increasing rapidly, so are the risks with these devices. Concurrently, it is also becoming increasingly challenging to gain a deeper understand- ing of the smart home. Such understanding is necessary to build a more privacy-preserving and secure smart connected home. Likewise, it is needed as a precursor to perform a comprehensive privacy and security analysis of the smart home.

    In this dissertation, we render a comprehensive description and account of the smart connected home that can be used for conducting risk analysis. In doing so, we organize the underlying smart home devices ac- cording to their functionality, identify their data-collecting capabilities, and survey the data types being collected by them. Such is done using the technical specification of commercial devices, including their privacy policies. This description is then leveraged for identifying threats and for analyzing risks present in smart connected homes. Such is done by analyzing both scholarly literature and examples from the industry, and leveraging formal modeling. Additionally, we identify malicious threat agents and mitigations that are relevant to smart connected homes. This is performed without limiting the research and results to a particular configuration and type of smart home.

    This research led to three main findings. First, the majority of the surveyed commercial devices are collecting instances of sensitive and personal data but are prone to critical vulnerabilities. Second, there is a shortage of scientific models that capture the complexity and heterogeneity of real-world smart home deployments, especially those intended for privacy risk analysis. Finally, despite the increasing regulations and attention to privacy and security, there is a lack of proactive and integrative approaches intended to safeguard privacy and security of the residents. We contributed to addressing these three findings by developing a framework and models that enable early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they reach the homes and compromise the lives of the residents.

    Overall, the scientific contributions presented in this dissertation help deepen the understanding and reasoning about privacy and security concerns affecting smart connected homes, and contributes to advancing the research in the area of risk analysis as applied to such systems.

    Download full text (pdf)
    comprehensive summary
    Download (jpg)
    preview image
  • 49.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Functional Classification and Quantitative Analysis of Smart Connected Home Devices2018In: 2018 Global Internet of Things Summit (GIoTS), Institute of Electrical and Electronics Engineers (IEEE), 2018, p. 144-149Conference paper (Refereed)
    Abstract [en]

    The home environment is rapidly becoming more complex with the introduction of numerous and heterogeneous Internet of Things devices. This development into smart connected homes brings with it challenges when it comes to gaining a deeper understanding of the home environment as a socio-technical system. A better understanding of the home is essential to build robust, resilient, and secure smart home systems. In this regard, we developed a novel method for classifying smart home devices in a logical and coherent manner according to their functionality. Unlike other approaches, we build the categorization empirically by mining the technical specifications of 1,193 commercial devices. Moreover, we identify twelve capabilities that can be used to characterize home devices. Alongside the classification, we also quantitatively analyze the entire spectrum of commercial smart home devices in accordance to their functionality and capabilities. Overall, the categorization and analysis provide a foundation for identifying opportunities of generalizations and common solutions for the smart home.

    Download full text (pdf)
    FULLTEXT01
  • 50.
    Bugeja, Joseph
    et al.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Jacobsson, Andreas
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Green Intelligent Homes: A Perspective on the Future of Smart Homes and Their Implications2023In: Proceedings of the 8th International Conference on Internet of Things, Big Data and Security (IoTBDS 2023). / [ed] Gary, Wills; Buttyán, Levante; Kacuk, Péter; Chang, Victor, Portugal, 2023, p. 186-193Conference paper (Refereed)
    Abstract [en]

    The smart home technology market is witnessing rapid growth due to the advent of more advanced, intuitive, and affordable solutions. As the adoption of these technologies becomes more prevalent, there is a need for research to explore potential avenues for pervasive smart living. This study aims to review the available literature and industry studies, along with our own experiences in the field, to identify and discuss potential future research in the smart home. We observe that the future of the smart home will likely be focused on improving the user experience, with a greater emphasis on personalization, automation, and Artificial intelligence (AI)-driven technologies, leading to what we call the "Green Intelligent Home". Through this analysis, this study aims to offer insights into how the development of smart homes could shape society in the future and the potential implications of such a development. This study concludes by suggesting a framework for knowledge development in the smart home domain.

    Download full text (pdf)
    fulltext
123456 1 - 50 of 267
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf