Title: Research Areas HiA Grimstad
1Research Areas _at_ HiA Grimstad
- Agder University College
- Norway
2Research _at_ HiA Grimstad
- Quantum Physics and Philosophy (Prof. Hans H.
Grelland) - Ethics and Economy (Prof. Dag G. Aasland)
- Innovation and Industrial Development (Prof. Arne
Isaksen) - Materials Science Engineering (Prof. Tor O.
Saetre) - Axisymmetric Green Functions in Physics and
Engineering (Prof. T. Conway) - Power Electronics, Green Power (Prof. Ole-Morten
Midtgård) - Sold Oxide Fuel Cell (Prof. Hugh Middleton)
- Energy Crops for Combustion and Gasification
(Prof. Henrik K. Nielsen)
3Research _at_ HIA IKT
- System modeling transformations (Prof. A Prinz)
- Context description, reasoning, aggregation
(Prof. R. Nossum) - Business innovation and user aspects (Prof. P.E.
Pedersen) - Data-intensive Systems (Prof. Christian S.
Jensen) - Web mining technology accessibility (Dr. M.
Snaprud) - System security and business strategies (Prof.
J.J. Gonzalez) - Security, privacy and trust (Prof. V. Oleshchuk)
- Learning, adaptive automata (Dr. O.-C. Granmo,
Prof. Oomen) - Wireless networking and resource awareness (Prof.
F. Reichert) - Channel models, MIMO techniques and especially
Mobile-to-Mobile aspects (Prof. M. Pätzold)
4Quantum Physics and PhilosophyProf. Hans H.
Grelland (An Hàn Si jiàoshòu)
- Philosophy of space and nothingness
- in physics and in western and Chinese philosophy
Einstein, Heidegger, Sartre, Laozi, Buddhism) - Philosophy of mathematics as a language in
physics - Ethics and Free Will
- Theoretical quantum mechanics
5Ethics and EconomyProf. Dag G. Aasland
- Business ethics and Corporate Social
responsibility (CSR) - The distinction between business ethics as a
knowledge demanded from business and ethics as an
idea external to business rationality - The philosophical meaning of ethics
- The relevance of the philosophy of Emmanuel
Levinas on business and economy - Teaching ethics to business students
6Innovation and industrial developmentProf. Arne
Isaksen, HiA, also researcher at NIFU STEP
(research institute in Oslo)
- Regional industrial development with a special
focus on regional clusters and innovation systems - The role of different types of cities in
industrial development - Innovation policy instruments
- Knowledge-intensive and cultural industries in
economic and regional development
7Materials Science EngineeringProf. Tor O.
Saetre
- Aluminium Metallurgy
- Theory of Recrystallization in Metals
- Theory of Grain Growth in Metals
- Hydrogen Solid State Storage (Hydrides)
- Photovoltaic Cells and Modules
8Axisymmetric Green Functions in Physics and
EngineeringProf. John T. Conway
- Actuator Disk Theory in Aerodynamics
- Gravitational Fields of Systems with Axisymmetric
Boundaries - Electromagnetic Fields of Axisymmetric Systems
- Circular Sources and Detectors of Nuclear
Radiation - Solutions of the Helmholtz Wave Equation
- Bessel and Legendre functions, Elliptic Integrals
and functions, Epstein- Hubbell integrals
9Research _at_ HIA IKT
- System modeling transformations (Prof. A Prinz)
- Context description, reasoning, aggregation
(Prof. R. Nossum) - Business innovation and user aspects (Prof. P.E.
Pedersen) - Data-intensive Systems (Prof. Christian S.
Jensen) - Web mining technology accessibility (Dr. M.
Snaprud) - System security and business strategies (Prof.
J.J. Gonzalez) - Security, privacy and trust (Prof. V. Oleshchuk)
- Learning, adaptive automata (Dr. O.-C. Granmo,
Prof. Oomen) - Wireless networking and resource awareness (Prof.
F. Reichert) - Channel models, MIMO techniques and especially
Mobile-to-Mobile aspects (Prof. M. Pätzold)
10Data-intensive SystemsProf. Christian S. Jensen
(HiA Aalborg University)
- Data management for mobile services
- Geographical context-awareness for mobile
services - Query processing for location-based services
- Indexing of moving objects
- Location tracking and privacy
- Spatio-temporal data management
- Temporal data management
11Data-intensive Systems Data management for
mobile services
Always-on, integrated, context-aware services
Primitive, largely off-line services
Intelligent, community-aware services
User Experience
Digitization of processes, sensor
technologies, ad-hoc networks
Increased bandwidth, new business
models, business convergence, standardization
Available cellular infrastructure, new handsets
and terminals
Key Enablers
Today
2010
2020
12Wireless networking and resource awarenessProf.
F. Reichert, HiA IKT Agder Mobility Lab
- Mobile network architectures and protocols
- Short Range Communications
- Resource Awareness Discovery
- Wireless residential networking services
- Mobile terminal evolution
- SIP/IMS All-IP
- IP independent mobile routing (future area)
13Wireless networking and resource
awarenessTowards Trusted Ubiquitous
Communications Services
Im connectedto the WEB
Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
Few Interactive Mobile Applications
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
Peer-2-Peer-Mobile Networking
Federated Trust Identity Solutions
New Key Enablers
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
14Business innovation and user aspects Professor
Per E. Pedersen, HiA, adj. prof. NHH
- Business models for heterogeneous services and
networks - Service innovation by electronic service
standardization, service integration and
self-services - Service adoption and technology readiness
- Mobile service adoption and commercial effects of
mobile services - Online and interactive marketing
- Cross media services and service integration
15Business innovation and user aspects
Non-intrusive and innovative service integration
User initiated integration of services
Service integrators
Seamless integration by all service providers
User Experience
Innovative users of heterogeneous services
Service standardization and experimental
business models
Consolidation of standards and business models
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
16Context description, reasoning, aggregation
Prof. Dr. Rolf Nossum, HiA IKT
- Formal theories of context and trust in
multi-agent systems - Context-sensitive knowledge processing and
management - Mechanised reasoning by autonomous agents
- Knowledge management in the web
- Ontology-based knowledge acquisition and
retrieval
17Context description, reasoning, aggregation
Towards context-aware computing
ambient computing power
Experience
adaptive devices
useful devices
trusted wireless short-range communication
disparate theories of trust, context, security
integrated models of trust, context, security
Enablers
Today
2010
2020
18Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Prof. Dr.-Ing. M.
Pätzold, HiA IKT
- Mobile communications
- Modelling, analysis, and simulation of mobile
fading channels - Multi-input multi-output (MIMO) techniques
- Space-time coding schemes
- Transmission techniques, especially MIMO-OFDM
- Mobile-to-mobile communications
- Performance analysis of mobile communication
systems
19Channel Models, MIMO Techniques, and
Mobile-to-Mobile Aspects Towards Trusted
Ubiquitous Communications Services
Im connectedto the WEB
Im connected to the direct environmentaround
me
I havewhatever I needat hand
User Experience
todays trends
Few Interactive Mobile Applications
your trend
Swissknife Phones Java/J2ME/XML WS Digital
MultiMedia WiFi Home Networking
your trend
your vision
Peer-2-PeerMobile Networking
Federated Trust Identity Solutions
New Key Enablers
your vision
your trend
Widely deployed WiFi Access Services
Virtual, networked device components service
extensions
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
20System modeling transformationsProf. Andreas
Prinz, HiA IKT OSYS group
- explicit description of model structures
- description of model transformations
- automatic code generation
- explicit description of semantics
- formal description and analysis of protocols and
systems
21System modeling transformations Towards
correct programming
ad-hoc modeling using fixed languages
domain specific modeling languages and tool
support for them
agreement on best practice for defining
languages including patterns
Software Engineering
simple domain specific languages
individual methods for proving correctness
integrated environments for correct programming
only correct programming engineering
Correct Programming
yourtrend
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
22Open Source, Web mining, and AccessibilityDr. M.
Snaprud, HiA IKT OSYS group
- Automatic web accessibility evaluation
- Open Source applications
- Software Engineering based on Open Source
- Platforms for on-line collaboration
- ICT policy
- Measurements of the status and effects of
eGovernment - Quantifiable indicators in eDemocracy
23Open Source, Web mining, and AccessibilityTowards
an Information Society for All
Problems accessing some information and
services with different terminals etc.
All static information is accessible, but some
services do not work.
All relevant information and services are
accessible
User Experience
Common criteria for European accessibility
requirements for Public procurement
UWEM is defined and approved. Wider use of Open
Source tools
A Unified Web Evaluation Methodology (UWEM) is
formed
New Key Enablers
Different guidelines and many ways to use them
Harmonised guidelines implementations based
on unified methdodology
Large scale evaluation established as element
of eDemocracy
Automatic web access evaluation
W3C, Section 508...
W3C/WCAG2.0
Today
2010
2020
24Learning AutomataDr. O.-C. Granmo (HiA), Prof.
B. J. Oommen (HiA Carleton)
- Learning and Adaptivity in Unknown Stochastic
Environments - Resource Allocation
- Routing
- QoS Control
- Monitoring
- Optimization
25Learning AutomataTowards Self-Optimizing
Pervasive Computing
User Experience
Self-Optimizing Constellations of Computing
Devices
Self-Optimizing Routing, Access
Control, Monitoring, ...
Self-Optimizing Computing Devices
Learning Automata for Routing, Access
Control, Monitoring, ...
Integration of Learning Automata Approaches
Pervasive Learning Automata Solutions Found
New Key Enablers
WiFi100 Mpbs
WiFi, UWB, 500 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
2G, 2.5G, 3G
IMS, 4G
Today
2010
2020
26Security, privacy and trustProf. V. Oleshchuk
- Formal models for security, privacy and trust in
mobile systems - Privacy and ID management issues in mobile
computing - Security and trust aspects in ubiquitous
computing - Location and identity privacy preserving issues
- Privacy preserving information retrieval
- Security, privacy and anonymity in medical
information systems
27Security, privacy and trust Towards Trusted
Ubiquitous Communications Services
Im securely connected to the direct
environmentaround me with preserving my privacy
Im connectedto the WEB
I have whatever I needat hand securely and
privately
User Experience
Few Interactive Mobile Applications
Disparate security solutions with (very
limited) privacy protection
Integrated security solutions for P2P /Ad Hoc
mobile networking preserving privacy
Federated context- aware, self-adaptable, trust
based security solutions preserving privacy and
anonymity.
New Key Enablers
WiFi, UWB, 500 Mpbs
WiFi100 Mpbs
Multi-AccessAll-IPAmbient Networks
Wireless Networks
IMS, 4G
2G, 2.5G, 3G
Today
2010
2020
28Security and Quality in OrganizationsProf. Jose
J. Gonzalez
- Security as continuous improvement process
- Security management
- Effectiveness of Computer Security Incident
Response Teams (CSIRTs) - Lifetime of software vulnerabilities
- Patching policies for software vulnerabilities
- Security and safety in eOperations in the oil
gas industry - Security in organizational transition to
adjacencies - Human factors in security
29Wireless Short Range Communications
AccessPoint 2
Remote Service, e.g. news service
Internet
UPnP DLNA
Internet Access Remote Services
Home, Workplace School, Sports Club,
Local Access Local Services
WiFi, BT UWB
AccessPoint 1
Wireless Peers
LocalNetwork
Local Service e.g. file service