22 research outputs found

    Building Evacuation with Mobile Devices

    Get PDF
    In der Dissertation wird ein Konzept für ein Gebäudeevakuierungssystem vorgestellt, das es ermöglicht, Personen mit Hilfe mobiler Endgeräte im Evakuierungsfall aus einem Gebäude zu führen. Die Dissertation gliedert sich in drei thematische Bereiche, in denen zunächst ein Konzept für die Systemarchitektur vorgestellt wird und anschließend verschiedene Algorithmen zur Routenplanung sowie zur Lokalisierung der Geräte vorgestellt und evaluiert werden

    Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation Models of Complex Adaptive Systems

    Get PDF
    Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches and applications. However, while cas researchers are inherently interested in an interdisciplinary comparison of models, to the best of our knowledge, there is currently no single unified framework for facilitating the development, comparison, communication and validation of models across different scientific domains. In this thesis, we propose first steps towards such a unified framework using a combination of agent-based and complex network-based modeling approaches and guidelines formulated in the form of a set of four levels of usage, which allow multidisciplinary researchers to adopt a suitable framework level on the basis of available data types, their research study objectives and expected outcomes, thus allowing them to better plan and conduct their respective research case studies. Firstly, the complex network modeling level of the proposed framework entails the development of appropriate complex network models for the case where interaction data of cas components is available, with the aim of detecting emergent patterns in the cas under study. The exploratory agent-based modeling level of the proposed framework allows for the development of proof-of-concept models for the cas system, primarily for purposes of exploring feasibility of further research. Descriptive agent-based modeling level of the proposed framework allows for the use of a formal step-by-step approach for developing agent-based models coupled with a quantitative complex network and pseudocode-based specification of the model, which will, in turn, facilitate interdisciplinary cas model comparison and knowledge transfer. Finally, the validated agent-based modeling level of the proposed framework is concerned with the building of in-simulation verification and validation of agent-based models using a proposed Virtual Overlay Multiagent System approach for use in a systematic team-oriented approach to developing models. The proposed framework is evaluated and validated using seven detailed case study examples selected from various scientific domains including ecology, social sciences and a range of complex adaptive communication networks. The successful case studies demonstrate the potential of the framework in appealing to multidisciplinary researchers as a methodological approach to the modeling and simulation of cas by facilitating effective communication and knowledge transfer across scientific disciplines without the requirement of extensive learning curves

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Man as product and producer of vitreous optic: from the mirror phase to the monitor phase, with particular reference to Martin Jay, Bergson, Deleuze and Baudrillard

    Get PDF
    Drawing an arc from Narcissus’ encounter with his own reflection, tracking through varieties and modalities of glassy surfaces and technologies through history, from the mirror to the lens, microscope and telescope, camera obscura and panopticon, to contemporary techno-cultural phenomena of the ‘digital age’ the concern of this work is to determine how mirrors, lenses, screens and monitors have shaped our social and conceptual modes of existence. The four parts of this dissertation all illustrate how glass technology modalities of vitreous optic has contributed to the development of the various spheres of our life, and vice versa. The general hypothesis shows how intertwined we are with our material production beyond the reductive perspectives of technological determinism and social constructivism; and, more specifically, the thesis argues that the vitreous optics of the contemporary age –the computer game, the smartphone, social media platforms and networks- have profound ramifications that are redefining ‘intelligence’, ‘things’, and ‘technology
    corecore