11,447 research outputs found

    Toward Self-Organising Service Communities

    Get PDF
    This paper discusses a framework in which catalog service communities are built, linked for interaction, and constantly monitored and adapted over time. A catalog service community (represented as a peer node in a peer-to-peer network) in our system can be viewed as domain specific data integration mediators representing the domain knowledge and the registry information. The query routing among communities is performed to identify a set of data sources that are relevant to answering a given query. The system monitors the interactions between the communities to discover patterns that may lead to restructuring of the network (e.g., irrelevant peers removed, new relationships created, etc.)

    Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET

    Full text link
    Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unauthorized access. Although the current solutions have been designed to defeat the attack nodes, they still require additional hardware, have considerable delivery delays, do not offer high throughput or packet delivery ratios, or do not do so without using more energy. The capability of a mobile node to forward packets, which is dependent on the platform's life quality, may be impacted by the absence of the network node power source. We developed the Safe Routing Approach (SRA), which uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process. The attacking node recognition system is made for irregular routing node detection to protect the controller network's usual properties from becoming recognized as an attack node. The suggested method examines the nearby attack nodes and conceals the trusted node in the routing pathway. The path is instantly assigned after the initial discovery of trust nodes based on each node's strength value. It extends the network's life span and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy consumption, network performance, and detection of attack nodes, the suggested approach is contrasted with AIS, ZIDS, and Improved AODV. The findings demonstrate that the recommended strategy performs superior in terms of PDR, residual energy, and network throughput

    Supporting the tutor in the design and support of adaptive e-learning

    Get PDF
    The further development and deployment of e-learning faces a number of threats. First, in order to meet the increasing demands of learners, staff have to develop and plan a wide and complex variety of learning activities that, in line with contemporary pedagogical models, adapt to the learners’ individual needs. Second, the deployment of e-learning, and therewith the freedom to design the appropriate kind of activities is bound by strict economical conditions, i.e. the amount of time available to staff to support the learning process. In this thesis two models have been developed and implemented that each address a different need. The first model covers the need to support the design task of staff, the second one the need to support the staff in supervising and giving guidance to students' learning activities. More specifically, the first model alleviates the design task by offering a set of connected design and runtime tools that facilitate adaptive e-learning. The second model alleviates the support task by invoking the knowledge and skills of fellow-students. Both models have been validated in near-real-world task settings

    Automated driving and autonomous functions on road vehicles

    Get PDF
    In recent years, road vehicle automation has become an important and popular topic for research and development in both academic and industrial spheres. New developments received extensive coverage in the popular press, and it may be said that the topic has captured the public imagination. Indeed, the topic has generated interest across a wide range of academic, industry and governmental communities, well beyond vehicle engineering; these include computer science, transportation, urban planning, legal, social science and psychology. While this follows a similar surge of interest – and subsequent hiatus – of Automated Highway Systems in the 1990’s, the current level of interest is substantially greater, and current expectations are high. It is common to frame the new technologies under the banner of “self-driving cars” – robotic systems potentially taking over the entire role of the human driver, a capability that does not fully exist at present. However, this single vision leads one to ignore the existing range of automated systems that are both feasible and useful. Recent developments are underpinned by substantial and long-term trends in “computerisation” of the automobile, with developments in sensors, actuators and control technologies to spur the new developments in both industry and academia. In this paper we review the evolution of the intelligent vehicle and the supporting technologies with a focus on the progress and key challenges for vehicle system dynamics. A number of relevant themes around driving automation are explored in this article, with special focus on those most relevant to the underlying vehicle system dynamics. One conclusion is that increased precision is needed in sensing and controlling vehicle motions, a trend that can mimic that of the aerospace industry, and similarly benefit from increased use of redundant by-wire actuators

    Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles

    Get PDF
    Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause deaths of hundreds of thousands of people due to not getting treatment in time. Thus, we need to develop an efficient and smart emergency system to ensure the timely arrival of an ambulance service to the place of the accident in order to provide timely medical help to those injured. In addition, we also need to communicate promptly with other entities such as hospitals so that they can make appropriate arrangements and provide timely medical information to emergency personnel on the scene including alerting those related to the injured person(s). In this paper, we have developed an intelligent protocol that uses connected and autonomous vehicles\u27 scenarios in Intelligent Transportation System (ITS) so that prompt emergency services can be provided to reduce the death rate caused. The proposed protocol smartly connects with all the relevant entitles during the emergency while maintaining a smooth traffic flow for the arrival of the ambulance service. Moreover, our protocol also mitigates the broadcasting of messages circulating over the network for delay sensitive tasks. The evaluation results, based on the performance metrics such as channel collision, average packet delay, packet loss, and routing-overhead demonstrate that our proposed protocol outperforms previously proposed protocols such as Emergency Message Dissemination for Vehicular (EMDV), Contention Based Broadcasting (CBB), and Particle Swarm Optimization Contention-based Broadcast (PCBB) protocols. Finally, we discuss several issues and challenges that need to be addressed in the network in order to achieve more a reliable, efficient, connected, and autonomous vehicular network

    A Distributed and Adaptive Revocation Mechanism for P2P networks

    Get PDF
    International audienceWith the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of the P2P protocol and does not need complex consensus and cryptographic mechanisms, hardly scalable. The reputation criteria evolve with the contribution of a peer to the network in order to highlight and help fight against selfish or malicious behaviours. The preliminary results show that the user perceived delays are not highly impacted and that our solution is resistant to reputation and revocation attacks

    Enabling the V2X Economy Revolution Using a Blockchain-based Value Transaction Layer for Vehicular Ad-hoc Networks

    Get PDF
    The next generation of tightly interconnected vehicles offers a variety of new technological as well as business opportunities. Those vehicles form so called vehicular ad-hoc networks (VANETs) in order to enable vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-human (V2H), or in general vehicle-to-everything (V2X) communication and interaction. A variety of manufacturers started implementing specific use cases, but limited to their own brands and products. However, a platform- and manufacturer-agnostic default standard for interactions and transaction within this new economy is still missing. This paper fills the gap in the state of the art by introducing a novel blockchain-based V2X platform that enables a transaction and interaction layer for goods and services required to kick-start the upcoming V2X economy. We present the general functions and features of the system, outline the requirements and goals as well as the architecture of the V2X platform. Moreover, we detail the system engagement processes of the identified stakeholders inside the V2X ecosystem and the theoretical foundations of those interactions and transactions

    Five-country Study on Service and Volunteering in Southern Africa: Zambia Country Report

    Get PDF
    The study documents and analyses civic service and volunteering in Zambia and also identifies formal and informal civic service programmes in Zambia
    corecore