liu.seSearch for publications in DiVA
Change search
Refine search result
1234567 151 - 200 of 94994
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 151.
    Abdolmajid Ahmad, Bookan
    Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
    Programmering av generativ konst i C# .Net2014Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [sv]

    Detta examensarbete utfördes på IDA (Institutionen för datavetenskap) vid Linköpings universitet. 

    Syftet med det här examensarbetet var att utveckla ett program som skulle skapa förutsättningar för generativ konst med hjälp av MyPaint som är ett digitalt rit/målarverktyg. Metoden gick ut på att registrera vad användaren skapat för komponenter, dvs. musinteraktioner och kortkommandon, och därefter använda dem algoritmiskt.

    Examensarbetet resulterades i ett program (SharpArt), som fångar musinteraktioner samt simulerar tangentbordstryckningar (kortkommandon) från och till Mypaint, vilket i sin tur skapar komponenter som används algoritmiskt. Programmet kan även positionera objektet på canvasen enligt det önskade koordinatvärdet.

  • 152.
    Abdul Aziz Hasan Ali, Aamir
    et al.
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, The Institute of Technology.
    Shahzad, Muhammad Adil
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, The Institute of Technology.
    A Joint Subcarrier/Power allocation Scheme for OFDMA-based Cellular Networks2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The assignment of this master thesis consists of initiating power, subcarrier allocation in a dynamic FFR based scheme designed for multi-cell OFDMA networks and to enhance the throughput of all center users in bandwidth hungry borrower cells (overloaded cells) which was previously degraded by original FFR3 scheme as a result of partitioning of system bandwidth into center and edge bands respectively. The method uses band borrowing to compensate center user’s throughput loss in a semi and fully overloaded system. The scheme uses dynamic programming method (0/1 knapsack problem) to bargain an edge band on various power levels and tends to check the best combination (power and sub-carrier) which the system can utilize while still maintaining acceptable throughput loss for the users at the edge of the neighboring cell (lender cell).

    The algorithm consists of generating a borrowing request to neighboring cells for utilizing their edge bands by the overloaded borrower cell if their average center user throughput reaches below a minimum threshold value set in the system. The borrowing method uses 0/1 knapsack problem to capture an edge band based on limiting factors of total cost in average throughput losses by neighbors (Ci) and Un (tolerable mean user edge user throughput loss by lending cell). While solving knapsack problem the lender (neighbors) will check Ci and Un before granting the right to use its edge band. The later stage requires reducing subcarrier power level in order to utilize the lenders edge band using "soft borrower" mode. The borrowed sub-carriers will be activated take power from the original center band sub-carriers of the overloaded cell by taking into account the interference between the lender and the borrower. In case of negative (0) reply from the lender cell after the first request, multiple requests are generated at reduce power level at every step to order to acquire more bands. If a neighbor has band borrowing requests from multiple overloaded base stations, the band will be granted to the one which gives minimal loss in terms of throughput to the lender cell.

    The simulation results are analyzed w.r.t reuse-1 and FFR3 scheme of a multi cell regular and irregular scenarios comprising of lightly to heavily overloaded cells with various subcarrier allocation patterns. An overhead and time assessment is also presented between borrower and lender cells. Simulation results show an increase of 60% in center user’s throughput w.r.t original FFR3 scheme with an acceptable loss of 18% at the edges in complex overloaded scenarios while the overall system throughout increases by 35%.

  • 153.
    Abdul Malek, Nurul Aida
    et al.
    Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia / Department of Production, University of Vaasa, Finland.
    Shahzad, Khuram
    Department of Production, University of Vaasa, Finland.
    Takala, Josu
    Department of Production, University of Vaasa, Finland.
    Bojnec, Stefan
    Faculty of Management, University of Primorska, Slovenia.
    Papler, Drago
    Faculty of Management, University of Primorska, Slovenia.
    Liu, Yang
    Department of Production, University of Vaasa, Finland.
    Analyzing Sustainable Competitive Advantage: Strategically Managing Resource Allocations to Achieve Operational Competitiveness2015In: Management and Production Engineering Review, ISSN 2080-8208, E-ISSN 2082-1344, Vol. 6, no 4, p. 70-86Article in journal (Refereed)
    Abstract [en]

    In today’s dynamic business environment, a key challenge for all companies is to make adaptive adjustments to their manufacturing strategy. This study demonstrates the competitive priorities of manufacturing strategy in hydro-power case company to evaluate the level of sustainable competitive advantage and also to further analyze how business strategies are aligned with manufacturing strategies. This research is based on new holistic analytical evaluation of manufacturing strategy index, sense and respond, and sustainable competitive advantage models. These models help to describe, evaluate, and optimize resource allocation to meet the performance requirements in dynamic decision making. Furthermore, these models evaluate operational competitiveness for manufacturing strategies according to the multi-criteria priority. The results show that the adjustments of competitive priorities in manufacturing strategies by implementing the proposed holistic analytical models are helpful in strategically managing business operations. The discussion derives the most critical attributes in business operations while alignment of resource allocation with competitive priorities help to strategically focus those attributes. In conclusion, we argue that resource allocation and manufacturing strategies have become the most important capabilities in a business environment where companies focus to get a sustainable competitive advantage.

  • 154.
    Abdulahad, Bassam
    et al.
    Linköping University, Department of Computer and Information Science.
    Lounis, Georgios
    Linköping University, Department of Computer and Information Science.
    A user interface for the ontology merging tool SAMBO2004Independent thesis Basic level (professional degree)Student thesis
    Abstract [en]

    Ontologies have become an important tool for representing data in a structured manner. Merging ontologies allows for the creation of ontologies that later can be composed into larger ontologies as well as for recognizing patterns and similarities between ontologies. Ontologies are being used nowadays in many areas, including bioinformatics. In this thesis, we present a desktop version of SAMBO, a system for merging ontologies that are represented in the languages OWL and DAML+OIL. The system has been developed in the programming language JAVA with JDK (Java Development Kit) 1.4.2. The user can open a file locally or from the network and can merge ontologies using suggestions generated by the SAMBO algorithm. SAMBO provides a user-friendly graphical interface, which guides the user through the merging process.

  • 155.
    Abdulhamidova, Nurangez
    Linköping University, Department of Management and Engineering.
    The European Union-Central Asia: in the light of the New Strategy2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Central Asia is a region strategically located on the crossroads of the two continents. The region is represented by five states (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan) with different level of economic development and with the population amounting to over 60 million people. The region is rich in energy resources, represented by oil, gas, coal and hydropower resources.

    The thesis analyses, assesses and scrutinises one of the topical issues of the contemporary international relations - cooperation between the European Union and Central Asian states before and after adoption in June 2007 of the ‘European Union and Central Asia: Strategy for a New Partnership’, an important political document in the history of relations between the two parties.

    The new stage of cooperation is analysed more comprehensively accentuating priorities set in the Strategy. Analysis of the current state of affairs is conducted concerning some important issues of the Strategy related to regional cooperation between Central Asian states, such as integrated water management and development of hydro-energy system, issues of diversification of hydrocarbons supply routes from the region to Europe and provision of energy security, etc.

    Issues of cooperation between the European Union and Tajikistan are analysed as a case study. State of affairs between some of the European Union member-states and Central Asian countries is characterised.

    The thesis also scrutinises other regional/international actors engaged in cooperation with Central Asia (such as China, Russia, the US, Shanghai Cooperation Organisation, etc.) and their potential for interaction with the European Union for more effective joint solution of the problems existing in the region is assessed.

    In the conclusion, development of cooperation between the European Union and Central Asian states is scrutinised, the problems and their possible solutions in this regard are analysed, and the recommendations for increasing effectiveness of cooperation between the two parties are presented.

    The European Union’s foreign policy in Central Asia is interpreted from perspective of the theories of international relations namely neorealism, neoliberalism and constructivism in the end of every chapter.

  • 156.
    Abdulhamidova, Nurangez
    Linköping University, Department of Management and Engineering.
    The European Union-Central Asia: in the light of the New Strategy2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Central Asia is a region strategically located at the crossroads of the two continents: Asia and Europe. The region is represented by five states (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan) with different level of economic development and with the population amounting to over 60 million people. The region is rich in energy resources represented by oil, gas, coal and water resources.

    The thesis analyses, assesses and scrutinises one of the topical issues of the contemporary international relations - cooperation between the European Union and Central Asian states before and after adoption in June 2007 of the ‘European Union and Central Asia: Strategy for a New Partnership’,  an important political document in the history of relations between the two parties.

    The new stage of cooperation is analysed more comprehensively accentuating priorities set in the Strategy. Analysis of the current state of affairs is conducted concerning some important issues of the Strategy related to regional cooperation between Central Asian states, such as integrated water management and development of hydro-energy system, issues of diversification of hydrocarbons supply routes from the region to Europe and provision of energy security, etc.

    Issues of cooperation between the European Union and Tajikistan are analysed as a case study. State of affairs between the Central Asian states and the European Union Member States actively cooperating with these countries is characterised.

    The thesis also scrutinises other regional/international actors engaged in cooperation with Central Asia (such as China, Russia, the US, Shanghai Cooperation Organisation, etc.) and their potential for interaction with the European Union for more effective joint solution of the problems existing in the region is assessed.

    In the conclusion, development of cooperation between the European Union and Central Asian states is scrutinised, the problems and their possible solutions in this regard are analysed, and the recommendations for increasing effectiveness of cooperation between the two parties are presented.

    The European Union’s policy in Central Asia is interpreted from perspective of the theories of international relations namely neorealism, neoliberalism and constructivism in the research.

  • 157.
    Abdulla, Afrah
    Linköping University, Department of Behavioural Sciences and Learning. Linköping University, Faculty of Educational Sciences. Department of Social and Behavioural Studies, Division of Social Pedagogy and Sociology, Högskolan Väst, Trollhättan, Sweden.
    Readiness or resistance?: Newly arrived adult migrants' experiences, meaning making, and learning in Sweden2017Doctoral thesis, monograph (Other academic)
    Abstract [en]

    This thesis is about newly arrived adult migrants’ meaning making and learning in Swedish society during the two years’ introduction period, after they have received the residence permit. I have specifically studied Arabic speaking adults’ meaning making and learning, by carrying out observations and individual in-depth interviews with 12 migrants. The introduction period consists mainly of three so called introduction measures; the civic orientation course, Swedish for immigrants (SFI), and different work related activities, such as internship at different work places.

    The results show that etablering is about shaping the newly arrived adult migrants into ”good” citizens, through the introduction measures, among other things in the civic orientation course, which is regulated through the policy documents, and which so to say provides meaning to the newly arrived. The “good” citizen has some specific characteristics, which, roughly, are that he or she is independent (and advocates individuality), free, equality thinking, secularized, law-abiding (which includes being honest), responsible, and a “good” parent. These characteristics are expressed in different ways in the civic orientation course, for instance through the course material. The Swedish society is described as something desirable, and different from what is implied to be ”Arabic” values and ways of thinking. The idea of the “good” citizen appears to aim at constructing the adult migrants’ (and their families’) identity, something which many of the study’s respondents make a resistance to.

    As concerns the migrant’s new experiences, it is, for example, those which the migrant get through the contact with the Swedish Public Employment Service (SPES) that affect the meaning making in the new society. The meaning which most of the respondents have made of the SPES’s measures for them is that this authority only offers “prepackaged” solutions, and does not provide the help or support that they need. Also the experiences which the migrant has in the civic orientation course, and the meaning which ”old” migrants give to him or her, play a role when he or she makes meaning of Sweden and Swedes, and of his or her new life situation. Further, it has been shown that it is those experiences that the adult individual has been socialized through, and those which he or she has gained through work or education in his or her country of origin, which affect his or her meaning making in Sweden. It is mostly values which concern child upbringing and religion that lead to a certain understanding and construction of one’s new life. These values, when related to the values which are included in the ”good” citizen idea, also lead to either a resistance or a readiness towards the meaning giving that is embedded in the ”good” citizen notion.

  • 158.
    Abdulla, Afrah
    et al.
    Linköping University, Department of Behavioural Sciences and Learning. Linköping University, Faculty of Arts and Sciences.
    Risenfors, Signild
    Högskolan Väst.
    Kursen samhällsorientering för nyanlända: mobilisering och integration för deltagare2013In: Gemenskaper: socialpedagogiska perspektiv / [ed] Lisbeth Eriksson, Gunilla Nilsson, Lars A. Svensson, Göteborg: Daidalos, 2013, p. 117-138Chapter in book (Other academic)
  • 159.
    Abdulla, Ariyan
    et al.
    Linköping University, Department of Mathematics, Optimization . Linköping University, Faculty of Science & Engineering.
    Andersson, Erik
    Linköping University, Department of Mathematics, Optimization . Linköping University, Faculty of Science & Engineering.
    Heuristiska algoritmer för schemaläggning i real-tidssystem med hänsyn till data beroenden2018Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    The schedule for the jobs in a real-time system can have a huge impact on how the system behave. Since real-time systems are common in safety applications it is important that the scheduling is done in a valid way. Furthermore, one can enhance the performance of the applications by minimizing data latency and jitter. A challenge is that jobs in real-time systems usually have complex constraints making it too time consuming to minimize data latency and jitter to optimality. The purpose of this report is to investigate the possibility of creating high quality schedules using heuristics, with the goal to keep the computational time under one minute. This will be done by comparing three different algorithms that will be used on real scheduling instances provided by the company Arcticus. The first algorithm is a greedy heuristic, the second one a local search and the third one is a metaheuristic, simulated annealing. The results indicate that the data latency can be reduced whilst keeping the computational time below one minute.

  • 160.
    Abdulla, Parosh Aziz
    et al.
    Department of Information Technology, Uppsala University, Sweden.
    Atig, Mohamed Faouzi
    Department of Information Technology, Uppsala University, Sweden.
    Chen, Yu-Fang
    Institute of Information Science, Academia Sinica, Taiwan.
    Holik, Lukas
    Faculty of Information Technology, Brno University of Technology, Czech Republic.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Rümmer, Philipp
    Department of Information Technology, Uppsala University, Sweden.
    Stenman, Jari
    Department of Information Technology, Uppsala University, Sweden.
    String Constraints for Verification2014In: 26th International Conference on Computer Aided Verification (CAV 2014), Vienna, Austria, Jul. 9-12, 2014., Berlin: Springer, 2014, p. 150-166Conference paper (Refereed)
    Abstract [en]

    We present a decision procedure for a logic that combines (i) word equations over string variables denoting words of arbitrary lengths, together with (ii) constraints on the length of words, and on (iii) the regular languages to which words belong. Decidability of this general logic is still open. Our procedure is sound for the general logic, and a decision procedure for a particularly rich fragment that restricts the form in which word equations are written. In contrast to many existing procedures, our method does not make assumptions about the maximum length of words. We have developed a prototypical implementation of our decision procedure, and integrated it into a CEGAR-based model checker for the analysis of programs encoded as Horn clauses. Our tool is able to automatically establish the correctness of several programs that are beyond the reach of existing methods.

  • 161.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Atig, Mohamed Faouzi
    Uppsala University, Sweden.
    Chen, Yu-Fang
    Academia Sinica, Taiwan.
    Leonardsson, Carl
    Uppsala University, Sweden.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Automatic fence insertion in integer programs via predicate abstraction2012In: Static Analysis: 19th International Symposium, SAS 2012, Deauville, France, September 11-13, 2012. Proceedings / [ed] Antoine Miné, David Schmidt, Springer Berlin/Heidelberg, 2012, p. 164-180Conference paper (Refereed)
    Abstract [en]

    We propose an automatic fence insertion and verification framework for concurrent programs running under relaxed memory. Unlike previous approaches to this problem, which allow only variables of finite domain, we target programs with (unbounded) integer variables. The problem is difficult because it has two different sources of infiniteness: unbounded store buffers and unbounded integer variables. Our framework consists of three main components: (1) a finite abstraction technique for the store buffers, (2) a finite abstraction technique for the integer variables, and (3) a counterexample guided abstraction refinement loop of the model obtained from the combination of the two abstraction techniques. We have implemented a prototype based on the framework and run it successfully on all standard benchmarks together with several challenging examples that are beyond the applicability of existing methods.

  • 162.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Atig, Mohamed Faouzi
    Uppsala University, Sweden.
    Chen, Yu-Fang
    Academia Sinica, Taiwan.
    Leonardsson, Carl
    Uppsala University, Sweden.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, ESLAB - Embedded Systems Laboratory. Linköping University, The Institute of Technology.
    Counter-Example Guided Fence Insertion under TSO2012In: TACAS 2012, Berlin, Heidelberg: Springer , 2012Conference paper (Refereed)
    Abstract [en]

    We give a sound and complete fence insertion procedure for concurrentfinite-state programs running under the classical TSO memory model. Thismodel allows “write to read” relaxation corresponding to the addition of an unboundedstore buffer between each processor and the main memory. We introducea novel machine model, called the Single-Buffer (SB) semantics, and show thatthe reachability problem for a program under TSO can be reduced to the reachabilityproblem under SB. We present a simple and effective backward reachabilityanalysis algorithm for the latter, and propose a counter-example guided fence insertionprocedure. The procedure is augmented by a placement constraint thatallows the user to choose places inside the program where fences may be inserted.For a given placement constraint, we automatically infer all minimal setsof fences that ensure correctness. We have implemented a prototype and run itsuccessfully on all standard benchmarks together with several challenging examplesthat are beyond the applicability of existing methods.

  • 163.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Atig, Mohamed Faouzi
    Uppsala University, Sweden.
    Chen, Yu-Fang
    Academia Sinica, Taiwan.
    Leonardsson, Carl
    Uppsala University, Sweden.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO2013In: Tools and Algorithms for the Construction and Analysis of Systems: 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, Springer Berlin/Heidelberg, 2013, p. 530-536Conference paper (Refereed)
    Abstract [en]

    We introduce MEMORAX, a tool for the verification of control state reachability (i.e., safety properties) of concurrent programs manipulating finite range and integer variables and running on top of weak memory models. The verification task is non-trivial as it involves exploring state spaces of arbitrary or even infinite sizes. Even for programs that only manipulate finite range variables, the sizes of the store buffers could grow unboundedly, and hence the state spaces that need to be explored could be of infinite size. In addition, MEMORAX in- corporates an interpolation based CEGAR loop to make possible the verification of control state reachability for concurrent programs involving integer variables. The reachability procedure is used to automatically compute possible memory fence placements that guarantee the unreachability of bad control states under TSO. In fact, for programs only involving finite range variables and running on TSO, the fence insertion functionality is complete, i.e., it will find all minimal sets of memory fence placements (minimal in the sense that removing any fence would result in the reachability of the bad control states). This makes MEMORAX the first freely available, open source, push-button verification and fence insertion tool for programs running under TSO with integer variables.

  • 164.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University.
    Atig, Mohammed Faouzi
    Uppsala University.
    Ganjei, Zeinab
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Zhu, Yunyun
    Uppsala University.
    Verification of Cache Coherence Protocols wrt. Trace Filters2015Conference paper (Refereed)
    Abstract [en]

    We address the problem of parameterized verification of cache coherence protocols for hardware accelerated transactional memories. In this setting, transactional memories leverage on the versioning capabilities of the underlying cache coherence protocol. The length of the transactions, their number, and the number of manipulated variables (i.e., cache lines) are parameters of the verification problem. Caches in such systems are finite-state automata communicating via broadcasts and shared variables. We augment our system with filters that restrict the set of possible executable traces according to existing conflict resolution policies. We show that the verification of coherence for parameterized cache protocols with filters can be reduced to systems with only a finite number of cache lines. For verification, we show how to account for the effect of the adopted filters in a symbolic backward reachability algorithm based on the framework of constrained monotonic abstraction. We have implemented our method and used it to verify transactional memory coherence protocols with respect to different conflict resolution policies.

  • 165.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University, Sweden.
    Dwarkadas, Sandhya
    University of Rochester, U.S.A..
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    Shriraman, Arrvindh
    Simon Fraser University, Canada.
    Zhu, Yunyun
    Uppsala University, Sweden.
    Verifying Safety and Liveness for the FlexTM Hybrid Transactional Memory2013In: Design, Automation & Test in Europe (DATE 2013), Grenoble, France, March 18-22, 2013., IEEE , 2013, p. 785-790Conference paper (Refereed)
    Abstract [en]

    We consider the verification of safety (strict se- rializability and abort consistency) and liveness (obstruction and livelock freedom) for the hybrid transactional memory framework FLEXTM. This framework allows for flexible imple- mentations of transactional memories based on an adaptation of the MESI coherence protocol. FLEXTM allows for both eager and lazy conflict resolution strategies. Like in the case of Software Transactional Memories, the verification problem is not trivial as the number of concurrent transactions, their size, and the number of accessed shared variables cannot be a priori bounded. This complexity is exacerbated by aspects that are specific to hardware and hybrid transactional memories. Our work takes into account intricate behaviours such as cache line based conflict detection, false sharing, invisible reads or non-transactional instructions. We carry out the first automatic verification of a hybrid transactional memory and establish, by adopting a small model approach, challenging properties such as strict serializability, abort consistency, and obstruction freedom for both an eager and a lazy conflict resolution strategies. We also detect an example that refutes livelock freedom. To achieve this, our prototype tool makes use the latest antichain based techniques to handle systems with tens of thousands of states.

  • 166.
    Abdulla, Parosh Aziz
    et al.
    Uppsala University.
    Haziza, Frédéric
    Uppsala University.
    Holik, Lukas
    Brno University of Technology, Czech Republic.
    Jonsson, Bengt
    Uppsala University.
    Rezine, Ahmed
    Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
    An Integrated Specification and Verification Technique for Highly Concurrent Data Structures2013In: The 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), Rome, Italy, March 16-24, 2013. / [ed] Piterman, Nir, Smolka, Scott, 2013Conference paper (Refereed)
    Abstract [en]

    We present a technique for automatically verifying safety properties of concurrent programs, in particular programs which rely on subtle dependencies of local states of different threads, such as lock-free implementations of stacks and queues in an environment without garbage collection. Our technique addresses the joint challenges of infinite-state specifications, an unbounded number of threads, and an unbounded heap managed by explicit memory allocation. Our technique builds on the automata-theoretic approach to model checking, in which a specification is given by an automaton that observes the execution of a program and accepts executions that violate the intended specification.We extend this approach by allowing specifications to be given by a class of infinite-state automata. We show how such automata can be used to specify queues, stacks, and other data structures, by extending a data-independence argument. For verification, we develop a shape analysis, which tracks correlations between pairs of threads, and a novel abstraction to make the analysis practical. We have implemented our method and used it to verify programs, some of which have not been verified by any other automatic method before.

  • 167.
    Abdullah Jan, Mirza
    et al.
    Linköping University, Department of Electrical Engineering.
    Ahsan, Mahmododfateh
    Linköping University, Department of Electrical Engineering.
    Multi-View Video Transmission over the Internet2010Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    3D television using multiple views rendering is receiving increasing interest. In this technology a number of video sequences are transmitted simultaneously and provides a larger view of the scene or stereoscopic viewing experience. With two views stereoscopic rendition is possible. Nowadays 3D displays are available that are capable of displaying several views simultaneously and the user is able to see different views by moving his head.

    The thesis work aims at implementing a demonstration system with a number of simultaneous views. The system will include two cameras, computers at both the transmitting and receiving end and a multi-view display. Besides setting up the hardware, the main task is to implement software so that the transmission can be done over an IP-network.

    This thesis report includes an overview and experiences of similar published systems, the implementation of real time video, its compression, encoding, and transmission over the internet with the help of socket programming and finally the multi-view display in 3D format.  This report also describes the design considerations more precisely regarding the video coding and network protocols.

  • 168.
    Abdullah, M Ailieen
    et al.
    Royal Institute of Technology.
    Öhrwall Rönnbäck, Anna
    Linköping University, Department of Management and Engineering, Industrial Marketing and Industrial Economics. Linköping University, The Institute of Technology.
    Ölundh Sandström, Gunilla
    Royal Institute of Technology.
    Building Networks for Delivering Integrated Product-Service Offerings (IPSOs)2010In: Proceedings of 2nd CIRP IPS2 Conference 2010 - Industrial product-service systems -IPS², CIRP , 2010Conference paper (Refereed)
    Abstract [en]

    The paper describes the effect of forming business networks and collaborations for the purpose of developing an Integrated Product-Service Offering (IPSO) using the Product/Service Systems (PSS). The research method is an in-depth case study of a joint venture formed by four companies developing a new technology for chemical extraction from water sludge waste within the pulp and paper industry.

    Combining literature from PSS, network theories and collaborative product development, this paper puts forward the benefits for SMEs to collaborate in business networks and produce IPSOs when introducing a new technology in an emerging market. The case study shows that working towards the new market would not have been possible if each party acted individually or maintained their traditional buyer-supplieroperator roles, and that IPSOs can reduce the business risk.

  • 169.
    Abdul-Mumuni, Abdallah
    Linköping University, Department of Management and Economics.
    Conflict Resolution in West Africa: A Comparative Analysis of Sierra Leone and Liberia2005Independent thesis Advanced level (degree of Magister)Student thesis
    Abstract [en]

    This paper is a Master thesis for the Master’s program in International and European Relations in the Department of Management and Economics at Linköping University. As the title indicates, the aim of this thesis is to make a comparative analysis of the conflict resolution initiatives that were employed in the Sierra Leonean and Liberian conflicts. The research questions are:

    • What were the root causes and trajectories of the Sierra Leonean and Liberian conflicts?

    • What were the conflict resolution initiatives employed in resolving both conflicts?

    • Why did the Lome Peace Accord succeed in the case of Sierra Leone whilst the Abuja Peace Accord failed in bringing peace to Liberia?

    In order to answer the afore-mentioned questions and fulfil the aim of this paper, a qualitative research method has been chosen. The study is mainly based on secondary sources such as textbooks, official documents from ECOWAS and the UN, articles, magazines and newspapers as well as internet resources. In making the comparative analysis the Conflict Transformation Model as espoused by Kumar Rupesinghe has been utilized. This model has specifically helped in explaining the reasons why peace returned to Sierra Leone but eluded the people of Liberia for a long time. The conclusion drawn from the study is that a multi-track approach is required in dealing with conflicts in West Africa so that it would touch on the context of the conflict, the conflict structure, the intra-party as well as the inter- party divisions and the broader system of society and governance within the conflict area.

  • 170.
    Abe, Y
    et al.
    Tohoku University, Japan; .
    Hara, K
    Tohoku University, Japan; .
    Matsumoto, H
    Tohoku University, Japan; .
    Kobayashi-, J
    Tohoku University, Japan; .
    Sasada, H
    Tohoku University, Japan; .
    Ekwall, H
    Tohoku University, Japan; .
    Rodriguez-Martinez, Heriberto
    Swedish University of Agricultural Sciences; Sweden.
    Sato, E
    Tohoku University, Japan; .
    Feasibility of a nylon-mesh holder for vitrification of bovine germinal vesicle oocytes in subsequent production of viable blastocysts2005In: Biology of Reproduction, ISSN 0006-3363, E-ISSN 1529-7268, Vol. 72, no 6, p. 1416-1420Article in journal (Refereed)
    Abstract [en]

    To improve the feasibility of nylon-mesh holder for vitrification of bovine cumulus-oocytes complexes (GV-COCs) having germinal vesicle, this study was conducted to demonstrate effects of sugars and protocol of exposure in vitrification on subsequent in vitro maturation, ultrastructural changes, and in vitro development in bovine immature oocytes after cryopreservation using nylon mesh. Before vitrification, GV-COCs were exposed to the cryoprotectant, which was composed of 40% (v/v) ethylene glycol, 18% (w/v) Ficoll-70, and 0.3 M sucrose (EFS40) or 0.3 M trehalose (EFT40), either by single step or in a stepwise way. The maturation rates in the stepwise exposure with EFS40 or EFT40 were significantly higher (P less than 0.05) compared with the corresponding rates in the single step. In the stepwise exposure, few abnormalities were observed compared with the single-step exposure, where most oocytes showed a highly vacuolated cytoplasm with many ruptured mitochondria. Cleavage rates in fertilized oocytes previously exposed stepwise to EFS40 or EFT40 were significantly higher than those exposed by the single-step procedure. The cleaved embryos derived from the stepwise exposure to EFS40 developed to blastocysts. After transfer of blastocysts derived from vitrified GV oocytes, a female calf was born. These results indicate that vitrification of large numbers of bovine GV-COCs using a nylon-mesh holder accompanied with stepwise exposure minimizes structural damage in organelles, resulting in yield of viable blastocysts following in vitro embryo production.

  • 171.
    Abebe, Meaza Eshetu
    et al.
    Linköping University, Department of Management and Engineering, Business Administration.
    Kalinina, Ekaterina
    Linköping University, Department of Management and Engineering, Business Administration.
    Coordination of inter-organizational projects within creative industries: A contextual perspective2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Inter-organizational projects have become common forms of organizing in various industries such as construction, advertising, music, film making etc. The unique structural nature of Inter-organizational projects coupled with the fact that they carried out through the participation of multiple organizations, raises issues of coordination. Particularly when it comes to creative industries, coordination is challenged by demand and transactional uncertainties. In order to understand how inter-organizational projects achieve coordination in such situations, it is important to study their interior processes putting in consideration their environmental context. 

    The aim of this research is to study how network embeddedness enhances coordination in inter-organizational projects within creative industries.

    Inter-organizational projects: are projects that are carried out through the collaboration of multiple legally independent organizations

    Inter-organizational networks: refer to sets of long-term ties among independent organizations that are engaged in continuous exchange relations.

    Embeddedness: refers to the continuous interaction of individuals, organizations, projects etc. with their environmental context.

    Macrocultures: refer to the shared beliefs, norms values rules and practices with in inter- organizational networks that guide members on their actions.

    A qualitative approach using a multiple comparative case study was conducted. Accordingly four projects chosen from creative industries were studied using both primary and secondary data.

    Macrocultures that are embedded inter-organizational networks facilitate coordination within inter-organizational projects. Further projects that differ in their constituents task nature, time duration and team composition relied on different types of embeddedness for coordination.

  • 172.
    Abednazari, Hossein
    et al.
    Linköping University, Department of Molecular and Clinical Medicine, Infectious Diseases. Linköping University, Faculty of Health Sciences.
    Xu, Junyang
    Linköping University, Department of Molecular and Clinical Medicine, Infectious Diseases. Linköping University, Faculty of Health Sciences.
    Millinger, Eva
    Östergötlands Läns Landsting, Centre of Surgery and Oncology, Department of Respiratory Medicine. Linköping University, Faculty of Health Sciences.
    Brudin, Lars
    Department of Clinical Physiology, County Hospital, Kalmar, Sweden.
    Forsberg, Pia
    Linköping University, Department of Molecular and Clinical Medicine, Infectious Diseases. Linköping University, Faculty of Health Sciences.
    Nayeri, Fariba
    Linköping University, Department of Molecular and Clinical Medicine, Infectious Diseases. Linköping University, Faculty of Health Sciences.
    Hepatocyte growth factor is a better indicator of therapeutic response than C-reactive protein within the first day of treatment in pneumonia2006In: Chemotherapy, ISSN 0009-3157, E-ISSN 1421-9794, Vol. 52, no 5, p. 260-263Article in journal (Refereed)
    Abstract [en]

    Acute bacterial infectious diseases are mostly treated empirically at admission before the culture results are available. According to the risk for serious complications in the case of therapeutic failure, it is important to evaluate the therapy results and change to a more appropriate antibiotic regime as soon as possible. In the present study, 40 patients with X-ray-verified community-acquired pneumonia were examined and blood specimens were collected before and within 24 h of treatment. Body temperature, C-reactive protein (CRP) and hepatocyte growth factor (HGF) were investigated. Thirty-two patients received an appropriate initial antibiotic therapy regarding clinical outcome, but in 8 patients the treatment was changed because of therapy failure. Changes of HGF levels after 18–24 h of treatment could predict the therapeutic results accurately in 38 of 40 cases (sensitivity 100%, specificity 94%, positive likelihood ratio 16.0). HGF was significantly better to predict therapy outcome than CRP (p < 0.0001).

  • 173.
    Abednazari, Hossin
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Microbiology and Molecular Medicine. Linköping University, Faculty of Health Sciences. PEAS Institute, Linköping.
    Brudin, Lars
    Linköping University, Department of Medical and Health Sciences, Division of Cardiovascular Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Heart and Medicine Center, Department of Clinical Physiology in Linköping.
    Almroth, Gabriel
    Linköping University, Department of Medical and Health Sciences, Division of Drug Research. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Heart and Medicine Center, Department of Nephrology.
    Nilsson, Ingela
    Kalmar County Hospital, Sweden.
    Nayeri, Fariba
    Linköping University, Department of Clinical and Experimental Medicine, Division of Microbiology and Molecular Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Heart and Medicine Center, Department of Infectious Diseases.
    Hepatocyte growth factor is a reliable marker for efficient anti-bacterial therapy within the first day of treatment2014In: Advances in Bioscience and Biotechnology, ISSN 2156-8456, E-ISSN 2156-8502, Vol. 5, no 10, p. 823-830Article in journal (Refereed)
    Abstract [en]

    Rapid diagnosis and choice of appropriate antibiotic treatment might be life-saving in serious infectious diseases. Still the available markers that can evaluate and monitor the diagnosis and treatment are few. Hepatocyte growth factor (HGF) has been studied as a potent regenerative factor produced and released during injuries such as infectious diseases. Monitoring of HGF levels might predict therapy results better than C-reactive protein (CRP) within the first day of treatment in pneumonia. For further investigation of previous observations we aimed to study HGF as a first-day marker in over-representing infectious diseases in comparison to procalcitonin (PCT), CRP and body temperature. Fifty-one patients with community acquired infectious diseases were included consequently at admittance and the serum samples were collected before and within 18 - 24 hours of treatment. HGF levels decreased significantly in case of efficient antibiotic therapy and HGF was shown to be better than PCT, CRP and body temperature to evaluate treatment. In patients with pneumonia, monitoring of HGF was most reasonable. HGF might be used as a therapeutic marker within the first day of empiric antibiotic treatment during infection.

  • 174.
    Abela, Charles
    Linköping University, Department of Behavioural Sciences and Learning.
    Understanding the Dynamics of the Employability Agenda in Further Education Colleges in England: New Cross College - A Case Study2008Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study explores the dynamic of what happens within a further education college in order to develop an understanding of the cultures, systems and processes that are used to socially construct meaning around work and employability.  It is an inductive approach and is based on a case study of a further education college in South London.  The case study is analysed through the metaphor of an “extended family” and draws on social learning theory which is predicated on meaning and identity being created through social interaction (Wenger, 1998).  What has become apparent from being immersed within that extended family of the College, from interviews with staff and students, interacting in social activities, observing classes and reviewing many of its artefacts is perhaps an unremarkable conclusion.  The work of the family is not primarily about imparting a given set of skills (although that plays an important part) but in the formation of identity: “because learning transforms who we are and what we can do, it is an experience of identity” (Wenger, 1998, p. 215).  A major task for the College is to build self belief in developing the identity of learners and assist them to make new meaning so that they can transact effectively in economic life.  To the extent that one can examine and comprehend the organisational DNA of a further education college there are markers here, genes if you will, that can be passed across generations of learners that adapt and shift to survive in life beyond the boundaries of this community.  This study constructs a narrative around that research experience to respond to that primary research question about how the dynamics of the employability operate within a college.  The answer is partial, limited and perhaps only grabs at a corner of what is really going on within the College.  With those caveats and disclaimers what follows is the story of how a discourse takes root and flourishes within a learning community.  It points to the need to re-set the relationship between FE colleges and government to promote greater coherence between policy and practice.

  • 175.
    Abelius, M
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Pediatrics. Linköping University, Faculty of Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Clinical Immunology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Obstetrics and gynecology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre of Paediatrics and Gynecology and Obstetrics, Department of Gynecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Obstetrics and gynecology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre of Paediatrics and Gynecology and Obstetrics, Department of Gynecology and Obstetrics in Linköping.
    Nilsson, L J
    Linköping University, Department of Clinical and Experimental Medicine. Linköping University, Faculty of Health Sciences.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Pediatrics. Linköping University, Faculty of Health Sciences.
    Immunological interactions between mother and child: a characterisation of Th1-and Th2-like chemokines during pregnancy, postpartum and childhood in JOURNAL OF REPRODUCTIVE IMMUNOLOGY, vol 90, issue 2, pp 170-1712011In: JOURNAL OF REPRODUCTIVE IMMUNOLOGY, Elsevier , 2011, Vol. 90, no 2, p. 170-171Conference paper (Refereed)
    Abstract [en]

    n/a

  • 176.
    Abelius, Martina
    Linköping University, Department of Clinical and Experimental Medicine. Linköping University, Faculty of Health Sciences.
    Immunological interactions between mother and child during pregnancy in relation to the development of allergic diseases in the offspring2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Background: Pregnancy and allergic disease have both been postulated as T-helper 2 (Th2) phenomena. Thus, the increased propensity of allergic mothers to mount Th2-responses might generate favourable effects on the maintenance of pregnancy, but might also be unfavorable, as fetal exposure to a strong Th2 environment could influence the immune development in the offspring to a Th2-like phenotype, favouring IgE production and possibly allergy development later in life. The influence of the intrauterine environment on the immunity and allergy development in the offspring needs to be further investigated.

    Aim: The aim of this thesis was to explore the Th1/Th2 balance in allergic and non-allergic women during pregnancy and its influence on the shaping of the Th1/Th2 profile in the neonate and the development of allergic diseases in the offspring.

    Material and methods: The study group included 20 women with and 36 women without allergic symptoms followed during pregnancy (gestational week 10-12, 15-16, 25, 35, 39) and 2 and 12 months postpartum, and their children followed from birth to 6 years of age. The circulating Th1-like chemokines CXCL9, CXCL10, CXCL11, Th2-like chemokines CCL17, CCL18 and CCL22, and the allergen-induced secretion of interleukin-4 (IL-4), IL-5, IL-10, IL-13, Interferon-γ (IFN-γ), CXCL10 and CCL17 were measured by Luminex and ELISA. The allergen-specific and total IgE levels were quantified using ImmunoCAP Technology. mRNA expression of Th1-, Th2-, Treg- and Th17-associated genes were measured by PCR arrays and real-time PCR.

    Results: We found that sensitised women with allergic symptoms had increased total IgE levels and birch- and cat-induced IL-5, IL-13 and CCL17 responses during pregnancy as compared with postpartum. The non-sensitised women without allergic symptoms had elevated cat-induced IL-5 and IL-13 responses and lower birch- and cat-induced IFN-γ during pregnancy, but similar IgE levels as compared with postpartum.

    Maternal total IgE levels during and after pregnancy correlated with cord blood (CB) IgE and CCL22 levels (regardless of maternal allergy status). Circulating CXCL11, CCL18 and CCL22 levels during pregnancy and postpartum correlated with the corresponding chemokine levels in the offspring at various time points during childhood. Maternal IL-5 expression in peripheral blood mononuclear cells (PBMC) was associated with neonatal Galectin-1, and placental p35 expression was negatively associated with neonatal Tbx21 expression. Increased mRNA expression of CCL22 in cord blood mononuclear cells (CBMC), and increased CCL17 and CCL22 levels in CB were observed in children later developing allergic symptoms and sensitisation as compared with children who did not. Development of allergic symptoms and sensitisation were associated with increased total IgE, CCL17, CCL18 and CCL22 levels during childhood.

    Conclusions: Maternal allergy was associated with a pronounced Th2 deviation during pregnancy, shown as increased total IgE levels and birch- and cat-induced IL-5, IL-13 and CCL17 responses during pregnancy, possibly exposing their fetuses to a particular strong Th2 environment during gestation.

    Correlations were shown between the maternal immunity during pregnancy and the offspring’s immunity at birth and later during childhood, indicating an interplay between the maternal and fetal immunity.

    Allergy development during the first 6 years of life was associated with a marked Th2 deviation at birth and a delayed down-regulation of this Th2-skewed immunity during childhood.

    List of papers
    1. Total and allergen-specific IgE levels during and after pregnancy in relation to maternal allergy
    Open this publication in new window or tab >>Total and allergen-specific IgE levels during and after pregnancy in relation to maternal allergy
    Show others...
    2009 (English)In: JOURNAL OF REPRODUCTIVE IMMUNOLOGY, ISSN 0165-0378, Vol. 81, no 1, p. 82-88Article in journal (Refereed) Published
    Abstract [en]

    Type 2 T-helper cell (Th2)-skewed immunity is associated with successful pregnancy and the ability to easily direct immune responses to a Th2-polarised profile may be an evolutionary benefit. The Th2-like immunity associated with allergic disease might generate favourable effects for the maintenance of pregnancy, but could also promote development of Th2-like immune responses and allergic disease in the offspring. The aim of this study was to explore, by using IgE as a stable proxy for Th2, the Th1/Th2 balance in allergic and non-allergic women by measuring allergen-specific and total IgE antibody levels in plasma during pregnancy and after delivery. Specific and total IgE antibody levels were determined by ImmunoCAP technology at five occasions during pregnancy (gestational weeks 10-12, 15-16, 25, 35 and 39), as well as at 2 and 12 months after delivery. Thirty-six women without and 20 women with allergic symptoms were included, of whom 13 were sensitised with allergic symptoms and 30 were non-sensitised without allergic symptoms. The levels of total IgE, but not allergen-specific IgE, were increased during early pregnancy when compared to 12 months after delivery in the sensitised women with allergic symptoms, but not in the non-sensitised women without allergic symptoms (pandlt;0.01). This increase in total IgE levels during early pregnancy only in the sensitised women with allergic symptoms indicates that allergy is associated with an enhanced Th2 deviation during pregnancy.

    Keywords
    Allergy, IgE, Phadiatop, Pregnancy, Th2
    National Category
    Medical and Health Sciences
    Identifiers
    urn:nbn:se:liu:diva-19894 (URN)10.1016/j.jri.2009.04.003 (DOI)
    Note

    Original Publication: Martina Sandberg, Anne Frykman, Yvonne Jonsson, Marie Persson, Jan Ernerudh, Göran Berg, Leif Matthiesen, Christina Ekerfelt and Maria Jenmalm, Total and allergen-specific IgE levels during and after pregnancy in relation to maternal allergy, 2009, JOURNAL OF REPRODUCTIVE IMMUNOLOGY, (81), 1, 82-88. http://dx.doi.org/10.1016/j.jri.2009.04.003 Copyright: Elsevier Science B.V., Amsterdam. http://www.elsevier.com/

    Available from: 2009-09-09 Created: 2009-08-14 Last updated: 2014-04-29Bibliographically approved
    2. High cord blood levels of the T-helper 2-associated chemokines CCL17 and CCL22 precede allergy development during the first 6 years of life
    Open this publication in new window or tab >>High cord blood levels of the T-helper 2-associated chemokines CCL17 and CCL22 precede allergy development during the first 6 years of life
    Show others...
    2011 (English)In: Pediatric Research, ISSN 0031-3998, E-ISSN 1530-0447, Vol. 70, no 5, p. 495-500Article in journal (Refereed) Published
    Abstract [en]

    Exposure to a strong T-helper 2 (Th2)-like environment during fetal development may promote allergy development. Increased cord blood (CB) levels of the Th2-associated chemokine CCL22 were associated with allergy development during the first 2 y of life. The aim of the present study was to determine whether CB Th1- and Th2-associated chemokine levels are associated with allergy development during the first 6 y of life, allowing assessment of respiratory allergic symptoms usually developing in this period. The CB levels of cytokines, chemokines, and total IgE were determined in 56 children of 20 women with allergic symptoms and 36 women without allergic symptoms. Total IgE and allergen-specific IgE antibody levels were quantified at 6, 12, 24 mo, and 6 y of age. Increased CB CCL22 levels were associated with development of allergic sensitization and asthma and increased CCL17 levels with development of allergic symptoms, including asthma. Sensitized children with allergic symptoms showed higher CB CCL17 and CCL22 levels and higher ratios between these Th2-associated chemokines and the Th1-associated chemokine CXCL10 than nonsensitized children without allergic symptoms. A pronounced Th2 deviation at birth, reflected by increased CB CCL17 and CCL22 levels, and increased CCL22/CXCL10 and CCL17/CXCL10 ratios might promote allergy development later in life.

    Keywords
    AD, atopic dermatitis, ARC, allergic rhinoconjunctivitis, CB, cord blood, SPT, skin prick test, Th, T-helper
    National Category
    Medical and Health Sciences
    Identifiers
    urn:nbn:se:liu:diva-74499 (URN)10.1203/PDR.0b013e31822f2411 (DOI)000296121100010 ()21796021 (PubMedID)
    Available from: 2012-01-30 Created: 2012-01-30 Last updated: 2017-12-08
    3. Th2-like chemokine levels are increased in allergic children and influenced by maternal immunity during pregnancy
    Open this publication in new window or tab >>Th2-like chemokine levels are increased in allergic children and influenced by maternal immunity during pregnancy
    Show others...
    2014 (English)In: Pediatric Allergy and Immunology, ISSN 0905-6157, E-ISSN 1399-3038, Vol. 25, no 4, p. 387-393Article in journal (Refereed) Published
    Abstract [en]

    Background: The influence of the intra-uterine environment on the immunity and allergy development in the offspring is unclear. We aimed to investigate (i) whether the pregnancy magnifies the Th2 immunity in allergic and non-allergic women, (ii) whether the maternal chemokine levels during pregnancy influenced the offspring’s chemokine levels during childhood and (iii) the relationship between circulating Th1/Th2-associated chemokines and allergy in mothers and children.

    Methods: The Th1-associated chemokines CXCL9, CXCL10, CXCL11, and the Th2- associated chemokines CCL17, CCL18 and CCL22 were quantified by Luminex and ELISA in 20 women with and 36 women without allergic symptoms at gestational week (gw) 10–12, 15–16, 25, 35, 39 and 2 and 12 months post-partum and in their children at birth, 6, 12, 24 months and 6 yr of age. Total IgE levels were measured using ImmunoCAP Technology.

    Results: The levels of the Th2-like chemokines were not magnified by pregnancy. Instead decreased levels were shown during pregnancy (irrespectively of maternal allergy status) as compared to post-partum. In the whole group, the Th1-like chemokine levels were higher at gw 39 than during the first and second trimester and post-partum. Maternal CXCL11, CCL18 and CCL22 levels during and after pregnancy correlated with the corresponding chemokines in the offspring during childhood. Increased CCL22 and decreased CXCL10 levels in the children were associated with sensitisation and increased CCL17 levels with allergic symptoms during childhood. Maternal chemokine levels were not associated with maternal allergic disease.

    Conclusions: Allergic symptoms and sensitisation were associated with decreased Th1-and increased Th2-associated chemokine levels during childhood, indicating a Th2 shift in the allergic children, possibly influenced by the maternal immunity during pregnancy.

    Place, publisher, year, edition, pages
    John Wiley & Sons, 2014
    Keywords
    Allergy; CCL17; CCL22; chemokines; pregnancy; Th2
    National Category
    Medical and Health Sciences
    Identifiers
    urn:nbn:se:liu:diva-106218 (URN)10.1111/pai.12235 (DOI)000338037100013 ()
    Available from: 2014-04-29 Created: 2014-04-29 Last updated: 2017-12-05Bibliographically approved
    4. Gene expression in placenta, peripheral and cord blood mononuclear cells from allergic and non-allergic women
    Open this publication in new window or tab >>Gene expression in placenta, peripheral and cord blood mononuclear cells from allergic and non-allergic women
    Show others...
    2014 (English)Manuscript (preprint) (Other academic)
    Abstract [en]

    Background: The influence of maternal allergy on the development of immune responses and allergy in the offspring is not understood.

    Objective: To investigate (i) if maternal allergy influences the gene expression locally in placenta, systemically in peripheral blood mononuclear cells (PBMC) and fetally in cord blood mononuclear cells (CBMC), (ii) if the gene expression in the placenta and PBMC influences the gene expression in CBMC and (iii) how the gene expression at birth relates to allergy development during  childhood.

    Methods: A real-time PCR array was used to quantify forty immune regulatory genes in placenta, PBMC (gestational week 39) and in CBMC from 7 allergic and 12 non-allergic women and their offspring. Furthermore, quantitative real-time PCR was used to measure mRNA expression of Tbx21, GATA-3, Foxp3, RORC and CCL22 in CBMC, selected based on present PCR array results and previous protein findings in cord blood, in 13 children who developed and 11 children who did not develop allergy during childhood.

    Results: The gene expression profile in the placenta revealed a T-helper (Th) 2-/anti-inflammatory environment as compared with gene expression systemically, in PBMC. Maternal allergy was associated with increased expression of p35 in PBMC and CBMC and p40 in placenta. Placental p35 expression correlated with fetal Tbx21 expression (Rho=-0.88, p<0.001) and maternal IL-5 expression in PBMC with fetal Galectin-1 (Rho=0.91, p<0.001) expression. Allergy development in the children was preceded by high mRNA expression of the Th2-associated chemokine CCL22 at birth.

    Conclusion and clinical relevance: Gene expression locally and systemically during pregnancy influenced the offspring’s gene expression at birth, indicating an interplay between maternal and fetal immunity. Children developing allergy during childhood had an increased expression of the Th2-associated chemokine CCL22 at birth, indicating a Th2 skewing before disease onset. Maternal allergy was not associated with a Th2-dominance in placenta, PBMC or CBMC.

    National Category
    Medical and Health Sciences
    Identifiers
    urn:nbn:se:liu:diva-106219 (URN)
    Available from: 2014-04-29 Created: 2014-04-29 Last updated: 2015-03-25Bibliographically approved
  • 177.
    Abelius, Martina
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Enke, Uta
    University Hospital Jena, Germany.
    Varosi, Frauke
    University Hospital Jena, Germany.
    Hoyer, Heike
    University Hospital Jena, Germany.
    Schleussner, Ekkehard
    University Hospital Jena, Germany.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Markert, Udo R.
    University Hospital Jena, Germany.
    Placental immune response to apple allergen in allergic mothers2014In: Journal of Reproductive Immunology, ISSN 0165-0378, E-ISSN 1872-7603, Vol. 106, p. 100-109Article in journal (Refereed)
    Abstract [en]

    The immunological milieu in the placenta may be crucial for priming the developing foetal immune system. Early imbalances may promote the establishment of immune-mediated diseases in later life, including allergies. The initial exposure to allergens seems to occur in utero, but little is known about allergen-induced placental cytokine and chemokine release. The release of several cytokines and chemokines from placenta tissue after exposure to mast cell degranulator compound 48/80 or apple allergen in placentas from allergic and healthy mothers was to be analysed. Four placentas from women with apple allergy and three controls were applied in a placental perfusion model with two separate cotyledons simultaneously perfused with and without apple allergen (Mal d 1). Two control placentas were perfused with compound 48/80. In outflow, histamine was quantified spectrophotofluorometrically, IL-2, IL-4, IL-6, IL-10, TNF and IFN-gamma by a cytometric multiplex bead array and IL-13 and CXCL10, CXCL11, CCL17 and CCL22 with an in-house multiplex Luminex assay. Compound 48/80 induced a rapid release of histamine, CXCL10, CXCL11, CCL17 and CCL22, but not of the other factors. Apple allergen induced a time-dependent release of IL-6 and TNF, but not of histamine, in placentas of women with apple allergy compared with the unstimulated cotyledon. CCL17 levels were slightly increased after allergen stimulation in control placentas. Allergens can induce placental cytokines and chemokines distinctly in allergic and healthy mothers. These mediators may affect the prenatal development of the immune system and modify the risk of diseases related to immune disorders in childhood such as allergies.

  • 178.
    Abelius, Martina
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    Jedenfalk, Malin
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Janefjord, Camilla
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Division of Children's and Women's health. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Division of Children's and Women's health. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping. Helsingborg Hospital, Sweden.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    Pregnancy modulates the allergen-induced cytokine production differently in allergic and non-allergic women2017In: Pediatric Allergy and Immunology, ISSN 0905-6157, E-ISSN 1399-3038, Vol. 28, no 8, p. 818-824Article in journal (Refereed)
    Abstract [en]

    Background: The immunological environment during pregnancy may differ between allergic and non-allergic women. This study investigates the effect of maternal allergy on the allergen-induced cytokine and chemokine levels and whether pregnancy modulates these immune responses differently in allergic and non-allergic women. Methods: The birch-, cat-, phytohemagglutinin- and tetanus toxoid-induced interferon-gamma(IFN-gamma), interleukin (IL)-4, IL-5, IL-10, IL-13, the T-helper 1 (Th1)-associated chemokine CXCL10 and the Th2-associated chemokine CCL17 levels were quantified in 20 women with allergic symptoms (sensitized, n=13) and 36 women without allergic symptoms (non-sensitized, n=30) at gestational weeks 10-12, 15-16, 25, 35 and 2 and 12months post-partum. Results: Birch-, but not cat-induced, IL-5, IL-13 and CCL17 levels were increased during pregnancy as compared to post-partum in the sensitized women with allergic symptoms. In contrast, cat-, but not birch-induced, IL-5 and IL-13 levels were increased during pregnancy as compared to post-partum in the non-sensitized women without allergic symptoms. Furthermore, IFN-gamma secretion was increased in the first and decreased in the second and third trimesters in response to birch and decreased in the third trimester in response to cat as compared to post-partum in the non-sensitized women without allergic symptoms. Increased allergen-induced IL-4, IL-5 and IL-13 levels were associated with allergic symptoms and sensitization. Conclusions: Pregnancy had a clear effect on the allergen-induced IL-5, IL-13, CCL17, IFN-gamma and CXCL10 production, with distinct enhanced Th2-responses to birch in the allergic group and to cat in the non-allergic group.

    The full text will be freely available from 2018-10-03 12:41
  • 179.
    Abelius, Martina S
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Pediatrics. Linköping University, Faculty of Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Clinical Immunology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Obstetrics and gynecology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre of Paediatrics and Gynecology and Obstetrics, Department of Gynecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Obstetrics and gynecology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre of Paediatrics and Gynecology and Obstetrics, Department of Gynecology and Obstetrics in Linköping.
    Nilsson, Lennart
    Linköping University, Department of Clinical and Experimental Medicine, Pediatrics. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre of Paediatrics and Gynecology and Obstetrics, Department of Paediatrics in Linköping.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Pediatrics. Linköping University, Faculty of Health Sciences.
    High cord blood levels of the T-helper 2-associated chemokines CCL17 and CCL22 precede allergy development during the first 6 years of life2011In: Pediatric Research, ISSN 0031-3998, E-ISSN 1530-0447, Vol. 70, no 5, p. 495-500Article in journal (Refereed)
    Abstract [en]

    Exposure to a strong T-helper 2 (Th2)-like environment during fetal development may promote allergy development. Increased cord blood (CB) levels of the Th2-associated chemokine CCL22 were associated with allergy development during the first 2 y of life. The aim of the present study was to determine whether CB Th1- and Th2-associated chemokine levels are associated with allergy development during the first 6 y of life, allowing assessment of respiratory allergic symptoms usually developing in this period. The CB levels of cytokines, chemokines, and total IgE were determined in 56 children of 20 women with allergic symptoms and 36 women without allergic symptoms. Total IgE and allergen-specific IgE antibody levels were quantified at 6, 12, 24 mo, and 6 y of age. Increased CB CCL22 levels were associated with development of allergic sensitization and asthma and increased CCL17 levels with development of allergic symptoms, including asthma. Sensitized children with allergic symptoms showed higher CB CCL17 and CCL22 levels and higher ratios between these Th2-associated chemokines and the Th1-associated chemokine CXCL10 than nonsensitized children without allergic symptoms. A pronounced Th2 deviation at birth, reflected by increased CB CCL17 and CCL22 levels, and increased CCL22/CXCL10 and CCL17/CXCL10 ratios might promote allergy development later in life.

  • 180.
    Abelius, Martina S
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    Janefjord, Camilla
    Linköping University, Department of Clinical and Experimental Medicine, Division of Cell Biology. Linköping University, Faculty of Medicine and Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping. Helsingborg Hospital, Helsingborg.
    Duchén, Karel
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center of Paediatrics and Gynaecology and Obstetrics, Department of Paediatrics in Linköping.
    Nilsson, Lennart J
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Heart and Medicine Center, Allergy Center.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences.
    The Placental Immune Milieu is Characterized by a Th2- and Anti-Inflammatory Transcription Profile, Regardless of Maternal Allergy, and Associates with Neonatal Immunity2015In: American Journal of Reproductive Immunology, ISSN 1046-7408, E-ISSN 1600-0897, Vol. 73, no 5, p. 445-459Article in journal (Refereed)
    Abstract [en]

    PROBLEM: How maternal allergy affects the systemic and local immunological environment during pregnancy and the immune development of the offspring is unclear.

    METHOD OF STUDY: Expression of 40 genes was quantified by PCR arrays in placenta, peripheral blood mononuclear cells (PBMC), and cord blood mononuclear cells (CBMC) from 7 allergic and 12 non-allergic women and their offspring.

    RESULTS: Placental gene expression was dominated by a Th2-/anti-inflammatory profile, irrespectively of maternal allergy, as compared to gene expression in PBMC. p35 expression in placenta correlated with fetal Tbx21 (ρ = -0.88, P < 0.001) and IL-5 expression in PBMC with fetal galectin1 (ρ = 0.91, P < 0.001). Increased expression of Th2-associated CCL22 in CBMC preceded allergy development.

    CONCLUSIONS: Gene expression locally and systemically during pregnancy was partly associated with the offspring's gene expression, possibly indicating that the immunological milieu is important for fetal immune development. Maternal allergy was not associated with an enhanced Th2 immunity in placenta or PBMC, while a marked prenatal Th2 skewing, shown as increased CCL22 mRNA expression, might contribute to postnatal allergy development.

  • 181.
    Abelius, Martina S
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Janefjord, Camilla
    Linköping University, Department of Clinical and Experimental Medicine, Division of Cell Biology. Linköping University, Faculty of Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Duchén, Karel
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Nilsson, Lennart
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Heart and Medicine Center, Allergy Center.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Gene expression in placenta, peripheral and cord blood mononuclear cells from allergic and non-allergic women2014Manuscript (preprint) (Other academic)
    Abstract [en]

    Background: The influence of maternal allergy on the development of immune responses and allergy in the offspring is not understood.

    Objective: To investigate (i) if maternal allergy influences the gene expression locally in placenta, systemically in peripheral blood mononuclear cells (PBMC) and fetally in cord blood mononuclear cells (CBMC), (ii) if the gene expression in the placenta and PBMC influences the gene expression in CBMC and (iii) how the gene expression at birth relates to allergy development during  childhood.

    Methods: A real-time PCR array was used to quantify forty immune regulatory genes in placenta, PBMC (gestational week 39) and in CBMC from 7 allergic and 12 non-allergic women and their offspring. Furthermore, quantitative real-time PCR was used to measure mRNA expression of Tbx21, GATA-3, Foxp3, RORC and CCL22 in CBMC, selected based on present PCR array results and previous protein findings in cord blood, in 13 children who developed and 11 children who did not develop allergy during childhood.

    Results: The gene expression profile in the placenta revealed a T-helper (Th) 2-/anti-inflammatory environment as compared with gene expression systemically, in PBMC. Maternal allergy was associated with increased expression of p35 in PBMC and CBMC and p40 in placenta. Placental p35 expression correlated with fetal Tbx21 expression (Rho=-0.88, p<0.001) and maternal IL-5 expression in PBMC with fetal Galectin-1 (Rho=0.91, p<0.001) expression. Allergy development in the children was preceded by high mRNA expression of the Th2-associated chemokine CCL22 at birth.

    Conclusion and clinical relevance: Gene expression locally and systemically during pregnancy influenced the offspring’s gene expression at birth, indicating an interplay between maternal and fetal immunity. Children developing allergy during childhood had an increased expression of the Th2-associated chemokine CCL22 at birth, indicating a Th2 skewing before disease onset. Maternal allergy was not associated with a Th2-dominance in placenta, PBMC or CBMC.

  • 182.
    Abelius, Martina S
    et al.
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Lempinen, Esma
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Lindblad, Karin
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Berg, Göran
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Matthiesen, Leif
    Linköping University, Department of Clinical and Experimental Medicine, Division of Clinical Sciences. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Center of Paediatrics and Gynaecology and Obstetrics, Department of Gynaecology and Obstetrics in Linköping.
    Nilsson, Lennart
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Heart and Medicine Center, Allergy Center.
    Jenmalm, Maria
    Linköping University, Department of Clinical and Experimental Medicine, Division of Inflammation Medicine. Linköping University, Faculty of Health Sciences.
    Th2-like chemokine levels are increased in allergic children and influenced by maternal immunity during pregnancy2014In: Pediatric Allergy and Immunology, ISSN 0905-6157, E-ISSN 1399-3038, Vol. 25, no 4, p. 387-393Article in journal (Refereed)
    Abstract [en]

    Background: The influence of the intra-uterine environment on the immunity and allergy development in the offspring is unclear. We aimed to investigate (i) whether the pregnancy magnifies the Th2 immunity in allergic and non-allergic women, (ii) whether the maternal chemokine levels during pregnancy influenced the offspring’s chemokine levels during childhood and (iii) the relationship between circulating Th1/Th2-associated chemokines and allergy in mothers and children.

    Methods: The Th1-associated chemokines CXCL9, CXCL10, CXCL11, and the Th2- associated chemokines CCL17, CCL18 and CCL22 were quantified by Luminex and ELISA in 20 women with and 36 women without allergic symptoms at gestational week (gw) 10–12, 15–16, 25, 35, 39 and 2 and 12 months post-partum and in their children at birth, 6, 12, 24 months and 6 yr of age. Total IgE levels were measured using ImmunoCAP Technology.

    Results: The levels of the Th2-like chemokines were not magnified by pregnancy. Instead decreased levels were shown during pregnancy (irrespectively of maternal allergy status) as compared to post-partum. In the whole group, the Th1-like chemokine levels were higher at gw 39 than during the first and second trimester and post-partum. Maternal CXCL11, CCL18 and CCL22 levels during and after pregnancy correlated with the corresponding chemokines in the offspring during childhood. Increased CCL22 and decreased CXCL10 levels in the children were associated with sensitisation and increased CCL17 levels with allergic symptoms during childhood. Maternal chemokine levels were not associated with maternal allergic disease.

    Conclusions: Allergic symptoms and sensitisation were associated with decreased Th1-and increased Th2-associated chemokine levels during childhood, indicating a Th2 shift in the allergic children, possibly influenced by the maternal immunity during pregnancy.

  • 183.
    Abellán, C.
    et al.
    ICFO - Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, Barcelona, Spain.
    Acín, A.
    ICFO - Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, Barcelona, Spain / ICREA - Institució Catalana de Recerca i Estudis Avançats, Barcelona, Spain.
    Alarcón, A.
    Millennium Institute for Research in Optics, Universidad de Concepción, Universidad de Concepción, Concepción, Chile / Departamento de Ingeniería Eléctrica, Universidad de Concepción, Concepción, Chile.
    Alibart, O.
    Université Côte d’Azur, CNRS UMR 7010, Institut de Physique de Nice (INPHYNI), Nice, France.
    Andersen, C. K.
    Department of Physics, ETH Zurich,, Zurich, Switzerland.
    Andreoli, F.
    Dipartimento di Fisica, Sapienza Università di Roma, Rome, Italy.
    Beckert, A.
    Department of Physics, ETH Zurich,, Zurich, Switzerland.
    Beduini, F. A.
    ICFO - Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, Barcelona, Spain.
    Bendersky, A.
    Departamento de Computación, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires and Instituto de Investigación en Ciencias de la Comunicación (ICC), CONICET, Buenos Aires, Argentina.
    Bentivegna, M.
    Dipartimento di Fisica, Sapienza Università di Roma, Rome, Italy.
    Bierhorst, P.
    National Institute of Standards and Technology, Boulder, CO, USA.
    Burchardt, D.
    Ludwig-Maximilians-Universität, Munich, Germany.
    Cabello, A.
    Departamento de Física Aplicada II, Universidad de Sevilla, Seville, Spain.
    Cariñe, J.
    Millennium Institute for Research in Optics, Universidad de Concepción, Universidad de Concepción, Concepción, Chile.
    Carrasco, S.
    ICFO - Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, Barcelona, Spain.
    Carvacho, G.
    Dipartimento di Fisica, Sapienza Università di Roma, Rome, Italy.
    Cavalcanti, D.
    Chaves, R.
    Cortés-Vega, J.
    Cuevas, A.
    Delgado, A.
    de Riedmatten, H.
    Eichler, C.
    Farrera, P.
    Fuenzalida, J.
    García-Matos, M.
    Garthoff, R.
    Gasparinetti, S.
    Gerrits, T.
    Ghafari Jouneghani, F.
    Glancy, S.
    Gómez, E. S.
    González, P.
    Guan, J. -Y.
    Handsteiner, J.
    Heinsoo, J.
    Heintze, G.
    Hirschmann, A.
    Jiménez, O.
    Kaiser, F.
    Knill, E.
    Knoll, L. T.
    Krinner, S.
    Kurpiers, P.
    Larotonda, M. A.
    Larsson, Jan-Åke
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, Faculty of Science & Engineering.
    Lenhard, A.
    Li, H.
    Li, M. -H.
    Lima, G.
    Liu, B.
    Liu, Y.
    López Grande, I. H.
    Lunghi, T.
    Ma, X.
    Magaña-Loaiza, O. S.
    Magnard, P.
    Magnoni, A.
    Martí­-Prieto, M.
    Martínez, D.
    Mataloni, P.
    Mattar, A.
    Mazzera, M.
    Mirin, R. P.
    Mitchell, M. W.
    Nam, S.
    Oppliger, M.
    Pan, J. -W.
    Patel, R. B.
    Pryde, G. J.
    Rauch, D.
    Redeker, K.
    Rieländer, D.
    Ringbauer, M.
    Roberson, T.
    Rosenfeld, W.
    Salathé, Y.
    Santodonato, L.
    Sauder, G.
    Scheidl, T.
    Schmiegelow, C. T.
    Sciarrino, F.
    Seri, A.
    Shalm, L. K.
    Shi, S. -C
    Slussarenko, S.
    Stevens, M. J.
    Tanzilli, S.
    Toledo, F.
    Tura, J.
    Ursin, R.
    Vergyris, P.
    Verma, V. B.
    Walter, T.
    Wallraff, A.
    Wang, Z.
    Weinfurter, H.
    Weston, M. M.
    White, A. G.
    Wu, C.
    Xavier, Guilherme B.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, Faculty of Science & Engineering.
    You, L.
    Yuan, X.
    Zeilinger, A.
    Zhang, Q.
    Zhang, W.
    Zhong, J.
    Challenging Local Realism with Human Choices2018In: Nature, ISSN 0028-0836, E-ISSN 1476-4687, Vol. 557, p. 212-216Article in journal (Refereed)
    Abstract [en]

    A Bell test is a randomized trial that compares experimental observations against the philosophical worldview of local realism , in which the properties of the physical world are independent of our observation of them and no signal travels faster than light. A Bell test requires spatially distributed entanglement, fast and high-efficiency detection and unpredictable measurement settings. Although technology can satisfy the first two of these requirements, the use of physical devices to choose settings in a Bell test involves making assumptions about the physics that one aims to test. Bell himself noted this weakness in using physical setting choices and argued that human ‘free will’ could be used rigorously to ensure unpredictability in Bell tests. Here we report a set of local-realism tests using human choices, which avoids assumptions about predictability in physics. We recruited about 100,000 human participants to play an online video game that incentivizes fast, sustained input of unpredictable selections and illustrates Bell-test methodology. The participants generated 97,347,490 binary choices, which were directed via a scalable web platform to 12 laboratories on five continents, where 13 experiments tested local realism using photons, single atoms, atomic ensembles and superconducting devices. Over a 12-hour period on 30 November 2016, participants worldwide provided a sustained data flow of over 1,000 bits per second to the experiments, which used different human-generated data to choose each measurement setting. The observed correlations strongly contradict local realism and other realistic positions in bi-partite and tri-partite 12 scenarios. Project outcomes include closing the ‘freedom-of-choice loophole’ (the possibility that the setting choices are influenced by ‘hidden variables’ to correlate with the particle properties), the utilization of video-game methods for rapid collection of human-generated randomness, and the use of networking techniques for global participation in experimental science.

  • 184.
    Abelow, Alexis
    et al.
    University of Utah, Salt Lake City, USA.
    Persson, Kristin
    Linköping University, Department of Science and Technology. Linköping University, The Institute of Technology.
    Jager, Edwin
    Linköping University, Department of Physics, Chemistry and Biology, Biosensors and Bioelectronics. Linköping University, The Institute of Technology.
    Berggren, Magnus
    Linköping University, Department of Science and Technology. Linköping University, The Institute of Technology.
    Zharov, Ilya
    University of Utah, Salt Lake City, USA.
    Electroresponsive Nanoporous Membranes by Coating Anodized Alumina with Poly(3,4-ethylenedioxythiophone) and Polypyrrole2014In: Macromolecular materials and engineering (Print), ISSN 1438-7492, E-ISSN 1439-2054, Vol. 299, no 2, p. 190-197Article in journal (Refereed)
    Abstract [en]

    Electrically-active nanoporous membranes are prepared by coating the surface of anodized alumina with electroactive polymers using vapor phase polymerization with four combinations of conjugated polymers and doping ions: poly(3,4-ethylenedioxythiophone) and polypyrrole, FeCl3 and FeTs3. The permeability of the polymer-coated membranes is measured as a function of the applied electric potential. A reversible three-fold increase is found in molecular flux of a neutral dye for membranes in oxidized state compared to that in the reduced state. After analyzing various factors that may affect the molecular transport through these membranes, it is concluded that the observed behavior results mostly from swelling/deswelling of the polymers and from the confinement of the polymers inside the nanopores.

  • 185.
    Abelsson, J.
    et al.
    NU Hospital Organization, Uddevalla.
    Merup, M.
    Karolinska Universitetssjukhuset, Huddinge.
    Birgegård, G.
    Uppsala University.
    WeisBjerrum, O.
    Rigshospitalet, University of Copenhagen.
    Brinch, L.
    Rikshospitalet, Oslo University Hospital.
    Brune, M.
    Sahlgrenska Universitetssjukhuset, Göteborg.
    Johansson, P.
    NU Hospital Organization, Uddevalla.
    Kauppila, M.
    Turku University Hospital, Finland.
    Lenhoff, S.
    Skåne University Hospital.
    Liljeholm, M.
    Norrlands Universitetssjukhus, Umeå.
    Malm, Claes
    Linköping University, Department of Clinical and Experimental Medicine, Oncology. Linköping University, Faculty of Health Sciences. Östergötlands Läns Landsting, Centre for Surgery, Orthopaedics and Cancer Treatment, Department of Haematology UHL.
    Remes, K.
    Turku University Hospital, Finland.
    Vindelöv, L.
    Rigshospitalet, University of Copenhagen.
    Andréasson, Björn
    NU Hospital Organization, Uddevalla.
    The outcome of allo-HSCT for 92 patients with myelofibrosis in the Nordic countries2012In: Bone Marrow Transplantation, ISSN 0268-3369, E-ISSN 1476-5365, Vol. 47, no 3, p. 380-386Article in journal (Refereed)
    Abstract [en]

    Between 1982 and 2009 a total of 92 patients with myelofibrosis (MF) in chronic phase underwent allo-SCT in nine Nordic transplant centers. Myeloablative conditioning (MAC) was given to 40 patients, and reduced intensity conditioning (RIC) was used in 52 patients. The mean age in the two groups at transplantation was 46±12 and 55±8 years, respectively (P<0.001). When adjustment for age differences was made, the survival of the patients treated with RIC was significantly better (P=0.003). Among the RIC patients, the survival was significantly (P=0.003) better for the patients with age <60 years (a 10-year survival close to 80%) than for the older patients. The type of stem cell donor did not significantly affect the survival. No significant difference was found in TRM at 100 days between the MAC- and the RIC-treated patients. The probability of survival at 5 years was 49% for the MAC-treated patients and 59% in the RIC group (P=0.125). Patients treated with RIC experienced significantly less aGVHD compared with patients treated with MAC (P<0.001). The OS at 5 years was 70, 59 and 41% for patients with Lille score 0, 1 and 2, respectively (P=0.038, when age adjustment was made). Twenty-one percent of the patients in the RIC group were given donor lymphocyte infusion because of incomplete donor chimerism, compared with none of the MAC-treated patients (P<0.002). Nine percent of the patients needed a second transplant because of graft failure, progressive disease or transformation to AML, with no significant difference between the groups. Our conclusions are (1) allo-SCT performed with RIC gives a better survival compared with MAC. (2) age over 60 years is strongly related to a worse outcome and (3) patients with higher Lille score had a shorter survival.Bone Marrow Transplantation advance online publication, 9 May 2011; doi:10.1038/bmt.2011.91.

  • 186.
    Aberg, D
    et al.
    Royal Inst Technol, SE-16440 Kista, Sweden Linkoping Univ, Dept Phys & Measurement Technol, SE-58183 Linkoping, Sweden.
    Storasta, Liutauras
    Linköping University, The Institute of Technology. Linköping University, Department of Physics, Chemistry and Biology, Semiconductor Materials.
    Hallen, A
    Royal Inst Technol, SE-16440 Kista, Sweden Linkoping Univ, Dept Phys & Measurement Technol, SE-58183 Linkoping, Sweden.
    Svensson, BG
    Implantation temperature dependent deep level defects in 4H-SiC2001In: Materials Science Forum, Vols. 353-356, 2001, Vol. 353-3, p. 443-446Conference paper (Refereed)
    Abstract [en]

    Deep level transient spectroscopy spectra of the near Z-defect region (150-350K) were investigated for B implanted samples of low doses (10(8)-10(9) cm(-2)). For 300 degreesC implantation, a level at an energy of 0.41 eV below the conduction hand edge was found, referred to as the S-level. The S-center was shown to form in both implanted and electron irradiated 4H-SiC, either after room temperature (R.T.) implantation followed by mild heat treatments or lung R.T. storage (several months) or after 200-300 degreesC implantations/irradiations. The S-center was found to anneal out at temperatures above 250 degreesC.

  • 187.
    Aberger, Martin
    Linköping University, Department of Electrical Engineering, Automatic Control. Linköping University, The Institute of Technology.
    Effects of Nonlinearities in Black Box Identification of an Industrial Robot2000Report (Other academic)
    Abstract [en]

    This paper discusses effects of nonlinearities in black box identification of one axis of a robot. The used data come from a commercial ABB robot, IRB1400. A three-mass flexible model for the robot was built in MathModelica. The nonlinearities in the model are nonlinear friction and backlash in the gear box.

  • 188.
    Abeysekera, Ramanika
    Linköping University, Department of Computer and Information Science.
    Effects of system integration in an organization: A case study carried out in the photo and home electronics branch2005Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Organizations often have information systems belonging to different computer generations. These systems contain much valuable data to the organizations concerned. However, these systems are often unable to communicate with each other, due to incompatibilities. Moreover, replacing these systems with new systems is also very costly. Therefore the latest trend is integrating the existing systems with each other with the help of different system integration technologies. When the systems are integrated with new technology they bring about various effects to the organizations in concern.

    The purpose of this thesis is to find out how system integration affects an organization in the photo and home electronics branch, namely Expert. The questions that will be raised in this thesis are how does system integration affect the organization’s work processes and how does system integration affect the organisation’s employees. I have studied how system integration has affected the work processes and employees of the retail stores. In order to find answers to these questions three qualitative interviews were carried out. One interview took place in the central organization and the rest in retail stores in Linköping.

    There are many reasons, which led Expert towards using system integration. Some of the main reasons are increased profitability and decreased costs for maintenance and upgrading of different systems. Further, the retail stores required better information channelling and streamlining of work processes in order to provide salesmen at retail stores possibility to concentrate more on customers by minimising administrative work.

    I have found that system integration has affected the organization’s work processes and its employees both positively and negatively, in other words system integration has helped Expert to decrease administration work, provided salesmen at retail stores more time to deliver better service to customers, has automated key work processes saving time and reducing redundancy of work. Even if, the organization is quite satisfied with the benefits the existing system integration technologies have rendered to them, there are many more privileges, which can be achieved.

  • 189.
    Abidi, L.
    et al.
    Maastricht University, Netherlands.
    Oenema, A.
    Maastricht University, Netherlands.
    Nilsen, Per
    Linköping University, Department of Medical and Health Sciences, Division of Community Medicine. Linköping University, Faculty of Medicine and Health Sciences.
    Anderson, P.
    Maastricht University, Netherlands; Newcastle University, England.
    van de Mheen, D.
    Maastricht University, Netherlands; IVO Addict Research Institute, Netherlands; Erasmus MC, Netherlands.
    Strategies to Overcome Barriers to Implementation of Alcohol Screening and Brief Intervention in General Practice: a Delphi Study Among Healthcare Professionals and Addiction Prevention Experts2016In: Prevention Science, ISSN 1389-4986, E-ISSN 1573-6695, Vol. 17, no 6, p. 689-699Article in journal (Refereed)
    Abstract [en]

    Despite the evidence base, alcohol screening and brief intervention (ASBI) have rarely been integrated into routine clinical practice. The aim of this study is to identify strategies that could tackle barriers to ASBI implementation in general practice by involving primary healthcare professionals and addiction prevention experts. A three-round online Delphi study was carried out in the Netherlands. The first-round questionnaire consisted of open-ended questions to generate ideas about strategies to overcome barriers. In the second round, participants were asked to indicate how applicable they found each strategy. Items without consensus were systematically fed back with group median ratings and interquartile range (IQR) scores in the third-round questionnaire. In total, 39 out of 69 (57 %) invited participants enrolled in the first round, 214 participants completed the second round, and 144 of these (67 %) completed the third-round questionnaire. Results show that participants reached consensus on 59 of 81 strategies, such as the following: (1) use of E-learning technology, (2) symptom-specific screening by general practitioners (GPs) and/or universal screening by practice nurses, (3) reimbursement incentives, (4) supportive materials, (5) clear guidelines, (6) service provision of addiction care centers, and (7) more publicity in the media. This exploratory study identified a broad set of strategies that could potentially be used for overcoming barriers to ASBI implementation in general practice and paves the way for future research to experimentally test the identified implementation strategies using multifaceted approaches.

  • 190.
    Abidin, Aysajan
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions2013Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public communication channel. It enjoys provable unconditional security provided that the public communication channel is immutable. Otherwise, QKD is vulnerable to a man-in-the-middle attack. Immutable public communication channels, however, do not exist in practice. So we need to use authentication that implements the properties of an immutable channel as well as possible. One scheme that serves this purpose well is the Wegman-Carter authentication (WCA), which is built upon Almost Strongly Universal2 (ASU2) hashing. This scheme uses a new key in each authentication attempt to select a hash function from an ASU2 family, which is then used to generate the authentication tag for a message.

    The main focus of this dissertation is on authentication in the context of QKD. We study ASU2 hash functions, security of QKD that employs a computationally secure authentication, and also security of authentication with a partially known key. Specifically, we study the following.

    First, Universal hash functions and their constructions are reviewed, and as well as a new construction of ASU2 hash functions is presented. Second, security of QKD that employs a specific computationally secure authentication is studied. We present detailed attacks on various practical implementations of QKD that employs this authentication. We also provide countermeasures and prove necessary and sufficient conditions for upgrading the security of the authentication to the level of unconditional security. Third, Universal hash function based multiple authentication is studied. This uses a fixed ASU2 hash function followed by one-time pad encryption, to keep the hash function secret. We show that the one-time pad is necessary in every round for the authentication to be unconditionally secure. Lastly, we study security of the WCA scheme, in the case of a partially known authentication key. Here we prove tight information-theoretic security bounds and also analyse security using witness indistinguishability as used in the Universal Composability framework.

    List of papers
    1. New Universal Hash Functions
    Open this publication in new window or tab >>New Universal Hash Functions
    2012 (English)In: Lecture Notes in Computer Science, Vol. 7242 / [ed] Frederik Armknecht and Stefan Lucks, Springer Berlin Heidelberg , 2012, p. 99-108Conference paper, Published paper (Refereed)
    Abstract [en]

    Universal hash functions are important building blocks for unconditionally secure message authentication codes. In this paper, we present a new construction of a class of Almost Strongly Universal hash functions with much smaller description (or key) length than the Wegman-Carter construction. Unlike some other constructions, our new construction has a very short key length and a security parameter that is independent of the message length, which makes it suitable for authentication in practical applications such as Quantum Cryptography.

    Place, publisher, year, edition, pages
    Springer Berlin Heidelberg, 2012
    Series
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 7242
    National Category
    Other Electrical Engineering, Electronic Engineering, Information Engineering
    Identifiers
    urn:nbn:se:liu:diva-84711 (URN)10.1007/978-3-642-34159-5_7 (DOI)978-3-642-34158-8 (ISBN)978-3-642-34159-5 (ISBN)
    Conference
    4th Western European Workshop on Research in Cryptology, WEWoRC 2011, Weimar, Germany, July 20-22, 2011
    Projects
    ICG QC
    Available from: 2012-10-18 Created: 2012-10-17 Last updated: 2018-01-31
    2. Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    Open this publication in new window or tab >>Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    2009 (English)In: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, no 5, p. 1047-1052Article in journal (Refereed) Published
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Keywords
    Quantum cryptography, quantum key distribution, authentication
    National Category
    Natural Sciences
    Identifiers
    urn:nbn:se:liu:diva-20405 (URN)10.1142/S0219749909005754 (DOI)
    Projects
    ICG QC
    Available from: 2009-09-08 Created: 2009-09-07 Last updated: 2016-08-31Bibliographically approved
    3. Attacks on quantum key distribution protocols that employ non-ITS authentication
    Open this publication in new window or tab >>Attacks on quantum key distribution protocols that employ non-ITS authentication
    Show others...
    2016 (English)In: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 15, no 1, p. 327-362Article in journal (Refereed) Published
    Abstract [en]

    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols.

    In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity.

    Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKDpostprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

    Place, publisher, year, edition, pages
    Springer Publishing Company, 2016
    National Category
    Engineering and Technology
    Identifiers
    urn:nbn:se:liu:diva-91260 (URN)10.1007/s11128-015-1160-4 (DOI)000372876800020 ()
    Projects
    ICG QC
    Note

    Vid tiden för disputation förelåg publikationen som manuskript

    Funding agencies: Vienna Science and Technology Fund (WWTF) [ICT10-067]; Austrian Research Promotion Agency (FFG) [Bridge-2364544]

    Available from: 2013-04-18 Created: 2013-04-18 Last updated: 2017-12-06Bibliographically approved
    4. On Security of Universal Hash Function Based Multiple Authentication
    Open this publication in new window or tab >>On Security of Universal Hash Function Based Multiple Authentication
    2012 (English)In: Lecture Notes in Computer Science, Vol. 7618 / [ed] Chim, Tat Wing and Yuen, Tsz Hon, 2012, p. 303-310Conference paper, Published paper (Refereed)
    Abstract [en]

    Universal hash function based multiple authentication was originally proposed by Wegman and Carter in 1981. In this authentication, a series of messages are authenticated by first hashing each message by a fixed (almost) strongly universal$_2$ hash function and then encrypting the hash value with a preshared one-time pad. This authentication is unconditionally secure. In this paper, we show that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [Atici and Stinson, CRYPTO '96. LNCS, vol. 1109]. This means that it is not only sufficient, but also necessary, to encrypt the hash of every message to be authenticated in order to have unconditional security. The security loss is demonstrated by a simple existential forgery attack.

    Series
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 7618
    National Category
    Engineering and Technology
    Identifiers
    urn:nbn:se:liu:diva-84732 (URN)10.1007/978-3-642-34129-8_27 (DOI)978-3-642-34128-1 (ISBN)978-3-642-34129-8 (ISBN)
    Conference
    14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29-31, 2012
    Projects
    ICG QC
    Available from: 2012-10-18 Created: 2012-10-18 Last updated: 2018-02-12
    5. Direct proof of security of Wegman-Carter authentication with partially known key
    Open this publication in new window or tab >>Direct proof of security of Wegman-Carter authentication with partially known key
    2014 (English)In: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 13, no 10, p. 2155-2170Article in journal (Refereed) Published
    Abstract [en]

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability ε and the authentication key has an ε´ trace distance to the uniform, then under ITS, the adversary’s success probability conditioned on an authentic message-tag pair is only bounded by ε +|Ƭ|ε´, where |Ƭ| is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to |Ƭ|ε´ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than ε + ε´. This proves that the scheme is (ε + ε´)-UC-secure, without using the composability theorem.

    Place, publisher, year, edition, pages
    Springer, 2014
    Keywords
    Authentication, Strongly Universal hash functions, Partially known key, Trace distance, Universal Composability, Quantum Key Distribution.
    National Category
    Electrical Engineering, Electronic Engineering, Information Engineering
    Identifiers
    urn:nbn:se:liu:diva-91264 (URN)10.1007/s11128-013-0641-6 (DOI)000341842000002 ()
    Projects
    ICG QC
    Available from: 2013-04-18 Created: 2013-04-18 Last updated: 2017-12-06Bibliographically approved
  • 191.
    Abidin, Aysajan
    Linköping University, Department of Electrical Engineering, Information Coding.
    On Security of Universal Hash Function Based Multiple Authentication2012In: Lecture Notes in Computer Science, Vol. 7618 / [ed] Chim, Tat Wing and Yuen, Tsz Hon, 2012, p. 303-310Conference paper (Refereed)
    Abstract [en]

    Universal hash function based multiple authentication was originally proposed by Wegman and Carter in 1981. In this authentication, a series of messages are authenticated by first hashing each message by a fixed (almost) strongly universal$_2$ hash function and then encrypting the hash value with a preshared one-time pad. This authentication is unconditionally secure. In this paper, we show that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [Atici and Stinson, CRYPTO '96. LNCS, vol. 1109]. This means that it is not only sufficient, but also necessary, to encrypt the hash of every message to be authenticated in order to have unconditional security. The security loss is demonstrated by a simple existential forgery attack.

  • 192.
    Abidin, Aysajan
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions2010Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally secure. The standard in Quantum Cryptography is to use theWegman-Carter authentication, which is unconditionally secure and is based on the idea of universal hashing.

    In this thesis, we first investigate properties of a Strongly Universal hash function family to facilitate understanding the properties of (classical) authentication used in Quantum Cryptography. Then, we study vulnerabilities of a recently proposed authentication protocol intended to rule out a "man-in-the-middle" attack on Quantum Cryptography. Here, we point out that the proposed authentication primitive is not secure when used in a generic Quantum Cryptographic protocol. Lastly, we estimate the lifetime of authentication using encrypted tags when the encryption key is partially known. Under simplifying assumptions, we derive that the lifetime is linearly dependent on the length of the authentication key. Experimental results that support the theoretical results are also presented.

    List of papers
    1. Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    Open this publication in new window or tab >>Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
    2009 (English)In: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, p. 289-293Conference paper, Published paper (Refereed)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

    Place, publisher, year, edition, pages
    New York: American Institute of Physics, 2009
    Keywords
    Quantum cryptography, Quantum theory, Probability
    National Category
    Mathematics
    Identifiers
    urn:nbn:se:liu:diva-18738 (URN)10.1063/1.3109951 (DOI)
    Conference
    Foundations of Probability and Physics—5, Växjö, augusti 2008
    Projects
    ICG QC
    Available from: 2009-06-03 Created: 2009-06-03 Last updated: 2016-08-31
    2. Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    Open this publication in new window or tab >>Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
    2009 (English)In: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, no 5, p. 1047-1052Article in journal (Refereed) Published
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

    Keywords
    Quantum cryptography, quantum key distribution, authentication
    National Category
    Natural Sciences
    Identifiers
    urn:nbn:se:liu:diva-20405 (URN)10.1142/S0219749909005754 (DOI)
    Projects
    ICG QC
    Available from: 2009-09-08 Created: 2009-09-07 Last updated: 2016-08-31Bibliographically approved
    3. Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially Known
    Open this publication in new window or tab >>Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially Known
    (English)Manuscript (preprint) (Other academic)
    Abstract [en]

    Quantum cryptography is an unconditionally secure key growing technique provided that an unconditionally secure authentication protocol is combined with it. This paper is about the study of the lifetime of a message authentication scheme, where a message to be authenticated is first hashed by a secret–but fixed–Strongly Universal hash function then the output is encrypted with a one-time-pad key to generate a tag for the message. If the onetime-pad is completely secret, then the lifetime is exponential in the tag length. If, however, the one-time-pad key is partially known in each authentication round, as is the case in practical quantum key distribution protocols, then the picture is different; because the adversary’s partial knowledge of the one-time-pad key in each authentication round contributes to his/her ability to identify the secret hash function. We estimate the lifetime of this type of authentication. Here the parameters are the length of the key identifying the secret hash function and the amount of knowledge that Eve has on the one-time-pad. A theoretical estimate is presented, along with experimental results that support it.

    Keywords
    Quantum cryptography, quantum key distribution, authentication, strongly universal hash functions, lifetime
    National Category
    Mathematics
    Identifiers
    urn:nbn:se:liu:diva-57289 (URN)
    Projects
    ICG QC
    Available from: 2010-06-16 Created: 2010-06-16 Last updated: 2016-08-31
  • 193.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Larsson, Jan-Åke
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Direct proof of security of Wegman-Carter authentication with partially known key2014In: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 13, no 10, p. 2155-2170Article in journal (Refereed)
    Abstract [en]

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability ε and the authentication key has an ε´ trace distance to the uniform, then under ITS, the adversary’s success probability conditioned on an authentic message-tag pair is only bounded by ε +|Ƭ|ε´, where |Ƭ| is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to |Ƭ|ε´ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than ε + ε´. This proves that the scheme is (ε + ε´)-UC-secure, without using the composability theorem.

  • 194.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Mathematics. Linköping University, The Institute of Technology.
    Larsson, Jan-Åke
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Lifetime of Authentication Using Encrypted Tags When the Encryption Key is Partially KnownManuscript (preprint) (Other academic)
    Abstract [en]

    Quantum cryptography is an unconditionally secure key growing technique provided that an unconditionally secure authentication protocol is combined with it. This paper is about the study of the lifetime of a message authentication scheme, where a message to be authenticated is first hashed by a secret–but fixed–Strongly Universal hash function then the output is encrypted with a one-time-pad key to generate a tag for the message. If the onetime-pad is completely secret, then the lifetime is exponential in the tag length. If, however, the one-time-pad key is partially known in each authentication round, as is the case in practical quantum key distribution protocols, then the picture is different; because the adversary’s partial knowledge of the one-time-pad key in each authentication round contributes to his/her ability to identify the secret hash function. We estimate the lifetime of this type of authentication. Here the parameters are the length of the key identifying the secret hash function and the amount of knowledge that Eve has on the one-time-pad. A theoretical estimate is presented, along with experimental results that support it.

  • 195.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding.
    Larsson, Jan-Åke
    Linköping University, Department of Electrical Engineering, Information Coding.
    New Universal Hash Functions2012In: Lecture Notes in Computer Science, Vol. 7242 / [ed] Frederik Armknecht and Stefan Lucks, Springer Berlin Heidelberg , 2012, p. 99-108Conference paper (Refereed)
    Abstract [en]

    Universal hash functions are important building blocks for unconditionally secure message authentication codes. In this paper, we present a new construction of a class of Almost Strongly Universal hash functions with much smaller description (or key) length than the Wegman-Carter construction. Unlike some other constructions, our new construction has a very short key length and a security parameter that is independent of the message length, which makes it suitable for authentication in practical applications such as Quantum Cryptography.

  • 196.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Larsson, Jan-Åke
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography2009In: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, p. 289-293Conference paper (Refereed)
    Abstract [en]

    Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

  • 197.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Larsson, Jan-Åke
    Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
    Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"2009In: International Journal of Quantum Information, ISSN 0219-7499, Vol. 7, no 5, p. 1047-1052Article in journal (Refereed)
    Abstract [en]

    In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

  • 198.
    Abidin, Aysajan
    et al.
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Pacher, Christoph
    Austrian Institute of Technology, Austria.
    Lorünser, Thomas
    Austrian Institute of Technology, Austria.
    Larsson, Jan-Åke
    Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
    Peev, Momtchil
    Austrian Institute of Technology, Austria.
    Quantum cryptography and authentication with low key-consumption2011In: Proceedings of SPIE - The International Society for Optical Engineering, 2011, p. 818916-Conference paper (Refereed)
    Abstract [en]

    Quantum Key Distribution (QKD - also referred to as Quantum Cryptography) is a technique for secret key agreement. It has been shown that QKD rigged with Information-Theoretic Secure (ITS) authentication (using secret key) of the classical messages transmitted during the key distribution protocol is also ITS. Note, QKD without any authentication can trivially be broken by man-in-the-middle attacks. Here, we study an authentication method that was originally proposed because of its low key consumption; a two-step authentication that uses a publicly known hash function, followed by a secret strongly universal2 hash function, which is exchanged each round. This two-step authentication is not information-theoretically secure but it was argued that nevertheless it does not compromise the security of QKD. In the current contribution we study intrinsic weaknesses of this approach under the common assumption that the QKD adversary has access to unlimited resources including quantum memories. We consider one implementation of Quantum Cryptographic protocols that use such authentication and demonstrate an attack that fully extract the secret key. Even including the final key from the protocol in the authentication does not rule out the possibility of these attacks. To rectify the situation, we propose a countermeasure that, while not informationtheoretically secure, restores the need for very large computing power for the attack to work. Finally, we specify conditions that must be satisfied by the two-step authentication in order to restore informationtheoretic security.

  • 199.
    Abildgaard, Lars
    et al.
    Linköping University, Faculty of Health Sciences. Linköping University, Department of Medicine and Care, Anaesthesiology. Östergötlands Läns Landsting, MKC - Medicin och kirurgicentrum, Anestesi.
    Aaro, Stig
    Linköping University, Faculty of Health Sciences. Linköping University, Department of Neuroscience and Locomotion, Orthopaedics and Sports Medicine.
    Lisander, Björn
    Linköping University, Faculty of Health Sciences. Linköping University, Department of Medicine and Care, Anaesthesiology. Östergötlands Läns Landsting, MKC - Medicin och kirurgicentrum, Anestesi.
    Limited effectiveness of intraoperative autotransfusion in major back surgery2001In: European Journal of Anaesthesiology, ISSN 0265-0215, E-ISSN 1365-2346, Vol. 18, no 12, p. 823-828Article in journal (Refereed)
    Abstract [en]

    Background and objective: The efficiency of intraoperative autotransfusion in scoliosis surgery is poorly known but needs to be evaluated, not least because of the large blood losses in these patients. This is a retrospective analysis of transfusion requirements of 43 such patients. Methods: Records from 43 patients were studied. During surgery, the shed blood was salvaged and washed in an autotransfusion device (AT1000 Auto-transfusion Unit«) and a suspension of red cells was reinfused. Results: Fifty-eight per cent of the intraoperative blood loss was salvaged. The total blood loss during the patients' hospital stay was calculated from the haemoglobin balance, 24% of this loss was salvaged by the device. Moreover, 36 of the patients needed allogeneic blood transfusion. Conclusion: The efficiency of the autotransfusion device was relatively low in relation to the total extravasation, mainly because the postoperative blood loss is substantial.

  • 200.
    Abioye, Ajibola I.
    et al.
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Park, Sangshin
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Ripp, Kelsey
    Brown Univ, RI 02912 USA.
    McDonald, Emily A.
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Kurtis, Jonathan D.
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Wu, Hannah
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Pond-Tor, Sunthorn
    Rhode Isl Hosp, RI USA.
    Sharma, Surendra
    Brown Univ, RI 02912 USA; Women and Infants Hosp Rhode Isl, RI 02908 USA.
    Ernerudh, Jan
    Linköping University, Department of Clinical and Experimental Medicine, Division of Neuro and Inflammation Science. Linköping University, Faculty of Medicine and Health Sciences. Region Östergötland, Center for Diagnostics, Department of Clinical Immunology and Transfusion Medicine.
    Baltazar, Palmera
    Res Inst Trop Med, Philippines; Remedios Trinidad Romualdez Hosp, Philippines.
    Acosta, Luz P.
    Res Inst Trop Med, Philippines.
    Olveda, Remigio M.
    Res Inst Trop Med, Philippines.
    Tallo, Veronica
    Res Inst Trop Med, Philippines.
    Friedman, Jennifer F.
    Brown Univ, RI 02912 USA; Rhode Isl Hosp, RI USA; Rhode Isl Hosp, RI USA.
    Anemia of Inflammation during Human Pregnancy Does Not Affect Newborn Iron Endowment2018In: Journal of Nutrition, ISSN 0022-3166, E-ISSN 1541-6100, Vol. 148, no 3, p. 427-436Article in journal (Refereed)
    Abstract [en]

    Background: To our knowledge, no studies have addressed whether maternal anemia of inflammation (AI) affects newborn iron status, and few have addressed risk factors for specific etiologies of maternal anemia. Objectives: The study aims were to evaluate 1) the contribution of AI and iron deficiency anemia (IDA) to newborn iron endowment, 2) hepcidin as a biomarker to distinguish AI from IDA among pregnant women, and 3) risk factors for specific etiologies of maternal anemia. Methods: We measured hematologic biomarkers in maternal blood at 12 and 32 wk of gestation and in cord blood from a randomized trial of praziquantel in 358 pregnant women with Schistosoma japonicum in The Philippines. IDA was defined as anemia with serum ferritin amp;lt; 30 ng/mL and non-IDA (NIDA), largely due to AI, as anemia with ferritin amp;gt;= 30 ng/mL. We identified cutoffs for biomarkers to distinguish IDA from NIDA by using area under the curve (AUC) analyses and examined the impact of different causes of anemia on newborn iron status (primary outcome) by using multivariate regression modeling. Results: Of the 358 mothers, 38% (n = 136) had IDA and 9% (n = 32) had NIDA at 32 wk of gestation. At 32 wk of gestation, serum hepcidin performed better than soluble transferrin receptor (sTfR) in identifying women with NIDA compared with the rest of the cohort (AUCs: 0.75 and 0.70, respectively) and in identifying women with NIDA among women with anemia (0.73 and 0.72, respectively). The cutoff that optimally distinguished women with NIDA from women with IDA in our cohort was 6.1 mu g/L. Maternal IDA, but not NIDA, was associated with significantly lower newborn ferritin (114.4 ng/mL compared with 148.4 mu g/L; P = 0.042). Conclusions: Hepcidin performed better than sTfR in identifying pregnant women with NIDA, but its cost may limit its use. Maternal IDA, but not NIDA, is associated with decreased newborn iron stores, emphasizing the need to identify this cause and provide iron therapy.

1234567 151 - 200 of 94994
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf