liu.seSearch for publications in DiVA
Endre søk
Begrens søket
1234567 1 - 50 of 2689
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Abbas, Qaisar
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Weak Boundary and Interface Procedures for Wave and Flow Problems2011Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    In this thesis, we have analyzed the accuracy and stability aspects of weak boundary and interface conditions (WBCs) for high order finite difference methods on Summations-By-Parts (SBP) form. The numerical technique has been applied to wave propagation and flow problems.

    The advantage of WBCs over strong boundary conditions is that stability of the numerical scheme can be proven. The boundary procedures in the advection-diffusion equation for a boundary layer problem is analyzed. By performing Navier-Stokes calculations, it is shown that most of the conclusions from the model problem carries over to the fully nonlinear case.

    The work was complemented to include the new idea of using WBCs on multiple grid points in a region, where the data is known, instead of at a single point. It was shown that we can achieve high accuracy, an increased rate of convergence to steady-state and non-reflecting boundary conditions by using this approach.

    Using the SBP technique and WBCs, we have worked out how to construct conservative and energy stable hybrid schemes for shocks using two different approaches. In the first method, we combine a high order finite difference scheme with a second order MUSCL scheme. In the second method, a procedure to locally change the order of accuracy of the finite difference schemes is developed. The main purpose is to obtain a higher order accurate scheme in smooth regions and a low order non-oscillatory scheme in the vicinity of shocks.

    Furthermore, we have analyzed the energy stability of the MUSCL scheme, by reformulating the scheme in the framework of SBP and artificial dissipation operators. It was found that many of the standard slope limiters in the MUSCL scheme do not lead to a negative semi-definite dissipation matrix, as required to get pointwise stability.

    Finally, high order simulations of shock diffracting over a convex wall with two facets were performed. The numerical study is done for a range of Reynolds numbers. By monitoring the velocities at the solid wall, it was shown that the computations were resolved in the boundary layer. Schlieren images from the computational results were obtained which displayed new interesting flow features.

  • 2.
    Abbas, Qaisar
    et al.
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Nordström, Jan
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Weak versus strong no-slip boundary conditions for the Navier-Stokes equations2010Inngår i: Engineering Applications of Computational Fluid Mechanics, ISSN 1994-2060, Vol. 4, s. 29-38Artikkel i tidsskrift (Fagfellevurdert)
  • 3.
    Abbas, Qaisar
    et al.
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Nordström, Jan
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Weak versus Strong No-Slip Boundary Conditions for the Navier-Stokes Equations2008Inngår i: Proc. 6th South African Conference on Computational and Applied Mechanics, South African Association for Theoretical and Applied Mechanics , 2008, s. 52-62Konferansepaper (Annet vitenskapelig)
  • 4.
    Abbas, Qaisar
    et al.
    Uppsala universitet, Avdelningen för teknisk databehandling.
    van der Weide, Edwin
    Nordström, Jan
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Accurate and stable calculations involving shocks using a new hybrid scheme2009Inngår i: Proc. 19th AIAA CFD Conference, AIAA , 2009Konferansepaper (Fagfellevurdert)
  • 5.
    Abbas, Qaisar
    et al.
    Uppsala universitet, Avdelningen för teknisk databehandling.
    van der Weide, Edwin
    Faculty of Engineering Technology, University of Twente, AE Enschede, The Netherlands.
    Nordström, Jan
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Energy Stability of the MUSCL Scheme2010Inngår i: Proc. 7th South African Conference on Computational and Applied Mechanics, South African Association for Theoretical and Applied Mechanics , 2010, s. 65:1-8Konferansepaper (Annet vitenskapelig)
  • 6.
    Abbas, Qaisar
    et al.
    Uppsala universitet, Avdelningen för teknisk databehandling.
    van der Weide, Edwin
    Nordström, Jan
    Uppsala universitet, Avdelningen för teknisk databehandling.
    Energy stability of the MUSCL scheme2010Inngår i: Numerical Mathematics and Advanced Applications: 2009, Berlin: Springer-Verlag , 2010, s. 61-68Konferansepaper (Fagfellevurdert)
  • 7.
    Abdallah, Nancy
    et al.
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik.
    Hansson, Mikael
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Hultman, Axel
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Topology of posets with special partial matchings2019Inngår i: Advances in Mathematics, ISSN 0001-8708, E-ISSN 1090-2082, Vol. 348, s. 255-276Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Special partial matchings (SPMs) are a generalisation of Brentis special matchings. Let a pircon be a poset in which every non-trivial principal order ideal is finite and admits an SPM. Thus pircons generalise Mariettis zircons. We prove that every open interval in a pircon is a PL ball or a PL sphere. It is then demonstrated that Bruhat orders on certain twisted identities and quasiparabolic W-sets constitute pircons. Together, these results extend a result of Can, Cherniaysky, and Twelbeck, prove a conjecture of Hultman, and confirm a claim of Rains and Vazirani.

  • 8.
    Abdallah, Nancy
    et al.
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Hultman, Axel
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Combinatorial invariance of Kazhdan-Lusztig-Vogan polynomials for fixed point free involutions2018Inngår i: Journal of Algebraic Combinatorics, ISSN 0925-9899, E-ISSN 1572-9192, Vol. 47, nr 4, s. 543-560Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    When acts on the flag variety of , the orbits are in bijection with fixed point free involutions in the symmetric group . In this case, the associated Kazhdan-Lusztig-Vogan polynomials can be indexed by pairs of fixed point free involutions , where denotes the Bruhat order on . We prove that these polynomials are combinatorial invariants in the sense that if is a poset isomorphism of upper intervals in the Bruhat order on fixed point free involutions, then for all v amp;gt;= u.

  • 9.
    Abdulla, Ariyan
    et al.
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska fakulteten.
    Andersson, Erik
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska fakulteten.
    Heuristiska algoritmer för schemaläggning i real-tidssystem med hänsyn till data beroenden2018Independent thesis Basic level (degree of Bachelor), 10,5 poäng / 16 hpOppgave
    Abstract [en]

    The schedule for the jobs in a real-time system can have a huge impact on how the system behave. Since real-time systems are common in safety applications it is important that the scheduling is done in a valid way. Furthermore, one can enhance the performance of the applications by minimizing data latency and jitter. A challenge is that jobs in real-time systems usually have complex constraints making it too time consuming to minimize data latency and jitter to optimality. The purpose of this report is to investigate the possibility of creating high quality schedules using heuristics, with the goal to keep the computational time under one minute. This will be done by comparing three different algorithms that will be used on real scheduling instances provided by the company Arcticus. The first algorithm is a greedy heuristic, the second one a local search and the third one is a metaheuristic, simulated annealing. The results indicate that the data latency can be reduced whilst keeping the computational time below one minute.

  • 10.
    Abidin, Aysajan
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions2010Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally secure. The standard in Quantum Cryptography is to use theWegman-Carter authentication, which is unconditionally secure and is based on the idea of universal hashing.

    In this thesis, we first investigate properties of a Strongly Universal hash function family to facilitate understanding the properties of (classical) authentication used in Quantum Cryptography. Then, we study vulnerabilities of a recently proposed authentication protocol intended to rule out a "man-in-the-middle" attack on Quantum Cryptography. Here, we point out that the proposed authentication primitive is not secure when used in a generic Quantum Cryptographic protocol. Lastly, we estimate the lifetime of authentication using encrypted tags when the encryption key is partially known. Under simplifying assumptions, we derive that the lifetime is linearly dependent on the length of the authentication key. Experimental results that support the theoretical results are also presented.

    Delarbeid
    1. Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    Åpne denne publikasjonen i ny fane eller vindu >>Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    2009 (engelsk)Inngår i: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, s. 289-293Konferansepaper, Publicerat paper (Fagfellevurdert)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

    sted, utgiver, år, opplag, sider
    New York: American Institute of Physics, 2009
    Emneord
    Quantum cryptography, Quantum theory, Probability
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-18738 (URN)10.1063/1.3109951 (DOI)
    Konferanse
    Foundations of Probability and Physics—5, Växjö, augusti 2008
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2009-06-03 Laget: 2009-06-03 Sist oppdatert: 2016-08-31
    2. Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    Åpne denne publikasjonen i ny fane eller vindu >>Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    2009 (engelsk)Inngår i: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, nr 5, s. 1047-1052Artikkel i tidsskrift (Fagfellevurdert) Published
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Emneord
    Quantum cryptography, quantum key distribution, authentication
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-20405 (URN)10.1142/S0219749909005754 (DOI)
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2009-09-08 Laget: 2009-09-07 Sist oppdatert: 2019-08-15bibliografisk kontrollert
    3. Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially Known
    Åpne denne publikasjonen i ny fane eller vindu >>Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially Known
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    Quantum cryptography is an unconditionally secure key growing technique provided that an unconditionally secure authentication protocol is combined with it. This paper is about the study of the lifetime of a message authentication scheme, where a message to be authenticated is first hashed by a secret–but fixed–Strongly Universal hash function then the output is encrypted with a one-time-pad key to generate a tag for the message. If the onetime-pad is completely secret, then the lifetime is exponential in the tag length. If, however, the one-time-pad key is partially known in each authentication round, as is the case in practical quantum key distribution protocols, then the picture is different; because the adversary’s partial knowledge of the one-time-pad key in each authentication round contributes to his/her ability to identify the secret hash function. We estimate the lifetime of this type of authentication. Here the parameters are the length of the key identifying the secret hash function and the amount of knowledge that Eve has on the one-time-pad. A theoretical estimate is presented, along with experimental results that support it.

    Emneord
    Quantum cryptography, quantum key distribution, authentication, strongly universal hash functions, lifetime
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-57289 (URN)
    Prosjekter
    ICG QC
    Tilgjengelig fra: 2010-06-16 Laget: 2010-06-16 Sist oppdatert: 2016-08-31
  • 11.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Matematiska institutionen. Linköpings universitet, Tekniska högskolan.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially KnownManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    Quantum cryptography is an unconditionally secure key growing technique provided that an unconditionally secure authentication protocol is combined with it. This paper is about the study of the lifetime of a message authentication scheme, where a message to be authenticated is first hashed by a secret–but fixed–Strongly Universal hash function then the output is encrypted with a one-time-pad key to generate a tag for the message. If the onetime-pad is completely secret, then the lifetime is exponential in the tag length. If, however, the one-time-pad key is partially known in each authentication round, as is the case in practical quantum key distribution protocols, then the picture is different; because the adversary’s partial knowledge of the one-time-pad key in each authentication round contributes to his/her ability to identify the secret hash function. We estimate the lifetime of this type of authentication. Here the parameters are the length of the key identifying the secret hash function and the amount of knowledge that Eve has on the one-time-pad. A theoretical estimate is presented, along with experimental results that support it.

  • 12.
    Abidin, Aysajan
    et al.
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography2009Inngår i: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, s. 289-293Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

  • 13.
    Abrahamsson, Olle
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    A Gröbner basis algorithm for fast encoding of Reed-Müller codes2016Independent thesis Basic level (degree of Bachelor), 10,5 poäng / 16 hpOppgave
    Abstract [en]

    In this thesis the relationship between Gröbner bases and algebraic coding theory is investigated, and especially applications towards linear codes, with Reed-Müller codes as an illustrative example. We prove that each linear code can be described as a binomial ideal of a polynomial ring, and that a systematic encoding algorithm for such codes is given by the remainder of the information word computed with respect to the reduced Gröbner basis. Finally we show how to apply the representation of a code by its corresponding polynomial ring ideal to construct a class of codes containing the so called primitive Reed-Müller codes, with a few examples of this result.

  • 14.
    Abrahamsson, Olle
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem.
    Hide and Seek in a Social Network2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In this thesis a known heuristic for decreasing a node's centrality scores while maintaining influence, called ROAM, is compared to a modified version specifically designed to decrease eigenvector centrality. The performances of these heuristics are also tested against the Shapley values of a cooperative game played over the considered network, where the game is such that influential nodes receive higher Shapley values. The modified heuristic performed at least as good as the original ROAM, and in some instances even better (especially when the terrorist network behind the World Trade Center attacks was considered). Both heuristics increased the influence score for a given targeted node when applied consecutively on the WTC network, and consequently the Shapley values increased as well. Therefore the Shapley value of the game considered in this thesis seems to be well suited for discovering individuals that are assumed to actively trying to evade social network analysis.

  • 15.
    Accardi, Luigi
    et al.
    Università di Roma “Tor Vergata”, Italy.
    Belavkin, V. P.
    University of Nottingham, UK.
    Kent, Johyn T.
    University of Leeds, UK.
    Brody, Dorje C.
    Imperial College, London, UK.
    Bingham, N. H.
    Brunel University, Uxbridge, UK.
    Frey, Jeremy G.
    University of Southampton, UK.
    Helland, Inge S.
    University of Oslo, Norway.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Majumdar, N. K.
    London, UK.
    Minozzo, Marco
    University of Perugia, Italy.
    Thompson, J. W.
    University of Hull, UK.
    Discussion on “On quantum statistical inference” by O. E. Barndorff-Nielsen, R. D. Gill and P.E. Jupp2003Inngår i: Journal of The Royal Statistical Society Series B-statistical Methodology, ISSN 1369-7412, E-ISSN 1467-9868, Vol. 65, nr 4, s. 805-816s. 805-816Artikkel i tidsskrift (Fagfellevurdert)
  • 16.
    Adamowicz, Tomasz
    et al.
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Björn, Anders
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Björn, Jana
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Regularity of p(.)-superharmonic functions, the Kellogg property and semiregular boundary points2014Inngår i: Annales de l'Institut Henri Poincare. Analyse non linéar, ISSN 0294-1449, E-ISSN 1873-1430, Vol. 31, nr 6, s. 1131-1153Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We study various boundary and inner regularity questions for p(.)-(super)harmonic functions in Euclidean domains. In particular, we prove the Kellogg property and introduce a classification of boundary points for p(.)-harmonic functions into three disjoint classes: regular, semiregular and strongly irregular points. Regular and especially semiregular points are characterized in many ways. The discussion is illustrated by examples. Along the way, we present a removability result for bounded p(.)-harmonic functions and give some new characterizations of W-0(1,p(.)) spaces. We also show that p(.)-superharmonic functions are lower semicontinuously regularized, and characterize them in terms of lower semicontinuously regularized supersolutions.

  • 17.
    Adib Yaghmaie, Farnaz
    et al.
    Linköpings universitet, Institutionen för systemteknik, Reglerteknik. Linköpings universitet, Tekniska fakulteten. Nanyang Technol Univ, Singapore.
    Movric, Kristian Hengster
    Czech Tech Univ, Czech Republic.
    Lewis, Frank L.
    Univ Texas Arlington, TX 76019 USA; Northeastern Univ, Peoples R China.
    Su, Rong
    Nanyang Technol Univ, Singapore.
    Differential graphical games for H-infinity control of linear heterogeneous multiagent systems2019Inngår i: International Journal of Robust and Nonlinear Control, ISSN 1049-8923, E-ISSN 1099-1239, Vol. 29, nr 10, s. 2995-3013Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Differential graphical games have been introduced in the literature to solve state synchronization problem for linear homogeneous agents. When the agents are heterogeneous, the previous notion of graphical games cannot be used anymore and a new definition is required. In this paper, we define a novel concept of differential graphical games for linear heterogeneous agents subject to external unmodeled disturbances, which contain the previously introduced graphical game for homogeneous agents as a special case. Using our new formulation, we can solve both the output regulation and H-infinity output regulation problems. Our graphical game framework yields coupled Hamilton-Jacobi-Bellman equations, which are, in general, impossible to solve analytically. Therefore, we propose a new actor-critic algorithm to solve these coupled equations numerically in real time. Moreover, we find an explicit upper bound for the overall L2-gain of the output synchronization error with respect to disturbance. We demonstrate our developments by a simulation example.

  • 18.
    Adolfsson, Anna
    et al.
    Linköpings universitet, Institutionen för utbildningsvetenskap.
    Hesslid, Anna-Carin
    Linköpings universitet, Institutionen för utbildningsvetenskap.
    Lärarens matematikundervisning: elevens matematikutveckling? En studie om matematiksvårigheter.2002Independent thesis Basic level (professional degree)Oppgave
    Abstract [sv]

    Examensarbetet ger en bild av både lärares och forskares syn på matematiksvårigheter samt deras uppfattning om orsakerna bakom problemen. Vi har undersökt vilka områden i matematiken som elever med matematiksvårigheter har mest problem med samt hur läraren förklarar och underlättar matematiken för dessa elever. Både forskningen och de lärare vi intervjuat är överens om att begreppet matematiksvårigheter är väldigt komplext. Orsakerna kan vara av medicinsk/neurologisk, psykologisk, sociologisk och didaktisk karaktär.

    I våra intervjuer framkommer att positionssystemet, bråk, procent, enheter, multiplikation och division är de områden som kan ställa till mest problem för elever med matematiksvårigheter. Dessa områden nämns även inom forskningen som möjliga problemområden. För att underlätta matematiken för elever med matematiksvårigheter anser forskarna att det är viktigt att undervisningen utgår från elevernas erfarenheter och förkunskaper. De påpekar också vikten av att undervisningen varieras och bör innefatta såväl laborativa som teoretiska arbetssätt där även diskussioner och gruppuppgifter ska förekomma. För att se på vilken nivå lärarna börjar förklara för elever med matematiksvårigheter gav vi dem tre uppgifter som de fick förklara. Svaren placerades in i fyra kategorier:

    1 Erfarenhet/vardag,

    2. Konkret material,

    3. Rita,

    4. Räkna.

    Resultatet visar att lärarna oftast börjar sin förklaring i kategori fyra. Många hamnar i kategori tre och väldigt få hamnar i kategori ett och två.

  • 19.
    Aerts, Sven
    et al.
    Fundamenten van de Exacte Wetenschappen, Vrije Universiteit Brussel, Brussel, Belgium.
    Kwiat, Paul
    Los Alamos National Laboratory, Los Alamos, New Mexico.
    Larsson, Jan-Åke
    Linköpings universitet, Matematiska institutionen. Linköpings universitet, Tekniska högskolan.
    Zukowski, Marek
    Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet Gdański, Gdańsk, Poland .
    Two-photon Franson-type experiments and local realism1999Inngår i: Physical Review Letters, ISSN 0031-9007, E-ISSN 1079-7114, Vol. 83, nr 15, s. 2872-2876Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The two-photon interferometric experiment proposed by J. D. Franson [Phys. Rev. Lett. 62, 2205 (1989)] is often treated as a “Bell test of local realism.” However, it has been suggested that this is incorrect due to the 50% postselection performed even in the ideal gedanken version of the experiment. Here we present a simple local hidden variable model of the experiment that successfully explains the results obtained in usual realizations of the experiment, even with perfect detectors. Furthermore, we also show that there is no such model if the switching of the local phase settings is done at a rate determined by the internal geometry of the interferometers.

  • 20.
    Aghapournahr, M
    et al.
    Arak University.
    Melkersson, Leif
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Finiteness properties of minimax and coatomic local cohomology modules2010Inngår i: ARCHIV DER MATHEMATIK, ISSN 0003-889X, Vol. 94, nr 6, s. 519-528Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Let R be a noetherian ring, alpha an ideal of R, and M an R-module. We prove that for a finite module M, if H-alpha(i)(M) is minimax for all i andgt;= r andgt;= 1, then H-alpha(i)(M) is artinian for i andgt;= r. A local-global principle for minimax local cohomology modules is shown. If H-alpha(i)(M) is coatomic for i andlt;= r (M finite) then H-alpha(i)(M) is finite for i andlt;= r. We give conditions for a module which is locally minimax to be a minimax module. A non-vanishing theorem and some vanishing theorems are proved for local cohomology modules.

  • 21.
    Aghapournahr, Moharram
    et al.
    Arak University.
    Melkersson, Leif
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    A natural map in local cohomology2010Inngår i: ARKIV FOR MATEMATIK, ISSN 0004-2080, Vol. 48, nr 2, s. 243-251Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Let R be a Noetherian ring, a an ideal of R, M an R-module and n a non-negative integer. In this paper we first study the finiteness properties of the kernel and the cokernel of the natural map f: Ext(R)(n) (R/alpha, M) -andgt; Hom(R)(R/alpha, H-alpha(n) (M)), under some conditions on the previous local cohomology modules. Then we get some corollaries about the associated primes and Artinianness of local cohomology modules. Finally we will study the asymptotic behavior of the kernel and the cokernel of the natural map in the graded case.

  • 22.
    Aghapournahr, Moharram
    et al.
    Arak Univ, Arak, Iran.
    Melkersson, Leif
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    COFINITENESS AND COASSOCIATED PRIMES OF LOCAL COHOMOLOGY MODULES2009Inngår i: Mathematica Scandinavica, ISSN 0025-5521, E-ISSN 1903-1807, Vol. 105, nr 2, s. 161-170Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Let R be a noetherian ring, alpha an ideal of R such that dim R/alpha = 1 and M a finite R-module. We will study cofiniteness and some other properties of the local cohomology modules H-alpha(i)(M). For an arbitrary ideal alpha and an R-module M (not necessarily finite), we will characterize alpha-cofinite artinian local cohomology modules. Certain sets of coassociated primes of top local cohomology modules over local rings are characterized.

  • 23.
    Agwa, Mohamed
    et al.
    Department of Mechanical Design and Production Engineering, Faculty of Engineering, Zagazig Egypt.
    Andersson, Lars-Erik
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Pinto da Costa, Ant´onio
    Departamento de Engenharia Civil, Instituto Superior T´ecnico and ICIST, Universidade T´ecnica de Lisboa, Avenida Rovisco Pais, 1049 􀀀 001 Lisboa, Portugal.
    Critical bounds for discrete frictional incremental problems, rateproblems and wedging problems2012Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    Summary. Questions of existence and uniqueness for discrete frictional quasi-static incremental problems, rate problems and wedging problems are discussed. Various methods to compute critical bounds for the coefficient of friction which guarantee existence and uniqueness are described, as well as the sharpness of the bounds and their interdependence.

  • 24.
    Ahlinder, Jon
    et al.
    Totalförsvarets Forskningsinstitut, FOI, Stockholm, Sweden.
    Nordgaard, Anders
    Linköpings universitet, Institutionen för datavetenskap, Statistik och maskininlärning. Linköpings universitet, Filosofiska fakulteten. Swedish National Forensic Centre (NFC), Linköping, Sweden.
    Wiklund Lindström, Susanne
    Totalförsvarets Forskningsinstitut, FOI, Stockholm, Sweden.
    Chemometrics comes to court: evidence evaluation of chem–bio threat agent attacks2015Inngår i: Journal of Chemometrics, ISSN 0886-9383, E-ISSN 1099-128X, Vol. 29, nr 5, s. 267-276Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Forensic statistics is a well-established scientific field whose purpose is to statistically analyze evidence in order to support legal decisions. It traditionally relies on methods that assume small numbers of independent variables and multiple samples. Unfortunately, such methods are less applicable when dealing with highly correlated multivariate data sets such as those generated by emerging high throughput analytical technologies. Chemometrics is a field that has a wealth of methods for the analysis of such complex data sets, so it would be desirable to combine the two fields in order to identify best practices for forensic statistics in the future. This paper provides a brief introduction to forensic statistics and describes how chemometrics could be integrated with its established methods to improve the evaluation of evidence in court.

    The paper describes how statistics and chemometrics can be integrated, by analyzing a previous know forensic data set composed of bacterial communities from fingerprints. The presented strategy can be applied in cases where chemical and biological threat agents have been illegally disposed.

  • 25.
    Ahlquist, Mari
    Linköpings universitet, Matematiska institutionen. Linköpings universitet, Tekniska fakulteten.
    On Knots and DNA2017Independent thesis Basic level (degree of Bachelor), 10,5 poäng / 16 hpOppgave
    Abstract [en]

    Knot theory is the mathematical study of knots. In this thesis we study knots and one of its applications in DNA. Knot theory sits in the mathematical field of topology and naturally this is where the work begins. Topological concepts such as topological spaces, homeomorphisms, and homology are considered. Thereafter knot theory, and in particular, knot theoretical invariants are examined, aiming to provide insights into why it is difficult to answer the question "How can we tell knots appart?". In knot theory invariants such as the bracket polynomial, the Jones polynomial and tricolorability are considered as well as other helpful results like Seifert surfaces. Lastly knot theory is applied to DNA, where it will shed light on how certain enzymes interact with the genome.

  • 26.
    Ahmad, M. Rauf
    Linköpings universitet, Matematiska institutionen.
    A note on the (n, p)-asymptotics of ATS for high dimensional multivariate data2010Rapport (Annet vitenskapelig)
  • 27.
    Ahmad, M. Rauf
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    A two-sample test statistic for high-dimensional multivariate data under non-normality2011Rapport (Annet vitenskapelig)
    Abstract [en]

    Ahmad, Ohlson, and von Rosen (2011a) present asymptotic distribution of a one-sample test statistic under non-normality, when the data are high dimensional, i.e., when the dimension of the vector, p, may exceed the sample size, n. This paper extends the case to a two-sample statistic to test the difference of mean vectors of two independent multivariate distributions, again under high-dimensional set up. Using the asymptotic theory of U-statistics, and under mild assumptions on the traces of the unknown covariance matrices, the statistic is shown to follow an approximate normal distribution when n and p are large. However, no relationship between n and p is assumed. An extension to the paired case is given, which, being essentially a one-sample statistic, supplements the asymptotic results obtained in Ahmad, Ohlson, and von Rosen (2011a).

  • 28.
    Ahmad, M. Rauf
    Linköpings universitet, Matematiska institutionen. Linköpings universitet, Tekniska högskolan.
    Robustness of a one-sample statistic for mean testing of high dimensional longitudinal data2010Rapport (Annet vitenskapelig)
  • 29.
    Ahmad, M. Rauf
    et al.
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    Ohlson, Martin
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    von Rosen, Dietrich
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    A U-statistics Based Approach to Mean Testing for High Dimensional Multivariate Data Under Non-normality2011Rapport (Annet vitenskapelig)
    Abstract [en]

    A test statistic is considered for testing a hypothesis for the mean vector for multivariate data, when the dimension of the vector, p, may exceed the number of vectors, n, and the underlying distribution need not necessarily be normal. With n, p large, and under mild assumptions, the statistic is shown to asymptotically follow a normal distribution. A by product of the paper is the approximate distribution of a quadratic form, based on the reformulation of well-known Box's approximation, under high-dimensional set up.

  • 30.
    Ahmad, M. Rauf
    et al.
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    Ohlson, Martin
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    von Rosen, Dietrich
    Department of Energy and Technology, Swedish Univerity of Agricultural Sciences, SE-750 07 Uppsala, Sweden.
    Some Tests of Covariance Matrices for High Dimensional Multivariate Data2011Rapport (Annet vitenskapelig)
    Abstract [en]

    Test statistics for sphericity and identity of the covariance matrix are presented, when the data are multivariate normal and the dimension, p, can exceed the sample size, n. Using the asymptotic theory of U-statistics, the test statistics are shown to follow an approximate normal distribution for large p, also when p >> n. The statistics are derived under very general conditions, particularly avoiding any strict assumptions on the traces of the unknown covariance matrix. Neither any relationship between n and p is assumed. The accuracy of the statistics is shown through simulation results, particularly emphasizing the case when p can be much larger than n. The validity of the commonly used assumptions for high-dimensional set up is also briefly discussed.

  • 31.
    Ahmad, M. Rauf
    et al.
    Uppsala University, Sweden; Swedish University of Agriculture Science, Sweden; University of Munich, Germany.
    von Rosen, Dietrich
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska fakulteten. Swedish University of Agriculture Science, Sweden.
    Tests for high-dimensional covariance matrices using the theory of U-statistics2015Inngår i: Journal of Statistical Computation and Simulation, ISSN 0094-9655, E-ISSN 1563-5163, Vol. 85, nr 13, s. 2619-2631Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Test statistics for sphericity and identity of the covariance matrix are presented, when the data are multivariate normal and the dimension, p, can exceed the sample size, n. Under certain mild conditions mainly on the traces of the unknown covariance matrix, and using the asymptotic theory of U-statistics, the test statistics are shown to follow an approximate normal distribution for large p, also when p and#8811;n. The accuracy of the statistics is shown through simulation results, particularly emphasizing the case when p can be much larger than n. A real data set is used to illustrate the application of the proposed test statistics.

  • 32.
    Ahmad, M. Rauf
    et al.
    Uppsala University, Sweden; Swedish University of Agriculture Science, Sweden.
    von Rosen, Dietrich
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan. Swedish University of Agriculture Science, Sweden.
    Tests of Covariance Matrices for High Dimensional Multivariate Data Under Non Normality2015Inngår i: Communications in Statistics - Theory and Methods, ISSN 0361-0926, E-ISSN 1532-415X, Vol. 44, nr 7, s. 1387-1398Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Ahmad et al. (in press) presented test statistics for sphericity and identity of the covariance matrix of a multivariate normal distribution when the dimension, p, exceeds the sample size, n. In this note, we show that their statistics are robust to normality assumption, when normality is replaced with certain mild assumptions on the traces of the covariance matrix. Under such assumptions, the test statistics are shown to follow the same asymptotic normal distribution as under normality for large p, also whenp greater thangreater than n. The asymptotic normality is proved using the theory of U-statistics, and is based on very general conditions, particularly avoiding any relationship between n and p.

  • 33.
    Ahmad, M. Rauf
    et al.
    Swedish University of Agricultural Sciences, Uppsala, Sweden and Department of Statistics, Uppsala University, Sweden.
    von Rosen, Dietrich
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    Singull, Martin
    Linköpings universitet, Matematiska institutionen, Matematisk statistik. Linköpings universitet, Tekniska högskolan.
    A note on mean testing for high dimensional multivariate data under non-normality2013Inngår i: Statistica neerlandica (Print), ISSN 0039-0402, E-ISSN 1467-9574, Vol. 67, nr 1, s. 81-99Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    A test statistic is considered for testing a hypothesis for the mean vector for multivariate data, when the dimension of the vector, p, may exceed the number of vectors, n, and the underlying distribution need not necessarily be normal. With n,p→∞, and under mild assumptions, but without assuming any relationship between n and p, the statistic is shown to asymptotically follow a chi-square distribution. A by product of the paper is the approximate distribution of a quadratic form, based on the reformulation of the well-known Box's approximation, under high-dimensional set up. Using a classical limit theorem, the approximation is further extended to an asymptotic normal limit under the same high dimensional set up. The simulation results, generated under different parameter settings, are used to show the accuracy of the approximation for moderate n and large p.

  • 34.
    Ahnell, Torbjörn
    Linköpings universitet, Institutionen för utbildningsvetenskap.
    Läromedelsanalys matematik A2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Bakgrund: Rapporter från Skolverket, Nationellt Centrum för Matematikutbildning och Utbildnings-departementet visar att dagens matematikundervisning dominerande är traditionell, att eleverna har svårt för problemlösning och att eleverna i hög grad hänvisas till läromedlet. Studier visar också att inslag av undersökande pedagogik (problembaserat lärande, laborativ matematik) påverkar elevernas attityd och resultat positivt. Sedan lpf94 finns också krav i styrdokumenten som syftar till undersökande pedagogik. Mot bakgrund av detta formuleras den här studiens syfte så här:

    Syfte: Att se om inslagen av undersökande pedagogik i läromedlen för gymnasiets kurs Matematik A (eller motsvarande) har förändrat sig under perioden 1980-2006.

    Metod: ·Kvalitativ analys av stil och språkbruk.

    ·Andel uppgifter av undersökande karaktär

    ·Andel intresseväckande bilder som syftar till helhetssyn eller sammanhang.

    Resultat: Det syns tydligt ökade inslag av undersökande pedagogik sedan 80-talets läromedel Gamma Grön. Brytpunkten för denna utveckling var sannolikt början av 90-talet då gymnasiet reformerades. Sedan denna brytpunkt syns också en vidareutveckling, där nya läromedel som Den flygande matten väger in tungt.

  • 35.
    Aigner, Mats
    et al.
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Tjatyrko, Vitalij
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Nyagahakwa, Venuste
    National University of Rwanda, Rwanda.
    THE ALGEBRA OF SEMIGROUPS OF SETS2015Inngår i: Mathematica Scandinavica, ISSN 0025-5521, E-ISSN 1903-1807, Vol. 116, nr 2, s. 161-170Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We study the algebra of semigroups of sets (i.e. families of sets closed under finite unions) and its applications. For each n greater than 1 we produce two finite nested families of pairwise different semigroups of sets consisting of subsets of R" without the Baire property.

  • 36.
    Aikawa, Hiroaki
    et al.
    Hokkaido Univ, Japan.
    Björn, Anders
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Björn, Jana
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Shanmugalingam, Nageswari
    Univ Cincinnati, OH 45221 USA.
    Dichotomy of global capacity density in metric measure spaces2018Inngår i: Advances in Calculus of Variations, ISSN 1864-8258, E-ISSN 1864-8266, Vol. 11, nr 4, s. 387-404Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The variational capacity cap(p) in Euclidean spaces is known to enjoy the density dichotomy at large scales, namely that for every E subset of R-n, infx is an element of R(n)cap(p)(E boolean AND B(x, r), B(x, 2r))/cap(p)(B(x, r), B(x, 2r)) is either zero or tends to 1 as r -amp;gt; infinity. We prove that this property still holds in unbounded complete geodesic metric spaces equipped with a doubling measure supporting a p-Poincare inequality, but that it can fail in nongeodesic metric spaces and also for the Sobolev capacity in R-n. It turns out that the shape of balls impacts the validity of the density dichotomy. Even in more general metric spaces, we construct families of sets, such as John domains, for which the density dichotomy holds. Our arguments include an exact formula for the variational capacity of superlevel sets for capacitary potentials and a quantitative approximation from inside of the variational capacity.

  • 37.
    Aitken, Colin
    et al.
    School of Mathematics, University of Edinburgh, Edinburgh, United Kingdom.
    Nordgaard, Anders
    Linköpings universitet, Institutionen för datavetenskap, Statistik och maskininlärning. Linköpings universitet, Filosofiska fakulteten. Swedish Police Auhtority, National Forensic Centre (NFC).
    Taroni, Franco
    School of Criminal Justice, Université de Lausanne, Lausanne, Switzerland.
    Biedermann, Alex
    School of Criminal Justice, Université de Lausanne, Lausanne, Switzerland.
    A commentary on Likelihood Ratio as Weight of Forensic Evidence: A Closer Look: by Lund, S. P., and Iyer, H. (2017). J. Res. Natl. Inst. Stand. Technol. 122:272018Inngår i: Frontiers in Genetics, ISSN 1664-8021, E-ISSN 1664-8021, Vol. 9, artikkel-id 224Artikkel i tidsskrift (Fagfellevurdert)
  • 38.
    Al-Chalabi, Mona
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Gymnasieelevers matematiska svårigheter att lösa linjära ekvationer och linjära ekvationssystem: En litteraturöversikt2018Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Många gymnasieelever har svårt att förstå algebra, specifikt linjära ekvationer och linjära ekvationssystem, vilket hindrar deras vidare lärande i både matematik och andra ämnen.  Lärare måste därför ha en klar uppfattning om vilka dessa svårigheter är för att kunna hjälpa sina elever till förståelse och lärande av detta område i algebra. I studien undersöks forskningslitteraturens resultat om vilka dessa svårigheter är. Påvisade svårigheter som har illustrerats med exempel på elevlösningar är: brister i elevers algebraiska förkunskaper, procedurkunskaper och konceptuella kunskaper (särskilt om likhetstecken, konstanter och variabler), brister i elevers kunskaper om algebraisk syntax, samt brister i elevers hantering av de operationer som används för lösning av ekvationer och ekvationssystem, t ex hur man hanterar negativa koefficienter och konstanter och använder substitutionsmetoden.

  • 39.
    Alfonseca, M Angeles
    et al.
    N Dakota State University.
    Auscher, Pascal
    University Paris 11.
    Axelsson Rosén, Andreas
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Hofmann, Steve
    University of Missouri.
    Kim, Seick
    Yonsei University.
    Analyticity of layer potentials and L-2 solvability of boundary value problems for divergence form elliptic equations with complex L-infinity coefficients2011Inngår i: Advances in Mathematics, ISSN 0001-8708, E-ISSN 1090-2082, Vol. 226, nr 5, s. 4533-4606Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We consider divergence form elliptic operators of the form L = -div A (x)del, defined in Rn+1 = {(x, t) is an element of R-n x R}, n andgt;= 2, where the L-infinity coefficient matrix A is (n + 1) x (n + 1), uniformly elliptic, complex and t-independent. We show that for such operators, boundedness and invertibility of the corresponding layer potential operators on L-2 (R-n) = L-2(partial derivative R-+(n+1)) is stable under complex, L-infinity perturbations of the coefficient matrix. Using a variant of the Tb Theorem, we also prove that the layer potentials are bounded and invertible on L-2(R-n) whenever A (x) is real and symmetric (and thus, by our stability result, also when A is complex, parallel to A - A(0)parallel to(infinity) is small enough and A(0) is real, symmetric, L-infinity and elliptic). In particular, we establish solvability of the Dirichlet and Neumann (and Regularity) problems, with L-2 (resp. (L) over dot(1)(2)) data, for small complex perturbations of a real symmetric matrix. Previously, L-2 solvability results for complex (or even real but non-symmetric) coefficients were known to hold only for perturbations of constant matrices (and then only for the Dirichlet problem), or in the special case that the coefficients A (j,n+1)= 0 = A(n+1,j), 1 andlt;= j andlt;= n, which corresponds to the Kato square root problem.

  • 40.
    Alnervik, Jonna
    et al.
    Linköpings universitet, Institutionen för datavetenskap, Statistik.
    Nord Andersson, Peter
    Linköpings universitet, Institutionen för datavetenskap, Statistik.
    En retrospektiv studie av vilka patientgrupper som erhåller insulinpump2010Independent thesis Advanced level (degree of Master (One Year)), 20 poäng / 30 hpOppgave
    Abstract [sv]

    Målsättning

    Att utreda skillnader i tillgänglighet till insulinpump mellan olika patientgrupper samt vad som orsakar ett byte till insulinpump.

    Metod

    Data från 7224 individer med typ 1 diabetes vid tio olika vårdenheter analyserades för att utreda effekterna av njurfunktion, kön, långtidsblodsocker, insulindos, diabetesduration samt ålder. Jämförelsen mellan patientgrupper utfördes med logistisk regression som en tvärsnittsstudie och Cox-regression för att utreda vad som föregått ett byte till pump.

    Resultat

    Genom logistisk regression erhölls en bild av hur skillnader mellan patienter som använder insulinpump och patienter som inte gör det ser ut i dagsläget. Cox-regressionen tar med ett tidsperspektiv och ger på så sätt svar på vad som föregått ett byte till insulinpump. Dessa analyser gav liknande resultat gällande variabler konstanta över tiden. Kvinnor använder pump i större utsträckning än män och andelen pumpanvändare skiljer sig åt vid olika vårdenheter. I dagsläget visar sig hög ålder sänka sannolikheten att använda insulinpump, vilket bekräftas vid den tidsberoende studien som visade hur sannolikheten att byta till pump är avsevärt lägre vid hög ålder. Långtidsblodsockret har också tydlig effekt på sannolikheten att gå över till pump där ett högt långtidsblodsocker medför hög sannolikhet att byta till insulinpump.

    Slutsatser

    I dagsläget finns det skillnader i andelen insulinpumpanvändare mellan olika patientgrupper och skillnader finns även i de olika gruppernas benägenhet att byta från andra insulinbehandlingar till insulinpump. Beroende av patienters njurfunktion, kön, långtidsblodsocker, insulindos, diabetesduration och ålder har dessa olika sannolikheter att byta till insulinpump.

  • 41.
    Al-Shujary, Ahmed
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska fakulteten.
    Kähler-Poisson Algebras2018Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The focus of this thesis is to introduce the concept of Kähler-Poisson algebras as analogues of algebras of smooth functions on Kähler manifolds. We first give here a review of the geometry of Kähler manifolds and Lie-Rinehart algebras. After that we give the definition and basic properties of Kähler-Poisson algebras. It is then shown that the Kähler type condition has consequences that allow for an identification of geometric objects in the algebra which share several properties with their classical counterparts. Furthermore, we introduce a concept of morphism between Kähler-Poisson algebras and show its consequences. Detailed examples are provided in order to illustrate the novel concepts.

  • 42.
    Altafini, Claudio
    Linköpings universitet, Institutionen för systemteknik, Reglerteknik. Linköpings universitet, Tekniska fakulteten.
    The Geometric Phase of Stock Trading2016Inngår i: PLoS ONE, ISSN 1932-6203, E-ISSN 1932-6203, Vol. 11, nr 8, s. e0161538-Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Geometric phases describe how in a continuous-time dynamical system the displacement of a variable (called phase variable) can be related to other variables (shape variables) undergoing a cyclic motion, according to an area rule. The aim of this paper is to show that geometric phases can exist also for discrete-time systems, and even when the cycles in shape space have zero area. A context in which this principle can be applied is stock trading. A zero-area cycle in shape space represents the type of trading operations normally carried out by high-frequency traders (entering and exiting a position on a fast time-scale), while the phase variable represents the cash balance of a trader. Under the assumption that trading impacts stock prices, even zero-area cyclic trading operations can induce geometric phases, i.e., profits or losses, without affecting the stock quote.

  • 43.
    Alvbrant, Joakim
    et al.
    Linköpings universitet, Institutionen för systemteknik. Linköpings universitet, Tekniska fakulteten.
    Keshmiri, Vahid
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Wikner, Jacob
    Linköpings universitet, Institutionen för systemteknik, Elektroniska Kretsar och System. Linköpings universitet, Tekniska fakulteten.
    Transfer Characteristics and Bandwidth Limitation in a Linear-Drift Memristor Model2015Inngår i: 2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), IEEE , 2015, s. 332-335Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The linear-drift memristor model, suggested by HP Labs a few years ago, is used in this work together with two window functions. From the equations describing the memristor model, the transfer characteristics of a memristor is formulated and analyzed. A first-order estimation of the cut-off frequency is shown, that illustrates the bandwidth limitation of the memristor and how it varies with some of its physical parameters. The design space is elaborated upon and it is shown that the state speed, the variation of the doped and undoped regions of the memristor, is inversely proportional to the physical length, and depth of the device. The transfer characteristics is simulated for Joglekar-Wolf, and Biolek window functions and the results are analyzed. The Joglekar-Wolf window function causes a distinct behavior in the tranfer characteristics at cut-off frequency. The Biolek window function on the other hand gives a smooth state transfer function, at the cost of loosing the one-to-one mapping between charge and state. We also elaborate on the design constraints derived from the transfer characteristics.

  • 44.
    Alvino, Angelo
    et al.
    University Napoli Federico II.
    Cianchi, Andrea
    University Florence.
    Maz´ya, Vladimir
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Mercaldo, Anna
    University Napoli Federico II.
    Well-posed elliptic Neumann problems involving irregular data and domains2010Inngår i: ANNALES DE L INSTITUT HENRI POINCARE-ANALYSE NON LINEAIRE, ISSN 0294-1449, Vol. 27, nr 4, s. 1017-1054Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Non-linear elliptic Neumann problems, possibly in irregular domains and with data affected by low integrability properties, are taken into account. Existence, uniqueness and continuous dependence on the data of generalized solutions are established under a suitable balance between the integrability of the datum and the (ir)regularity of the domain. The latter is described in terms of isocapacitary inequalities. Applications to various classes of domains are also presented. (C) 2010 Elsevier Masson SAS. All rights reserved.

  • 45.
    Amankwah, Henry
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Mathematical Optimization Models and Methods for Open-Pit Mining2011Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Open-pit mining is an operation in which blocks from the ground are dug to extract the ore contained in them, and in this process a deeper and deeper pit is formed until the mining operation ends. Mining is often a highly complex industrial operation, with respect to both technological and planning aspects. The latter may involve decisions about which ore to mine and in which order. Furthermore, mining operations are typically capital intensive and long-term, and subject to uncertainties regarding ore grades, future mining costs, and the market prices of the precious metals contained in the ore. Today, most of the high-grade or low-cost ore deposits have already been depleted, and to obtain sufficient profitability in mining operations it is therefore today often a necessity to achieve operational efficiency with respect to both technological and planning issues.

    In this thesis, we study the open-pit design problem, the open-pit mining scheduling problem, and the open-pit design problem with geological and price uncertainty. These problems give rise to (mixed) discrete optimization models that in real-life settings are large scale and computationally challenging.

    The open-pit design problem is to find an optimal ultimate contour of the pit, given estimates of ore grades, that are typically obtained from samples in drill holes, estimates of costs for mining and processing ore, and physical constraints on mining precedence and maximal pit slope. As is well known, this problem can be solved as a maximum flow problem in a special network. In a first paper, we show that two well known parametric procedures for finding a sequence of intermediate contours leading to an ultimate one, can be interpreted as Lagrangian dual approaches to certain side-constrained design models. In a second paper, we give an alternative derivation of the maximum flow problem of the design problem.

    We also study the combined open-pit design and mining scheduling problem, which is the problem of simultaneously finding an ultimate pit contour and the sequence in which the parts of the orebody shall be removed, subject to mining capacity restrictions. The goal is to maximize the discounted net profit during the life-time of the mine. We show in a third paper that the combined problem can also be formulated as a maximum flow problem, if the mining capacity restrictions are relaxed; in this case the network however needs to be time-expanded.

    In a fourth paper, we provide some suggestions for Lagrangian dual heuristic and time aggregation approaches for the open-pit scheduling problem. Finally, we study the open-pit design problem under uncertainty, which is taken into account by using the concept of conditional value-atrisk. This concept enables us to incorporate a variety of possible uncertainties, especially regarding grades, costs and prices, in the planning process. In real-life situations, the resulting models would however become very computationally challenging.

    Delarbeid
    1. On the use of Parametric Open-Pit Design Models for Mine Scheduling - Pitfalls and Counterexamples
    Åpne denne publikasjonen i ny fane eller vindu >>On the use of Parametric Open-Pit Design Models for Mine Scheduling - Pitfalls and Counterexamples
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    This paper discusses a Lagrangian relaxation interpretation of the Picard and Smith (2004) parametric approach to open-pit mining, which finds a sequence of intermediate contours leading to an ultimate one. This method is similar to the well known parametric approach of Lerchs and Grossmann (1965). We give examples of worst case performance, as well as best case performance of the Picard-Smith approach. The worst case behaviour can be very poor in that we might not obtain any intermediate contours at all. We also discuss alternative parametric methods for finding intermediate contours, but conclude that such methods seem to have inherent weaknesses.

    Emneord
    Open-pit mining, Picard-Smith model, Lagrangian relaxation, pit design, block value, scheduling
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-70838 (URN)
    Tilgjengelig fra: 2011-09-20 Laget: 2011-09-20 Sist oppdatert: 2013-08-30bibliografisk kontrollert
    2. A Duality-Based Derivation of the Maximum Flow Formulation of the Open-Pit Design Problem
    Åpne denne publikasjonen i ny fane eller vindu >>A Duality-Based Derivation of the Maximum Flow Formulation of the Open-Pit Design Problem
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    Open-pit mining is a surface mining operation whereby ore, or waste, is excavated from the surface of the land. The open-pit design problem is deciding on which blocks of an ore deposit to mine in order to maximize the total profit, while obeying digging constraints concerning pit slope and block precedence. The open-pit design problem can be formulated as a maximum flow problem in a certain capacitated network, as first shown by Picard in 1976. His derivation is based on a restatement of the problem as a quadratic binary program. We give an alternative derivation of the maximum flow formulation, which uses only linear programming duality.

    Emneord
    Open-pit mining, pit design, maximum flow, maximum profit, block model
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-70840 (URN)
    Tilgjengelig fra: 2011-09-20 Laget: 2011-09-20 Sist oppdatert: 2013-08-30bibliografisk kontrollert
    3. A Multi-Parametric Maximum Flow Characterization of the Open-Pit Scheduling Problem
    Åpne denne publikasjonen i ny fane eller vindu >>A Multi-Parametric Maximum Flow Characterization of the Open-Pit Scheduling Problem
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    We consider the problem of finding an optimal mining schedule for an openpit during a number of time periods, subject to a mining capacity restriction for each time period. By applying Lagrangian relaxation to the capacities, a multi-parametric formulation is obtained. We show that this formulation can be restated as a maximum flow problem in a time-expanded network. This result extends a well-known result of Picard from 1976 for the open-pit design problem, that is, the single-period case, to the case of multiple time periods.

    Emneord
    Open-pit mining, scheduling, maximum flow, minimum cut, Lagrangian relaxation
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-70841 (URN)
    Tilgjengelig fra: 2011-09-20 Laget: 2011-09-20 Sist oppdatert: 2013-08-30bibliografisk kontrollert
    4. Open-Pit Production Scheduling - Suggestions for Lagrangian Dual Heuristic and Time Aggregation Approaches
    Åpne denne publikasjonen i ny fane eller vindu >>Open-Pit Production Scheduling - Suggestions for Lagrangian Dual Heuristic and Time Aggregation Approaches
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    Open-pit production scheduling deals with the problem of deciding what and when to mine from an open-pit, given potential profits of the different fractions of the mining volume, pit-slope restrictions, and mining capacity restrictions for successive time periods. We give suggestions for Lagrangian dual heuristic approaches for the open-pit production scheduling problem. First, the case with a single mining capacity restriction per time period is considered. For this case, linear programming relaxations are solved to find values of the multipliers for the capacity restrictions, to be used in a Lagrangian relaxation of the constraints. The solution to the relaxed problem will not in general satisfy the capacity restrictions, but can be made feasible by adjusting the multiplier values for one time period at a time. Further, a time aggregation approach is suggested as a way of reducing the computational burden of solving linear programming relaxations, especially for largescale real-life mine problems. For the case with multiple capacity restrictions per time period we apply newly developed conditions for optimality and nearoptimality in general discrete optimization problems to construct a procedure for heuristically constructing near-optimal intermediate pits.

    Emneord
    Open-pit mining, mine scheduling, Lagrangian relaxation, maximum flow, time aggregation
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-70842 (URN)
    Tilgjengelig fra: 2011-09-20 Laget: 2011-09-20 Sist oppdatert: 2018-06-25bibliografisk kontrollert
    5. Open-Pit Mining with Uncertainty - A Conditional Value-at-Risk Approach
    Åpne denne publikasjonen i ny fane eller vindu >>Open-Pit Mining with Uncertainty - A Conditional Value-at-Risk Approach
    (engelsk)Manuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    The selection of a mine design is based on estimating net present values of all possible, technically feasible mine plans so as to select the one with the maximum value. It is a hard task to know with certainty the quantity and quality of ore in the ground. This geological uncertainty, and also the future market behaviour of metal prices and foreign exchange rates, which are impossible to be known with certainty, make mining a high risk business.

    Value-at-Risk (VaR) is a measure that is used in financial decisions to minimize the loss caused by inadequate monitoring of risk. This measure does however have certain drawbacks such as lack of consistency, nonconvexity, and nondifferentiability. Rockafellar and Uryasev (2000) introduce the Conditional Value-at-Risk (CVaR) measure as an alternative to the VaR measure. The CVaR measure gives rise to a convex problem.

    An optimization model that maximizes expected return while minimizing risk is important for the mining sector as this will help make better decisions on the blocks of ore to mine at a particular point in time. We present a CVaR approach to the uncertainty involved in open-pit mining. We formulate investment and design models for the open-pit mine and also give a nested pit scheduling model based on CVaR. Several numerical results based on our models are presented by using scenarios from simulated geological and price uncertainties.

    Emneord
    Conditional value-at-risk (CVaR), open-pit mining, geological uncertainty, price uncertainty
    HSV kategori
    Identifikatorer
    urn:nbn:se:liu:diva-70843 (URN)
    Tilgjengelig fra: 2011-09-20 Laget: 2011-09-20 Sist oppdatert: 2013-08-30bibliografisk kontrollert
  • 46.
    Amankwah, Henry
    et al.
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Larsson, Torbjörn
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Textorius, Björn
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    A Duality-Based Derivation of the Maximum Flow Formulation of the Open-Pit Design ProblemManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    Open-pit mining is a surface mining operation whereby ore, or waste, is excavated from the surface of the land. The open-pit design problem is deciding on which blocks of an ore deposit to mine in order to maximize the total profit, while obeying digging constraints concerning pit slope and block precedence. The open-pit design problem can be formulated as a maximum flow problem in a certain capacitated network, as first shown by Picard in 1976. His derivation is based on a restatement of the problem as a quadratic binary program. We give an alternative derivation of the maximum flow formulation, which uses only linear programming duality.

  • 47.
    Amankwah, Henry
    et al.
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Larsson, Torbjörn
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Textorius, Björn
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    A Multi-Parametric Maximum Flow Characterization of the Open-Pit Scheduling ProblemManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    We consider the problem of finding an optimal mining schedule for an openpit during a number of time periods, subject to a mining capacity restriction for each time period. By applying Lagrangian relaxation to the capacities, a multi-parametric formulation is obtained. We show that this formulation can be restated as a maximum flow problem in a time-expanded network. This result extends a well-known result of Picard from 1976 for the open-pit design problem, that is, the single-period case, to the case of multiple time periods.

  • 48.
    Amankwah, Henry
    et al.
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Larsson, Torbjörn
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Textorius, Björn
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    On the use of Parametric Open-Pit Design Models for Mine Scheduling - Pitfalls and CounterexamplesManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    This paper discusses a Lagrangian relaxation interpretation of the Picard and Smith (2004) parametric approach to open-pit mining, which finds a sequence of intermediate contours leading to an ultimate one. This method is similar to the well known parametric approach of Lerchs and Grossmann (1965). We give examples of worst case performance, as well as best case performance of the Picard-Smith approach. The worst case behaviour can be very poor in that we might not obtain any intermediate contours at all. We also discuss alternative parametric methods for finding intermediate contours, but conclude that such methods seem to have inherent weaknesses.

  • 49.
    Amankwah, Henry
    et al.
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Larsson, Torbjörn
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Textorius, Björn
    Linköpings universitet, Matematiska institutionen, Tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Open-Pit Mining with Uncertainty - A Conditional Value-at-Risk ApproachManuskript (preprint) (Annet vitenskapelig)
    Abstract [en]

    The selection of a mine design is based on estimating net present values of all possible, technically feasible mine plans so as to select the one with the maximum value. It is a hard task to know with certainty the quantity and quality of ore in the ground. This geological uncertainty, and also the future market behaviour of metal prices and foreign exchange rates, which are impossible to be known with certainty, make mining a high risk business.

    Value-at-Risk (VaR) is a measure that is used in financial decisions to minimize the loss caused by inadequate monitoring of risk. This measure does however have certain drawbacks such as lack of consistency, nonconvexity, and nondifferentiability. Rockafellar and Uryasev (2000) introduce the Conditional Value-at-Risk (CVaR) measure as an alternative to the VaR measure. The CVaR measure gives rise to a convex problem.

    An optimization model that maximizes expected return while minimizing risk is important for the mining sector as this will help make better decisions on the blocks of ore to mine at a particular point in time. We present a CVaR approach to the uncertainty involved in open-pit mining. We formulate investment and design models for the open-pit mine and also give a nested pit scheduling model based on CVaR. Several numerical results based on our models are presented by using scenarios from simulated geological and price uncertainties.

  • 50.
    Amankwah, Henry
    et al.
    University of Cape Coast, Ghana .
    Larsson, Torbjörn
    Linköpings universitet, Matematiska institutionen, Optimeringslära. Linköpings universitet, Tekniska högskolan.
    Textorius, Björn
    Linköpings universitet, Matematiska institutionen, Matematik och tillämpad matematik. Linköpings universitet, Tekniska högskolan.
    Open-pit mining with uncertainty: A conditional value-at-risk approach2013Inngår i: Optimization Theory, Decision Making, and Operations Research Applications: Proceedings of the 1st International Symposium and 10th Balkan Conference on Operational Research / [ed] Athanasios Migdalas, Angelo Sifaleras, Christos K. Georgiadis, Jason Papathanasiou, Emmanuil Stiakakis, New York: Springer, 2013, s. 117-139Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The selection of a mine design is based on estimating net present values of all possible, technically feasible mine plans so as to select the one with the maximum value. It is a hard task to know with certainty the quantity and quality of ore in the ground. This geological uncertainty and also the future market behavior of metal prices and foreign exchange rates, which are always uncertain, make mining a high risk business. Value-at-Risk (VaR) is a measure that is used in financial decisions to minimize the loss caused by inadequate monitoring of risk. This measure does, however, have certain drawbacks such as lack of consistency, nonconvexity, and nondifferentiability. Rockafellar and Uryasev [J. Risk 2, 21-41 (2000)] introduce the Conditional Value-at-Risk (CVaR) measure as an alternative to the VaR measure. The CVaR measure gives rise to a convex optimization problem. An optimization model that maximizes expected return while minimizing risk is important for the mining sector as this will help make better decisions on the blocks of ore to mine at a particular point in time. We present a CVaR approach to the uncertainty involved in open-pit mining. We formulate investment and design models for the open-pit mine and also give a nested pit scheduling model based on CVaR. Several numerical results based on our models are presented by using scenarios from simulated geological and market uncertainties.

1234567 1 - 50 of 2689
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf