Research Areas HiA Grimstad - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

Research Areas HiA Grimstad

Description:

Materials Science & Engineering (Prof. Tor O. Saetre) ... Prof. Hans H. Grelland (An H n Si ji osh u) Philosophy of space and nothingness ... – PowerPoint PPT presentation

Number of Views:91
Avg rating:3.0/5.0
Slides: 27
Provided by: Ins61
Category:

less

Transcript and Presenter's Notes

Title: Research Areas HiA Grimstad


1
Research Areas _at_ HiA Grimstad
  • Agder University College
  • Norway

2
Research _at_ HiA Grimstad
  • Quantum Physics and Philosophy (Prof. Hans H.
    Grelland)
  • Materials Science Engineering (Prof. Tor O.
    Saetre)
  • Axisymmetric Green Functions in Physics and
    Engineering (Prof. T. Conway)

3
Quantum Physics and PhilosophyProf. Hans H.
Grelland (An Hàn Si jiàoshòu)
  • Philosophy of space and nothingness
  • in physics and in western and Chinese philosophy
    Einstein, Heidegger, Sartre, Laozi, Buddhism)
  • Philosophy of mathematics as a language in
    physics
  • Ethics and Free Will
  • Theoretical quantum mechanics

4
Materials Science EngineeringProf. Tor O.
Saetre
  • Aluminium Metallurgy
  • Theory of Recrystallization in Metals
  • Theory of Grain Growth in Metals
  • Hydrogen Solid State Storage (Hydrides)
  • Photovoltaic Cells and Modules

5
Axisymmetric Green Functions in Physics and
EngineeringProf. John T. Conway
  • Actuator Disk Theory in Aerodynamics
  • Gravitational Fields of Systems with Axisymmetric
    Boundaries
  • Electromagnetic Fields of Axisymmetric Systems
  • Circular Sources and Detectors of Nuclear
    Radiation
  • Solutions of the Helmholtz Wave Equation
  • Bessel and Legendre functions, Elliptic Integrals
    and functions, Epstein- Hubbell integrals

6
Research _at_ HIA IKT
  • System modeling transformations (Prof. A Prinz)
  • Context description, reasoning, aggregation
    (Prof. R. Nossum)
  • Business innovation and user aspects (Prof. P.E.
    Pedersen)
  • Data-intensive Systems (Prof. Christian S.
    Jensen)
  • Web mining technology accessibility (Dr. M.
    Snaprud)
  • System security and business strategies (Prof.
    J.J. Gonzalez)
  • Security, privacy and trust (Prof. V. Oleshchuk)
  • Learning, adaptive automata (Dr. O.-C. Granmo,
    Prof. Oomen)
  • Wireless networking and resource awareness (Prof.
    F. Reichert)
  • Channel models, MIMO techniques and especially
    Mobile-to-Mobile aspects (Prof. M. Pätzold)

7
Data-intensive SystemsProf. Christian S. Jensen
(HiA Aalborg University)
  • Data management for mobile services
  • Geographical context-awareness for mobile
    services
  • Query processing for location-based services
  • Indexing of moving objects
  • Location tracking and privacy
  • Spatio-temporal data management
  • Temporal data management

8
Data-intensive Systems Data management for
mobile services
Always-on, integrated, context-aware services
Primitive, largely off-line services
Intelligent, community-aware services
User Experience
Digitization of processes, sensor
technologies, ad-hoc networks
Increased bandwidth, new business
models, business convergence, standardization
Available cellular infrastructure, new handsets
and terminals
Key Enablers
Today
2010
2020
9
Wireless networking and resource awarenessProf.
F. Reichert, HiA IKT Agder Mobility Lab
  • Mobile network architectures and protocols
  • Short Range Communications
  • Resource Awareness Discovery
  • Wireless residential networking services
  • Mobile terminal evolution
  • SIP/IMS All-IP
  • IP independent mobile routing (future area)

10
Wireless networking and resource
awarenessTowards Trusted Ubiquitous
Communications Services
Im connectedto the WEB
Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
Few Interactive Mobile Applications
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
Peer-2-Peer-Mobile Networking
Federated Trust Identity Solutions
New Key Enablers
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
11
Business innovation and user aspects Professor
Per E. Pedersen, HiA, adj. prof. NHH
  • Business models for heterogeneous services and
    networks
  • Service innovation by electronic service
    standardization, service integration and
    self-services
  • Service adoption and technology readiness
  • Mobile service adoption and commercial effects of
    mobile services
  • Online and interactive marketing
  • Cross media services and service integration

12
Business innovation and user aspects
Non-intrusive and innovative service integration
User initiated integration of services
Service integrators
Seamless integration by all service providers
User Experience
Innovative users of heterogeneous services
Service standardization and experimental
business models
Consolidation of standards and business models
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
13
Context description, reasoning, aggregation
Prof. Dr. Rolf Nossum, HiA IKT
  • Formal theories of context and trust in
    multi-agent systems
  • Context-sensitive knowledge processing and
    management
  • Mechanised reasoning by autonomous agents
  • Knowledge management in the web
  • Ontology-based knowledge acquisition and
    retrieval

14
Context description, reasoning, aggregation
Towards context-aware computing
ambient computing power
Experience
adaptive devices
useful devices
trusted wireless short-range communication
disparate theories of trust, context, security
integrated models of trust, context, security
Enablers
Today
2010
2020
15
Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Prof. Dr.-Ing. M.
Pätzold, HiA IKT
  • Mobile communications
  • Modelling, analysis, and simulation of mobile
    fading channels
  • Multi-input multi-output (MIMO) techniques
  • Space-time coding schemes
  • Transmission techniques, especially MIMO-OFDM
  • Mobile-to-mobile communications
  • Performance analysis of mobile communication
    systems

16
Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Towards Trusted
Ubiquitous Communications Services

Im connectedto the WEB


Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
todays trends
Few Interactive Mobile Applications
your trend
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
your trend
your vision
Peer-2-PeerMobile Networking
Federated Trust Identity Solutions
New Key Enablers
your vision
your trend
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
17
System modeling transformationsProf. Andreas
Prinz, HiA IKT OSYS group
  • explicit description of model structures
  • description of model transformations
  • automatic code generation
  • explicit description of semantics
  • formal description and analysis of protocols and
    systems

18
System modeling transformations Towards
correct programming
ad-hoc modeling using fixed languages
domain specific modeling languages and tool
support for them
agreement on best practice for defining
languages including patterns
Software Engineering
simple domain specific languages
individual methods for proving correctness
integrated environments for correct programming
only correct programming engineering
Correct Programming
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
19
Open Source, Web mining, and AccessibilityDr. M.
Snaprud, HiA IKT OSYS group
  • Automatic web accessibility evaluation
  • Open Source applications
  • Software Engineering based on Open Source
  • Platforms for on-line collaboration
  • ICT policy
  • Measurements of the status and effects of
    eGovernment
  • Quantifiable indicators in eDemocracy

20
Open Source, Web mining, and AccessibilityTowards
an Information Society for All
Problems accessing some information and
services with different terminals etc.
All static information is accessible, but some
services do not work.
All relevant information and services are
accessible
User Experience
Common criteria for European accessibility
requirements for Public procurement
UWEM is defined and approved. Wider use of Open
Source tools
A Unified Web Evaluation Methodology (UWEM) is
formed
New Key Enablers
Different guidelines and many ways to use them
Harmonised guidelines implementations based
on unified methdodology
Large scale evaluation established as element
of eDemocracy
Automatic web access evaluation
W3C, Section 508...
W3C/WCAG2.0
Today
2010
2020
21
Learning AutomataDr. O.-C. Granmo (HiA), Prof.
B. J. Oommen (HiA Carleton)
  • Learning and Adaptivity in Unknown Stochastic
    Environments
  • Resource Allocation
  • Routing
  • QoS Control
  • Monitoring
  • Optimization

22
Learning AutomataTowards Self-Optimizing
Pervasive Computing

User Experience
Self-Optimizing Constellations of Computing
Devices
Self-Optimizing Routing, Access
Control, Monitoring, ...
Self-Optimizing Computing Devices
Learning Automata for Routing, Access
Control, Monitoring, ...
Integration of Learning Automata Approaches
Pervasive Learning Automata Solutions Found
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
23
Security, privacy and trustProf. V. Oleshchuk
  • Formal models for security, privacy and trust in
    mobile systems
  • Privacy and ID management issues in mobile
    computing
  • Security and trust aspects in ubiquitous
    computing
  • Location and identity privacy preserving issues
  • Privacy preserving information retrieval
  • Security, privacy and anonymity in medical
    information systems

24
Security, privacy and trust Towards Trusted
Ubiquitous Communications Services
Im securely connected to the direct
environmentaround me with preserving my privacy
Im connectedto the WEB
I have whatever I needat hand securely and
privately
User Experience
Few Interactive Mobile Applications
Disparate security solutions with (very
limited) privacy protection
Integrated security solutions for P2P /Ad Hoc
mobile networking preserving privacy
Federated context- aware, self-adaptable, trust
based security solutions preserving privacy and
anonymity.
New Key Enablers

WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
IMS, 4G
2G, 2.5G, 3G
Today
2010
2020
25
Security and Quality in OrganizationsProf. Jose
J. Gonzalez
  • Security as continuous improvement process
  • Security management
  • Effectiveness of Computer Security Incident
    Response Teams (CSIRTs)
  • Lifetime of software vulnerabilities
  • Patching policies for software vulnerabilities
  • Security and safety in eOperations in the oil
    gas industry
  • Security in organizational transition to
    adjacencies
  • Human factors in security

26
Wireless Short Range Communications
AccessPoint 2
Remote Service, e.g. news service
Internet
UPnP DLNA
Internet Access Remote Services
Home, Workplace School, Sports Club,
Local Access Local Services
WiFi, BT UWB
AccessPoint 1
Wireless Peers
LocalNetwork
Local Service e.g. file service
Write a Comment
User Comments (0)
About PowerShow.com