Research Areas HiA Grimstad - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

Research Areas HiA Grimstad

Description:

Innovation and Industrial Development (Prof. Arne Isaksen) ... Philosophy of space and nothingness. in physics and in western and Chinese philosophy: ... – PowerPoint PPT presentation

Number of Views:81
Avg rating:3.0/5.0
Slides: 30
Provided by: Ins61
Category:

less

Transcript and Presenter's Notes

Title: Research Areas HiA Grimstad


1
Research Areas _at_ HiA Grimstad
  • Agder University College
  • Norway

2
Research _at_ HiA Grimstad
  • Quantum Physics and Philosophy (Prof. Hans H.
    Grelland)
  • Ethics and Economy (Prof. Dag G. Aasland)
  • Innovation and Industrial Development (Prof. Arne
    Isaksen)
  • Materials Science Engineering (Prof. Tor O.
    Saetre)
  • Axisymmetric Green Functions in Physics and
    Engineering (Prof. T. Conway)
  • Power Electronics, Green Power (Prof. Ole-Morten
    Midtgård)
  • Sold Oxide Fuel Cell (Prof. Hugh Middleton)
  • Energy Crops for Combustion and Gasification
    (Prof. Henrik K. Nielsen)

3
Research _at_ HIA IKT
  • System modeling transformations (Prof. A Prinz)
  • Context description, reasoning, aggregation
    (Prof. R. Nossum)
  • Business innovation and user aspects (Prof. P.E.
    Pedersen)
  • Data-intensive Systems (Prof. Christian S.
    Jensen)
  • Web mining technology accessibility (Dr. M.
    Snaprud)
  • System security and business strategies (Prof.
    J.J. Gonzalez)
  • Security, privacy and trust (Prof. V. Oleshchuk)
  • Learning, adaptive automata (Dr. O.-C. Granmo,
    Prof. Oomen)
  • Wireless networking and resource awareness (Prof.
    F. Reichert)
  • Channel models, MIMO techniques and especially
    Mobile-to-Mobile aspects (Prof. M. Pätzold)

4
Quantum Physics and PhilosophyProf. Hans H.
Grelland (An Hàn Si jiàoshòu)
  • Philosophy of space and nothingness
  • in physics and in western and Chinese philosophy
    Einstein, Heidegger, Sartre, Laozi, Buddhism)
  • Philosophy of mathematics as a language in
    physics
  • Ethics and Free Will
  • Theoretical quantum mechanics

5
Ethics and EconomyProf. Dag G. Aasland
  • Business ethics and Corporate Social
    responsibility (CSR)
  • The distinction between business ethics as a
    knowledge demanded from business and ethics as an
    idea external to business rationality
  • The philosophical meaning of ethics
  • The relevance of the philosophy of Emmanuel
    Levinas on business and economy
  • Teaching ethics to business students

6
Innovation and industrial developmentProf. Arne
Isaksen, HiA, also researcher at NIFU STEP
(research institute in Oslo)
  • Regional industrial development with a special
    focus on regional clusters and innovation systems
  • The role of different types of cities in
    industrial development
  • Innovation policy instruments
  • Knowledge-intensive and cultural industries in
    economic and regional development

7
Materials Science EngineeringProf. Tor O.
Saetre
  • Aluminium Metallurgy
  • Theory of Recrystallization in Metals
  • Theory of Grain Growth in Metals
  • Hydrogen Solid State Storage (Hydrides)
  • Photovoltaic Cells and Modules

8
Axisymmetric Green Functions in Physics and
EngineeringProf. John T. Conway
  • Actuator Disk Theory in Aerodynamics
  • Gravitational Fields of Systems with Axisymmetric
    Boundaries
  • Electromagnetic Fields of Axisymmetric Systems
  • Circular Sources and Detectors of Nuclear
    Radiation
  • Solutions of the Helmholtz Wave Equation
  • Bessel and Legendre functions, Elliptic Integrals
    and functions, Epstein- Hubbell integrals

9
Research _at_ HIA IKT
  • System modeling transformations (Prof. A Prinz)
  • Context description, reasoning, aggregation
    (Prof. R. Nossum)
  • Business innovation and user aspects (Prof. P.E.
    Pedersen)
  • Data-intensive Systems (Prof. Christian S.
    Jensen)
  • Web mining technology accessibility (Dr. M.
    Snaprud)
  • System security and business strategies (Prof.
    J.J. Gonzalez)
  • Security, privacy and trust (Prof. V. Oleshchuk)
  • Learning, adaptive automata (Dr. O.-C. Granmo,
    Prof. Oomen)
  • Wireless networking and resource awareness (Prof.
    F. Reichert)
  • Channel models, MIMO techniques and especially
    Mobile-to-Mobile aspects (Prof. M. Pätzold)

10
Data-intensive SystemsProf. Christian S. Jensen
(HiA Aalborg University)
  • Data management for mobile services
  • Geographical context-awareness for mobile
    services
  • Query processing for location-based services
  • Indexing of moving objects
  • Location tracking and privacy
  • Spatio-temporal data management
  • Temporal data management

11
Data-intensive Systems Data management for
mobile services
Always-on, integrated, context-aware services
Primitive, largely off-line services
Intelligent, community-aware services
User Experience
Digitization of processes, sensor
technologies, ad-hoc networks
Increased bandwidth, new business
models, business convergence, standardization
Available cellular infrastructure, new handsets
and terminals
Key Enablers
Today
2010
2020
12
Wireless networking and resource awarenessProf.
F. Reichert, HiA IKT Agder Mobility Lab
  • Mobile network architectures and protocols
  • Short Range Communications
  • Resource Awareness Discovery
  • Wireless residential networking services
  • Mobile terminal evolution
  • SIP/IMS All-IP
  • IP independent mobile routing (future area)

13
Wireless networking and resource
awarenessTowards Trusted Ubiquitous
Communications Services
Im connectedto the WEB
Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
Few Interactive Mobile Applications
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
Peer-2-Peer-Mobile Networking
Federated Trust Identity Solutions
New Key Enablers
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
14
Business innovation and user aspects Professor
Per E. Pedersen, HiA, adj. prof. NHH
  • Business models for heterogeneous services and
    networks
  • Service innovation by electronic service
    standardization, service integration and
    self-services
  • Service adoption and technology readiness
  • Mobile service adoption and commercial effects of
    mobile services
  • Online and interactive marketing
  • Cross media services and service integration

15
Business innovation and user aspects
Non-intrusive and innovative service integration
User initiated integration of services
Service integrators
Seamless integration by all service providers
User Experience
Innovative users of heterogeneous services
Service standardization and experimental
business models
Consolidation of standards and business models
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
16
Context description, reasoning, aggregation
Prof. Dr. Rolf Nossum, HiA IKT
  • Formal theories of context and trust in
    multi-agent systems
  • Context-sensitive knowledge processing and
    management
  • Mechanised reasoning by autonomous agents
  • Knowledge management in the web
  • Ontology-based knowledge acquisition and
    retrieval

17
Context description, reasoning, aggregation
Towards context-aware computing
ambient computing power
Experience
adaptive devices
useful devices
trusted wireless short-range communication
disparate theories of trust, context, security
integrated models of trust, context, security
Enablers
Today
2010
2020
18
Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Prof. Dr.-Ing. M.
Pätzold, HiA IKT
  • Mobile communications
  • Modelling, analysis, and simulation of mobile
    fading channels
  • Multi-input multi-output (MIMO) techniques
  • Space-time coding schemes
  • Transmission techniques, especially MIMO-OFDM
  • Mobile-to-mobile communications
  • Performance analysis of mobile communication
    systems

19
Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Towards Trusted
Ubiquitous Communications Services

Im connectedto the WEB


Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
todays trends
Few Interactive Mobile Applications
your trend
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
your trend
your vision
Peer-2-PeerMobile Networking
Federated Trust Identity Solutions
New Key Enablers
your vision
your trend
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
20
System modeling transformationsProf. Andreas
Prinz, HiA IKT OSYS group
  • explicit description of model structures
  • description of model transformations
  • automatic code generation
  • explicit description of semantics
  • formal description and analysis of protocols and
    systems

21
System modeling transformations Towards
correct programming
ad-hoc modeling using fixed languages
domain specific modeling languages and tool
support for them
agreement on best practice for defining
languages including patterns
Software Engineering
simple domain specific languages
individual methods for proving correctness
integrated environments for correct programming
only correct programming engineering
Correct Programming
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
22
Open Source, Web mining, and AccessibilityDr. M.
Snaprud, HiA IKT OSYS group
  • Automatic web accessibility evaluation
  • Open Source applications
  • Software Engineering based on Open Source
  • Platforms for on-line collaboration
  • ICT policy
  • Measurements of the status and effects of
    eGovernment
  • Quantifiable indicators in eDemocracy

23
Open Source, Web mining, and AccessibilityTowards
an Information Society for All
Problems accessing some information and
services with different terminals etc.
All static information is accessible, but some
services do not work.
All relevant information and services are
accessible
User Experience
Common criteria for European accessibility
requirements for Public procurement
UWEM is defined and approved. Wider use of Open
Source tools
A Unified Web Evaluation Methodology (UWEM) is
formed
New Key Enablers
Different guidelines and many ways to use them
Harmonised guidelines implementations based
on unified methdodology
Large scale evaluation established as element
of eDemocracy
Automatic web access evaluation
W3C, Section 508...
W3C/WCAG2.0
Today
2010
2020
24
Learning AutomataDr. O.-C. Granmo (HiA), Prof.
B. J. Oommen (HiA Carleton)
  • Learning and Adaptivity in Unknown Stochastic
    Environments
  • Resource Allocation
  • Routing
  • QoS Control
  • Monitoring
  • Optimization

25
Learning AutomataTowards Self-Optimizing
Pervasive Computing

User Experience
Self-Optimizing Constellations of Computing
Devices
Self-Optimizing Routing, Access
Control, Monitoring, ...
Self-Optimizing Computing Devices
Learning Automata for Routing, Access
Control, Monitoring, ...
Integration of Learning Automata Approaches
Pervasive Learning Automata Solutions Found
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
26
Security, privacy and trustProf. V. Oleshchuk
  • Formal models for security, privacy and trust in
    mobile systems
  • Privacy and ID management issues in mobile
    computing
  • Security and trust aspects in ubiquitous
    computing
  • Location and identity privacy preserving issues
  • Privacy preserving information retrieval
  • Security, privacy and anonymity in medical
    information systems

27
Security, privacy and trust Towards Trusted
Ubiquitous Communications Services
Im securely connected to the direct
environmentaround me with preserving my privacy
Im connectedto the WEB
I have whatever I needat hand securely and
privately
User Experience
Few Interactive Mobile Applications
Disparate security solutions with (very
limited) privacy protection
Integrated security solutions for P2P /Ad Hoc
mobile networking preserving privacy
Federated context- aware, self-adaptable, trust
based security solutions preserving privacy and
anonymity.
New Key Enablers

WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
IMS, 4G
2G, 2.5G, 3G
Today
2010
2020
28
Security and Quality in OrganizationsProf. Jose
J. Gonzalez
  • Security as continuous improvement process
  • Security management
  • Effectiveness of Computer Security Incident
    Response Teams (CSIRTs)
  • Lifetime of software vulnerabilities
  • Patching policies for software vulnerabilities
  • Security and safety in eOperations in the oil
    gas industry
  • Security in organizational transition to
    adjacencies
  • Human factors in security

29
Wireless Short Range Communications
AccessPoint 2
Remote Service, e.g. news service
Internet
UPnP DLNA
Internet Access Remote Services
Home, Workplace School, Sports Club,
Local Access Local Services
WiFi, BT UWB
AccessPoint 1
Wireless Peers
LocalNetwork
Local Service e.g. file service
Write a Comment
User Comments (0)
About PowerShow.com