<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://mw.hh.se/caisr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cclab</id>
	<title>ISLAB/CAISR - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://mw.hh.se/caisr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cclab"/>
	<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Special:Contributions/Cclab"/>
	<updated>2026-04-04T08:27:33Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.13</generator>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Detection_Unit_Imperfections_and_CPM_Reliability_in_Interoperable_RSUs&amp;diff=5675</id>
		<title>Detection Unit Imperfections and CPM Reliability in Interoperable RSUs</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Detection_Unit_Imperfections_and_CPM_Reliability_in_Interoperable_RSUs&amp;diff=5675"/>
		<updated>2026-02-06T10:01:31Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Collaboration with Mittlogik: The project investigates how data and analysis quality affects reliability of collective perception services. |...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Collaboration with Mittlogik: The project investigates how data and analysis quality affects reliability of collective perception services.&lt;br /&gt;
|Keywords=RSU, CPM, reliability analysis, connectivity&lt;br /&gt;
|TimeFrame=Spring-Summer 2026&lt;br /&gt;
|Prerequisites=Strong skills in C/C++, Python, and data analysis. Knowledge of real-time systems and a basic understanding of V2X (CPM) and sensor fusion concepts is required&lt;br /&gt;
|Supervisor=Mittlogik, Elena Haller, Oscar Molina&lt;br /&gt;
|Author=Mittlogik&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;h2&amp;gt;Background&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Standardization bodies have defined the structure of Vehicle-to-Everything (V2X) messages such as the&lt;br /&gt;
&amp;lt;strong&amp;gt;Collective Perception Message (CPM)&amp;lt;/strong&amp;gt;. However, the actual safety utility of these messages&lt;br /&gt;
depends entirely on the quality of the data provided by the &amp;lt;strong&amp;gt;Detection Unit (DU)&amp;lt;/strong&amp;gt;.&lt;br /&gt;
In real-world deployments, DUs (e.g., computer vision sensors) suffer from variable latency,&lt;br /&gt;
measurement noise, and intermittent detection gaps.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
This thesis investigates how these &amp;lt;em&amp;gt;sensor imperfections&amp;lt;/em&amp;gt; propagate through the&lt;br /&gt;
Roadside Unit (RSU) interworking protocol and affect the reliability and timeliness of&lt;br /&gt;
safety warnings sent to vehicles.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Objectives&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Characterize DU Latency and Noise:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Benchmark the latency and spatial accuracy of the selected DU under various conditions,&lt;br /&gt;
    such as varying numbers of detected objects and different lighting environments.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Model Detection Imperfections:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Develop a fault-injection framework capable of introducing artificial delays, noise,&lt;br /&gt;
    and dropped detections into the data stream between the DU and the RSU.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Analyze CPM Reliability:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Quantify the impact of detection imperfections on generated CPMs using metrics such as&lt;br /&gt;
    Age of Information (AoI), positional error, and message frequency stability.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Evaluate System Robustness:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Identify the system break-point, defined as the level of sensor latency or noise at which&lt;br /&gt;
    CPMs no longer provide a reliable safety benefit for vulnerable road user (VRU) protection.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Methodology&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Benchmarking:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Conduct physical experiments to measure the baseline latency of the DU-to-RSU communication link.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Fault Injection Framework:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Implement a Python/C++ tool positioned between the DU and the RSU interworking module to simulate&lt;br /&gt;
    real-world errors, including noise, jitter, and packet loss.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Stress Testing:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Execute safety-critical scenarios, such as a pedestrian emerging from behind a vehicle,&lt;br /&gt;
    while injecting controlled levels of sensor imperfection.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Data Analysis:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Compare ground-truth pedestrian positions with RSU-reported positions contained in CPMs&lt;br /&gt;
    to calculate error margins and safety-critical delays.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Expected Deliverables&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Robustness Analysis Report:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    A comprehensive assessment of how sensor imperfections influence CPM quality and reliability.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;DU Performance Profile:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    A technical benchmark documenting the performance characteristics of the selected detection hardware.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    &amp;lt;strong&amp;gt;Recommendations for RSU Logic:&amp;lt;/strong&amp;gt;&lt;br /&gt;
    Proposed software-level mitigation strategies, such as data smoothing or dead reckoning,&lt;br /&gt;
    to reduce the impact of sensor limitations.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Comparative_Study_on_Data_Abstraction_Methodologies_for_Interoperable_V2X_Roadside_Units_(RSU)&amp;diff=5674</id>
		<title>Comparative Study on Data Abstraction Methodologies for Interoperable V2X Roadside Units (RSU)</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Comparative_Study_on_Data_Abstraction_Methodologies_for_Interoperable_V2X_Roadside_Units_(RSU)&amp;diff=5674"/>
		<updated>2025-12-19T10:59:17Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=It is a collaboration with MittLogik on development of Interoperable RSU Prototype focused on Vulnerable Road User (VRU) safety. |Keywords=pe...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=It is a collaboration with MittLogik on development of Interoperable RSU Prototype focused on Vulnerable Road User (VRU) safety.&lt;br /&gt;
|Keywords=pedestrian safety, computer vision, V2X communication&lt;br /&gt;
|TimeFrame=february 26 - june 26&lt;br /&gt;
|Prerequisites=Strong skills in embedded C/C++, data structures, computer networks, and a foundational understanding of V2X standards.&lt;br /&gt;
|Supervisor=Elena Haller, MittLogik&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1 id=&amp;quot;comparative-study-v2x-rsu&amp;quot;&amp;gt;&lt;br /&gt;
  Comparative Study on Data Abstraction Methodologies for Interoperable V2X Roadside Units (RSU)&lt;br /&gt;
&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;project-context&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Project Context&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Interoperable RSU Prototype&amp;lt;/strong&amp;gt; focused on &amp;lt;em&amp;gt;Vulnerable Road User (VRU)&amp;lt;/em&amp;gt; safety.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;summary&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Summary&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;p&amp;gt;&lt;br /&gt;
    This thesis is a pre-study to inform the architecture of a proprietary interworking protocol.&lt;br /&gt;
    Theme: Embedded Systems, V2X Data Efficiency, Comparative Protocol Analysis.&lt;br /&gt;
  &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;metadata&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Project Metadata&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;dl&amp;gt;&lt;br /&gt;
    &amp;lt;dt&amp;gt;Theme&amp;lt;/dt&amp;gt;&lt;br /&gt;
    &amp;lt;dd&amp;gt;Embedded Systems, V2X Data Efficiency, Comparative Protocol Analysis&amp;lt;/dd&amp;gt;&lt;br /&gt;
    &amp;lt;dt&amp;gt;Location&amp;lt;/dt&amp;gt;&lt;br /&gt;
    &amp;lt;dd&amp;gt;Lund&amp;lt;/dd&amp;gt;&lt;br /&gt;
    &amp;lt;dt&amp;gt;Timeline&amp;lt;/dt&amp;gt;&lt;br /&gt;
    &amp;lt;dd&amp;gt;2026-02-01 to 2026-10-31&amp;lt;/dd&amp;gt;&lt;br /&gt;
  &amp;lt;/dl&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;background&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Background&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;p&amp;gt;&lt;br /&gt;
    To achieve true RSU interoperability and scalability, the core RSU application must be decoupled&lt;br /&gt;
    from vendor-specific detection unit (DU) sensor data and diverse communication methods (e.g., C‑V2X/DSRC).&lt;br /&gt;
    The design of a lean, efficient &amp;lt;strong&amp;gt;Minimal Dataset Schema&amp;lt;/strong&amp;gt; is critical for low-latency&lt;br /&gt;
    &amp;lt;em&amp;gt;VAM (Vulnerable Road User Awareness Message)&amp;lt;/em&amp;gt; generation. This research will compare various approaches&lt;br /&gt;
    for defining this minimal schema, but will not disclose the final proprietary implementation.&lt;br /&gt;
  &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;objectives&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Objectives&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;ol&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Analyze DU Data Complexity:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      Analyze and characterize the data payload complexity and velocity from representative Computer Vision (CV)&lt;br /&gt;
      detection units (DU), identifying challenges in converting raw data (e.g., bounding boxes, tracking IDs)&lt;br /&gt;
      into V2X data elements.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Compare Methodologies:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      Conduct a comparative study of different encoding methodologies for V2X safety applications, evaluating each&lt;br /&gt;
      based on latency, CPU overhead on embedded platforms, and message size efficiency.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Define Abstraction Rules:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      Propose a set of general best-practice rules and conversion algorithms for mapping high-frequency CV tracking data&lt;br /&gt;
      onto the necessary minimal dataset fields required for standardized VAM generation&lt;br /&gt;
      (e.g., position, dynamics, object type).&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;methodology&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Methodology&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;h3&amp;gt;Comparative Review&amp;lt;/h3&amp;gt;&lt;br /&gt;
  &amp;lt;p&amp;gt;&lt;br /&gt;
    Detailed review of three candidate serialization/encoding techniques (Objective 2) suitable for the RSU&amp;#039;s embedded platform,&lt;br /&gt;
    including profiling their processing speed in a laboratory environment (simulation/modelling).&lt;br /&gt;
  &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;h3&amp;gt;Algorithm Design&amp;lt;/h3&amp;gt;&lt;br /&gt;
  &amp;lt;p&amp;gt;&lt;br /&gt;
    Design generalized algorithms and flowcharts for data aggregation and abstraction (Objective 3).&lt;br /&gt;
  &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section id=&amp;quot;deliverables&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;h2&amp;gt;Expected Deliverables&amp;lt;/h2&amp;gt;&lt;br /&gt;
  &amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Comparative Analysis Report:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      A detailed technical report comparing the performance and suitability of the investigated&lt;br /&gt;
      data serialization methodologies for the RSU application.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Generalized Abstraction Rules:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      A documented set of algorithms and principles for mapping complex detection data to V2X minimal datasets.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      &amp;lt;strong&amp;gt;Thesis Report:&amp;lt;/strong&amp;gt;&lt;br /&gt;
      A thesis submitted for publication focusing on the methodologies, analysis, and generic findings.&lt;br /&gt;
      The final proprietary RSU protocol schema will not be documented or published.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/section&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=In-Vehicle_Data_Acquisition_for_Driving_Behavior_Profiling_and_Automotive_AI_Applications&amp;diff=5671</id>
		<title>In-Vehicle Data Acquisition for Driving Behavior Profiling and Automotive AI Applications</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=In-Vehicle_Data_Acquisition_for_Driving_Behavior_Profiling_and_Automotive_AI_Applications&amp;diff=5671"/>
		<updated>2025-11-25T14:38:49Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Research focus in-vehicle data acquisition techniques, building upon existing work and addressing key limitations in collecting comprehensive, real-world automotive datasets.&lt;br /&gt;
|Keywords=In-vehicle networks;CAN protocol;data acquisition;datasets generation&lt;br /&gt;
|References=A. Dos Santos Roque, L. M. Da Silva Alves and E. P. de Freitas, &amp;quot;CAN-Modes: In-vehicle datasets generation and analysis in different driving situations,&amp;quot; 2024 Workshop on Communication Networks and Power Systems (WCNPS), Brasilia, Brazil, 2024, pp. 1-7, doi: 10.1109/WCNPS65035.2024.10814379.&lt;br /&gt;
|Prerequisites=Communication, programming and hardware skills.&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master/Bachelor&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
General Description:&lt;br /&gt;
To design, implement, and validate an in-vehicle data acquisition system that contributes in dataset generation, and to develop methodologies for profiling diverse driving behaviors from this data. This research will establish a foundation for future data-driven applications.&lt;br /&gt;
&lt;br /&gt;
Goals:&lt;br /&gt;
- Investigating and addressing the limitations of current data acquisition methods, specifically those highlighted in works like CAN-Modes, regarding data diversity (e.g., more car brands, model variations), modern protocols (e.g., CAN FD), and advanced systems (e.g., ADAS, authenticated OBD access).&lt;br /&gt;
- Developing an enhanced in-vehicle data acquisition system capable of collecting more extensive and varied data types, including those from ADAS sensors and potentially beyond standard CAN.&lt;br /&gt;
- Creating methodologies for generating novel, diverse, and well-labeled datasets under a broader range of driving conditions and vehicle types.&lt;br /&gt;
- Data Preprocessing and Feature Engineering: Implement robust pipelines for data cleaning, synchronization, and feature extraction.&lt;br /&gt;
- Study of standards for data generation, as the MDF4 file format, and programming libraries.&lt;br /&gt;
- Study of methods of autentication to access in-vehicle networks (Gateway access problem).&lt;br /&gt;
- Investigating and implementing non-invasive data access methods (e.g., CAN crocodile)&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=In-Vehicle_Data_Acquisition_for_Driving_Behavior_Profiling_and_Automotive_AI_Applications&amp;diff=5670</id>
		<title>In-Vehicle Data Acquisition for Driving Behavior Profiling and Automotive AI Applications</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=In-Vehicle_Data_Acquisition_for_Driving_Behavior_Profiling_and_Automotive_AI_Applications&amp;diff=5670"/>
		<updated>2025-11-25T14:35:39Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Research focus in-vehicle data acquisition techniques, building upon existing work and addressing key limitations in collecting comprehensive...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Research focus in-vehicle data acquisition techniques, building upon existing work and addressing key limitations in collecting comprehensive, real-world automotive datasets.&lt;br /&gt;
|Keywords=In-vehicle networks;CAN protocol;data acquisition;datasets generation&lt;br /&gt;
|References=A. Dos Santos Roque, L. M. Da Silva Alves and E. P. de Freitas, &amp;quot;CAN-Modes: In-vehicle datasets generation and analysis in different driving situations,&amp;quot; 2024 Workshop on Communication Networks and Power Systems (WCNPS), Brasilia, Brazil, 2024, pp. 1-7, doi: 10.1109/WCNPS65035.2024.10814379.&lt;br /&gt;
|Prerequisites=Communication, programming and hardware skills.&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master/Degree&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
General Description:&lt;br /&gt;
To design, implement, and validate an in-vehicle data acquisition system that contributes in dataset generation, and to develop methodologies for profiling diverse driving behaviors from this data. This research will establish a foundation for future data-driven applications.&lt;br /&gt;
&lt;br /&gt;
Goals:&lt;br /&gt;
- Investigating and addressing the limitations of current data acquisition methods, specifically those highlighted in works like CAN-Modes, regarding data diversity (e.g., more car brands, model variations), modern protocols (e.g., CAN FD), and advanced systems (e.g., ADAS, authenticated OBD access).&lt;br /&gt;
- Developing an enhanced in-vehicle data acquisition system capable of collecting more extensive and varied data types, including those from ADAS sensors and potentially beyond standard CAN.&lt;br /&gt;
- Creating methodologies for generating novel, diverse, and well-labeled datasets under a broader range of driving conditions and vehicle types.&lt;br /&gt;
- Data Preprocessing and Feature Engineering: Implement robust pipelines for data cleaning, synchronization, and feature extraction.&lt;br /&gt;
- Study of standards for data generation, as the MDF4 file format, and programming libraries.&lt;br /&gt;
- Study of methods of autentication to access in-vehicle networks (Gateway access problem).&lt;br /&gt;
- Investigating and implementing non-invasive data access methods (e.g., CAN crocodile)&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Explainable_GNNs_for_Security_Verification_of_RISC-V_Cores&amp;diff=5606</id>
		<title>Explainable GNNs for Security Verification of RISC-V Cores</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Explainable_GNNs_for_Security_Verification_of_RISC-V_Cores&amp;diff=5606"/>
		<updated>2025-10-22T04:43:01Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=develop an explainable graph-neural-network (GNN) workflow that localises security-relevant weaknesses in open-source RISC-V cores at RTL.&lt;br /&gt;
|References=Reimann, Lennart M., et al. ”Qtflow: Quantitative timing-sensitive information flow for security-aware hardware design on rtl.” 2024 International VLSI Symposium on Technology, Systems and Applications (VLSI TSA). IEEE, 2024.&lt;br /&gt;
&lt;br /&gt;
Gosch, Lukas, et al. ”Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks.” Transactions on Machine Learning Research.&lt;br /&gt;
|Supervisor=Mahdi Fazeli&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
In this thesis, you will develop an explainable graph-neural-network (GNN) workflow that localises security-relevant weaknesses in open-source RISC-V cores at RTL. You will (i) extract circuit graphs from RTL, (ii) train/finetune a GNN with Jumping-Knowledge to avoid over-smoothing, and (iii) integrate XAI (e.g., GNNExplainer) to produce “vulnerability heatmaps.” As a validation case, you will introduce a small, data-dependent prefetcher-like feature into a RISC-V design and evaluate whether your pipeline flags and localises the risky structure.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Explainable_GNNs_for_Security_Verification_of_RISC-V_Cores&amp;diff=5605</id>
		<title>Explainable GNNs for Security Verification of RISC-V Cores</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Explainable_GNNs_for_Security_Verification_of_RISC-V_Cores&amp;diff=5605"/>
		<updated>2025-10-22T04:39:13Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=develop an explainable graph-neural-network (GNN) workflow that localises security-relevant weaknesses in open-source RISC-V cores at RTL. |R...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=develop an explainable graph-neural-network (GNN) workflow that localises security-relevant weaknesses in open-source RISC-V cores at RTL.&lt;br /&gt;
|References=Reimann, Lennart M., et al. ”Qtflow: Quantitative timing-sensitive information flow for security-aware hardware design on rtl.” 2024 International VLSI Symposium on Technology, Systems and Applications (VLSI TSA). IEEE, 2024.&lt;br /&gt;
&lt;br /&gt;
Gosch, Lukas, et al. ”Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks.” Transactions on Machine Learning Research.&lt;br /&gt;
|Supervisor=Mahdi Fazeli&lt;br /&gt;
|Level=Master&lt;br /&gt;
}}&lt;br /&gt;
n this thesis, you will develop an explainable graph-neural-network (GNN) workflow that localises security-relevant weaknesses in open-source RISC-V cores at RTL. You will (i) extract circuit graphs from RTL, (ii) train/finetune a GNN with Jumping-Knowledge to avoid over-smoothing, and (iii) integrate XAI (e.g., GNNExplainer) to produce “vulnerability heatmaps.” As a validation case, you will introduce a small, data-dependent prefetcher-like feature into a RISC-V design and evaluate whether your pipeline flags and localises the risky structure.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Sensitivity%E2%80%91Aware_Hardening_and_Run%E2%80%91Time_Detection_of_Stealthy_Weight%E2%80%91Drift_Trojans_in_ML_Accelerators&amp;diff=5604</id>
		<title>Sensitivity‑Aware Hardening and Run‑Time Detection of Stealthy Weight‑Drift Trojans in ML Accelerators</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Sensitivity%E2%80%91Aware_Hardening_and_Run%E2%80%91Time_Detection_of_Stealthy_Weight%E2%80%91Drift_Trojans_in_ML_Accelerators&amp;diff=5604"/>
		<updated>2025-10-22T04:32:36Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=design and evaluate sensitivity-aware defences that detect and mitigate stealthy, gradual weight-drift Trojans in FPGA-based ML accelerators ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=design and evaluate sensitivity-aware defences that detect and mitigate stealthy, gradual weight-drift Trojans in FPGA-based ML accelerators&lt;br /&gt;
|References=Grimsholm, Filip, and Cassandra Westergren. &amp;quot;Resilience of Machine Learning Hardware Accelerators Against Accuracy Degrading Trojans.&amp;quot; (2025).&lt;br /&gt;
|Supervisor=Mahdi Fazeli&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
In this thesis, you will design and evaluate sensitivity-aware defences that detect and mitigate stealthy, gradual weight-drift Trojans in FPGA-based ML accelerators. You’ll combine PD-guided “canary” monitors with selective integrity checks on the most critical weights, then measure detection speed, false alarms, and hardware cost. The work includes reproducing a baseline attack setup and delivering a practical, low-overhead defence recipe with code.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Profiling_ML_Side-Channel_on_CiM_for_Input_Reconstruction&amp;diff=5603</id>
		<title>Profiling ML Side-Channel on CiM for Input Reconstruction</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Profiling_ML_Side-Channel_on_CiM_for_Input_Reconstruction&amp;diff=5603"/>
		<updated>2025-10-21T14:52:46Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=investigate whether supervised models (e.g., U-Net/pix2pix) can reconstruct pri- vate inputs from CiM-generated “power-feature matrices” ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=investigate whether supervised models (e.g., U-Net/pix2pix) can reconstruct pri- vate inputs from CiM-generated “power-feature matrices” and how noise/sampling constrain feasibility.&lt;br /&gt;
|TimeFrame=Spring 2026 (Jan–Jun)&lt;br /&gt;
|References=Wang, Ziyu, et al. &amp;quot;PowerGAN: a machine learning approach for power side‐channel attack on compute‐in‐memory accelerators.&amp;quot; Advanced Intelligent Systems 5.12 (2023): 2300313.&lt;br /&gt;
|Supervisor=Mahdi Fazeli&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
We study profiling side channels in which an adversary trains a supervised model to map CiM power/timing features to user inputs. The setting is an RRAM crossbar CiM performing vector–matrix multiplication with ADC conversion. The attacker records or simulates peroperation features (e.g., tile start/stop markers, accumulate/ADC phase activity, coarse power samples) on a set of known inputs to learn a feature-input mapping. At attack time, the trained model reconstructs private inputs from features obtained on unknown inputs. Prior work demonstrates that a conditional generative model can recover meaningful images from CiM leakage and retains salient structures while remaining effective under substantial measurement noise, indicating practical privacy risk when profiling data and device characteristics are available.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Security_Vulnerabilities_in_Multi-Model_Computing-in-Memory_Systems&amp;diff=5602</id>
		<title>Security Vulnerabilities in Multi-Model Computing-in-Memory Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Security_Vulnerabilities_in_Multi-Model_Computing-in-Memory_Systems&amp;diff=5602"/>
		<updated>2025-10-21T14:41:27Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Discover and quantify timing side-channels and model-fingerprinting risks in multi-tenant CiM accelerators using open simulators and a custom...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Discover and quantify timing side-channels and model-fingerprinting risks in multi-tenant CiM accelerators using open simulators and a custom runtime&lt;br /&gt;
|TimeFrame=Spring 2026 (Jan–Jun)&lt;br /&gt;
|References=Kim, Seah, et al. &amp;quot;Moca: Memory-centric, adaptive execution for multi-tenant deep neural networks.&amp;quot; 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE, 2023.&lt;br /&gt;
&lt;br /&gt;
|Prerequisites=1. Programming in Python; experience with PyTorch and Linux.&lt;br /&gt;
2. Background in computer architecture and basic ML (CNNs/transformers).&lt;br /&gt;
3. Interest in hardware security or systems security (timing/throughput analysis).&lt;br /&gt;
|Supervisor=Mahdi Fazeli&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Computing-in-Memory (CiM) accelerators increasingly host multiple neural networks on shared analog arrays to raise utilization. Throughput-oriented mechanisms such as tenant-level area allocation, operator splitting or duplication, and fine-grained inter-layer pipelining also increase interactions among co-resident models. This thesis evaluates whether these mechanisms create exploitable timing side-channels and model-specific execution signatures in realistic edge settings without physical access. We design two primary experiments and one goal: (i) cross-model timing leakage, where an unprivileged co-tenant infers binary properties of a victim’s inputs using only its own per-inference latencies and queuing behavior; (ii) model fingerprinting, which identifies the victim’s architecture family from contention-driven timing patterns; and (iii) exploratory parameter-structure inference on small fully connected layers.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Increase_Data_Rate_over_Error-prone_networks&amp;diff=5592</id>
		<title>Increase Data Rate over Error-prone networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Increase_Data_Rate_over_Error-prone_networks&amp;diff=5592"/>
		<updated>2025-10-17T12:17:46Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Increase Data Rate over Error-prone networks (AIRBUS)&lt;br /&gt;
|References=1) D. E. Lucani, M. V. Pedersen, D. Ruano, C. W. Sørensen, F. H. P. Fitzek, J. Heide, O. Geil, V. Nguyen, M. Reisslein — “Fulcrum: Flexible Network Coding for Heterogeneous Devices.” IEEE Access, 2018.&lt;br /&gt;
&lt;br /&gt;
2) V. Nguyen, J. A. Cabrera, D. You, H. Salah, G. T. Nguyen, F. H. P. Fitzek — “Advanced Adaptive Decoder Using Fulcrum Network Codes.” IEEE Access, 2019.&lt;br /&gt;
&lt;br /&gt;
3) A. Shahzad, R. Ali, A. Haider, H. S. Kim — “RS-RLNC: A Reinforcement Learning-Based Selective Random Linear Network Coding Framework for Tactile Internet.” IEEE Access, 2023.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
This work aims to devise a mechanism to reduce latency by sending redundant data together with the original one, allowing for packet reconstruction at the destination. In particular, FEC through Random Linear Network Coding (RLNC) is able to reduce the number of distinct packet transmissions in a network and minimizes packet transmissions due to poor network conditions. In particular Fulcrum Network Coding (FNC), is a variation of RLNC that aims to reduce the computational complexity and decoding delay. However, Fulcrum Codes parameters are statically chosen before data transmission, while using feedback or retransmission is impractical in rapidly changing network conditions. Hence, this work aims to devise a mechanism to allow FNC to adapt to the available capabilities of nodes in a dynamic network.&lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Anomaly_Detection_in_Time_Series_Data_Using_Generative_Models&amp;diff=5591</id>
		<title>Anomaly Detection in Time Series Data Using Generative Models</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Anomaly_Detection_in_Time_Series_Data_Using_Generative_Models&amp;diff=5591"/>
		<updated>2025-10-16T19:40:23Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Anomaly Detection in Time Series Data Using Generative Models&lt;br /&gt;
|Keywords=Anomaly detection, time series, generative model&lt;br /&gt;
|TimeFrame= Fall 2025&lt;br /&gt;
|References=https://github.com/exathlonbenchmark/exathlon&lt;br /&gt;
|Prerequisites=Deep learning&lt;br /&gt;
|Supervisor=Guojun Liang&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Research Question:&lt;br /&gt;
How effectively can generative models detect anomalies in time series data compared to traditional statistical or supervised methods?&lt;br /&gt;
&lt;br /&gt;
Type:&lt;br /&gt;
This research is software-oriented, focusing on algorithm design, model training, and data analysis rather than hardware implementation.&lt;br /&gt;
&lt;br /&gt;
Brief Description of 3–4 Related Works:&lt;br /&gt;
&lt;br /&gt;
Variational Autoencoders (VAE) for Time Series:&lt;br /&gt;
VAEs learn the normal patterns of time series data by reconstructing input sequences. Anomalies are detected when the reconstruction error exceeds a certain threshold.&lt;br /&gt;
&lt;br /&gt;
Diffusion Models for Probabilistic Detection:&lt;br /&gt;
Diffusion-based generative models capture complex temporal distributions and allow for likelihood-based anomaly detection by modeling the data generation process step by step.&lt;br /&gt;
&lt;br /&gt;
Transformer-based Generative Models:&lt;br /&gt;
Attention mechanisms in transformer architectures can capture long-term dependencies in time series, improving the ability to model and identify subtle temporal anomalies.&lt;br /&gt;
&lt;br /&gt;
Hybrid Generative–Predictive Models:&lt;br /&gt;
Combining generative models with forecasting networks (e.g., VAE + LSTM) enables learning both the underlying data distribution and predictive patterns, enhancing anomaly detection robustness.&lt;br /&gt;
&lt;br /&gt;
Expected Outcome:&lt;br /&gt;
Students will develop a working prototype of a generative-model-based anomaly detection system for time series data. They will:&lt;br /&gt;
&lt;br /&gt;
Gain hands-on experience with deep learning frameworks (e.g., PyTorch or TensorFlow).&lt;br /&gt;
&lt;br /&gt;
Learn how to design, train, and evaluate generative models on real or simulated time series datasets.&lt;br /&gt;
&lt;br /&gt;
Analyze model performance compared to traditional methods.&lt;br /&gt;
&lt;br /&gt;
Produce a short research thesis summarizing the findings, methodology, and potential applications (e.g., fault detection, health monitoring, or finance).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Identification_and_Classification_of_Automotive_Radar_Interference_using_Data-driven_Methods&amp;diff=5590</id>
		<title>Identification and Classification of Automotive Radar Interference using Data-driven Methods</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Identification_and_Classification_of_Automotive_Radar_Interference_using_Data-driven_Methods&amp;diff=5590"/>
		<updated>2025-10-16T07:30:10Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This is a collaboration with Radar Reticence. The project investigates how different detection methods handle radar interference, a crucial factor for ensuring accurate perception in automated driving.&lt;br /&gt;
|Keywords=Automotive radar, ADAS, interference, anomaly detection,&lt;br /&gt;
|TimeFrame=Spring 2026&lt;br /&gt;
|References=Radar interference: https://www.analog.com/en/resources/analog-dialogue/articles/automotive-radar-sensors-and-congested-radio-spectrum-an-urban-electronic-warfare.html&lt;br /&gt;
&lt;br /&gt;
Equipment:  https://www.ti.com/tool/AWR2944EVM, and https://www.ti.com/tool/DCA1000EVM,&lt;br /&gt;
|Prerequisites=Programming for data analysis, experience with Matlab/Python (with ML-libraries), signal processing foundations&lt;br /&gt;
|Supervisor=Emil Nilsson, Sławomir Nowaczyk, Elena Haller&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Background&lt;br /&gt;
&lt;br /&gt;
Transportation systems are currently becoming automated for improved efficiency and safety. The automation requires various types of sensors, and for vehicle automation, cameras and radars are common. The cameras and radars are integrated together with computing devices into Advanced Driving and Assisting Systems (ADAS). Drivers become increasingly dependent on ADAS, and eventually the vehicle will require no human operator at all.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Transportation systems are becoming increasingly automated to improve efficiency and safety. These systems rely on integrated sensor suites — cameras and radars — feeding Advanced Driving and Assistance Systems (ADAS). Radar sensors are particularly valuable because they function well in adverse weather and low-light conditions. Unlike passive cameras, radars are active sensors: they transmit radio-frequency signals and receive weak echoes reflected by the environment. Because received echoes are weak, radars are vulnerable to other transmitters operating in the same frequency band; interference can mask echoes or create false detections. As the number of radar-equipped vehicles (and radars per vehicle) grows, interference will become more frequent and varied.&lt;br /&gt;
A better empirical understanding of how automotive radar responds to different interference types is required. Radar hardware is complex and hard to model in full fidelity, therefore controlled experiments and data-driven analysis are preferred approaches for a master thesis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Project Goal&lt;br /&gt;
&lt;br /&gt;
Develop and evaluate a data-driven pipeline that (1) detects the presence of interference in automotive radar data and (2) classifies the interference into meaningful types (e.g., FMCW, CW, GMSK, pulsed, wideband noise). The project will produce an experimental dataset, baseline algorithms, and an evaluation of accuracy and robustness in controled environment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Research Questions&lt;br /&gt;
&lt;br /&gt;
1.	Which radar data representations (ADC/IQ, range profiles, range-Doppler maps, range-Doppler-angle cubes) provide the “best” information for interference detection and classification?&lt;br /&gt;
&lt;br /&gt;
2.	How well can an autoencoder (can be smth else) trained only on “good” data detect interference through reconstruction-error–based anomaly scores, and what are suitable thresholds or statistical criteria to separate “clean” from interfered data?&lt;br /&gt;
&lt;br /&gt;
3.	Can residual-based features (e.g., reconstruction error, spectral characteristics of the residual, anomaly scores over time) support accurate supervised classification of interference types?&lt;br /&gt;
&lt;br /&gt;
4.	How do different interference types (FMCW overlap, CW tone, pulsed bursts, wideband noise) look like in autoencoder residuals, and which features are most important for classification?&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Anomaly_Detection_in_Time_Series_Data_Using_Generative_Models&amp;diff=5589</id>
		<title>Anomaly Detection in Time Series Data Using Generative Models</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Anomaly_Detection_in_Time_Series_Data_Using_Generative_Models&amp;diff=5589"/>
		<updated>2025-10-15T19:36:35Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Anomaly Detection in Time Series Data Using Generative Models |Keywords=Anomaly detection, time series, generative model |TimeFrame= Fall 202...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Anomaly Detection in Time Series Data Using Generative Models&lt;br /&gt;
|Keywords=Anomaly detection, time series, generative model&lt;br /&gt;
|TimeFrame= Fall 2025&lt;br /&gt;
|References=https://github.com/EQTPartners/TSDE/tree/main&lt;br /&gt;
https://github.com/exathlonbenchmark/exathlon&lt;br /&gt;
|Prerequisites=Deep learning&lt;br /&gt;
|Supervisor=Guojun Liang&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Research Question:&lt;br /&gt;
How effectively can generative models detect anomalies in time series data compared to traditional statistical or supervised methods?&lt;br /&gt;
&lt;br /&gt;
Type:&lt;br /&gt;
This research is software-oriented, focusing on algorithm design, model training, and data analysis rather than hardware implementation.&lt;br /&gt;
&lt;br /&gt;
Brief Description of 3–4 Related Works:&lt;br /&gt;
&lt;br /&gt;
Variational Autoencoders (VAE) for Time Series:&lt;br /&gt;
VAEs learn the normal patterns of time series data by reconstructing input sequences. Anomalies are detected when the reconstruction error exceeds a certain threshold.&lt;br /&gt;
&lt;br /&gt;
Diffusion Models for Probabilistic Detection:&lt;br /&gt;
Diffusion-based generative models capture complex temporal distributions and allow for likelihood-based anomaly detection by modeling the data generation process step by step.&lt;br /&gt;
&lt;br /&gt;
Transformer-based Generative Models:&lt;br /&gt;
Attention mechanisms in transformer architectures can capture long-term dependencies in time series, improving the ability to model and identify subtle temporal anomalies.&lt;br /&gt;
&lt;br /&gt;
Hybrid Generative–Predictive Models:&lt;br /&gt;
Combining generative models with forecasting networks (e.g., VAE + LSTM) enables learning both the underlying data distribution and predictive patterns, enhancing anomaly detection robustness.&lt;br /&gt;
&lt;br /&gt;
Expected Outcome:&lt;br /&gt;
Students will develop a working prototype of a generative-model-based anomaly detection system for time series data. They will:&lt;br /&gt;
&lt;br /&gt;
Gain hands-on experience with deep learning frameworks (e.g., PyTorch or TensorFlow).&lt;br /&gt;
&lt;br /&gt;
Learn how to design, train, and evaluate generative models on real or simulated time series datasets.&lt;br /&gt;
&lt;br /&gt;
Analyze model performance compared to traditional methods.&lt;br /&gt;
&lt;br /&gt;
Produce a short research thesis summarizing the findings, methodology, and potential applications (e.g., fault detection, health monitoring, or finance).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Identification_and_Classification_of_Automotive_Radar_Interference_using_Data-driven_Methods&amp;diff=5588</id>
		<title>Identification and Classification of Automotive Radar Interference using Data-driven Methods</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Identification_and_Classification_of_Automotive_Radar_Interference_using_Data-driven_Methods&amp;diff=5588"/>
		<updated>2025-10-14T10:17:19Z</updated>

		<summary type="html">&lt;p&gt;Cclab: This master thesis project will investigate how automotive radar systems are affected by interference and explore machine learning approaches to detect and characterize interference. The work will be&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=In this project, we will investigate how different detection methods handle radar interference, a crucial factor for ensuring accurate perception in automated driving.&lt;br /&gt;
|Keywords=Automotive radar, ADAS, interference, anomaly detection,  &lt;br /&gt;
|TimeFrame=Spring 2026&lt;br /&gt;
|References=Radar interference: https://www.analog.com/en/resources/analog-dialogue/articles/automotive-radar-sensors-and-congested-radio-spectrum-an-urban-electronic-warfare.html&lt;br /&gt;
&lt;br /&gt;
Equipment:  https://www.ti.com/tool/AWR2944EVM, and https://www.ti.com/tool/DCA1000EVM,&lt;br /&gt;
|Prerequisites=Programming for data analysis, experience with Matlab/Python (with ML-libraries), signal processing foundations&lt;br /&gt;
|Supervisor=Emil Nilsson, Sławomir Nowaczyk, Elena Haller&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Background&lt;br /&gt;
&lt;br /&gt;
Transportation systems are currently becoming automated for improved efficiency and safety. The automation requires various types of sensors, and for vehicle automation, cameras and radars are common. The cameras and radars are integrated together with computing devices into Advanced Driving and Assisting Systems (ADAS). Drivers become increasingly dependent on ADAS, and eventually the vehicle will require no human operator at all.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Transportation systems are becoming increasingly automated to improve efficiency and safety. These systems rely on integrated sensor suites — cameras and radars — feeding Advanced Driving and Assistance Systems (ADAS). Radar sensors are particularly valuable because they function well in adverse weather and low-light conditions. Unlike passive cameras, radars are active sensors: they transmit radio-frequency signals and receive weak echoes reflected by the environment. Because received echoes are weak, radars are vulnerable to other transmitters operating in the same frequency band; interference can mask echoes or create false detections. As the number of radar-equipped vehicles (and radars per vehicle) grows, interference will become more frequent and varied.&lt;br /&gt;
A better empirical understanding of how automotive radar responds to different interference types is required. Radar hardware is complex and hard to model in full fidelity, therefore controlled experiments and data-driven analysis are preferred approaches for a master thesis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Project Goal&lt;br /&gt;
&lt;br /&gt;
Develop and evaluate a data-driven pipeline that (1) detects the presence of interference in automotive radar data and (2) classifies the interference into meaningful types (e.g., FMCW, CW, GMSK, pulsed, wideband noise). The project will produce an experimental dataset, baseline algorithms, and an evaluation of accuracy and robustness in controled environment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Research Questions&lt;br /&gt;
&lt;br /&gt;
1.	Which radar data representations (ADC/IQ, range profiles, range-Doppler maps, range-Doppler-angle cubes) provide the “best” information for interference detection and classification?&lt;br /&gt;
&lt;br /&gt;
2.	How well can an autoencoder (can be smth else) trained only on “good” data detect interference through reconstruction-error–based anomaly scores, and what are suitable thresholds or statistical criteria to separate “clean” from interfered data?&lt;br /&gt;
&lt;br /&gt;
3.	Can residual-based features (e.g., reconstruction error, spectral characteristics of the residual, anomaly scores over time) support accurate supervised classification of interference types?&lt;br /&gt;
&lt;br /&gt;
4.	How do different interference types (FMCW overlap, CW tone, pulsed bursts, wideband noise) look like in autoencoder residuals, and which features are most important for classification?&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Coordinated_Multi-Drone_Pattern_Formation_with_Crazyflie_%26_Lighthouse&amp;diff=5585</id>
		<title>Coordinated Multi-Drone Pattern Formation with Crazyflie &amp; Lighthouse</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Coordinated_Multi-Drone_Pattern_Formation_with_Crazyflie_%26_Lighthouse&amp;diff=5585"/>
		<updated>2025-10-13T20:52:32Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Design and implement synchronized multi-pattern formation (circle, square, hexagon, spiral) for 2–6 Crazyflie drones using Lighthouse posit...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Design and implement synchronized multi-pattern formation (circle, square, hexagon, spiral) for 2–6 Crazyflie drones using Lighthouse positioning and ROS 2/Crazyswarm2, with smooth formation transitions and quantified accuracy/synchronization.&lt;br /&gt;
|References=Crazyswarm/Crazyswarm2 (multi-robot micro-quadrotor control) https://www.bitcraze.io/tag/swarm/&lt;br /&gt;
&lt;br /&gt;
Bitcraze Lighthouse positioning (setup &amp;amp; calibration)&lt;br /&gt;
&lt;br /&gt;
https://www.bitcraze.io/documentation/tutorials/getting-started-with-lighthouse/&lt;br /&gt;
&lt;br /&gt;
Olfati-Saber, “Flocking for multi-agent dynamic systems” (IEEE, 2006)&lt;br /&gt;
&lt;br /&gt;
Ren &amp;amp; Beard, Distributed Consensus in Multi-vehicle Cooperative Control&lt;br /&gt;
|Prerequisites=Basic Python, ROS 2, linear algebra &amp;amp; coordinate frames; Git/Linux&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Problem: Achieving precise, synchronized formations with multiple micro-UAVs indoors is challenged by timing jitter, radio bandwidth, and pose noise, yet a generic, reproducible formation framework would enable reliable group behaviors.&lt;br /&gt;
&lt;br /&gt;
Goal: Develop a Lighthouse-based multi-drone system that executes parameterized formations and smooth transitions for 2–6 Crazyflies with measured accuracy, synchronization, and scalability.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Tasks: Implement parametric pattern generators; use Crazyswarm2 to upload/start time-aligned trajectories with per-drone offsets; add transition scheduling between patterns; manage radio channels and logging; record flight data and analyze formation error, phase/sync, and tracking.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria: Formation RMS error, minimum inter-drone separation, trajectory tracking error during transitions, scalability vs. number of drones.&lt;br /&gt;
&lt;br /&gt;
Suggested Tools &amp;amp; Platforms: ROS 2, Crazyswarm2 (control), Bitcraze Lighthouse (positioning), Python scripts for trajectory generation and data analysis.&lt;br /&gt;
&lt;br /&gt;
Project in cooperation with Sivadinesh Ponrajan (sivadinesh.ponrajan@hh.se)&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Posture_Estimation_for_Motorcycle_Simulator_Riders_Using_Remote_Sensing_and_IMU-Based_Systems&amp;diff=5565</id>
		<title>Posture Estimation for Motorcycle Simulator Riders Using Remote Sensing and IMU-Based Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Posture_Estimation_for_Motorcycle_Simulator_Riders_Using_Remote_Sensing_and_IMU-Based_Systems&amp;diff=5565"/>
		<updated>2025-10-08T12:26:17Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop and compare posture estimation methods for motorcycle simulator riders using camera-based remote sensing and IMU-based systems, focus...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop and compare posture estimation methods for motorcycle simulator riders using camera-based remote sensing and IMU-based systems, focusing on hip movement, body lean angles, and leg positions.&lt;br /&gt;
|Keywords=Posture Estimation, Motorcycle Simulator, IMU, Camera-Based Tracking, ROS, CARLA, BikeSim&lt;br /&gt;
|TimeFrame=Fall 2025 - Spring 2027&lt;br /&gt;
|Prerequisites=Familiarity with ROS and CARLA simulator&lt;br /&gt;
Knowledge of computer vision (e.g., pose estimation frameworks)&lt;br /&gt;
Experience with IMU data processing and sensor fusion&lt;br /&gt;
Python programming for data analysis and integration&lt;br /&gt;
|Supervisor=Oscar Amador Molina&lt;br /&gt;
|Examiner=Emil Nilsson&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;h3&amp;gt;Research Question&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
How can remote sensing (camera-based) and IMU-based systems be used to estimate rider posture in a motorcycle simulator, and how do these approaches compare in terms of accuracy and robustness?&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;HW/SW Focus&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
The project emphasizes algorithm development and system integration, leveraging CARLA and ROS for simulation and data synchronization. Both vision-based and IMU-based methods will be explored and compared.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Work Packages&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;WP1: System Setup &amp;amp; Data Collection&amp;lt;/b&amp;gt;&lt;br /&gt;
    &amp;lt;ul&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Integrate CARLA simulator with ROS for data streaming.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Configure camera-based tracking system for rider posture.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Prepare IMU modules for hip, torso, and legs; design enclosures for secure attachment.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Collect synchronized datasets from both systems.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;/ul&amp;gt;&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;WP2: Posture Estimation Algorithms&amp;lt;/b&amp;gt;&lt;br /&gt;
    &amp;lt;ul&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Implement vision-based posture estimation (e.g., OpenPose, MediaPipe).&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Develop IMU-based orientation and joint angle estimation.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Extract key posture metrics: hip movement, body lean angles, leg positions.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;/ul&amp;gt;&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;WP3: Validation &amp;amp; Comparative Analysis&amp;lt;/b&amp;gt;&lt;br /&gt;
    &amp;lt;ul&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Define ground truth using simulator kinematics or marker-based system.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Compare accuracy, latency, and robustness of both approaches.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Analyze trade-offs for real-world applicability.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;/ul&amp;gt;&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Deliverables / Outcomes&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;Integrated CARLA-ROS simulation environment with posture tracking.&amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;Two posture estimation pipelines: camera-based and IMU-based.&amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;Comparative analysis report with performance metrics and recommendations.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Posture_Estimation_for_Motorcycle_Riders_Using_Multi-IMU_Systems_and_Video-Based_Ground_Truth&amp;diff=5564</id>
		<title>Posture Estimation for Motorcycle Riders Using Multi-IMU Systems and Video-Based Ground Truth</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Posture_Estimation_for_Motorcycle_Riders_Using_Multi-IMU_Systems_and_Video-Based_Ground_Truth&amp;diff=5564"/>
		<updated>2025-10-08T11:59:40Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop and validate a motorcycle rider posture estimation system using multi-IMU sensors and video-based ground truth for accuracy evaluatio...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop and validate a motorcycle rider posture estimation system using multi-IMU sensors and video-based ground truth for accuracy evaluation.&lt;br /&gt;
|Keywords=IMU, Sensor Fusion, Posture Estimation, microROS, Motorcycle Safety, Motion Tracking&lt;br /&gt;
|TimeFrame=Fall 2025 - Spring 2027&lt;br /&gt;
|Prerequisites=Embedded systems programming (ESP32, microROS)&lt;br /&gt;
Sensor fusion techniques (e.g., Extended Kalman Filter)&lt;br /&gt;
Basic machine learning (optional, for posture classification)&lt;br /&gt;
Familiarity with Python or MATLAB for data analysis&lt;br /&gt;
|Supervisor=Oscar Amador Molina&lt;br /&gt;
|Examiner=Pererik Andreasson&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Research Question:&lt;br /&gt;
How can multi-IMU systems integrated into a motorcycle jacket and helmet be used to accurately estimate rider posture, and how does the performance compare to a video-based ground truth system?&lt;br /&gt;
&lt;br /&gt;
Hardware/Software Focus:&lt;br /&gt;
The project is primarily algorithm-oriented, with some hardware integration for data collection and synchronization. Emphasis will be on sensor fusion, drift compensation, and validation against ground truth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work Packages&lt;br /&gt;
&lt;br /&gt;
WP1: Hardware Setup &amp;amp; Data Collection&lt;br /&gt;
&lt;br /&gt;
- Configure jacket with six IMUs and helmet IMU.&lt;br /&gt;
&lt;br /&gt;
- Implement microROS communication over Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
- Synchronize IMU and video data streams.&lt;br /&gt;
&lt;br /&gt;
- Collect datasets under controlled riding scenarios.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WP2: Sensor Fusion &amp;amp; Posture Estimation&lt;br /&gt;
&lt;br /&gt;
- Implement orientation estimation algorithms (Madgwick, Mahony, EKF).&lt;br /&gt;
&lt;br /&gt;
- Investigate magnetometer interference and apply correction strategies (e.g., soft/hard iron calibration, magnetometer-free fusion).&lt;br /&gt;
&lt;br /&gt;
- Compute joint angles and posture metrics from IMU orientations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WP3: Validation &amp;amp; Analysis&lt;br /&gt;
&lt;br /&gt;
- Use video-based marker system as ground truth.&lt;br /&gt;
&lt;br /&gt;
- Evaluate accuracy (e.g., RMSE of joint angles) and robustness under different conditions.&lt;br /&gt;
&lt;br /&gt;
- Compare performance of different fusion algorithms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Deliverables / Outcomes&lt;br /&gt;
&lt;br /&gt;
- Synchronized dataset of IMU and video-based posture data.&lt;br /&gt;
&lt;br /&gt;
- Posture estimation algorithm with documented performance metrics.&lt;br /&gt;
&lt;br /&gt;
- Comparative analysis report of IMU-based vs. video-based posture estimation.&lt;br /&gt;
- Recommendations for improving robustness in real-world motorcycle environments.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Service_Centric_Mobility_Management_in_LEO_Constellations&amp;diff=5562</id>
		<title>Service Centric Mobility Management in LEO Constellations</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Service_Centric_Mobility_Management_in_LEO_Constellations&amp;diff=5562"/>
		<updated>2025-10-06T23:38:03Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Service Centric Mobility Management in LEO Constellations |References=1) User-Centric Flexible Resource Management Framework for LEO Satellit...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Service Centric Mobility Management in LEO Constellations&lt;br /&gt;
|References=1) User-Centric Flexible Resource Management Framework for LEO Satellites with Fully Regenerative Payload — Sovit Bhandari, Thang X. Vu, Symeon Chatzinotas; IEEE Journal on Selected Areas in Communications (JSAC), May 2024.&lt;br /&gt;
&lt;br /&gt;
2) LISP-LEO: Location/Identity Separation-based Mobility Management for LEO Satellite Networks — Jun Hu, Tian Pan, Yujie Chen, Xuebei Zhang, Tao Huang, Yunjie Liu; IEEE Global Communications Conference (GLOBECOM), 2022.&lt;br /&gt;
&lt;br /&gt;
3) SKYCASTLE: Taming LEO Mobility to Facilitate Seamless and Low-latency Satellite Internet Services — Jihao Li et al.; IEEE INFOCOM 2024&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
This work aims to tackle the problem of mobility management in IP-based LEO constellation networks, based on the notion of service mobility, and not based on the notion of host mobility as done by prior-art. &lt;br /&gt;
&lt;br /&gt;
The goal is to allow customers (e.g. aircraft) to always be well connected to communication services, even in the presence of rapid network topology to change constantly.&lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Data_muling_services_over_a_constellation_of_aircraft&amp;diff=5561</id>
		<title>Data muling services over a constellation of aircraft</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Data_muling_services_over_a_constellation_of_aircraft&amp;diff=5561"/>
		<updated>2025-10-06T23:34:30Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Data muling services over a constellation of aircraft |References=1) “Unmanned Aerial Vehicles as Data Mules: An Experimental Assessment”...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Data muling services over a constellation of aircraft&lt;br /&gt;
|References=1) “Unmanned Aerial Vehicles as Data Mules: An Experimental Assessment” — Palma, Zolich, Jiang, Johansen, IEEE Access, 2017.&lt;br /&gt;
&lt;br /&gt;
2) “GeoSaW: A Location-Aware Waypoint-Based Routing Protocol for Airborne DTNs in Search and Rescue Scenarios” — Bujari, Calafate, Cano, Manzoni, Palazzi, Ronzani, Sensors (Basel), 2018.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
A Data Muling service is a method for transferring data between locations that lack a continuous, end-to-end network connection.  &lt;br /&gt;
&lt;br /&gt;
The core concept relies on a specialized mobile node, called a data mule, that physically carries data and acts as a mobile relay.&lt;br /&gt;
&lt;br /&gt;
This work aims to analyse the viability of having aircraft as data mules, in a scenario where aircraft may be interconnected by some omnidirectional or directional links.&lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Segment_Routing_based_on_Geographic_Checkpoints&amp;diff=5560</id>
		<title>Segment Routing based on Geographic Checkpoints</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Segment_Routing_based_on_Geographic_Checkpoints&amp;diff=5560"/>
		<updated>2025-10-06T23:31:47Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Segment Routing based on Geographic Checkpoints: |References=1) M. Moy, R. Kassouf-Short, N. Kortas, J. Cleveland, B. Tomko, D. Conricode, Y....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Segment Routing based on Geographic Checkpoints:&lt;br /&gt;
|References=1) M. Moy, R. Kassouf-Short, N. Kortas, J. Cleveland, B. Tomko, D. Conricode, Y. Kirkpatrick, R. Cardona, B. Heller and J. Curry — “Contact Multigraph Routing: Overview and Implementation.” 2023 IEEE Aerospace Conference.&lt;br /&gt;
&lt;br /&gt;
2) J. Hu, L. Cai, C. Zhao and J. Pan — “Directed Percolation Routing for Ultra-Reliable and Low-Latency Services in Low Earth Orbit (LEO) Satellite Networks.” 2020 IEEE Vehicular Technology Conference (VTC-Fall).&lt;br /&gt;
&lt;br /&gt;
3) G. Stock, J. A. Fraire and H. Hermanns, &amp;quot;Distributed On-Demand Routing for LEO Mega-Constellations: A Starlink Case Study,&amp;quot; 2022 11th Advanced Satellite Multimedia Systems Conference and the 17th Signal Processing for Space Communications Workshop (ASMS/SPSC), Graz, Austria, 2022, pp. 1-8, doi: 10.1109/ASMS/SPSC55670.2022.9914716&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Segment Routing based on Geographic Checkpoints:&lt;br /&gt;
&lt;br /&gt;
Improve performance in starlink, using other algorithms in Florasat (e.g. CGR), and the &amp;quot;greedy geographic&amp;quot; routing approach of starlink as a benchmark.&lt;br /&gt;
&lt;br /&gt;
Analyse how the routing protocol behaves in other constellations like Oneweb, Iridium, Kuiper or Telesat.&lt;br /&gt;
&lt;br /&gt;
Analyse the behaviour of the routing protocol in an Aircraft constellation.&lt;br /&gt;
&lt;br /&gt;
The student(s) may choose 2 out of 3 to perform the thesis, or one, if a deeper he/she/them want(s) to perform a deeper study. &lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Real-time_flow_compression_for_TCP_and_QUIC_at_the_network_edge&amp;diff=5559</id>
		<title>Real-time flow compression for TCP and QUIC at the network edge</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Real-time_flow_compression_for_TCP_and_QUIC_at_the_network_edge&amp;diff=5559"/>
		<updated>2025-10-06T23:24:09Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Real-time flow compression for TCP and QUIC at the network edge |References=1) “Dynamic Semantic Compression for CNN Inference in Multi-Acc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Real-time flow compression for TCP and QUIC at the network edge&lt;br /&gt;
|References=1) “Dynamic Semantic Compression for CNN Inference in Multi-Access Edge Computing: A Graph Reinforcement Learning-Based Autoencoder”&lt;br /&gt;
Nan Li, Alexandros Iosifidis, Qi Zhang — IEEE Transactions on Wireless Communications, Vol. 24, Issue 3, Mar 2025.&lt;br /&gt;
&lt;br /&gt;
2) “CStream: Parallel Data Stream Compression on Multicore Edge Devices” Xianzhi Zeng, Shuhao Zhang — published in 2023 (preprint / arXiv)&lt;br /&gt;
&lt;br /&gt;
3) “To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices”&lt;br /&gt;
Liang Li, Dian Shi, Ronghui Hou, Hui Li, Miao Pan, Zhu Han — FLIP-type / IEEE / arXiv etc., 2020.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
This work aims to minimize redundant data and overhead using features inherent to the protocols or their upper layers (like HTTP/2 and HTTP/3). For instance using header compression by replacing common headers with a single-byte index or Store custom or previously seen header-value pairs during the connection, replacing them with a much smaller index on subsequent requests. Other approaches may include having edge devices compressing the payload data stream in real time before transmission using algorithms like LZ4 or LZO. The work may include using a system able to monitor local resources (CPU utilization, battery level) and network conditions (latency, bandwidth) to dynamically adjust the compression level or even the algorithm itself. An advanced setup may also include using Deep Reinforcement Learning agents to learn the optimal trade-off between compression ratio, compression time, and power consumption based on real-time feedback from the network and device, ensuring that real-time latency requirements are always met.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Increase_Data_Rate_over_Error-prone_networks&amp;diff=5558</id>
		<title>Increase Data Rate over Error-prone networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Increase_Data_Rate_over_Error-prone_networks&amp;diff=5558"/>
		<updated>2025-10-06T23:21:39Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Increase Data Rate over Error-prone networks |References=1) D. E. Lucani, M. V. Pedersen, D. Ruano, C. W. Sørensen, F. H. P. Fitzek, J. Heid...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Increase Data Rate over Error-prone networks&lt;br /&gt;
|References=1) D. E. Lucani, M. V. Pedersen, D. Ruano, C. W. Sørensen, F. H. P. Fitzek, J. Heide, O. Geil, V. Nguyen, M. Reisslein — “Fulcrum: Flexible Network Coding for Heterogeneous Devices.” IEEE Access, 2018.&lt;br /&gt;
&lt;br /&gt;
2) V. Nguyen, J. A. Cabrera, D. You, H. Salah, G. T. Nguyen, F. H. P. Fitzek — “Advanced Adaptive Decoder Using Fulcrum Network Codes.” IEEE Access, 2019.&lt;br /&gt;
&lt;br /&gt;
3) A. Shahzad, R. Ali, A. Haider, H. S. Kim — “RS-RLNC: A Reinforcement Learning-Based Selective Random Linear Network Coding Framework for Tactile Internet.” IEEE Access, 2023.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
This work aims to devise a mechanism to reduce latency by sending redundant data together with the original one, allowing for packet reconstruction at the destination. In particular, FEC through Random Linear Network Coding (RLNC) is able to reduce the number of distinct packet transmissions in a network and minimizes packet transmissions due to poor network conditions. In particular Fulcrum Network Coding (FNC), is a variation of RLNC that aims to reduce the computational complexity and decoding delay. However, Fulcrum Codes parameters are statically chosen before data transmission, while using feedback or retransmission is impractical in rapidly changing network conditions. Hence, this work aims to devise a mechanism to allow FNC to adapt to the available capabilities of nodes in a dynamic network.&lt;br /&gt;
&lt;br /&gt;
Work in partnership with AIRBUS Central Research and Technology, Germany.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Segment-based_coordination_of_Congestion_Control&amp;diff=5557</id>
		<title>Segment-based coordination of Congestion Control</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Segment-based_coordination_of_Congestion_Control&amp;diff=5557"/>
		<updated>2025-10-06T23:17:26Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Development of a decentralized congestion control mechanism among multiple transport-layer connections (e.g., TCP or QUIC) between the source and destination&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Segment-based coordination of Congestion Control&lt;br /&gt;
|References=1 - S. N. S. Hashemi &amp;amp; A. Bohlooli — “3CP: Coordinated Congestion Control Protocol for Named-Data Networking”, IEEE Transactions on Network and Service Management (TNSM), 2021.&lt;br /&gt;
&lt;br /&gt;
2 - W. Yang, L. Cai, S. Shu, J. Pan — “Mobility-Aware Congestion Control for Multipath QUIC in Integrated Terrestrial and LEO Satellite Networks”, IEEE Transactions on Mobile Computing (TMC), 2024.&lt;br /&gt;
&lt;br /&gt;
3 - W. Li, H. Zhang, S. Gao, C. Xue, X. Wang, S. Lu — “SmartCC: A Reinforcement-Learning Approach for Multipath TCP Congestion Control in Heterogeneous Networks”, IEEE Journal on Selected Areas in Communications (JSAC), 2019.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
This work aims to develop a decentralized congestion control mechanism among multiple transport-layer connections (e.g., TCP or QUIC) between the source and destination set up as a chain in different segments. &lt;br /&gt;
&lt;br /&gt;
Transport-layer connections in each segment may be set up between proxy servers, middleboxes, or even relays of new transport standards like Media over QUIC.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Non-Invasive_Safety_Monitoring_via_Integrated_Sensing_and_Communication&amp;diff=5555</id>
		<title>Non-Invasive Safety Monitoring via Integrated Sensing and Communication</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Non-Invasive_Safety_Monitoring_via_Integrated_Sensing_and_Communication&amp;diff=5555"/>
		<updated>2025-10-06T11:41:19Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Smart sensing for motion, presence, and accident detection—without cameras&lt;br /&gt;
|Keywords=ISAC, IoT, Networking, Sensing&lt;br /&gt;
|TimeFrame=Fall 2025 - Spring 2026&lt;br /&gt;
|Supervisor=Oscar Amador Molina&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Research question:&lt;br /&gt;
&lt;br /&gt;
How can Integrated Sensing and Communication (ISAC) using Wi-Fi (802.11 b/g/n), Bluetooth RSSI, and sensor-equipped ESP32-C3 devices be used to detect motion, presence, and accidents in a non-invasive way to improve safety for elderly individuals living alone?&lt;br /&gt;
&lt;br /&gt;
Focus:&lt;br /&gt;
&lt;br /&gt;
The project is primarily software-oriented, with some hardware integration involving ESP32-C3 microcontrollers and basic sensors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work packages:&lt;br /&gt;
&lt;br /&gt;
WP1: Wi-Fi Sensing – Analyze 802.11 access-layer data (e.g., RSSI) to infer motion and presence.&lt;br /&gt;
&lt;br /&gt;
WP2: Bluetooth RSSI Communication – Use BLE RSSI for proximity detection and device-to-device signaling.&lt;br /&gt;
&lt;br /&gt;
WP3: Sensor Integration – Connect motion and environmental sensors to ESP32-C3 devices and develop logic for accident detection.&lt;br /&gt;
&lt;br /&gt;
WP4: System Coordination – Enable communication between devices to share sensing data and trigger alerts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Deliverables/outcomes/results:&lt;br /&gt;
&lt;br /&gt;
A set of prototype systems demonstrating motion, presence, and accident detection.&lt;br /&gt;
Evaluation of detection accuracy and system responsiveness in a simulated home environment.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Non-Invasive_Safety_Monitoring_via_Integrated_Sensing_and_Communication&amp;diff=5554</id>
		<title>Non-Invasive Safety Monitoring via Integrated Sensing and Communication</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Non-Invasive_Safety_Monitoring_via_Integrated_Sensing_and_Communication&amp;diff=5554"/>
		<updated>2025-10-06T11:39:49Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Smart sensing for motion, presence, and accident detection—without cameras |Keywords=ISAC, IoT, Networking, Sensing |Supervisor=Oscar Amado...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Smart sensing for motion, presence, and accident detection—without cameras&lt;br /&gt;
|Keywords=ISAC, IoT, Networking, Sensing&lt;br /&gt;
|Supervisor=Oscar Amador Molina&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Research question:&lt;br /&gt;
&lt;br /&gt;
How can Integrated Sensing and Communication (ISAC) using Wi-Fi (802.11 b/g/n), Bluetooth RSSI, and sensor-equipped ESP32-C3 devices be used to detect motion, presence, and accidents in a non-invasive way to improve safety for elderly individuals living alone?&lt;br /&gt;
&lt;br /&gt;
Focus:&lt;br /&gt;
&lt;br /&gt;
The project is primarily software-oriented, with some hardware integration involving ESP32-C3 microcontrollers and basic sensors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work packages:&lt;br /&gt;
&lt;br /&gt;
WP1: Wi-Fi Sensing – Analyze 802.11 access-layer data (e.g., RSSI) to infer motion and presence.&lt;br /&gt;
&lt;br /&gt;
WP2: Bluetooth RSSI Communication – Use BLE RSSI for proximity detection and device-to-device signaling.&lt;br /&gt;
&lt;br /&gt;
WP3: Sensor Integration – Connect motion and environmental sensors to ESP32-C3 devices and develop logic for accident detection.&lt;br /&gt;
&lt;br /&gt;
WP4: System Coordination – Enable communication between devices to share sensing data and trigger alerts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Deliverables/outcomes/results:&lt;br /&gt;
&lt;br /&gt;
A set of prototype systems demonstrating motion, presence, and accident detection.&lt;br /&gt;
Evaluation of detection accuracy and system responsiveness in a simulated home environment.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=AI-Driven_Semantic_Encoding_for_Efficient_Communication&amp;diff=5553</id>
		<title>AI-Driven Semantic Encoding for Efficient Communication</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=AI-Driven_Semantic_Encoding_for_Efficient_Communication&amp;diff=5553"/>
		<updated>2025-10-03T22:34:38Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=To develop and evaluate an AI-based semantic encoding model capable of transforming raw data into compact, structured representations.  |Refe...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=To develop and evaluate an AI-based semantic encoding model capable of transforming raw data into compact, structured representations. &lt;br /&gt;
|References=1) Pezone, Francesco. &amp;quot;Semantic communication based on generative AI: a new approach to image compression and edge optimization.&amp;quot; arXiv preprint arXiv:2502.01675 (2025).&lt;br /&gt;
&lt;br /&gt;
2) Qiao, Li, Mahdi Boloursaz Mashhadi, Zhen Gao, Chuan Heng Foh, Pei Xiao, and Mehdi Bennis. &amp;quot;Latency-aware generative semantic communications with pre-trained diffusion models.&amp;quot; IEEE wireless communications letters (2024).&lt;br /&gt;
&lt;br /&gt;
3) Islam, Azharul, and KyungHi Chang. &amp;quot;Navigating the future of wireless networks: A multidimensional survey on semantic communications.&amp;quot; ICT Express 10, no. 4 (2024): 747-773.&lt;br /&gt;
&lt;br /&gt;
4) Li, Nan, Alexandros Iosifidis, and Qi Zhang. &amp;quot;Dynamic semantic compression for cnn inference in multi-access edge computing: A graph reinforcement learning-based autoencoder.&amp;quot; IEEE Transactions on Wireless Communications (2024).&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Contextualization: &lt;br /&gt;
Semantic Communication Networks represent a fundamental shift in how we think about and design communication systems. Unlike traditional communication, which focuses on the accurate and reliable transmission of bits, SCNs prioritize the meaning or intent behind the data.&lt;br /&gt;
&lt;br /&gt;
One of the key element in SCN is the semantic encoder. Instead of compressing data using a general-purpose algorithm (like JPEG for images), a sophisticated AI model analyzes the raw data and extracts only the most important semantic features. The encoder compresses this semantic information into a low-dimensional vector that captures the properties of the original data.&lt;br /&gt;
&lt;br /&gt;
Goals:&lt;br /&gt;
To develop and evaluate an AI-based semantic encoding model capable of transforming raw data into compact, structured representations. The objective is to reduce transmission payload while preserving the essential meaning of the information. The proposed encoder will focus on text sentences and/or images as primary data modalities.&lt;br /&gt;
&lt;br /&gt;
Testing; &lt;br /&gt;
Datasets recommendation: European Parliament for text and MNIST for images.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
Compare the proposed solution with traditional communication (the baseline) in terms of compression ratio; semantic similarity; CPU/GPU consumption and encoding/decoding time.&lt;br /&gt;
&lt;br /&gt;
Extra (if you have time): behavior/evaluation when a normal noise is inserted in both baseline and proposed solution.&lt;br /&gt;
&lt;br /&gt;
Main Tasks: &lt;br /&gt;
Task 1: Study semantic encoders concepts, especially NLPs, LLMs, ANNs Knowledge Graphs and Topos. &lt;br /&gt;
Task 2: Study the addressed dataset. &lt;br /&gt;
Task 3: Develop, train and improve the model. &lt;br /&gt;
Task 4: Test the model, capturing the evaluation criteria.  &lt;br /&gt;
Task 5: Analisys the results and compare with baseline. &lt;br /&gt;
Task 6: Write thesis and prepare presentation. &lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document): &lt;br /&gt;
- AI model specification to encode and decode text/image. &lt;br /&gt;
- Tests description with visual result representation (graphs).&lt;br /&gt;
- Performance analysis report. &lt;br /&gt;
- Thesis documentation.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Resilient_Recovery:_A_Byzantine_Fault_Tolerance_(BFT)_Framework_for_Tactical_Mesh_Networks&amp;diff=5551</id>
		<title>Resilient Recovery: A Byzantine Fault Tolerance (BFT) Framework for Tactical Mesh Networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Resilient_Recovery:_A_Byzantine_Fault_Tolerance_(BFT)_Framework_for_Tactical_Mesh_Networks&amp;diff=5551"/>
		<updated>2025-10-02T10:50:36Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=This proposal addresses the critical state-poisoning vulnerability in tactical networks during post-partition recovery. The research proposes...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal addresses the critical state-poisoning vulnerability in tactical networks during post-partition recovery. The research proposes the development of a recovery protocol centered on Byzantine Fault Tolerance (BFT)&lt;br /&gt;
|Keywords=Byzantine Fault Tolerance (BFT), Tactical Mesh Networks, Distributed Consensus, Network Recovery, Critical Systems&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Summary:&lt;br /&gt;
This proposal addresses the critical state-poisoning vulnerability in tactical networks during post-partition recovery. The research proposes the development of a recovery protocol centered on Byzantine Fault Tolerance (BFT) that forces a distributed consensus among nodes before accepting state updates. The goal is to prevent compromised nodes from corrupting mission-critical state information, such as targeting data or command logs, ensuring that network re-synchronization occurs securely and reliably, even in the presence of malicious actors.&lt;br /&gt;
&lt;br /&gt;
General Information:&lt;br /&gt;
Goals: To design, implement, and validate a recovery protocol for tactical mesh networks that utilizes BFT principles to guarantee network state integrity during the re-integration of partitioned segments, thereby preventing data poisoning attacks.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: &lt;br /&gt;
The research will focus on adapting classic BFT algorithms to the dynamic and resource-constrained environment of tactical mobile ad-hoc networks (MANETs). &lt;br /&gt;
&lt;br /&gt;
The objectives include:&lt;br /&gt;
- Analyzing the feasibility and overhead of different BFT protocols in tactical network scenarios.&lt;br /&gt;
- Designing a lightweight consensus mechanism that allows rejoining network segments to agree upon a unified and trustworthy state.&lt;br /&gt;
- Developing a state synchronization process that is resilient to Byzantine (compromised) nodes attempting to provide falsified state histories.&lt;br /&gt;
- Evaluating the trade-off between the level of security provided by BFT and the impact on recovery performance (latency and bandwidth consumption).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Robotics_for_Urban_Traffic_Support:_Design,_Prototyping,_and_Intelligent_Interaction_in_Smart_Cities&amp;diff=5550</id>
		<title>Robotics for Urban Traffic Support: Design, Prototyping, and Intelligent Interaction in Smart Cities</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Robotics_for_Urban_Traffic_Support:_Design,_Prototyping,_and_Intelligent_Interaction_in_Smart_Cities&amp;diff=5550"/>
		<updated>2025-10-01T12:09:05Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal focuses on the application of robotics to enhance traffic safety and efficiency in smart cities. The research considers the interaction with VRU&lt;br /&gt;
|Keywords=Robotics, Smart Cities, Traffic Support, Human-Robot Interaction, Vulnerable Road Users (VRU), Urban Safety&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Summary: &amp;quot;This proposal focuses on the application of robotics to enhance traffic safety and efficiency in smart cities. The research will encompass the design and prototyping (potentially using 3D printing) of robots capable of interacting with people, vulnerable road users (VRU), and transit agents. It will explore robot communication with smart city infrastructure, regulatory considerations, and case studies highlighting their benefits in intense traffic, accident response, and VRU guidance, aiming to create safer urban environments.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Goals: To design, prototype, and evaluate robotic systems for smart city traffic support, enhancing safety for all road users, particularly in challenging urban scenarios, through intelligent interaction and integration with smart infrastructure.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will focus on:&lt;br /&gt;
&lt;br /&gt;
- Conceptual design and prototyping (e.g., 3D printing) of traffic support robots.&lt;br /&gt;
- Mechanisms for effective robot communication with smart city systems.&lt;br /&gt;
- Exploration of regulatory frameworks and ethical considerations for urban robot deployment.&lt;br /&gt;
- Analysis of case studies where robotic intervention improves safety and flow (e.g., congestion, accidents, VRU guidance).&lt;br /&gt;
- Investigating human-robot interaction principles for intuitive and safe engagement.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
The research will combine conceptual design for various traffic robot types with rapid prototyping (e.g., 3D printing). &lt;br /&gt;
Evaluation and study of communication protocols for robot interaction with smart city infrastructure, or simulation-based. An option is Traffic simulation softwares to model robotic impact in high-density traffic, accident response, and VRU guidance scenarios. Human-robot interaction strategies will be developed, and existing regulations for urban robot deployment will be reviewed. Communication protocols and the reliability dependency need to be considered.&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Key deliverables include conceptual robot designs, a physical or simulated prototype, communication architecture designs, simulation results demonstrating positive impacts on traffic and safety, and a report on regulatory and ethical considerations.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a literature review on urban robotics, smart city traffic management, human-robot interaction (HRI), and 3D printing applications in robotics.&lt;br /&gt;
Task 2: Develop conceptual designs for traffic support robots targeting specific urban challenges (e.g., traffic intensity, accidents, VRU guidance).&lt;br /&gt;
Task 3: Investigate and apply 3D printing or other rapid prototyping techniques to create a physical or detailed virtual prototype of a selected robot design.&lt;br /&gt;
Task 4: Design and simulate communication protocols for seamless integration of robots with existing smart city infrastructure and traffic management systems.&lt;br /&gt;
Task 5: Model and simulate various urban scenarios (e.g., peak hour traffic, accident response, pedestrian crossing assistance) to evaluate the impact of robotic intervention on safety and efficiency.&lt;br /&gt;
Task 6: Analyze current regulations and propose guidelines or recommendations for the safe and effective deployment of urban traffic support robots.&lt;br /&gt;
Task 7: Evaluate the effectiveness of the robot&amp;#039;s interactions with people, VRUs, and transit agents in simulated or controlled environments.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for academic dissemination.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Detailed conceptual designs and technical specifications for urban traffic support robots.&lt;br /&gt;
A physical or simulated prototype of a key robotic component or full system.&lt;br /&gt;
Design of communication architecture for robot integration with smart city systems.&lt;br /&gt;
Simulation results demonstrating improvements in traffic flow, safety, and VRU protection due to robotic intervention.&lt;br /&gt;
A comprehensive report on regulatory, ethical, and societal considerations for urban robotics deployment.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
&lt;br /&gt;
Innovation and practicality of the robot designs and prototyping approach.&lt;br /&gt;
Measurable improvements in traffic safety and efficiency demonstrated through simulations.&lt;br /&gt;
The robustness and scalability of the robot&amp;#039;s communication and integration capabilities within smart city ecosystems.&lt;br /&gt;
The depth of analysis of regulatory challenges and the utility of proposed guidelines for urban robotics.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Robotics_for_Urban_Traffic_Support:_Design,_Prototyping,_and_Intelligent_Interaction_in_Smart_Cities&amp;diff=5549</id>
		<title>Robotics for Urban Traffic Support: Design, Prototyping, and Intelligent Interaction in Smart Cities</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Robotics_for_Urban_Traffic_Support:_Design,_Prototyping,_and_Intelligent_Interaction_in_Smart_Cities&amp;diff=5549"/>
		<updated>2025-10-01T10:48:03Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=This proposal focuses on the application of robotics to enhance traffic safety and efficiency in smart cities. The research considers the int...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal focuses on the application of robotics to enhance traffic safety and efficiency in smart cities. The research considers the interaction with VRU&lt;br /&gt;
|Keywords=Robotics, Smart Cities, Traffic Support, 3D Printing, Human-Robot Interaction, Vulnerable Road Users (VRU), Urban Safety&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Summary: &amp;quot;This proposal focuses on the application of robotics to enhance traffic safety and efficiency in smart cities. The research will encompass the design and prototyping (potentially using 3D printing) of robots capable of interacting with people, vulnerable road users (VRU), and transit agents. It will explore robot communication with smart city infrastructure, regulatory considerations, and case studies highlighting their benefits in intense traffic, accident response, and VRU guidance, aiming to create safer urban environments.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Goals: To design, prototype, and evaluate robotic systems for smart city traffic support, enhancing safety for all road users, particularly in challenging urban scenarios, through intelligent interaction and integration with smart infrastructure.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will focus on:&lt;br /&gt;
&lt;br /&gt;
- Conceptual design and prototyping (e.g., 3D printing) of traffic support robots.&lt;br /&gt;
- Mechanisms for effective robot communication with smart city systems.&lt;br /&gt;
- Exploration of regulatory frameworks and ethical considerations for urban robot deployment.&lt;br /&gt;
- Analysis of case studies where robotic intervention improves safety and flow (e.g., congestion, accidents, VRU guidance).&lt;br /&gt;
- Investigating human-robot interaction principles for intuitive and safe engagement.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
The research will combine conceptual design for various traffic robot types with rapid prototyping (e.g., 3D printing). &lt;br /&gt;
Evaluation and study of communication protocols for robot interaction with smart city infrastructure, or simulation-based. An option is Traffic simulation softwares to model robotic impact in high-density traffic, accident response, and VRU guidance scenarios. Human-robot interaction strategies will be developed, and existing regulations for urban robot deployment will be reviewed. Communication protocols and the reliability dependency need to be considered.&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Key deliverables include conceptual robot designs, a physical or simulated prototype, communication architecture designs, simulation results demonstrating positive impacts on traffic and safety, and a report on regulatory and ethical considerations.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a literature review on urban robotics, smart city traffic management, human-robot interaction (HRI), and 3D printing applications in robotics.&lt;br /&gt;
Task 2: Develop conceptual designs for traffic support robots targeting specific urban challenges (e.g., traffic intensity, accidents, VRU guidance).&lt;br /&gt;
Task 3: Investigate and apply 3D printing or other rapid prototyping techniques to create a physical or detailed virtual prototype of a selected robot design.&lt;br /&gt;
Task 4: Design and simulate communication protocols for seamless integration of robots with existing smart city infrastructure and traffic management systems.&lt;br /&gt;
Task 5: Model and simulate various urban scenarios (e.g., peak hour traffic, accident response, pedestrian crossing assistance) to evaluate the impact of robotic intervention on safety and efficiency.&lt;br /&gt;
Task 6: Analyze current regulations and propose guidelines or recommendations for the safe and effective deployment of urban traffic support robots.&lt;br /&gt;
Task 7: Evaluate the effectiveness of the robot&amp;#039;s interactions with people, VRUs, and transit agents in simulated or controlled environments.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for academic dissemination.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Detailed conceptual designs and technical specifications for urban traffic support robots.&lt;br /&gt;
A physical or simulated prototype of a key robotic component or full system.&lt;br /&gt;
Design of communication architecture for robot integration with smart city systems.&lt;br /&gt;
Simulation results demonstrating improvements in traffic flow, safety, and VRU protection due to robotic intervention.&lt;br /&gt;
A comprehensive report on regulatory, ethical, and societal considerations for urban robotics deployment.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
&lt;br /&gt;
Innovation and practicality of the robot designs and prototyping approach.&lt;br /&gt;
Measurable improvements in traffic safety and efficiency demonstrated through simulations.&lt;br /&gt;
The robustness and scalability of the robot&amp;#039;s communication and integration capabilities within smart city ecosystems.&lt;br /&gt;
The depth of analysis of regulatory challenges and the utility of proposed guidelines for urban robotics.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5548</id>
		<title>Leveraging LLM for Proactive Fault Analysis and Prediction in V2X Communication Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5548"/>
		<updated>2025-10-01T10:35:18Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal outlines research into applying LLMs for advanced fault analysis and prediction within V2X communication systems. The study will involve analyzing public datasets, developing novel datasets for specific V2X scenarios.&lt;br /&gt;
|Keywords=V2X Communication, Fault Analysis, Fault Prediction, Automotive Systems, Data collection&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: Design and implement an LLM-based framework to analyze and predict faults in V2X communication systems, enhancing system reliability and safety. The research aims to establish a robust methodology and knowledge base applicable to critical automotive scenarios.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will explore the capabilities of LLMs in processing V2X data for identifying anomalous patterns and predicting potential failures. It will focus on:&lt;br /&gt;
&lt;br /&gt;
- Investigating the applicability of various LLMs on existing public V2X datasets.&lt;br /&gt;
- Developing new V2X datasets that simulate critical failure modes and challenging communication environments.&lt;br /&gt;
- Simulating specific case studies where V2X communication integrity is paramount for automotive safety.&lt;br /&gt;
- Researching and evaluating existing simulation software, frameworks, and other AI approaches within this scope.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
&lt;br /&gt;
- Data Collection and Generation: Sourcing public V2X datasets and generating synthetic datasets through V2X simulation tools (e.g., SUMO, Veins, OMNeT++).&lt;br /&gt;
- LLM Application and Fine-tuning: Applying pre-trained LLMs and potentially fine-tuning them for V2X-specific fault recognition and prediction tasks.&lt;br /&gt;
- Case Study Simulation: Developing and simulating critical V2X scenarios (e.g., platooning, emergency vehicle warning, intersection assistance) to test fault detection and prediction capabilities.&lt;br /&gt;
- Evaluation and application of specific metrics (Prediction Accuracy, False Positive Rate, Scalability, Robustness, Methodology Utility)&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Deliverables include a comprehensive literature review, study or development of V2X datasets (synthetic and annotated), LLM models analysis, simulation results for one critical case study.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a thorough literature review on LLM applications in fault diagnosis/prediction and V2X communication systems.&lt;br /&gt;
Task 2: Identify suitable public V2X datasets for initial LLM training and evaluation.&lt;br /&gt;
Task 3: Design and implement a methodology for generating novel V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Task 4: Select and adapt appropriate LLMs for V2X fault analysis and prediction, potentially involving transfer learning or fine-tuning.&lt;br /&gt;
Task 5: Develop simulation environments and case studies focusing on V2X communication criticality for automotive safety.&lt;br /&gt;
Task 6: Evaluate the LLM-based fault analysis and prediction system using both public and custom datasets, as well as simulated case studies.&lt;br /&gt;
Task 7: Propose and document a methodological framework or knowledge base for V2X fault management using LLMs.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for dissemination (e.g., journal and conference papers).&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Curated and documented public V2X datasets.&lt;br /&gt;
Novel synthetic V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Implemented and evaluated LLM models for V2X fault analysis and prediction.&lt;br /&gt;
Detailed simulation results and analysis for critical V2X case studies.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Safety_Assurance_in_Critical_Automotive_Control_Systems:_A_Human-Centric_and_Standards-Compliant_Approach&amp;diff=5547</id>
		<title>Safety Assurance in Critical Automotive Control Systems: A Human-Centric and Standards-Compliant Approach</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Safety_Assurance_in_Critical_Automotive_Control_Systems:_A_Human-Centric_and_Standards-Compliant_Approach&amp;diff=5547"/>
		<updated>2025-10-01T10:34:30Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This research proposes an in-depth study into the safety aspects of critical automotive control systems, such as those found in autonomous vehicles. It will investigate the interplay between communication dependency in specific scenarios.&lt;br /&gt;
|Keywords=Automotive Safety, ISO 26262, ISO 21448, Communication Dependency, Human Factors, Cultural Aspects, Critical Control Systems.&lt;br /&gt;
|Supervisor=ALEXANDRE DOS SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: To comprehensively study vehicle safety, for example, autonomous cars, but not limited to, by integrating technical standards (ISO 26262, ISO 21448), communication dependency, and socio-cultural factors, aiming for safer and more acceptable autonomous mobility solutions.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will focus on:&lt;br /&gt;
&lt;br /&gt;
- Analyzing safety implications of communication dependency in critical autonomous driving scenarios.&lt;br /&gt;
- Investigating challenges and applications of ISO 26262 and ISO 21448 for advanced autonomous features.&lt;br /&gt;
- Exploring user perceptions, trust, and cultural influences on autonomous vehicle safety and acceptance.&lt;br /&gt;
- Identifying and addressing gaps between technical safety implementations and human expectations/behavior.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
The study will involve an extensive literature review on safety standards, communication protocols, and human factors. Critical driving scenarios will be analyzed for communication-related safety risks. Current autonomous vehicle discussions need to be reviewed, also considering the recent applications of standards as ISO 26262 and ISO 21448, and others. User perspectives on safety and acceptance could be gathered via surveys or interviews. Evaluate the application of a conceptual framework to integrate technical safety with human-centric design.&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Key deliverables include a detailed analysis report on communication-dependent safety aspects, a comparative study of safety standards application, a report on user perception and cultural challenges, and a conceptual framework for integrated automotive safety design.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a comprehensive literature review on autonomous vehicle safety, communication dependency, ISO 26262, ISO 21448, and human factors in automotive contexts.&lt;br /&gt;
Task 2: Analyze specific critical autonomous driving scenarios to identify safety risks stemming from communication reliance and potential failures.&lt;br /&gt;
Task 3: Examine how existing and emerging autonomous vehicle technologies align with, or deviate from, the requirements of ISO 26262 and ISO 21448.&lt;br /&gt;
Task 4: Design and execute a qualitative and/or quantitative study (surveys, interviews, focus groups) to capture user views, cultural aspects, and challenges related to autonomous vehicle safety and trust.&lt;br /&gt;
Task 5: Synthesize findings from technical analysis, standards compliance, and human factors to identify key safety gaps and potential mitigation strategies.&lt;br /&gt;
Task 6: Develop a conceptual framework or set of guidelines for integrating technical safety standards with user expectations and cultural considerations in autonomous vehicle design.&lt;br /&gt;
Task 7: Finalize thesis document and prepare for academic dissemination.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Detailed report on the safety implications of communication dependency in critical autonomous driving scenarios.&lt;br /&gt;
Analysis of compliance and challenges of ISO 26262 and ISO 21448 in autonomous systems.&lt;br /&gt;
Report summarizing user perceptions, trust, and cultural factors affecting autonomous vehicle safety.&lt;br /&gt;
A conceptual framework for holistic safety design in critical automotive control systems.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
&lt;br /&gt;
The depth of analysis of communication-dependent safety risks.&lt;br /&gt;
The thoroughness in assessing standards compliance and identifying practical challenges.&lt;br /&gt;
The robustness and insights derived from the user studies on human factors and cultural aspects.&lt;br /&gt;
The practical relevance and novelty of the proposed conceptual framework.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Safety_Assurance_in_Critical_Automotive_Control_Systems:_A_Human-Centric_and_Standards-Compliant_Approach&amp;diff=5546</id>
		<title>Safety Assurance in Critical Automotive Control Systems: A Human-Centric and Standards-Compliant Approach</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Safety_Assurance_in_Critical_Automotive_Control_Systems:_A_Human-Centric_and_Standards-Compliant_Approach&amp;diff=5546"/>
		<updated>2025-10-01T10:33:29Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=This research proposes an in-depth study into the safety aspects of critical automotive control systems, such as those found in autonomous ve...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This research proposes an in-depth study into the safety aspects of critical automotive control systems, such as those found in autonomous vehicles. It will investigate the interplay between communication dependency in specific scenarios, adherence to international safety standards.&lt;br /&gt;
|Keywords=Automotive Safety, ISO 26262, ISO 21448, Communication Dependency, Human Factors, Cultural Aspects, Critical Control Systems.&lt;br /&gt;
|Supervisor=ALEXANDRE SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: To comprehensively study vehicle safety, for example, autonomous cars, but not limited to, by integrating technical standards (ISO 26262, ISO 21448), communication dependency, and socio-cultural factors, aiming for safer and more acceptable autonomous mobility solutions.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will focus on:&lt;br /&gt;
&lt;br /&gt;
- Analyzing safety implications of communication dependency in critical autonomous driving scenarios.&lt;br /&gt;
- Investigating challenges and applications of ISO 26262 and ISO 21448 for advanced autonomous features.&lt;br /&gt;
- Exploring user perceptions, trust, and cultural influences on autonomous vehicle safety and acceptance.&lt;br /&gt;
- Identifying and addressing gaps between technical safety implementations and human expectations/behavior.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
The study will involve an extensive literature review on safety standards, communication protocols, and human factors. Critical driving scenarios will be analyzed for communication-related safety risks. Current autonomous vehicle discussions need to be reviewed, also considering the recent applications of standards as ISO 26262 and ISO 21448, and others. User perspectives on safety and acceptance could be gathered via surveys or interviews. Evaluate the application of a conceptual framework to integrate technical safety with human-centric design.&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Key deliverables include a detailed analysis report on communication-dependent safety aspects, a comparative study of safety standards application, a report on user perception and cultural challenges, and a conceptual framework for integrated automotive safety design.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a comprehensive literature review on autonomous vehicle safety, communication dependency, ISO 26262, ISO 21448, and human factors in automotive contexts.&lt;br /&gt;
Task 2: Analyze specific critical autonomous driving scenarios to identify safety risks stemming from communication reliance and potential failures.&lt;br /&gt;
Task 3: Examine how existing and emerging autonomous vehicle technologies align with, or deviate from, the requirements of ISO 26262 and ISO 21448.&lt;br /&gt;
Task 4: Design and execute a qualitative and/or quantitative study (surveys, interviews, focus groups) to capture user views, cultural aspects, and challenges related to autonomous vehicle safety and trust.&lt;br /&gt;
Task 5: Synthesize findings from technical analysis, standards compliance, and human factors to identify key safety gaps and potential mitigation strategies.&lt;br /&gt;
Task 6: Develop a conceptual framework or set of guidelines for integrating technical safety standards with user expectations and cultural considerations in autonomous vehicle design.&lt;br /&gt;
Task 7: Finalize thesis document and prepare for academic dissemination.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Detailed report on the safety implications of communication dependency in critical autonomous driving scenarios.&lt;br /&gt;
Analysis of compliance and challenges of ISO 26262 and ISO 21448 in autonomous systems.&lt;br /&gt;
Report summarizing user perceptions, trust, and cultural factors affecting autonomous vehicle safety.&lt;br /&gt;
A conceptual framework for holistic safety design in critical automotive control systems.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
&lt;br /&gt;
The depth of analysis of communication-dependent safety risks.&lt;br /&gt;
The thoroughness in assessing standards compliance and identifying practical challenges.&lt;br /&gt;
The robustness and insights derived from the user studies on human factors and cultural aspects.&lt;br /&gt;
The practical relevance and novelty of the proposed conceptual framework.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5545</id>
		<title>Leveraging LLM for Proactive Fault Analysis and Prediction in V2X Communication Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5545"/>
		<updated>2025-10-01T10:20:03Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal outlines research into applying LLMs for advanced fault analysis and prediction within V2X communication systems. The study will involve analyzing public datasets, developing novel datasets for specific V2X scenarios.&lt;br /&gt;
|Keywords=V2X Communication, Fault Analysis, Fault Prediction, Automotive Systems, Data collection&lt;br /&gt;
|Supervisor=ALEXANDRE SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: Design and implement an LLM-based framework to analyze and predict faults in V2X communication systems, enhancing system reliability and safety. The research aims to establish a robust methodology and knowledge base applicable to critical automotive scenarios.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will explore the capabilities of LLMs in processing V2X data for identifying anomalous patterns and predicting potential failures. It will focus on:&lt;br /&gt;
&lt;br /&gt;
- Investigating the applicability of various LLMs on existing public V2X datasets.&lt;br /&gt;
- Developing new V2X datasets that simulate critical failure modes and challenging communication environments.&lt;br /&gt;
- Simulating specific case studies where V2X communication integrity is paramount for automotive safety.&lt;br /&gt;
- Researching and evaluating existing simulation software, frameworks, and other AI approaches within this scope.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
&lt;br /&gt;
- Data Collection and Generation: Sourcing public V2X datasets and generating synthetic datasets through V2X simulation tools (e.g., SUMO, Veins, OMNeT++).&lt;br /&gt;
- LLM Application and Fine-tuning: Applying pre-trained LLMs and potentially fine-tuning them for V2X-specific fault recognition and prediction tasks.&lt;br /&gt;
- Case Study Simulation: Developing and simulating critical V2X scenarios (e.g., platooning, emergency vehicle warning, intersection assistance) to test fault detection and prediction capabilities.&lt;br /&gt;
- Evaluation and application of specific metrics (Prediction Accuracy, False Positive Rate, Scalability, Robustness, Methodology Utility)&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Deliverables include a comprehensive literature review, study or development of V2X datasets (synthetic and annotated), LLM models analysis, simulation results for one critical case study.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a thorough literature review on LLM applications in fault diagnosis/prediction and V2X communication systems.&lt;br /&gt;
Task 2: Identify suitable public V2X datasets for initial LLM training and evaluation.&lt;br /&gt;
Task 3: Design and implement a methodology for generating novel V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Task 4: Select and adapt appropriate LLMs for V2X fault analysis and prediction, potentially involving transfer learning or fine-tuning.&lt;br /&gt;
Task 5: Develop simulation environments and case studies focusing on V2X communication criticality for automotive safety.&lt;br /&gt;
Task 6: Evaluate the LLM-based fault analysis and prediction system using both public and custom datasets, as well as simulated case studies.&lt;br /&gt;
Task 7: Propose and document a methodological framework or knowledge base for V2X fault management using LLMs.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for dissemination (e.g., journal and conference papers).&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Curated and documented public V2X datasets.&lt;br /&gt;
Novel synthetic V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Implemented and evaluated LLM models for V2X fault analysis and prediction.&lt;br /&gt;
Detailed simulation results and analysis for critical V2X case studies.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5544</id>
		<title>Leveraging LLM for Proactive Fault Analysis and Prediction in V2X Communication Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5544"/>
		<updated>2025-10-01T10:19:26Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal outlines research into applying LLMs for advanced fault analysis and prediction within V2X communication systems. The study will involve analyzing public datasets, developing novel datasets for specific V2X scenarios, and simulating critical automotive case studies.&lt;br /&gt;
|Keywords=V2X Communication, Fault Analysis, Fault Prediction, Automotive Systems, Data collection&lt;br /&gt;
|Supervisor=ALEXANDRE SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: Design and implement an LLM-based framework to analyze and predict faults in V2X communication systems, enhancing system reliability and safety. The research aims to establish a robust methodology and knowledge base applicable to critical automotive scenarios.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will explore the capabilities of LLMs in processing V2X data for identifying anomalous patterns and predicting potential failures. It will focus on:&lt;br /&gt;
&lt;br /&gt;
- Investigating the applicability of various LLMs on existing public V2X datasets.&lt;br /&gt;
- Developing new V2X datasets that simulate critical failure modes and challenging communication environments.&lt;br /&gt;
- Simulating specific case studies where V2X communication integrity is paramount for automotive safety.&lt;br /&gt;
- Researching and evaluating existing simulation software, frameworks, and other AI approaches within this scope.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
&lt;br /&gt;
- Data Collection and Generation: Sourcing public V2X datasets and generating synthetic datasets through V2X simulation tools (e.g., SUMO, Veins, OMNeT++).&lt;br /&gt;
- LLM Application and Fine-tuning: Applying pre-trained LLMs and potentially fine-tuning them for V2X-specific fault recognition and prediction tasks.&lt;br /&gt;
- Case Study Simulation: Developing and simulating critical V2X scenarios (e.g., platooning, emergency vehicle warning, intersection assistance) to test fault detection and prediction capabilities.&lt;br /&gt;
- Evaluation and application of specific metrics (Prediction Accuracy, False Positive Rate, Scalability, Robustness, Methodology Utility)&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Deliverables include a comprehensive literature review, study or development of V2X datasets (synthetic and annotated), LLM models analysis, simulation results for one critical case study.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a thorough literature review on LLM applications in fault diagnosis/prediction and V2X communication systems.&lt;br /&gt;
Task 2: Identify suitable public V2X datasets for initial LLM training and evaluation.&lt;br /&gt;
Task 3: Design and implement a methodology for generating novel V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Task 4: Select and adapt appropriate LLMs for V2X fault analysis and prediction, potentially involving transfer learning or fine-tuning.&lt;br /&gt;
Task 5: Develop simulation environments and case studies focusing on V2X communication criticality for automotive safety.&lt;br /&gt;
Task 6: Evaluate the LLM-based fault analysis and prediction system using both public and custom datasets, as well as simulated case studies.&lt;br /&gt;
Task 7: Propose and document a methodological framework or knowledge base for V2X fault management using LLMs.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for dissemination (e.g., journal and conference papers).&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Curated and documented public V2X datasets.&lt;br /&gt;
Novel synthetic V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Implemented and evaluated LLM models for V2X fault analysis and prediction.&lt;br /&gt;
Detailed simulation results and analysis for critical V2X case studies.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5543</id>
		<title>Leveraging LLM for Proactive Fault Analysis and Prediction in V2X Communication Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5543"/>
		<updated>2025-10-01T10:18:37Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal outlines research into applying LLMs for advanced fault analysis and prediction within V2X communication systems.&lt;br /&gt;
|Keywords=V2X Communication, Fault Analysis, Fault Prediction, Automotive Systems, Data collection&lt;br /&gt;
|Supervisor=ALEXANDRE SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: Design and implement an LLM-based framework to analyze and predict faults in V2X communication systems, enhancing system reliability and safety. The research aims to establish a robust methodology and knowledge base applicable to critical automotive scenarios.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will explore the capabilities of LLMs in processing V2X data for identifying anomalous patterns and predicting potential failures. It will focus on:&lt;br /&gt;
&lt;br /&gt;
- Investigating the applicability of various LLMs on existing public V2X datasets.&lt;br /&gt;
- Developing new V2X datasets that simulate critical failure modes and challenging communication environments.&lt;br /&gt;
- Simulating specific case studies where V2X communication integrity is paramount for automotive safety.&lt;br /&gt;
- Researching and evaluating existing simulation software, frameworks, and other AI approaches within this scope.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
&lt;br /&gt;
- Data Collection and Generation: Sourcing public V2X datasets and generating synthetic datasets through V2X simulation tools (e.g., SUMO, Veins, OMNeT++).&lt;br /&gt;
- LLM Application and Fine-tuning: Applying pre-trained LLMs and potentially fine-tuning them for V2X-specific fault recognition and prediction tasks.&lt;br /&gt;
- Case Study Simulation: Developing and simulating critical V2X scenarios (e.g., platooning, emergency vehicle warning, intersection assistance) to test fault detection and prediction capabilities.&lt;br /&gt;
- Evaluation and application of specific metrics (Prediction Accuracy, False Positive Rate, Scalability, Robustness, Methodology Utility)&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Deliverables include a comprehensive literature review, study or development of V2X datasets (synthetic and annotated), LLM models analysis, simulation results for one critical case study.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a thorough literature review on LLM applications in fault diagnosis/prediction and V2X communication systems.&lt;br /&gt;
Task 2: Identify suitable public V2X datasets for initial LLM training and evaluation.&lt;br /&gt;
Task 3: Design and implement a methodology for generating novel V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Task 4: Select and adapt appropriate LLMs for V2X fault analysis and prediction, potentially involving transfer learning or fine-tuning.&lt;br /&gt;
Task 5: Develop simulation environments and case studies focusing on V2X communication criticality for automotive safety.&lt;br /&gt;
Task 6: Evaluate the LLM-based fault analysis and prediction system using both public and custom datasets, as well as simulated case studies.&lt;br /&gt;
Task 7: Propose and document a methodological framework or knowledge base for V2X fault management using LLMs.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for dissemination (e.g., journal and conference papers).&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Curated and documented public V2X datasets.&lt;br /&gt;
Novel synthetic V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Implemented and evaluated LLM models for V2X fault analysis and prediction.&lt;br /&gt;
Detailed simulation results and analysis for critical V2X case studies.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5542</id>
		<title>Leveraging LLM for Proactive Fault Analysis and Prediction in V2X Communication Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Leveraging_LLM_for_Proactive_Fault_Analysis_and_Prediction_in_V2X_Communication_Systems&amp;diff=5542"/>
		<updated>2025-10-01T10:12:11Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=This proposal outlines research into applying Large Language Models (LLMs) for advanced fault analysis and prediction within Vehicle-to-Every...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=This proposal outlines research into applying Large Language Models (LLMs) for advanced fault analysis and prediction within Vehicle-to-Everything (V2X) communication systems. The study will involve analyzing public datasets, developing novel datasets for specific V2X scenarios, and simulating critical automotive case studies. The aim is to establish a methodological framework or knowledge base for enhancing V2X system reliability and safety through AI-driven fault management.&lt;br /&gt;
|Keywords=V2X Communication, Fault Analysis, Fault Prediction, Automotive Systems, Data collection&lt;br /&gt;
|Supervisor=ALEXANDRE SANTOS ROQUE&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals: Design and implement an LLM-based framework to analyze and predict faults in V2X communication systems, enhancing system reliability and safety. The research aims to establish a robust methodology and knowledge base applicable to critical automotive scenarios.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives: This thesis will explore the capabilities of LLMs in processing V2X data for identifying anomalous patterns and predicting potential failures. It will focus on:&lt;br /&gt;
&lt;br /&gt;
- Investigating the applicability of various LLMs on existing public V2X datasets.&lt;br /&gt;
- Developing new V2X datasets that simulate critical failure modes and challenging communication environments.&lt;br /&gt;
- Simulating specific case studies where V2X communication integrity is paramount for automotive safety.&lt;br /&gt;
- Researching and evaluating existing simulation software, frameworks, and other AI approaches within this scope.&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation: &lt;br /&gt;
&lt;br /&gt;
- Data Collection and Generation: Sourcing public V2X datasets and generating synthetic datasets through V2X simulation tools (e.g., SUMO, Veins, OMNeT++).&lt;br /&gt;
- LLM Application and Fine-tuning: Applying pre-trained LLMs and potentially fine-tuning them for V2X-specific fault recognition and prediction tasks.&lt;br /&gt;
- Case Study Simulation: Developing and simulating critical V2X scenarios (e.g., platooning, emergency vehicle warning, intersection assistance) to test fault detection and prediction capabilities.&lt;br /&gt;
- Evaluation and application of specific metrics (Prediction Accuracy, False Positive Rate, Scalability, Robustness, Methodology Utility)&lt;br /&gt;
&lt;br /&gt;
Project Deliverables: &lt;br /&gt;
Deliverables include a comprehensive literature review, study or development of V2X datasets (synthetic and annotated), LLM models analysis, simulation results for one critical case study.&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Conduct a thorough literature review on LLM applications in fault diagnosis/prediction and V2X communication systems.&lt;br /&gt;
Task 2: Identify suitable public V2X datasets for initial LLM training and evaluation.&lt;br /&gt;
Task 3: Design and implement a methodology for generating novel V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Task 4: Select and adapt appropriate LLMs for V2X fault analysis and prediction, potentially involving transfer learning or fine-tuning.&lt;br /&gt;
Task 5: Develop simulation environments and case studies focusing on V2X communication criticality for automotive safety.&lt;br /&gt;
Task 6: Evaluate the LLM-based fault analysis and prediction system using both public and custom datasets, as well as simulated case studies.&lt;br /&gt;
Task 7: Propose and document a methodological framework or knowledge base for V2X fault management using LLMs.&lt;br /&gt;
Task 8: Finalize thesis document and prepare for dissemination (e.g., journal and conference papers).&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
&lt;br /&gt;
Curated and documented public V2X datasets.&lt;br /&gt;
Novel synthetic V2X datasets simulating critical fault scenarios.&lt;br /&gt;
Implemented and evaluated LLM models for V2X fault analysis and prediction.&lt;br /&gt;
Detailed simulation results and analysis for critical V2X case studies.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Predicting_Unit_Behavior_in_Tactical_Scenarios_Using_Deep_Learning&amp;diff=5527</id>
		<title>Predicting Unit Behavior in Tactical Scenarios Using Deep Learning</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Predicting_Unit_Behavior_in_Tactical_Scenarios_Using_Deep_Learning&amp;diff=5527"/>
		<updated>2025-09-25T14:29:34Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop and evaluate deep learning models capable of predicting future unit behavior and movement trajectories in tactical scenarios, using a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop and evaluate deep learning models capable of predicting future unit behavior and movement trajectories in tactical scenarios, using a combination of historical trajectory data, environmental context, and mission objectives.&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Problem Statement&lt;br /&gt;
In tactical military operations, situational awareness and timely decision-making are critical for mission success. Commanders often rely on historical movement patterns, environmental conditions, and mission objectives to anticipate the future actions of friendly and adversarial units. However, manual or rule-based predictive models fail to capture the complexity and non-linear dynamics of real-world tactical behavior.&lt;br /&gt;
Recent advances in deep learning — particularly Recurrent Neural Networks (RNNs), Long Short-Term Memory (LSTM) networks, and Transformers — have shown strong performance in sequence modeling, trajectory prediction, and spatiotemporal reasoning. Applying these techniques to predict the behavior and movement of units could enhance proactive decision-making in dynamic environments, improve coordination in coalition networks, and anticipate adversary maneuvers.&lt;br /&gt;
&lt;br /&gt;
Project Goal&lt;br /&gt;
Develop and evaluate deep learning models capable of predicting future unit behavior and movement trajectories in tactical scenarios, using a combination of historical trajectory data, environmental context, and mission objectives.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Specific Tasks&lt;br /&gt;
1. Literature Review&lt;br /&gt;
- Survey existing work on trajectory prediction, spatiotemporal deep learning, and military/tactical movement modeling.&lt;br /&gt;
- Identify key datasets, modeling techniques, and challenges (e.g., uncertainty, adversarial behaviors, incomplete data).&lt;br /&gt;
&lt;br /&gt;
2. Dataset Preparation&lt;br /&gt;
- Collect or simulate trajectory datasets relevant to tactical scenarios:&lt;br /&gt;
- Public datasets (e.g., CAIDA military mobility traces, CRAWDAD mobility datasets, OpenSky flight data).&lt;br /&gt;
- Synthetic datasets generated using NS-3, OMNeT++ or SUMO (for vehicle/unit movement).&lt;br /&gt;
- Include contextual information: terrain features, mission objectives, coalition/adversary interactions.&lt;br /&gt;
&lt;br /&gt;
3. Model Development&lt;br /&gt;
- Implement baseline trajectory prediction models (e.g., RNN, LSTM).&lt;br /&gt;
- Explore transformer-based models (e.g., Temporal Fusion Transformers, Trajectory Transformers).&lt;br /&gt;
- Integrate environmental context embeddings (terrain, weather, obstacles) and mission constraints into the model.&lt;br /&gt;
&lt;br /&gt;
4. Scenario Simulation&lt;br /&gt;
- Develop tactical scenarios (e.g., convoy movements, UAV swarms, adversarial pursuit/avoidance).&lt;br /&gt;
- Train models on historical/simulated data, then predict future positions and actions.&lt;br /&gt;
&lt;br /&gt;
5. Evaluation &amp;amp; Analysis&lt;br /&gt;
- Compare performance of RNN, LSTM, and transformer-based approaches.&lt;br /&gt;
- Analyze predictive accuracy under different tactical conditions (dense vs. sparse units, contested vs. uncontested environments).&lt;br /&gt;
- Investigate uncertainty estimation (e.g., Monte Carlo dropout, Bayesian DL).&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
- Prediction Accuracy: &lt;br /&gt;
 Mean Squared Error (MSE), Average Displacement Error (ADE), Final Displacement Error (FDE).&lt;br /&gt;
 Accuracy of predicting mission-relevant behaviors (e.g., retreat, advance, encirclement).&lt;br /&gt;
&lt;br /&gt;
- Robustness:&lt;br /&gt;
 Model performance with noisy or incomplete trajectory data.&lt;br /&gt;
 Ability to generalize across different terrains/missions.&lt;br /&gt;
&lt;br /&gt;
- Operational Relevance:&lt;br /&gt;
 Improvement in situational awareness (quantified as lead-time advantage in decision-making).&lt;br /&gt;
 Computational efficiency for deployment in constrained tactical systems.&lt;br /&gt;
&lt;br /&gt;
Tools &amp;amp; Frameworks:&lt;br /&gt;
- Deep Learning Libraries: PyTorch, TensorFlow/Keras.&lt;br /&gt;
- Simulation Tools (for synthetic data): NS-3, OMNeT++, SUMO (for vehicle/convoy scenarios), UAVSim.&lt;br /&gt;
&lt;br /&gt;
Datasets:&lt;br /&gt;
- CRAWDAD (military mobility traces, wireless connectivity).&lt;br /&gt;
- OpenSky Network (UAV/aircraft movements).&lt;br /&gt;
- Synthetic tactical datasets generated via simulators.&lt;br /&gt;
&lt;br /&gt;
Visualization: Matplotlib, Seaborn, Plotly (trajectory plots, heatmaps).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Coalition_Interoperability_in_Multi-Domain_Trust_Frameworks%E2%80%8B&amp;diff=5526</id>
		<title>Coalition Interoperability in Multi-Domain Trust Frameworks​</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Coalition_Interoperability_in_Multi-Domain_Trust_Frameworks%E2%80%8B&amp;diff=5526"/>
		<updated>2025-09-25T14:22:08Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop and test mechanisms for trust interoperability across coalition forces using different trust frameworks, ensuring secure and effectiv...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop and test mechanisms for trust interoperability across coalition forces using different trust frameworks, ensuring secure and effective collaboration in joint missions. Trust Framework Analysis​&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals&lt;br /&gt;
    Develop and test mechanisms for trust interoperability across coalition forces using different trust frameworks, ensuring secure and effective collaboration in joint missions.&lt;br /&gt;
&lt;br /&gt;
Trust Framework Analysis​&lt;br /&gt;
    The study analyzes existing trust frameworks in allied military systems to identify interoperability challenges and security constraints.​&lt;br /&gt;
&lt;br /&gt;
Protocol Design​&lt;br /&gt;
   Translation and reconciliation protocols for trust metrics are designed to enable interoperability across diverse trust frameworks.​&lt;br /&gt;
&lt;br /&gt;
Simulated Coalition Testing​&lt;br /&gt;
    An interoperability layer is implemented in a simulation environment to test effectiveness in joint operations with mixed trust models.​&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria​&lt;br /&gt;
   The system is evaluated based on trust translation success, security preservation, and operational effectiveness in missions.​&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
- Task 1: Study existing trust frameworks used in allied military systems.&lt;br /&gt;
- Task 2: Identify interoperability challenges and security constraints.&lt;br /&gt;
- Task 3: Design translation and reconciliation protocols for trust metrics.&lt;br /&gt;
- Task 4: Implement interoperability layer in a simulated coalition environment.&lt;br /&gt;
- Task 5: Test effectiveness in joint operations with mixed trust models.&lt;br /&gt;
- Task 6: Document findings and prepare thesis defense.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document)&lt;br /&gt;
- Trust interoperability protocol&lt;br /&gt;
- Simulation of coalition operations with heterogeneous trust systems&lt;br /&gt;
- Evaluation report on collaboration effectiveness and security&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria&lt;br /&gt;
- Success rate of trust translation across domains&lt;br /&gt;
- Security preservation during trust reconciliation&lt;br /&gt;
- Operational effectiveness in coalition missions&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Dynamic_Trust_Recalibration_Based_on_Mission_Phase_and_Autonomy_Shifts&amp;diff=5525</id>
		<title>Dynamic Trust Recalibration Based on Mission Phase and Autonomy Shifts</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Dynamic_Trust_Recalibration_Based_on_Mission_Phase_and_Autonomy_Shifts&amp;diff=5525"/>
		<updated>2025-09-25T14:19:41Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Design and implement a mechanism for dynamic trust recalibration that adapts to evolving mission phases and changes in agent autonomy levels,...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Design and implement a mechanism for dynamic trust recalibration that adapts to evolving mission phases and changes in agent autonomy levels, incorporating plan recognition and collective intention modeling.&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals&lt;br /&gt;
    Design and implement a mechanism for dynamic trust recalibration that adapts to evolving mission phases and changes in agent autonomy levels, incorporating plan recognition and collective intention modeling.&lt;br /&gt;
&lt;br /&gt;
Research Focus and Objectives​&lt;br /&gt;
    The thesis explores dynamic trust recalibration adapting to mission phases and changing agent autonomy levels.​&lt;br /&gt;
&lt;br /&gt;
Methodology and Implementation​&lt;br /&gt;
    Plan recognition, intention modeling, and trust logic are developed and tested in simulated multi-agent environments.​&lt;br /&gt;
&lt;br /&gt;
Evaluation and Success Metrics​&lt;br /&gt;
    Trust update speed, accuracy, team cohesion, and reduced misalignment define the mechanism&amp;#039;s effectiveness.​&lt;br /&gt;
&lt;br /&gt;
Project Deliverables​&lt;br /&gt;
   Deliverables include recalibration algorithms, mission simulations, evaluation reports, and the thesis document.​&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
- Task 1: Research plan recognition and intention modeling in multi-agent systems.&lt;br /&gt;
- Task 2: Define mission phase transitions and autonomy shift scenarios.&lt;br /&gt;
- Task 3: Develop trust recalibration logic based on cognitive and operational context.&lt;br /&gt;
- Task 4: Implement recalibration mechanism in a simulated mission environment.&lt;br /&gt;
- Task 5: Evaluate adaptation speed and trust accuracy during dynamic changes.&lt;br /&gt;
- Task 6: Finalize thesis and prepare presentation.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
- Trust recalibration algorithm&lt;br /&gt;
- Simulation of evolving mission scenarios&lt;br /&gt;
- Evaluation report on adaptation and trust accuracy&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria&lt;br /&gt;
- Speed and accuracy of trust updates during autonomy shifts&lt;br /&gt;
- Effectiveness in maintaining team cohesion across mission phases&lt;br /&gt;
- Reduction in trust misalignment due to outdated assumptions&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Conflict-free_Replicated_Data_Type_(CRDT)-based_Distributed_Trust_Propagation_in_Partitioned_Networks&amp;diff=5524</id>
		<title>Conflict-free Replicated Data Type (CRDT)-based Distributed Trust Propagation in Partitioned Networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Conflict-free_Replicated_Data_Type_(CRDT)-based_Distributed_Trust_Propagation_in_Partitioned_Networks&amp;diff=5524"/>
		<updated>2025-09-25T14:16:53Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Implement a CRDT-based mechanism for distributed trust computation and conflict-free updates during network partition recovery. |References=1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Implement a CRDT-based mechanism for distributed trust computation and conflict-free updates during network partition recovery.&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals&lt;br /&gt;
    Implement a CRDT-based mechanism for distributed trust computation and conflict-free updates during network partition recovery.&lt;br /&gt;
&lt;br /&gt;
CRDTs and Trust Systems​&lt;br /&gt;
    The thesis reviews CRDT concepts and distributed trust systemsas the foundation for trust propagation.​&lt;br /&gt;
&lt;br /&gt;
Trust Propagation Protocol​&lt;br /&gt;
    A trust propagation protocol using CRDTs is designed forreliable trust updates in partitioned networks.​&lt;br /&gt;
&lt;br /&gt;
Simulation and Testing​&lt;br /&gt;
    The protocol is tested in simulated partitioned networkscenarios to measure performance and update accuracy.​&lt;br /&gt;
&lt;br /&gt;
Evaluation Metrics​&lt;br /&gt;
   Success rate of conflict-free updates and accuracy of trustreconciliation post-recovery are evaluated.​&lt;br /&gt;
&lt;br /&gt;
Main Tasks: &lt;br /&gt;
Task 1: Review CRDTs and distributed trust systems.&lt;br /&gt;
Task 2: Design trust propagation protocol using CRDTs.&lt;br /&gt;
Task 3: Implement protocol in a simulated partitioned network.&lt;br /&gt;
Task 4: Test trust updates during and after partitions.&lt;br /&gt;
Task 5: Measure performance degradation and recovery accuracy.&lt;br /&gt;
Task 6: Finalize thesis and prepare defense materials.&lt;br /&gt;
 &lt;br /&gt;
Deliverables (Besides the final thesis document):&lt;br /&gt;
- CRDT-based trust propagation protocol&lt;br /&gt;
- Simulation of partitioned network scenarios&lt;br /&gt;
- Evaluation report on update consistency and recovery&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
- Conflict-free trust update success rate&lt;br /&gt;
- Performance under varying partition durations&lt;br /&gt;
- Accuracy of trust reconciliation post-recovery&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Game-Theoretic_Trust_Evaluation_for_Objective_Conflict_Resolution&amp;diff=5523</id>
		<title>Game-Theoretic Trust Evaluation for Objective Conflict Resolution</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Game-Theoretic_Trust_Evaluation_for_Objective_Conflict_Resolution&amp;diff=5523"/>
		<updated>2025-09-25T14:04:23Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Design and implement a trust evaluation mechanism that distinguishes between legitimate goal divergence and malicious behavior using game-the...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Design and implement a trust evaluation mechanism that distinguishes between legitimate goal divergence and malicious behavior using game-theoretic principles.&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals&lt;br /&gt;
    Design and implement a trust evaluation mechanism that distinguishes between legitimate goal divergence and malicious behavior using game-theoretic principles.&lt;br /&gt;
&lt;br /&gt;
Trust Evaluation Mechanism​&lt;br /&gt;
   Designs a mechanism to distinguish legitimate goal divergence from malicious behavior using game theory.​&lt;br /&gt;
&lt;br /&gt;
Multi-Agent System Modeling​&lt;br /&gt;
   Models agent objectives and conflicts to analyze interactions and trust decisions through simulations.​&lt;br /&gt;
&lt;br /&gt;
Performance Evaluation Criteria​&lt;br /&gt;
   Evaluates precision, false trust decision reduction, and scalability across team sizes and missions.​&lt;br /&gt;
&lt;br /&gt;
Thesis Deliverables​:&lt;br /&gt;
    Includes algorithm, simulations, performance report, and comprehensive thesis document.​&lt;br /&gt;
&lt;br /&gt;
Main Tasks: &lt;br /&gt;
- Task 1: Study game theory in multi-agent systems and trust dilemmas.&lt;br /&gt;
- Task 2: Model agent objectives and potential conflicts.&lt;br /&gt;
- Task 3: Develop game-theoretic trust evaluation algorithm.&lt;br /&gt;
- Task 4: Implement and simulate agent interactions with conflicting goals.&lt;br /&gt;
- Task 5: Analyze trust decisions and false positive/negative rates.&lt;br /&gt;
-Task 6: Write thesis and prepare presentation.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document)&lt;br /&gt;
- Game-theoretic trust evaluation algorithm&lt;br /&gt;
- Simulation scenarios with conflicting objectives&lt;br /&gt;
- Performance analysis report&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria&lt;br /&gt;
- Precision in distinguishing malicious vs. conflicting behavior. &lt;br /&gt;
- Reduction in false trust decisions. &lt;br /&gt;
- Scalability across team sizes and mission types.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Autonomy-Aware_Trust_Modeling_in_Heterogeneous_IoBT_-_Teams%E2%80%8B&amp;diff=5522</id>
		<title>Autonomy-Aware Trust Modeling in Heterogeneous IoBT - Teams​</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Autonomy-Aware_Trust_Modeling_in_Heterogeneous_IoBT_-_Teams%E2%80%8B&amp;diff=5522"/>
		<updated>2025-09-25T12:09:28Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop and evaluate a trust model that dynamically weights behavioral indicators based on agents&amp;#039; autonomy levels (Response Demand, Response...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop and evaluate a trust model that dynamically weights behavioral indicators based on agents&amp;#039; autonomy levels (Response Demand, Response Production, Response Selection).&lt;br /&gt;
|References=1. Fernandes, R., Hieb, M. R., &amp;amp; Costa, P. C. “Levels of Autonomy: Command and Control of Hybrid Forces”, 21st ICCRTS, 2016.&lt;br /&gt;
&lt;br /&gt;
2. Dunin-Keplicz, B., &amp;amp; Verbrugge, R. “Teamwork in Multi-agent Systems: A formal approach”, John Wiley &amp;amp; Sons, 2011.&lt;br /&gt;
&lt;br /&gt;
3. Alberts, D. S. “The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors”, CCRP Publication Series, 2011.&lt;br /&gt;
|Supervisor=EDISON PIGNATON DE FREITAS&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Goals&lt;br /&gt;
    Develop and evaluate a trust model that dynamically weights behavioral indicators based on agents&amp;#039; autonomy levels (Response Demand, Response Production, Response Selection).&lt;br /&gt;
&lt;br /&gt;
Dynamic Trust Weighting​&lt;br /&gt;
   Trust model dynamically adjusts behavioral indicators based on agent autonomy levels to improve accuracy.​&lt;br /&gt;
&lt;br /&gt;
Simulation and Testing​&lt;br /&gt;
   Simulation environment tests heterogeneous agents under various autonomy configurations for model validation.​&lt;br /&gt;
&lt;br /&gt;
Model Evaluation Criteria​&lt;br /&gt;
   Success measured by accuracy in detecting compromised agents and robustness in network partitions.​&lt;br /&gt;
&lt;br /&gt;
Project Deliverables​&lt;br /&gt;
   Includes trust model specification, simulation setup, evaluation report, and thesis documentation.​&lt;br /&gt;
&lt;br /&gt;
Main Tasks:&lt;br /&gt;
Task 1: Literature review on trust modeling and HyCCo autonomy levels; define agent profiles.&lt;br /&gt;
Task 2: Design autonomy-aware trust metrics and behavioral indicators.&lt;br /&gt;
Task 3: Implement simulation environment with heterogeneous agents.&lt;br /&gt;
Task 4: Integrate trust model into simulation; run initial tests.&lt;br /&gt;
Task 5: Evaluate trust accuracy under different autonomy configurations.&lt;br /&gt;
Task 6: Finalize documentation and prepare thesis defense.&lt;br /&gt;
&lt;br /&gt;
Deliverables (Besides the final thesis document)&lt;br /&gt;
- Trust model specification&lt;br /&gt;
- Simulation environment with agent profiles&lt;br /&gt;
- Evaluation report on trust accuracy&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria: &lt;br /&gt;
- Accuracy in detecting compromised agents across autonomy levels&lt;br /&gt;
- Robustness under simulated network partitions&lt;br /&gt;
- Clarity and adaptability of trust metrics&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Blockchain-Assisted_Data_Integrity_in_Eventually_Consistent_IoBT_Systems&amp;diff=5521</id>
		<title>Blockchain-Assisted Data Integrity in Eventually Consistent IoBT Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Blockchain-Assisted_Data_Integrity_in_Eventually_Consistent_IoBT_Systems&amp;diff=5521"/>
		<updated>2025-09-25T12:04:25Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Build a lightweight blockchain or distributed ledger tailored for IoBT that ensures post-partition reconciliation and prevents data tampering.&lt;br /&gt;
|References=An Efficient Lightweight Blockchain for Decentralized IoT.&lt;br /&gt;
https://arxiv.org/abs/2508.19219&lt;br /&gt;
&lt;br /&gt;
A Scalable Blockchain Based Framework for Efficient IoT Data Management Using Lightweight Consensus.&lt;br /&gt;
https://www.nature.com/articles/s41598-024-58578-7.pdf&lt;br /&gt;
&lt;br /&gt;
TON_IoT dataset (2021) – has telemetry and cyberattack traces for IoT/IIoT.&lt;br /&gt;
https://ieee-dataport.org/documents/toniot-datasets&lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Problem:&lt;br /&gt;
In IoBT, eventual consistency creates windows of vulnerability where adversaries can inject false or manipulated data. Ensuring integrity without requiring strong synchronization is critical.&lt;br /&gt;
&lt;br /&gt;
Goal:&lt;br /&gt;
Build a lightweight blockchain or distributed ledger tailored for IoBT that ensures post-partition reconciliation and prevents data tampering.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Tasks:&lt;br /&gt;
Develop an append-only log system with cryptographic hashing and digital signatures.&lt;br /&gt;
Implement a lightweight blockchain consensus protocol suitable for low-power IoBT devices (e.g., Proof-of-Authority instead of PoW).&lt;br /&gt;
Test against false data injection attacks and partition/reintegration scenarios.&lt;br /&gt;
Compare performance with Conflict-Free Replicated Data Types (CRDTs).&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
Integrity verification success rate (% of tampered data detected).&lt;br /&gt;
System overhead (memory, CPU, bandwidth).&lt;br /&gt;
Recovery time after partition rejoining.&lt;br /&gt;
Energy efficiency on constrained devices.&lt;br /&gt;
&lt;br /&gt;
Suggested Tools &amp;amp; Platforms:&lt;br /&gt;
Blockchain Frameworks:&lt;br /&gt;
Hyperledger Fabric (permissioned blockchain, supports Proof-of-Authority).&lt;br /&gt;
Ethereum Private Testnet with Geth (can tune consensus protocols).&lt;br /&gt;
IOTA Tangle (DAG-based ledger) → lightweight, designed for IoT devices.&lt;br /&gt;
&lt;br /&gt;
IoT Simulation:&lt;br /&gt;
NS-3 with DTN (Delay-Tolerant Networking) extensions → to simulate partitions and reintegration.&lt;br /&gt;
Cooja Simulator (in Contiki-NG) → deploy constrained IoBT nodes with blockchain overlays.&lt;br /&gt;
&lt;br /&gt;
Validation Tools:&lt;br /&gt;
Wireshark for protocol analysis,&lt;br /&gt;
Log comparison for tampering detection.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Federatad_Learning_(FL)_improving_security_and_privacy_in_tactical_networks&amp;diff=5519</id>
		<title>Federatad Learning (FL) improving security and privacy in tactical networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Federatad_Learning_(FL)_improving_security_and_privacy_in_tactical_networks&amp;diff=5519"/>
		<updated>2025-09-23T14:36:56Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Investigate and prototype how FL can improve security and privacy in tactical networks, with a focus on intrusion detection or anomaly detect...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Investigate and prototype how FL can improve security and privacy in tactical networks, with a focus on intrusion detection or anomaly detection. The project will combine a literature review with a simulation-based implementation to assess feasibility.&lt;br /&gt;
|References=Federated Learning in Intrusion Detection: Advancements, Applications, and Future Directions&lt;br /&gt;
https://link.springer.com/article/10.1007/s10586-025-05325-w &lt;br /&gt;
&lt;br /&gt;
Federated Learning for Anomaly Detection: A Systematic Review on Scalability, Adaptability, and Benchmarking Framework &lt;br /&gt;
https://www.mdpi.com/1999-5903/17/8/375 &lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Project Goal:&lt;br /&gt;
Investigate and prototype how FL can improve security and privacy in tactical networks, with a focus on intrusion detection or anomaly detection. The project will combine a literature review with a simulation-based implementation to assess feasibility.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Specific Tasks:&lt;br /&gt;
Literature Review &amp;amp; Gap Analysis:&lt;br /&gt;
Survey current research on FL in military/tactical or IoBT networks.&lt;br /&gt;
Identify open problems in privacy, security, robustness, and efficiency of FL for tactical applications.&lt;br /&gt;
&lt;br /&gt;
System Design:&lt;br /&gt;
Define a tactical network scenario (e.g., coalition IoBT with partitioned nodes).&lt;br /&gt;
Choose a security task (e.g., intrusion detection, anomaly detection, malware traffic classification).&lt;br /&gt;
Design a federated learning framework for this task.&lt;br /&gt;
&lt;br /&gt;
Implementation:&lt;br /&gt;
Simulate tactical nodes using a federated learning framework such as Flower, PySyft, or TensorFlow Federated.&lt;br /&gt;
Integrate privacy-preserving mechanisms (e.g., differential privacy, secure aggregation).&lt;br /&gt;
Model adversarial attacks on FL (e.g., data poisoning, model poisoning, inference attacks).&lt;br /&gt;
&lt;br /&gt;
Experiments &amp;amp; Evaluation:&lt;br /&gt;
Train baseline centralized ML vs. federated ML.&lt;br /&gt;
Evaluate under varying tactical conditions (network partitions, node dropouts, adversarial clients).&lt;br /&gt;
Compare trade-offs: accuracy, latency, bandwidth, privacy leakage, robustness to attack.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria: &lt;br /&gt;
&lt;br /&gt;
Model Accuracy:&lt;br /&gt;
Classification performance (e.g., F1-score, ROC-AUC) compared to centralized training.&lt;br /&gt;
&lt;br /&gt;
Security &amp;amp; Privacy:&lt;br /&gt;
Resistance to data/model poisoning attacks (attack success rate).&lt;br /&gt;
Privacy leakage quantified via inference attacks.&lt;br /&gt;
&lt;br /&gt;
Efficiency:&lt;br /&gt;
Bandwidth usage reduction compared to centralized training.&lt;br /&gt;
Computational overhead on constrained devices.&lt;br /&gt;
&lt;br /&gt;
Robustness:&lt;br /&gt;
Performance under intermittent connectivity and node dropouts.&lt;br /&gt;
&lt;br /&gt;
Tools &amp;amp; Frameworks:&lt;br /&gt;
&lt;br /&gt;
Federated Learning Frameworks:&lt;br /&gt;
Flower (flexible, Python-based).&lt;br /&gt;
TensorFlow Federated (robust, integrates with TF/Keras).&lt;br /&gt;
PySyft (privacy-preserving ML with secure aggregation).&lt;br /&gt;
&lt;br /&gt;
Datasets:&lt;br /&gt;
CIC-IDS 2017 / CIC-IDS 2020 (intrusion detection).&lt;br /&gt;
TON_IoT dataset (2021) (IoT/IIoT telemetry with attacks — closer to tactical IoBT).&lt;br /&gt;
&lt;br /&gt;
Simulation Tools (optional extension):&lt;br /&gt;
NS-3 or CORE to emulate tactical network constraints (bandwidth limits, node dropouts).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Simulating_cyber_attacks_and_countermeasures_using_Cyber_Operations_Research_Gym_(CybORG)&amp;diff=5518</id>
		<title>Simulating cyber attacks and countermeasures using Cyber Operations Research Gym (CybORG)</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Simulating_cyber_attacks_and_countermeasures_using_Cyber_Operations_Research_Gym_(CybORG)&amp;diff=5518"/>
		<updated>2025-09-23T14:32:05Z</updated>

		<summary type="html">&lt;p&gt;Cclab: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop a simulation-based study of cyber attacks and countermeasures in CybORG, comparing baseline scripted defenses with reinforcement learning–based adaptive defenders to identify effective strategies for protecting networked systems.&lt;br /&gt;
|References=Quantitative Resilience Modeling for Autonomous Cyber Defense &lt;br /&gt;
https://rlj.cs.umass.edu/2025/papers/RLJ_RLC_2025_99.pdf &lt;br /&gt;
&lt;br /&gt;
Interpreting Agent Behaviors in Reinforcement-Learning-Based Cyber-Battle Simulation Platforms&lt;br /&gt;
https://arxiv.org/html/2506.08192v1&lt;br /&gt;
&lt;br /&gt;
CybORG:&lt;br /&gt;
https://github.com/cage-challenge/cyborg?utm_source=chatgpt.com &lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Work in partnership with the Fraunhofer FKIE Institute in Bonn, Germany&lt;br /&gt;
&lt;br /&gt;
Project Goal:&lt;br /&gt;
Develop a simulation-based study of cyber attacks and countermeasures in CybORG, comparing baseline scripted defenses with reinforcement learning–based adaptive defenders to identify effective strategies for protecting networked systems.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Specific Tasks:&lt;br /&gt;
&lt;br /&gt;
Set up CybORG environment:&lt;br /&gt;
Install CybORG and familiarize with its baseline scenarios (e.g., red team exploiting vulnerable hosts, blue team defending services).&lt;br /&gt;
Select representative scenarios (e.g., privilege escalation, lateral movement, persistence).&lt;br /&gt;
&lt;br /&gt;
Model Attacks:&lt;br /&gt;
Implement or tune red-team agents using scripted attack strategies (e.g., scanning, brute force, exploit chaining).&lt;br /&gt;
Explore adaptive attackers using RL (e.g., Deep Q-Networks, PPO).&lt;br /&gt;
&lt;br /&gt;
Design Defenses:&lt;br /&gt;
Implement baseline defenses (patching, service monitoring, port blocking).&lt;br /&gt;
Develop blue-team agents with reinforcement learning to dynamically choose defense actions (e.g., isolate host, restart service, deception).&lt;br /&gt;
&lt;br /&gt;
Experimentation:&lt;br /&gt;
Run controlled experiments where red-team agents attack and blue-team agents defend.&lt;br /&gt;
Compare performance across different strategies (static rules vs. adaptive RL).&lt;br /&gt;
&lt;br /&gt;
Analysis &amp;amp; Visualization:&lt;br /&gt;
Collect metrics on attacker success rate, defender cost, time-to-compromise, and system availability.&lt;br /&gt;
Visualize attack-defense dynamics over simulation episodes.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria&lt;br /&gt;
Defensive Effectiveness:&lt;br /&gt;
Reduction in attacker success rate (% of compromised hosts).&lt;br /&gt;
Mean time to compromise (MTTC) improvements.&lt;br /&gt;
&lt;br /&gt;
Efficiency:&lt;br /&gt;
Resource overhead of defenses (CPU, memory, action cost in CybORG).&lt;br /&gt;
&lt;br /&gt;
Adaptability:&lt;br /&gt;
Ability of RL-based defenders to learn effective countermeasures against novel attack patterns.&lt;br /&gt;
&lt;br /&gt;
Comparative Performance:&lt;br /&gt;
Benchmark RL defenders vs. rule-based defenders.&lt;br /&gt;
Benchmark scripted attackers vs. adaptive RL attackers.&lt;br /&gt;
&lt;br /&gt;
Tools &amp;amp; Frameworks&lt;br /&gt;
&lt;br /&gt;
Simulation Environment: CybORG* (Python-based cyber operations simulator).&lt;br /&gt;
&lt;br /&gt;
Reinforcement Learning: Stable Baselines3 (PPO, DQN, A2C) or Ray RLlib for scalability.&lt;br /&gt;
&lt;br /&gt;
Visualization &amp;amp; Analysis: Matplotlib, NetworkX (for network attack graphs), TensorBoard.&lt;br /&gt;
&lt;br /&gt;
Expected Contributions&lt;br /&gt;
A reproducible simulation framework for testing cyber attack/defense strategies in CybORG.&lt;br /&gt;
Empirical insights on when adaptive defense outperforms static defense.&lt;br /&gt;
Recommendations for deploying RL-based defenses in real-world cyber ranges.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Simulating_cyber_attacks_and_countermeasures_using_Cyber_Operations_Research_Gym_(CybORG)&amp;diff=5517</id>
		<title>Simulating cyber attacks and countermeasures using Cyber Operations Research Gym (CybORG)</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Simulating_cyber_attacks_and_countermeasures_using_Cyber_Operations_Research_Gym_(CybORG)&amp;diff=5517"/>
		<updated>2025-09-23T14:27:51Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Develop a simulation-based study of cyber attacks and countermeasures in CybORG, comparing baseline scripted defenses with reinforcement lear...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Develop a simulation-based study of cyber attacks and countermeasures in CybORG, comparing baseline scripted defenses with reinforcement learning–based adaptive defenders to identify effective strategies for protecting networked systems.&lt;br /&gt;
|References=Quantitative Resilience Modeling for Autonomous Cyber Defense &lt;br /&gt;
https://rlj.cs.umass.edu/2025/papers/RLJ_RLC_2025_99.pdf &lt;br /&gt;
&lt;br /&gt;
Interpreting Agent Behaviors in Reinforcement-Learning-Based Cyber-Battle Simulation Platforms&lt;br /&gt;
https://arxiv.org/html/2506.08192v1 &lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Work in partnership with the Fraunhofer FKIE Institute in Bonn, Germany&lt;br /&gt;
&lt;br /&gt;
Project Goal:&lt;br /&gt;
Develop a simulation-based study of cyber attacks and countermeasures in CybORG, comparing baseline scripted defenses with reinforcement learning–based adaptive defenders to identify effective strategies for protecting networked systems.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Specific Tasks:&lt;br /&gt;
&lt;br /&gt;
Set up CybORG environment:&lt;br /&gt;
Install CybORG and familiarize with its baseline scenarios (e.g., red team exploiting vulnerable hosts, blue team defending services).&lt;br /&gt;
Select representative scenarios (e.g., privilege escalation, lateral movement, persistence).&lt;br /&gt;
&lt;br /&gt;
Model Attacks:&lt;br /&gt;
Implement or tune red-team agents using scripted attack strategies (e.g., scanning, brute force, exploit chaining).&lt;br /&gt;
Explore adaptive attackers using RL (e.g., Deep Q-Networks, PPO).&lt;br /&gt;
&lt;br /&gt;
Design Defenses:&lt;br /&gt;
Implement baseline defenses (patching, service monitoring, port blocking).&lt;br /&gt;
Develop blue-team agents with reinforcement learning to dynamically choose defense actions (e.g., isolate host, restart service, deception).&lt;br /&gt;
&lt;br /&gt;
Experimentation:&lt;br /&gt;
Run controlled experiments where red-team agents attack and blue-team agents defend.&lt;br /&gt;
Compare performance across different strategies (static rules vs. adaptive RL).&lt;br /&gt;
&lt;br /&gt;
Analysis &amp;amp; Visualization:&lt;br /&gt;
Collect metrics on attacker success rate, defender cost, time-to-compromise, and system availability.&lt;br /&gt;
Visualize attack-defense dynamics over simulation episodes.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria&lt;br /&gt;
Defensive Effectiveness:&lt;br /&gt;
Reduction in attacker success rate (% of compromised hosts).&lt;br /&gt;
Mean time to compromise (MTTC) improvements.&lt;br /&gt;
&lt;br /&gt;
Efficiency:&lt;br /&gt;
Resource overhead of defenses (CPU, memory, action cost in CybORG).&lt;br /&gt;
&lt;br /&gt;
Adaptability:&lt;br /&gt;
Ability of RL-based defenders to learn effective countermeasures against novel attack patterns.&lt;br /&gt;
&lt;br /&gt;
Comparative Performance:&lt;br /&gt;
Benchmark RL defenders vs. rule-based defenders.&lt;br /&gt;
Benchmark scripted attackers vs. adaptive RL attackers.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Autonomous_Trust_and_Access_Control_in_Coalition_IoBT_Networks&amp;diff=5515</id>
		<title>Autonomous Trust and Access Control in Coalition IoBT Networks</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Autonomous_Trust_and_Access_Control_in_Coalition_IoBT_Networks&amp;diff=5515"/>
		<updated>2025-09-23T14:18:55Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Design a decentralized, behavior-based trust and access control system that adapts autonomously under disconnected, adversarial conditions. |...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Design a decentralized, behavior-based trust and access control system that adapts autonomously under disconnected, adversarial conditions.&lt;br /&gt;
|References=Trust-based Blockchain Authorization for IoT&lt;br /&gt;
https://arxiv.org/pdf/2104.00832 &lt;br /&gt;
&lt;br /&gt;
Blockchain-based Decentralized Trust Management in IoT: Systems, Requirements and Challenges&lt;br /&gt;
https://link.springer.com/article/10.1007/s40747-023-01058-8&lt;br /&gt;
&lt;br /&gt;
UAVouch&lt;br /&gt;
https://ieeexplore.ieee.org/document/9448085  &lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Problem:&lt;br /&gt;
Coalition operations require dynamic trust and access control across multiple organizations. Centralized RBAC/PKI solutions fail in partitioned environments, leading to risks of insider threats and impersonation attacks.&lt;br /&gt;
&lt;br /&gt;
Goal:&lt;br /&gt;
Design a decentralized, behavior-based trust and access control system that adapts autonomously under disconnected, adversarial conditions.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Tasks:&lt;br /&gt;
Implement local ABAC/RBAC policies enforced with ephemeral tokens.&lt;br /&gt;
Develop behavioral trust models that score nodes based on mobility patterns, resource use, and anomaly detection.&lt;br /&gt;
Incorporate location-validation techniques (e.g., UAVouch-style*) to detect Sybil or impersonation attacks.&lt;br /&gt;
Test resilience in coalition networks with different trust domains.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
Accuracy of malicious/insider node detection (precision, recall, F1-score).&lt;br /&gt;
Policy enforcement latency and overhead.&lt;br /&gt;
Scalability with increasing coalition size.&lt;br /&gt;
Success rate in preventing unauthorized access during adversarial attacks.&lt;br /&gt;
&lt;br /&gt;
Suggested Tools &amp;amp; Platforms:&lt;br /&gt;
Simulation Frameworks:&lt;br /&gt;
OMNeT++ with INET/Veins modules → simulate coalition networks with adversarial behaviors.&lt;br /&gt;
NS-3 with mobility models → test trust policies with moving IoBT nodes (drones, vehicles).&lt;br /&gt;
&lt;br /&gt;
Trust/Access Control Libraries:&lt;br /&gt;
Open Policy Agent (OPA) → ABAC/RBAC policies in distributed systems.&lt;br /&gt;
Keycloak → identity management (extend with ephemeral tokens).&lt;br /&gt;
Machine Learning Tools (for behavioral trust scoring):&lt;br /&gt;
Scikit-learn or TensorFlow Lite → train anomaly detectors on node behavior (bandwidth use, mobility patterns).&lt;br /&gt;
&lt;br /&gt;
Datasets:&lt;br /&gt;
UNSW-NB15 and CIC-IDS2017 → intrusion detection datasets for anomaly detection.&lt;br /&gt;
Mobility traces:&lt;br /&gt;
CRAWDAD datasets (e.g., military mobility traces, UAV movement).&lt;br /&gt;
Synthetic mobility models (Random Waypoint, Gauss-Markov) in NS-3/OMNeT++.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Blockchain-Assisted_Data_Integrity_in_Eventually_Consistent_IoBT_Systems&amp;diff=5514</id>
		<title>Blockchain-Assisted Data Integrity in Eventually Consistent IoBT Systems</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Blockchain-Assisted_Data_Integrity_in_Eventually_Consistent_IoBT_Systems&amp;diff=5514"/>
		<updated>2025-09-23T14:01:25Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Build a lightweight blockchain or distributed ledger tailored for IoBT that ensures post-partition reconciliation and prevents data tampering...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Build a lightweight blockchain or distributed ledger tailored for IoBT that ensures post-partition reconciliation and prevents data tampering.&lt;br /&gt;
|References=An Efficient Lightweight Blockchain for Decentralized IoT.&lt;br /&gt;
https://arxiv.org/abs/2508.19219&lt;br /&gt;
&lt;br /&gt;
A Scalable Blockchain Based Framework for Efficient IoT Data Management Using Lightweight Consensus.&lt;br /&gt;
https://www.nature.com/articles/s41598-024-58578-7.pdf&lt;br /&gt;
&lt;br /&gt;
TON_IoT dataset (2021) – has telemetry and cyberattack traces for IoT/IIoT.&lt;br /&gt;
https://ieee-dataport.org/documents/toniot-datasets&lt;br /&gt;
&lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
}}&lt;br /&gt;
Problem:&lt;br /&gt;
In IoBT, eventual consistency creates windows of vulnerability where adversaries can inject false or manipulated data. Ensuring integrity without requiring strong synchronization is critical.&lt;br /&gt;
&lt;br /&gt;
Goal:&lt;br /&gt;
Build a lightweight blockchain or distributed ledger tailored for IoBT that ensures post-partition reconciliation and prevents data tampering.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Tasks:&lt;br /&gt;
Develop an append-only log system with cryptographic hashing and digital signatures.&lt;br /&gt;
Implement a lightweight blockchain consensus protocol suitable for low-power IoBT devices (e.g., Proof-of-Authority instead of PoW).&lt;br /&gt;
Test against false data injection attacks and partition/reintegration scenarios.&lt;br /&gt;
Compare performance with Conflict-Free Replicated Data Types (CRDTs).&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
Integrity verification success rate (% of tampered data detected).&lt;br /&gt;
System overhead (memory, CPU, bandwidth).&lt;br /&gt;
Recovery time after partition rejoining.&lt;br /&gt;
Energy efficiency on constrained devices.&lt;br /&gt;
&lt;br /&gt;
Suggested Tools &amp;amp; Platforms:&lt;br /&gt;
Blockchain Frameworks:&lt;br /&gt;
Hyperledger Fabric (permissioned blockchain, supports Proof-of-Authority).&lt;br /&gt;
Ethereum Private Testnet with Geth (can tune consensus protocols).&lt;br /&gt;
IOTA Tangle (DAG-based ledger) → lightweight, designed for IoT devices.&lt;br /&gt;
&lt;br /&gt;
IoT Simulation:&lt;br /&gt;
NS-3 with DTN (Delay-Tolerant Networking) extensions → to simulate partitions and reintegration.&lt;br /&gt;
Cooja Simulator (in Contiki-NG) → deploy constrained IoBT nodes with blockchain overlays.&lt;br /&gt;
&lt;br /&gt;
Validation Tools:&lt;br /&gt;
Wireshark for protocol analysis,&lt;br /&gt;
Log comparison for tampering detection.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Secure_Key_Management_for_Partitioned_IoBT_Environments&amp;diff=5513</id>
		<title>Secure Key Management for Partitioned IoBT Environments</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Secure_Key_Management_for_Partitioned_IoBT_Environments&amp;diff=5513"/>
		<updated>2025-09-23T13:55:42Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Design a decentralized and lightweight key management scheme that ensures secure communication even under network partitions. |References=A R...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Design a decentralized and lightweight key management scheme that ensures secure communication even under network partitions.&lt;br /&gt;
|References=A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions. https://www.mdpi.com/1424-8220/25/6/1649&lt;br /&gt;
&lt;br /&gt;
Authentication in Internet of Things, Protocols, Attacks, and Open Issues: A Systematic Literature Review. https://link.springer.com/article/10.1007/s10207-023-00806-8 &lt;br /&gt;
|Supervisor=Edison Pignaton de Freitas&lt;br /&gt;
|Level=Master&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Problem:&lt;br /&gt;
IoBT nodes often lose connectivity with centralized Public Key Infrastructure (PKI), leaving them vulnerable to key compromise, replay attacks, and confidentiality breaches when operating offline.&lt;br /&gt;
&lt;br /&gt;
Goal:&lt;br /&gt;
Design a decentralized and lightweight key management scheme that ensures secure communication even under network partitions.&lt;br /&gt;
&lt;br /&gt;
Proposed Solution &amp;amp; Tasks:&lt;br /&gt;
Implement a RAM-only key storage system for tactical nodes (keys vanish if devices are captured).&lt;br /&gt;
Develop a peer-to-peer ephemeral certificate exchange system based on self-issued credentials.&lt;br /&gt;
Integrate elliptic-curve lightweight cryptography (e.g., Curve25519, ChaCha20) for constrained devices.&lt;br /&gt;
Simulate adversarial scenarios such as node capture and network jamming to test resilience.&lt;br /&gt;
&lt;br /&gt;
Evaluation Criteria:&lt;br /&gt;
Key compromise resistance (measured by % of scenarios where captured nodes reveal useful credentials).&lt;br /&gt;
Cryptographic overhead (CPU and memory usage).&lt;br /&gt;
Communication resilience in partitioned networks (latency, delivery ratio).&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
	<entry>
		<id>https://mw.hh.se/caisr/index.php?title=Trajectory_prediction_algorithms_for_intention_sharing_in_Micromobility&amp;diff=5465</id>
		<title>Trajectory prediction algorithms for intention sharing in Micromobility</title>
		<link rel="alternate" type="text/html" href="https://mw.hh.se/caisr/index.php?title=Trajectory_prediction_algorithms_for_intention_sharing_in_Micromobility&amp;diff=5465"/>
		<updated>2024-10-01T12:55:22Z</updated>

		<summary type="html">&lt;p&gt;Cclab: Created page with &amp;quot;{{StudentProjectTemplate |Summary=Self-prediction of trajectories by Vulnerable Road Users to share their intentions with vehicles. |Keywords=Prediction, vehicular networks, V...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StudentProjectTemplate&lt;br /&gt;
|Summary=Self-prediction of trajectories by Vulnerable Road Users to share their intentions with vehicles.&lt;br /&gt;
|Keywords=Prediction, vehicular networks, VRU&lt;br /&gt;
|TimeFrame=Fall 2024 - Spring 2025&lt;br /&gt;
|References=[1] Elfing, Johan, and Joel Pålsson. &amp;quot;V2X Intention Sharing for E-bikes and E-scooters: Design and implementation of a vehicular network protocol for Vulnerable Road Users intention sharing.&amp;quot; (2024).&lt;br /&gt;
[2] Croall, Ruben, and Douglas Jonsson Lundqvist. &amp;quot;Here I go: A prediction model for e-bike and e-scooter positioning inside a CCAM environment.&amp;quot; (2024).&lt;br /&gt;
|Prerequisites=Matlab or Python, ML-methods, polynomial fitting, programming for embedded systems.&lt;br /&gt;
|Supervisor=Elena Haller, Amira Soliman, Oscar Amador Molina&lt;br /&gt;
|Level=Flexible&lt;br /&gt;
|Status=Open&lt;br /&gt;
}}&lt;br /&gt;
Vehicle-to-everything (V2X) describes wireless communication between a vehicle and any entity that may affect or may be affected by, the vehicle. &amp;quot;Here I go&amp;quot; project aims to connect vulnerable road users (VRUs) to V2X services by making them active participants of Future Transport System. This bachelor thesis will be focused on refining prediction algorithms of VRUs future states in their movement trajectory adopting the pipeline presented in [1,2]. These prediction algorithms should propose the optimal shape and dimensions for the reservation area needed for VRUs on the road. The current implementation uses Least Squares (LS) method and allows for improvements, for example using Deep Neural Networks (DNNs) for timeseries data. The main purpose for this bachelor project would be then to apply various prediction algorithms e.g. weighted LS, Kalman Filter, DNNs (e.g., LSTM and GRU) and choose the optimal one for data available from both simulated scenarios and real-life testing. &lt;br /&gt;
&lt;br /&gt;
This project is more software related and we would use, besides synthetic data, our own gathered data and data from publicly-available datasets.&lt;/div&gt;</summary>
		<author><name>Cclab</name></author>
	</entry>
</feed>