Publikationer från KTH
Not a member yet
    57969 research outputs found

    Applying a conflict typology to ecologies of intermediation: the case of a transitions intermediary in Spain

    No full text
    Within ecologies of intermediation, multiple intermediaries and their initiatives operate with overlapping remits and associated conflicts. To understand these, we propose a typology of conflict sources, applying this to the case of a university-based sustainability intermediary in Spain (itdUPM). itdUPM acts as an umbrella organisation for initiatives that connect stakeholders in pursuit of sustainability objectives. Analysing the case with its embedded sub-units, we distinguish between: (1) value conflicts connected to actors’ identities and ideologies; (2) socio-cognitive conflicts related to the need to hold consistent and socially validated cognitions; (3) conflicts of interests, which emerge when actors’ interests in terms of resource allocation, including power, are misaligned. We highlight the importance of a nuanced understanding of conflict types as part of intermediation processes, including those arising from the dynamic interactions between specific intermediation initiatives and their broader contexts. We also propose conflict management strategies to assist in this in practice.QC 20251124</p

    Foundations of Computation Via Digital Communications

    No full text
    The explosive growth of distributed data generation — spanning data centers, sensor networks, massive IoT, and edge learning places an unsustainable burden on modern infrastructure, where the energy and latency costs of moving raw data often outstrip those of processing it. While analog over-the-air computation (OAC) promises a solution by exploiting the natural superposition of wireless waveforms to aggregate data in-channel, it remains fragile against noise and fundamentally incompatible with the ubiquitous digital hardware that powers all modern communication systems. This thesis introduces a digital-native framework that unifies communication and computation at the physical layer. Rather than treating channel interference as an obstacle, we engineer the geometry of digital constellations so that the superposition of signals directly yields the desired function value. This paradigm shift transforms the communication link from a passive data pipe into an active computational engine, applicable to any multiple-access channel—whether wired or wireless—without requiring the decoding of individual inputs. We generalize this framework along three axes to ensure scalability and reliability across diverse network environments. First, we develop noise-aware constellation designs that optimize inter-symbol geometry for non-Gaussian and heavy-tailed interference, ensuring robustness beyond standard Euclidean metrics. Second, we introduce a sampling-based reduction strategy that leverages the symmetry of aggregation functions to cut design complexity by orders of magnitude, enabling deployment in massive-scale networks. Third, we extend the framework to vector-valued computation, utilizing spatial degrees of freedom to perform complex, multi-dimensional aggregations in a single transmission shot without relying on perfect channel state information. Finally, to bridge the gap to immediate deployment, we present a closed-form algebraic coding scheme for exact summation. The proposed solution integrates seamlessly with standard quadrature amplitude modulation, eliminating the need for complex optimization and offering a plug-and-play solution for digital aggregation. We validate these contributions through the lens of Federated Edge Learning, demonstrating that computation-by-communication is not only feasible using standard digital protocols but significantly outperforms traditional orthogonal transmission. Collectively, these works prove that computation-by-communication is not only feasible on digitally modulated signals but superior to analog alternatives, paving the way for the next generation of compute-aware networks, enabling energy efficient, scalable, and robust intelligence across any digital infrastructure.QC 20251127</p

    Developing and validating domain specific languages for cyberattack modeling and simulations

    No full text
    This thesis explores the potential of domain-specific languages (DSLs) to enhance the accuracy, efficiency, and expressiveness of cyberattack modeling and simulation. Motivated by the increasing sophistication of cyber threats, this work addresses the limitations of traditional modeling approaches by developing and validating two novel DSLs: one tailored for vehicular systems and another for the Information and Communications Technology (ICT) domain. These languages provide specialized vocabulary and syntax for describing attack patterns, system behaviors, and defense mechanisms concisely and straightforwardly. Through a series of experiments and case studies, this research demonstrates the effectiveness of these DSLs in capturing the complexities of real-world cyberattacks. These languages enable the automatic generation of attack graphs from system architecture models, streamlining threat identification and enhancing the alignment of security measures with established frameworks for cybersecurity professionals. This thesis contributes to the advancement of cyberattack modeling and simulation techniques, providing cybersecurity professionals with tools to express, analyze, and predict the behavior of cyberattacks.Denna avhandling undersöker potentialen hos domänspecifika språk (DSL) för att förbättra noggrannheten, effektiviteten och uttrycksfullheten i modellering och simulering av cyberattacker. Motiverad av den ökande sofistikeringen av cyberhot, adresserar detta arbete begränsningarna hos traditionella modelleringsmetoder genom att utveckla och validera två nya DSL:er: en skräddarsydd för fordonsystem och en annan för IKT-domänen. Dessa språk tillhandahåller specialiserad vokabulär och syntax för att beskriva attackmönster, systembeteenden och försvarsmekanismer på ett koncist och tydligt sätt. Genom en serie experiment och fallstudier visar denna forskning effektiviteten hos dessa DSL:er för att fånga komplexiteten i verkliga cyberattacker. Dessa språk möjliggör automatisk generering av attackgrafer från systemarkitekturmodeller, vilket effektiviserar hotidentifiering och förbättrar anpassningen av säkerhetsåtgärder till etablerade ramverk för cybersäkerhets-experter. Denna avhandling bidrar till utvecklingen av tekniker för modellering och simulering av cyberattacker, vilket ger cybersäkerhetsexperter verktyg för att uttrycka, analysera och förutsäga beteendet hos cyberattacker.QC 20251217</p

    Cutting peaks and costs : Techno-economic design guidelines for solar PVT and GSHP in land-constrained multi-family buildings

    No full text
    This study conducts a detailed techno-economic analysis of photovoltaic-thermal (PVT) collectors integrated with ground-source heat pumps (GSHPs) for land-constrained multi-family buildings in cold climates. Using dynamic TRNSYS simulations, the system is designed around an undersized borehole field and incorporates realistic electricity pricing models, including dynamic spot prices and capacity-based tariffs, and peak demand considerations. A stepwise analysis evaluates five PVT absorber types, array sizes, layouts, and control strategies. The most cost-effective design combines 60 m2 of unglazed finned collectors, pre-borehole layout, and 80 l/h-m2 fixed flow, achieving a seasonal performance factor above 2.7 and a minimum total life-cycle cost (TLCC) of €451 k€. Among all design variables, array size has the greatest impact on system performance and cost, with flow rate being the next most critical factor. Relative to a stand-alone GSHP, the hybrid system lowers peak electric load by 10 % and reduces total life-cycle cost by 4–23 % when benchmarked against alternative heating configurations including district heating, air-source heat pump, and PV-assisted GSHP. Scenario analyses show that electricity pricing structure and volatility significantly influence optimal collector sizing, with higher electricity prices favoring larger PVT array sizes. The results provide actionable design guidelines for researchers and practitioners seeking to improve performance and cost-effectiveness of heat pump systems, and to support their broader deployment in space- and grid-constrained urban environments.QC 20251217</p

    Estimating Street-Level Green View Index Using Satellite Remote Sensing and Explainable Machine Learning

    No full text
    Street-level greenery assessment through the Green View Index (GVI) is essential for transportation planning and sustainable urban development. However, current GVI estimation methods rely heavily on street-view imagery, facing significant scalability challenges including high data acquisition costs, inconsistent temporal coverage, and limited cross-regional comparability. This study proposes an explainable machine learning framework for GVI estimation using ubiquitous satellite remote sensing data from Sentinel-2A imagery. Eight complementary spectral indices were systematically evaluated: enhanced vegetation indices, spectral variation indices, and urban context indices. Multiple spatial buffer configurations (200m to 1000m) and input strategies were tested, including mean-value aggregation and raster input for CNN models. The methodology was validated using over 6,300 samples from Helsinki (Finland), with comprehensive comparisons across traditional machine learning models and deep learning architectures.The optimized XGBoost model with 1000m buffer achieved R2 = 0.67 and MSE = 0.022, improved approximately 20% over baseline approaches using only NDVI and RGB bands. SHAP (SHapley Additive exPlanations) analysis revealed spatial scale-dependent feature importance patterns, with Urban Index (UI) consistently ranking highest across all scales, while NDVI showed lower importance at larger buffer sizes. Alternative spatial modeling approaches (CNN) underperformed compared to mean-value aggregation methods, suggesting that statistical aggregation may be more robust for GVI predictions. The framework eliminates dependency on street-view imagery while maintaining competitive accuracy, offering a scalable solution for large-scale green infrastructure assessment. The explainable AI approach provides interpretable insights into environmental factors influencing street-level green perception, supporting evidence-based decision-making in transportation planning and active transportation network development

    Modeling and Simulating Cyberattacks with Dynamic Graphs : With applications to cloud security assessments

    No full text
    This dissertation presents a formalism for exploring two fundamental, yet underrepresented, cyberattack dynamics. Namely, how adversary actions drive the emergence of cyberattacks and how adversaries manipulate dynamic system structures, such as by creating and destroying objects. The formalism in question is encapsulated in the Dynamic Meta Attack Language (DynaMAL), a meta-level formalism for modeling and simulating cyberattacks with dynamic graphs. DynaMAL has been designed and developed in accordance with the design science research framework across four studies. The first study introduces an attack graph construction language for assessing cloud architectures and identifies the central problem of representing attacks in which adversaries manipulate dynamic system structures. The second study is a systematic literature review of cyberattack simulations that identifies key simulation concepts used in later stages of the design process. Building on the two initial studies, the third study establishes the cyberattack modeling foundations of DynaMAL, comprising a dynamic graph system, a multi-layered graph model, a lazy graph generation strategy, and the DynaMAL grammar. Finally, the fourth study develops the corresponding discrete-event simulation process for DynaMAL. The resulting capabilities are evaluated through a first simulation experiment that uses three cloud penetration testing scenarios that rely on dynamically creating and destroying resources. The scenarios are then solved automatically with near-optimal results by combining two search and optimization algorithms.I den här avhandlingen presenteras en formalism för att utforska två fundamentala men underrepresenterade cyberattackdynamiker. Dessa är hur antagonisters handlingar driver fram cyberattacker och hur antagonister manipulerar dynamiska systemstrukturer, till exempel genom att skapa och förstöra resurser. Formalismen i fråga är inkapslad i ett Dynamic Meta Attack Language (DynaMAL), en formalism på metanivå för att modellera och simulera cyberattacker med dynamiska grafer. DynaMAL:s design och utveckling fortlöper genom fyra studier utförda i enlighet med designforskningsramverket. Den första studien bidrar med ett attackgrafkonstruktionsspråk för att utvärdera molnarkitekturer, vilket utvecklar problematiken med att representera när antagonister manipulerar dynamiska systemstrukturer. Den andra studien är en systematisk litteraturstudie som granskar cyberattacksimuleringsforskning och uppdagar flertalet nyckelkoncept som understödjer de senare designaktiviterna. I den påföljande tredje studien etableras ett fundament för cyberattackmodellering innefattandes ett dynamiskt grafsystem, en lagerbaserad grafmodell, en lat grafgenereringsstrategi och DynaMAL-grammatiken. Den fjärde studien färdigställer DynaMAL-formalismen genom att implementera en motsvarande diskret händelsestyrd simuleringsprocess. De resulterande förmågorna utvärderas via ett första simuleringsexperiment, varvid tre molnpenetrationstestningsscenarion som krävde att resurser dynamiskt skapades eller förstördes används. Scenariona löses sedan automatiskt med nära inpå optimala resultat genom att kombinera två sök- och optimeringsalgoritmer.QC 20251219</p

    Circular economy in the extractive frontier: Tensions and pathways for transformative change in mining

    No full text
    The mining sector, like other sectors of the economy, is under increasing pressure to adopt circular economy (CE) principles across its value chains and core operations. This paper offers a critical and conceptually grounded contribution to understanding how CE can support systemic transformation in one of the most resource-intensive and path-dependent sectors of the global economy. It examines the structural and institutional conditions that shape the adoption of CE in mining and identifies key tensions that constrain or enable transformative change. In parallel, the paper explores emerging pathways informed by technological innovation, shifts in production routines, and the rise of new circular business models. These insights are synthesised into a multi-level framework that captures the dynamic interactions between micro-, meso-, and macro-level processes shaping CE transitions. In addition to offering a diagnostic perspective, the framework outlines concrete action points for advancing systemic change.QC 20250908</p

    Advancing an already high-performance smart building with model predictive control: Multi-layer optimization under forecast uncertainty in a real building case

    No full text
    Thermal energy systems in buildings play a central role in global decarbonization efforts, accounting for a significant share of energy use and carbon emissions. This study addresses a key research question: how can advanced control strategies further enhance the performance of already energy-efficient, low-exergy thermal systems in low-energy buildings? To address this, a model predictive control (MPC) framework is designed to optimize the operation of an advanced thermal system based on modern concepts of low-temperature heating and high-temperature cooling, including ground-source heat pumps, borehole thermal storage, and modern air handling units. This approach employs a multi-layered MPC cost function, considering both immediate operational costs (electricity and heating) as well as system impact penalties, such as CO₂ emissions, thermal energy storage preservation, comfort violations, and peak load shaving, in response to fluctuating market cost signals, outdoor temperature, and thermal storage limitations. Applied to a validated, ultra-efficient commercial building, the MPC framework achieves a 13 % reduction in annual market-responsive operational costs, a 20 % improvement in long-term savings, and a four-year shorter payback period compared to existing well-established rule-based control. The results further confirm the robustness of predictive control under realistic forecast errors, as demonstrated by Monte Carlo simulations. From an environmental perspective, the CO₂ emission index stays below both Swedish electricity and district heating baselines, demonstrating the environmental benefits of predictive control through strategic sector coupling. Beyond the case study, the proposed method provides a scalable pathway for integrating predictive control into next-generation smart buildings. It highlights the potential of MPC as the final optimization layer in advanced thermal systems, aligning with global objectives for cost-promising and carbon-neutral building operations. QC 20250806</p

    Learning 3D Texture-Aware Representations for Parsing Diverse Human Clothing and Body Parts

    No full text
    Existing methods for human parsing into body parts and clothing often use fixed mask categories with broad labels that obscure fine-grained clothing types. Recent open-vocabulary segmentation approaches leverage pretrained text-to-image (T2I) diffusion model features for strong zero-shot transfer, but typically group entire humans into a single person category, failing to distinguish diverse clothing or detailed body parts. To address this, we propose Spectrum, a unified network for part-level pixel parsing (body parts and clothing) and instance-level grouping. While diffusion-based open-vocabulary models generalize well across tasks, their internal representations are not specialized for detailed human parsing. We observe that, unlike diffusion models with broad representations, image-driven 3D texture generators maintain faithful correspondence to input images, enabling stronger representations for parsing diverse clothing and body parts. Spectrum introduces a novel repurposing of an Image-to-Texture (I2Tx) diffusion model—obtained by fine-tuning a T2I model on 3D human texture maps—for improved alignment with body parts and clothing. From an input image, we extract human-part internal features via the I2Tx diffusion model and generate semantically valid masks aligned to diverse clothing categories through prompt-guided grounding. Once trained, Spectrum produces semantic segmentation maps for every visible body part and clothing category, ignoring standalone garments or irrelevant objects, for any number of humans in the scene. We conduct extensive cross-dataset experiments—separately assessing body parts, clothing parts, unseen clothing categories, and full-body masks—and demonstrate that Spectrum consistently outperforms baseline methods in prompt-based segmentation.QC 20251219</p

    Carbon trapping at the solid–liquid interface in cemented carbides

    No full text
    Inter-diffusion between the hard ceramic and ductile metallic phases in composite materials such as cemented carbides governs their mechanical properties. Understanding atomic-scale diffusion at these interfaces is key to uncovering the mechanisms that dictate microstructure evolution, establishing a foundation for tailoring the properties of WC Co composites through precise interfacial control. The interface between tungsten carbide (WC) and liquid cobalt (Co) is investigated using molecular dynamics simulations. An integrated approach is presented for computing the solid–liquid interfacial free energy by combining computer vision aided interface detection with the Capillary fluctuation method. Significant inter-diffusion is observed, with atomic displacements primarily localized at the interface for W and C, while Co exhibits homogeneous behavior in the liquid phase. The formation of C C bonded structures at the interface is identified as a critical factor influencing diffusion, introducing localized structural rigidity that reduces atomic mobility. Additionally, premelting phenomena below bulk melting temperatures gives rise to a heterogeneous interfacial zone containing residual solid WC patches and molten W-Co alloy. The inter-diffusion coefficients for W, C, and Co compare well with prior computational and experimental studies, validating the methodology. These findings offer new insights into the atomic-scale mechanisms driving interface evolution and provide a foundation for tailoring the properties of WC Co composites through precise interfacial control.QC 20251215</p

    0

    full texts

    57,969

    metadata records
    Updated in last 30 days.
    Publikationer från KTH is based in Sweden
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇