Bjarne Johansson's research while affiliated with ABB and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (5)
In process automation installations, the I/O systemconnect the field devices to the process controller over a fieldbus, a reliable, realtime capable communication link with signal values cyclical being exchanged with a 10-100 millisecond rate. If a deviation from intended behaviour occurs, analyzing the potentially vast data recordings from the fie...
Citations
... Recently, several studies analyzed the possibilities and limitations of orchestration systems applied to I4.0 [2,6,8]. Proposals have been advanced to support the awareness of real-time requirements, hardware heterogeneity, network latency, and fault-tolerance [9][10][11][12]. ...
... Several changes were introduced in the existing approach, that is, introduction of the bully algorithm [44], which was based on a tree structure and performed the comparison message complexity. Similarly, in [26], an extended form of bully leader selection method was presented in the environment of cloud computing in which the leader node selection was based on a Super Node (SN) [45] improving the leader nomination speed and message complexity was minimized to O(n2/k) to O(n2), in which k was showing the total nodes, while k was presenting the district. ...
... Different strategies for dealing with attacks have been adopted by Johansson et al. [15] and by Hormann and Fischer [13]. While Johansson et al. [15] use Artificial Neural Networks (ANNs) to estimate the type of data that could be transmitted on the network, Hormann and Fischer [13] seek to reduce the error percentage of data classification by sequentially applying two Self-Organizing Maps (SOMs). ...