86 research outputs found

    Enabling 5G Edge Native Applications

    Get PDF

    Third CLIPS Conference Proceedings, volume 1

    Get PDF
    Expert systems are computed programs which emulate human expertise in well defined problem domains. The potential payoff from expert systems is high: valuable expertise can be captured and preserved, repetitive and/or mundane tasks requiring human expertise can be automated, and uniformity can be applied in decision making processes. The C Language Integrated Production Systems (CLIPS) is an expert system building tool, developed at the Johnson Space Center, which provides a complete environment for the development and delivery of rule and/or object based expert systems. CLIPS was specifically designed to provide a low cost option for developing and deploying expert system applications across a wide range of hardware platforms. The development of CLIPS has helped to improve the ability to deliver expert systems technology throughout the public and private sectors for a wide range of applications and diverse computing environments

    Edge Computing for Internet of Things

    Get PDF
    The Internet-of-Things is becoming an established technology, with devices being deployed in homes, workplaces, and public areas at an increasingly rapid rate. IoT devices are the core technology of smart-homes, smart-cities, intelligent transport systems, and promise to optimise travel, reduce energy usage and improve quality of life. With the IoT prevalence, the problem of how to manage the vast volumes of data, wide variety and type of data generated, and erratic generation patterns is becoming increasingly clear and challenging. This Special Issue focuses on solving this problem through the use of edge computing. Edge computing offers a solution to managing IoT data through the processing of IoT data close to the location where the data is being generated. Edge computing allows computation to be performed locally, thus reducing the volume of data that needs to be transmitted to remote data centres and Cloud storage. It also allows decisions to be made locally without having to wait for Cloud servers to respond

    5G Network Slicing using SDN and NFV: A Survey of Taxonomy, Architectures and Future Challenges

    Get PDF
    In this paper, we provide a comprehensive review and updated solutions related to 5G network slicing using SDN and NFV. Firstly, we present 5G service quality and business requirements followed by a description of 5G network softwarization and slicing paradigms including essential concepts, history and different use cases. Secondly, we provide a tutorial of 5G network slicing technology enablers including SDN, NFV, MEC, cloud/Fog computing, network hypervisors, virtual machines & containers. Thidly, we comprehensively survey different industrial initiatives and projects that are pushing forward the adoption of SDN and NFV in accelerating 5G network slicing. A comparison of various 5G architectural approaches in terms of practical implementations, technology adoptions and deployment strategies is presented. Moreover, we provide a discussion on various open source orchestrators and proof of concepts representing industrial contribution. The work also investigates the standardization efforts in 5G networks regarding network slicing and softwarization. Additionally, the article presents the management and orchestration of network slices in a single domain followed by a comprehensive survey of management and orchestration approaches in 5G network slicing across multiple domains while supporting multiple tenants. Furthermore, we highlight the future challenges and research directions regarding network softwarization and slicing using SDN and NFV in 5G networks.Comment: 40 Pages, 22 figures, published in computer networks (Open Access

    Multi-Agent Systems for Transportation Planning and Coordination

    Get PDF
    Many transportation problems are in fact coordination problems: problems that require communication, coordination and negotiation to be optimally solved. However, most software systems targeted at transportation have never approached it this way, and have instead concentrated on centralised optimisation. Multi-agent systems (MAS) are a different approach to building software systems. Such systems are assembled from autonomously interacting agents; agents are small software programs, which have some type of intelligence and individual behaviour. Communication and coordination (between agents) are the essential elements in the construction of MAS. The transportation domain is often referred to as a potential candidate for the application of MAS. In this dissertation, we discuss two MAS design cases related to the transport of containers. Both cases resulted in concrete prototypes, which let us evaluate a series of aspects important in applying MAS in transportation. We demonstrate the importance of a multi-method validation and evaluation approach. The prototypes were furthermore utilised as artefacts to discuss eventual implementation with future users and experts. One of our most important observations is that planning, as a function within supply chains, is about to go through a fundamental change. Like the mobile phone changed the way people coordinate in daily life, the concepts discussed in this dissertation have the potential to fundamentally change coordination in supply chains. As part of this fundamental change, a different perspective on certainty and uncertainty is essential

    Architecture design for disaster resilient management network using D2D technology

    Get PDF
    Huge damages from natural disasters, such as earthquakes, floods, landslide, tsunamis, have been reported in recent years, claiming many lives, rendering millions homeless and causing huge financial losses worldwide. The lack of effective communication between the public rescue/safety agencies, rescue teams, first responders and trapped survivors/victims makes the situation even worse. Factors like dysfunctional communication networks, limited communications capacity, limited resources/services, data transformation and effective evaluation, energy, and power deficiency cause unnecessary hindrance in rescue and recovery services during a disaster. The new wireless communication technologies are needed to enhance life-saving capabilities and rescue services. In general, in order to improve societal resilience towards natural catastrophes and develop effective communication infrastructure, innovative approaches need to be initiated to provide improved quality, better connectivity in the events of natural and human disasters. In this thesis, a disaster resilient network architecture is proposed and analysed using multi-hop communications, clustering, energy harvesting, throughput optimization, reliability enhancement, adaptive selection, and low latency communications. It also examines the importance of mode selection, power management, frequency and time resource allocation to realize the promises of Long-term Evolution (LTE) Device to Device (D2D) communication. In particular, to support resilient and energy efficient communication in disaster-affected areas. This research is examined by thorough and vigorous simulations and validated through mathematical modelling. Overall, the impact of this research is twofold: i) it provides new technologies for effective inter- and intra-agency coordination system during a disaster event by establishing a stronger and resilient communication; and ii) It offers a potential solution for stakeholders such as governments, rescue teams, and general public with new informed information on how to establish effective policies to cope with challenges before, during and after the disaster events

    Research into software executives for space operations support

    Get PDF
    Research concepts pertaining to a software (workstation) executive which will support a distributed processing command and control system characterized by high-performance graphics workstations used as computing nodes are presented. Although a workstation-based distributed processing environment offers many advantages, it also introduces a number of new concerns. In order to solve these problems, allow the environment to function as an integrated system, and present a functional development environment to application programmers, it is necessary to develop an additional layer of software. This 'executive' software integrates the system, provides real-time capabilities, and provides the tools necessary to support the application requirements

    Towards Scalable Design of Future Wireless Networks

    Full text link
    Wireless operators face an ever-growing challenge to meet the throughput and processing requirements of billions of devices that are getting connected. In current wireless networks, such as LTE and WiFi, these requirements are addressed by provisioning more resources: spectrum, transmitters, and baseband processors. However, this simple add-on approach to scale system performance is expensive and often results in resource underutilization. What are, then, the ways to efficiently scale the throughput and operational efficiency of these wireless networks? To answer this question, this thesis explores several potential designs: utilizing unlicensed spectrum to augment the bandwidth of a licensed network; coordinating transmitters to increase system throughput; and finally, centralizing wireless processing to reduce computing costs. First, we propose a solution that allows LTE, a licensed wireless standard, to co-exist with WiFi in the unlicensed spectrum. The proposed solution bridges the incompatibility between the fixed access of LTE, and the random access of WiFi, through channel reservation. It achieves a fair LTE-WiFi co-existence despite the transmission gaps and unequal frame durations. Second, we consider a system where different MIMO transmitters coordinate to transmit data of multiple users. We present an adaptive design of the channel feedback protocol that mitigates interference resulting from the imperfect channel information. Finally, we consider a Cloud-RAN architecture where a datacenter or a cloud resource processes wireless frames. We introduce a tree-based design for real-time transport of baseband samples and provide its end-to-end schedulability and capacity analysis. We also present a processing framework that combines real-time scheduling with fine-grained parallelism. The framework reduces processing times by migrating parallelizable tasks to idle compute resources, and thus, decreases the processing deadline-misses at no additional cost. We implement and evaluate the above solutions using software-radio platforms and off-the-shelf radios, and confirm their applicability in real-world settings.PhDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/133358/1/gkchai_1.pd

    Security of Smartphones at the Dawn of their Ubiquitousness

    Full text link
    The importance of researching in the field of smartphone security is substantiated in the increasing number of smartphones, which are expected to outnumber common computers in the future. Despite their increasing importance, it is unclear today if mobile malware will play the same role for mobile devices as for common computers today. Therefore, this thesis contributes to defining and structuring the field mobile device security with special concern on smartphones and on the operational side of security, i.e., with mobile malware as the main attacker model. Additionally, it wants to give an understanding of the shifting boundaries of the attack surface in this emerging research field. The first three chapters introduce and structure the research field with the main goal of showing what has to be defended against today. Besides introducing related work they structure mobile device attack vectors with regard to mobile malicious software and they structure the topic of mobile malicious software itself with regard to its portability. The technical contributions of this thesis are in Chapters 5 to 8, classified according to the location of the investigation (on the device, in the network, distributed in device and network). Located in the device is MobileSandbox, a software for dynamic malware analysis. As another device-centric contribution we investigate on the efforts that have to be taken to develop an autonomously spreading smartphone worm. The results of these investigations are used to show that device-centric parts are necessary for smartphone security. Additionally, we propose a novel device-centric security mechanism that aims at reducing the attack surface of mobile devices to mobile malware. The network-centric investigations show the possibilities that a mobile network operator can use in its own mobile network for protecting the mobile devices of its clients. We simulate the effectiveness of different security mechanisms. Finally, the distributed investigations show the feasibility of distributed computation algorithms with security modules. We give prototypic implementations of protocols for secure multiparty computation as a modularized version with failure detector and consensus algorithms, and for fair exchange with guardian angels

    A new vision of software defined radio: from academic experimentation to industrial explotation

    Get PDF
    The broad objective of this study is to examine the role of Software Defined Radio in an industrial field. Basically examines the changes that have to be done to achieve moving this technology in a commercial domain. It is important to predict the impacts of the introduction of Software Defined Radio in the telecommunications industry because it is a real future that is coming. The project starts with the evolution of mobile telecommunications systems through the history. Following this, Software Defined Radio is defined and its main features are commented such as its architecture. Moreover, it wants to predict the changes that the telecommunications industry will might suffer with the introduction of SDR and some future structural and organizational variations are suggested. Additionally, it is discussed the positive and negative aspects of the introduction of SDR in the commercial domain from different points of view and finally, the future SDR mobile phone is described with its possible hardware and software.Outgoin
    • …
    corecore