Ulf Jennehag

ORCID: 0000-0002-5999-5976
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Coding and Compression Technologies
  • IoT and Edge/Fog Computing
  • Image and Video Quality Assessment
  • Energy Efficient Wireless Sensor Networks
  • Advanced Vision and Imaging
  • IoT Networks and Protocols
  • Multimedia Communication and Technology
  • Context-Aware Activity Recognition Systems
  • Advanced Image Processing Techniques
  • Advanced Data Compression Techniques
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Cryptography and Data Security
  • Peer-to-Peer Network Technologies
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Air Quality Monitoring and Forecasting
  • Cryptographic Implementations and Security
  • Energy Harvesting in Wireless Networks
  • Advanced Wireless Network Optimization
  • Water Quality Monitoring Technologies
  • Wireless Networks and Protocols
  • Wireless Body Area Networks
  • Biometric Identification and Security
  • Sensor Technology and Measurement Systems

RISE Research Institutes of Sweden
2021-2022

Mid Sweden University
2008-2020

Informa (Sweden)
2019

University of Connecticut
2018

University of Brescia
2018

Wayne State University
2018

Fraunhofer Institute for Integrated Circuits
2009-2011

Internet of Things (IoT) is an emerging domain that promises ubiquitous connection to the Internet, turning common objects into connected devices. The IoT paradigm changing way people interact with things around them. It paves for creating pervasively infrastructures support innovative services and better flexibility efficiency. Such advantages are attractive not only consumer applications, but also industrial domain. Over last few years, we have been witnessing making its industry...

10.1109/tii.2018.2852491 article EN IEEE Transactions on Industrial Informatics 2018-07-02

One of the light field capturing techniques is focused plenoptic capturing. By placing a microlens array in front photosensor, cameras capture both spatial and angular information scene each image across images. The results significant amount redundant information, captured usually large resolution. A coding scheme that removes redundancy before can be advantage for efficient compression, transmission, rendering. In this paper, we propose lossy to efficiently represent format contains sparse...

10.1109/tip.2015.2498406 article EN IEEE Transactions on Image Processing 2015-11-05

A light field is commonly described by a two-plane representation with four dimensions. Refocused 3D contents can be rendered from images. method for capturing these images using cameras microlens arrays. dense sampling of the results in large amounts redundant data. Therefore, an efficient compression vital practical use In this paper, we propose displacement intra prediction scheme maximum two hypotheses plenoptic focused cameras. The proposed further implemented into High Efficiency Video...

10.1109/tcsvt.2015.2450333 article EN IEEE Transactions on Circuits and Systems for Video Technology 2015-07-21

Digitalization is a global trend becoming ever more important to our connected and sustainable society. This also affects industry where the Industrial Internet of Things an part, there need conserve spectrum as well energy when communicating data fog or cloud back-end system. In this paper we investigate benefits computing by proposing novel distributed learning model on sensor device simulating stream in fog, instead transmitting all raw values back-end. To save communicate few packets...

10.3390/s18051532 article EN cc-by Sensors 2018-05-12

Interactive photo-realistic graphics can be rendered by using light field datasets. One way of capturing the dataset is cameras with microlens arrays. The captured images contain repetitive patterns resulted from adjacent mi-crolenses. These don't resemble appearance a natural scene. This dissimilarity leads to problems in image compression traditional and video encoders, which are optimized for sequences. In this paper, we introduce full inter-prediction scheme HEVC into intra-prediction...

10.1109/icassp.2014.6853654 article EN 2014-05-01

The Internet of Things is predicted to consist over 50 billion devices aiming solve problems in most areas our digital society. A large part the data communicated expected various multimedia contents, such as live audio and video. This article presents a solution for communication high definition video low-delay scenarios (<200 ms) under constraints with limited hardware resources, Raspberry Pi. We verify that it possible enable low delay streaming between Pi using distributed system...

10.3390/electronics5030060 article EN Electronics 2016-09-20

The expected monetary costs and response time performance is important information to know before deploying an industrial Internet-of-Things system. system investigated in this paper built up by combining the Open Plant Communication Universal Architecture Microsoft Azure Hub. We consider a real life scenario that remotely monitors piece of equipment consisting 1500 sensors, which 600 update their values every second. measured results show times for fiber based Internet connection was on...

10.1109/giots.2017.8016265 article EN 2017-06-01

We see a shift from todays Internet-of-Things(IoT) to include more industrial equipment and metrology systems, forming the Industrial Internet of Things (IIoT). However, this leads many concerns related confidentiality, integrity, availability, privacy non-repudiation. Hence, there is need secure IIoT in order cater for future with smart grids, metering, factories, cities, manufacturing. It therefore important research technologies create chaos, especially when it comes securing...

10.1109/metroi4.2018.8428344 article EN 2018-04-01

As the market for low-power wide-area network (LPWAN) technologies expands and number of connected devices increases, it is becoming important to investigate performance LPWAN candidate in dense deployment scenarios. In deployments, where networks usually exhibit traits an interference-limited system, a detailed intra- inter-cell interference analysis LPWANs required. this paper, we model analyze uplink communication LoRa link multi-cell system. To such end, use mathematical tools from...

10.1109/wimob.2018.8589100 article EN 2018-10-01

In this paper, a novel proposal regarding the transmission of next generation live-TV content in an IPTV environment is presented. Today IP systems utilizes Group Of Pictures (GOP) structure order to provide stream synchronization points for clients. Synchronization are used when TV-channel switch occurs. The number channel switches made by TV audiences have been shown be rather rare. It therefore redundant send events GOP manner. Our proposal, Frames Channel Switching (SFCS), only requests...

10.1109/tbc.2006.887167 article EN IEEE Transactions on Broadcasting 2007-03-01

The adoption of cloud and fog computing techniques for elastic provisioning quality-constrained industrial Internet Things (IoT) services is largely envisioned as very promising, but experience reports lessons learned from real deployment still lack. To fill this gap, paper presents the evaluation a system consisting virtual in combined fog, cloud, IoT setting, made up multiple devices with varying computation capabilities. In particular, we have utilized integrated off-the-shelf solutions...

10.1109/mobilecloud.2018.00011 article EN 2018-03-01

Traditionally, group of pictures (GOP) is used to solve IPTV channel tune-in issues. However, changes issued by a TV viewer are quite rare which indicates it redundant with GOP. In this paper we extend our earlier work on synchronization frames for switching (SFCS) reducing bandwidth utilization in networks include encoding/decoding standards not supporting Sl/SP-frames. We propose modifications SFCS MPEG-2. Channel quality and stream generation also addressed. provide estimation expressions...

10.1109/ccnc08.2007.147 article EN 2008-01-01

The distortion by using traditional video encoders (e.g. H.264) on the depth discontinuity can introduce disturbing effects synthesized view. proposed scheme aims at preserving most significant transition for a better view synthesis. Furthermore, it has scalable structure. extracts edge contours from image and represents them chain code. code sampled values each side of contour are encoded differential arithmetic coding. is reconstructed diffusion samples uniform sub-samples low quality...

10.1109/3dtv.2012.6365469 article EN 2012-10-01

In this paper we present a novel idea regarding transmission of next generation IPTV content. Today systems utilize GOP structure to provide stream synchronization points for the clients, these are used when channel switch occur. Since switches made by TV audiences quite rare it is redundant send opportunities in manner. The proposed design, frames switching (SFCS), only requests needed. We network traffic analysis model and compare with simulations. SFCS increases bandwidth utilization...

10.1109/icip.2004.1421493 article EN 2005-04-19

Many applications for machine-to-machine (M2M) communications are characterized by large numbers of devices with sporadic transmissions and subjected to low energy budgets. This work addresses the importance consumption proposing a new Medium Access Control (MAC) mechanism improving efficiency IEEE 802.11ah, standard targeting M2M communication. We propose use features 802.11ah MAC realize hybrid contention-reservation transmission uplink traffic. In proposed mechanism, any device buffered...

10.1109/icit.2017.7915550 article EN 2022 IEEE International Conference on Industrial Technology (ICIT) 2017-03-01

In the context of Internet Things (IoT), group communication is an efficient and fast way broadcasting messages. The message needs to be sent securely maintain confidentiality data privacy users. Establishing cryptographically secure links between a transceivers requires pre-agreement upon some key, unknown external attacker. Complex resource-intensive security schemes are infeasible for devices with limited computational capabilities. this paper, we implement lightweight computationally key...

10.1109/iotsms.2018.8554829 article EN 2018-10-01

In this paper we present an overview of the various proximity based authentication mechanisms that can be used in Industrial Internet Things (IIoT). We seek to identify and highlight from a holistic point view which enable for Things. addition, upcoming are most important proliferation Things, major obstacles remain unsolved with regard authentication. answering this, seven (i.e. wire, radio, acoustics, light, image, gesture biometrics) discuss each mechanism perspective their vulnerability...

10.1109/iecon.2018.8591118 article EN IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society 2018-10-01

Group communication in the context of Internet Things (IoT) is an efficient and fast way broadcasting group messages. A message needs to be sent securely maintain confidentiality data privacy users. The main challenges sharing keys consist designing implementing a key establishment scheme that feasible for devices with limited computational capabilities. Existing schemes do not offer good solution resource-constrained IoT devices, provides secure management procedures when new nodes join or...

10.1109/isncc.2018.8531034 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2018-06-01

Many small and medium enterprises have existing products that they want to innovate on move into the new era of Internet Things. Because this, we developed a plain Things platform aimed towards businesses who wants try out these systems but does not resources develop or maintain full from traditional providers. We an open source solution can be run cheap off shelf hardware employs today's de facto standards for systems. Our also provides adequate functionality initial effort innovation,...

10.1109/metroind4.0iot48571.2020.9138303 article EN 2020-06-01

Secure group communication in the Internet of Things (IoT) requires establishment and management one or more keys to provide security services such as confidentiality messages. One main challenges ensuring secure IoT is designing a key scheme that feasible for nodes with limited computational capabilities. In this paper, we propose lightweight based on fast symmetric-key encryption. We show mechanism whose underpinned by perfect secrecy provided Time Pad. then argue convenient applications...

10.1109/mobilecloud.2019.00021 article EN 2019-04-01

Research and industry invest time resources in producing Internet of Things-based services, the concept Things platforms is climbing hype cycle for emerging technologies. Consequently, there a vast number enabling technologies, making it difficult to find most suitable platform. The aim goal this article list identify currently available communication Things. In work we surveyed area found over 128 different data between things out which 42 fulfilled our listed basic requirements being an IoT

10.1109/giots.2018.8534556 article EN 2018-06-01
Coming Soon ...