31 research outputs found
LER-GR: Location Error Resilient Geographical Routing for Vehicular Ad-hoc Networks
The efficiency and scalability of geographical routing depend on the accuracy of location information of vehicles. Each vehicle determines its location using Global Positioning System (GPS) or other positioning systems. Related literature in geographical routing implicitly assumes accurate location information. However, this assumption is unrealistic considering the accuracy limitation of GPS and obstruction of signals by road side environments. The inaccurate location information results in performance degradation of geographical routing protocols in vehicular environments. In this context, this paper proposes a location error resilient geographical routing (LER-GR) protocol. Rayleigh distribution based error calculation technique is utilized for assessing error in the location of neighbouring vehicles. Kalman filter based location prediction and correction technique is developed to predict the location of the neighbouring vehicles. The next forwarding vehicle (NFV) is selected based on the least error in location information. Simulations are carried out to evaluate the performance of LER-GR in realistic environments, considering junction-based as well as real map-based road networks. The comparative performance evaluation attests the location error resilient capability of LER-GR in a vehicular environment
Priority-Based Content Delivery in the Internet of Vehicles through Named Data Networking
Named Data Networking (NDN) has been recently proposed as a prominent solution for content delivery in the Internet of Vehicles (IoV), where cars equipped with a variety of wireless communication technologies exchange information aimed to support safety, traffic efficiency, monitoring and infotainment applications. The main NDN tenets, i.e., name-based communication and in-network caching, perfectly fit the demands of time- and spatially-relevant content requested by vehicles regardless of their provenance. However, existing vehicular NDN solutions have not been targeted to wisely ensure prioritized traffic treatment based on the specific needs of heterogeneous IoV content types. In this work, we propose a holistic NDN solution that, according to the demands of data traffic codified in NDN content names, dynamically shapes the NDN forwarding decisions to ensure the appropriate prioritization. Specifically, our proposal first selects the outgoing interface(s) (i.e., 802.11, LTE) for NDN packets and then properly tunes the timing of the actual transmissions. Simulation results show that the proposed enhancements succeed in achieving differentiated traffic treatment, while keeping traffic load under control
Internet of Underwater Things and Big Marine Data Analytics -- A Comprehensive Survey
The Internet of Underwater Things (IoUT) is an emerging communication
ecosystem developed for connecting underwater objects in maritime and
underwater environments. The IoUT technology is intricately linked with
intelligent boats and ships, smart shores and oceans, automatic marine
transportations, positioning and navigation, underwater exploration, disaster
prediction and prevention, as well as with intelligent monitoring and security.
The IoUT has an influence at various scales ranging from a small scientific
observatory, to a midsized harbor, and to covering global oceanic trade. The
network architecture of IoUT is intrinsically heterogeneous and should be
sufficiently resilient to operate in harsh environments. This creates major
challenges in terms of underwater communications, whilst relying on limited
energy resources. Additionally, the volume, velocity, and variety of data
produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise
to the concept of Big Marine Data (BMD), which has its own processing
challenges. Hence, conventional data processing techniques will falter, and
bespoke Machine Learning (ML) solutions have to be employed for automatically
learning the specific BMD behavior and features facilitating knowledge
extraction and decision support. The motivation of this paper is to
comprehensively survey the IoUT, BMD, and their synthesis. It also aims for
exploring the nexus of BMD with ML. We set out from underwater data collection
and then discuss the family of IoUT data communication techniques with an
emphasis on the state-of-the-art research challenges. We then review the suite
of ML solutions suitable for BMD handling and analytics. We treat the subject
deductively from an educational perspective, critically appraising the material
surveyed.Comment: 54 pages, 11 figures, 19 tables, IEEE Communications Surveys &
Tutorials, peer-reviewed academic journa
Mecanismos dinâmicos de segurança para redes softwarizadas e virtualizadas
The relationship between attackers and defenders has traditionally been
asymmetric, with attackers having time as an upper hand to devise an exploit
that compromises the defender. The push towards the Cloudification of
the world makes matters more challenging, as it lowers the cost of an attack,
with a de facto standardization on a set of protocols. The discovery of a vulnerability
now has a broader impact on various verticals (business use cases),
while previously, some were in a segregated protocol stack requiring independent
vulnerability research. Furthermore, defining a perimeter within a cloudified
system is non-trivial, whereas before, the dedicated equipment already
created a perimeter. This proposal takes the newer technologies of network
softwarization and virtualization, both Cloud-enablers, to create new dynamic
security mechanisms that address this asymmetric relationship using novel
Moving Target Defense (MTD) approaches. The effective use of the exploration
space, combined with the reconfiguration capabilities of frameworks like
Network Function Virtualization (NFV) and Management and Orchestration
(MANO), should allow for adjusting defense levels dynamically to achieve the
required security as defined by the currently acceptable risk. The optimization
tasks and integration tasks of this thesis explore these concepts. Furthermore,
the proposed novel mechanisms were evaluated in real-world use cases, such
as 5G networks or other Network Slicing enabled infrastructures.A relação entre atacantes e defensores tem sido tradicionalmente assimétrica,
com os atacantes a terem o tempo como vantagem para conceberem
uma exploração que comprometa o defensor. O impulso para a Cloudificação
do mundo torna a situação mais desafiante, pois reduz o custo de um
ataque, com uma padronização de facto sobre um conjunto de protocolos.
A descoberta de uma vulnerabilidade tem agora um impacto mais amplo em
várias verticais (casos de uso empresarial), enquanto anteriormente, alguns
estavam numa pilha de protocolos segregados que exigiam uma investigação
independente das suas vulnerabilidades. Além disso, a definição de um
perímetro dentro de um sistema Cloud não é trivial, enquanto antes, o equipamento
dedicado já criava um perímetro. Esta proposta toma as mais recentes
tecnologias de softwarização e virtualização da rede, ambas facilitadoras da
Cloud, para criar novos mecanismos dinâmicos de segurança que incidem sobre
esta relação assimétrica utilizando novas abordagens de Moving Target
Defense (MTD). A utilização eficaz do espaço de exploração, combinada com
as capacidades de reconfiguração de frameworks como Network Function
Virtualization (NFV) e Management and Orchestration (MANO), deverá permitir
ajustar dinamicamente os níveis de defesa para alcançar a segurança
necessária, tal como definida pelo risco actualmente aceitável. As tarefas de
optimização e de integração desta tese exploram estes conceitos. Além disso,
os novos mecanismos propostos foram avaliados em casos de utilização no
mundo real, tais como redes 5G ou outras infraestruturas de Network Slicing.Programa Doutoral em Engenharia Informátic
Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles.
The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction
Abstracts on Radio Direction Finding (1899 - 1995)
The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography).
Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM.
The contents of these files are:
1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format];
2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format];
3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion
¿Dónde está el pirata? : el comercio informal de películas digitales en el Perú
En el Perú, al igual que en la mayoría de países del mundo, el comercio informal de películas digitales está tipificado como delito. Sin embargo, la inmensa mayoría de consumidores peruanos de películas compra copias DVD piratas, y por lo tanto actúan al margen de la ley. Las normas vigentes sobre propiedad intelectual que ilegitiman este comercio de películas han terminado cuestionando los usos, costumbres y valores de los peruanos.
El derecho de acceso libre a la información y cultura que hoy se plantea la sociedad global colisiona con los intereses económicos de las corporaciones productoras de audiovisuales (fundamentalmente con Hollywood) y con una legislación sobre propiedad intelectual que estas corporaciones han promovido a lo largo de las últimas décadas.
El objetivo de este trabajo es presentar y analizar algunos temas que nos ayuden a entender el origen, sentido, causas y consecuencias de la problemática cultural y social generada a propósito de la envergadura alcanzada por el comercio informal de películas digitales en el Perú. Para ello, revelaré la manera en que la revolución tecnológica digital ha precipitado la problemática del comercio informal de películas, también mostraré cómo se ha transformado la cadena productiva, de distribución y de consumo de los productos audiovisuales como consecuencia de la revolución tecnológica y la demanda creciente de la población de acceder a la información y la cultura. Como complemento a este aspecto del problema analizaré la historia global y local de la legislación sobre propiedad intelectual para conocer cómo ésta se ha ido modificando a lo largo de los años en beneficio de intereses específicos
¿Dónde está el pirata? : el comercio informal de películas digitales en el Perú
En el Perú, al igual que en la mayoría de países del mundo, el comercio informal de películas digitales está tipificado como delito. Sin embargo, la inmensa mayoría de consumidores peruanos de películas compra copias DVD piratas, y por lo tanto actúan al margen de la ley. Las normas vigentes sobre propiedad intelectual que ilegitiman este comercio de películas han terminado cuestionando los usos, costumbres y valores de los peruanos.
El derecho de acceso libre a la información y cultura que hoy se plantea la sociedad global colisiona con los intereses económicos de las corporaciones productoras de audiovisuales (fundamentalmente con Hollywood) y con una legislación sobre propiedad intelectual que estas corporaciones han promovido a lo largo de las últimas décadas.
El objetivo de este trabajo es presentar y analizar algunos temas que nos ayuden a entender el origen, sentido, causas y consecuencias de la problemática cultural y social generada a propósito de la envergadura alcanzada por el comercio informal de películas digitales en el Perú. Para ello, revelaré la manera en que la revolución tecnológica digital ha precipitado la problemática del comercio informal de películas, también mostraré cómo se ha transformado la cadena productiva, de distribución y de consumo de los productos audiovisuales como consecuencia de la revolución tecnológica y la demanda creciente de la población de acceder a la información y la cultura. Como complemento a este aspecto del problema analizaré la historia global y local de la legislación sobre propiedad intelectual para conocer cómo ésta se ha ido modificando a lo largo de los años en beneficio de intereses específicos.Tesi
Fire Monitoring Handbook
Fire is a powerful and enduring force that has had, and will continue to have, a profound influence on National Park Service (NPS) lands. Fire management decisions within the National Park Service require information on fire behavior and on the effects of fire on park resources. With good reason, the public is holding park management increasingly accountable, especially in the area of fire management. Federal and state agencies are instituting progressively more stringent guidelines for burning, monitoring, and evaluation. The impetus behind these guidelines and the purpose of this handbook are to ensure that management objectives are being met, to provide guidance that can prevent fire management problems from developing, to limit possible legal actions against the agency, and to ensure that all parks collect at least the minimum information deemed necessary to evaluate their fire management programs