11,447 research outputs found
Toward Self-Organising Service Communities
This paper discusses a framework in which catalog service communities are built, linked for interaction, and constantly monitored and adapted over time. A catalog service community (represented as a peer node in a peer-to-peer network) in our system can be viewed as domain specific data integration mediators representing the domain knowledge and the registry information. The query routing among communities is performed to identify a set of data sources that are relevant to answering a given query. The system monitors the interactions between the communities to discover patterns that may lead to restructuring of the network (e.g., irrelevant peers removed, new relationships created, etc.)
Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET
Wireless networks that are decentralized and communicate without using
existing infrastructure are known as mobile ad-hoc networks. The most common
sorts of threats and attacks can affect MANETs. Therefore, it is advised to
utilize intrusion detection, which controls the system to detect additional
security issues. Monitoring is essential to avoid attacks and provide extra
protection against unauthorized access. Although the current solutions have
been designed to defeat the attack nodes, they still require additional
hardware, have considerable delivery delays, do not offer high throughput or
packet delivery ratios, or do not do so without using more energy. The
capability of a mobile node to forward packets, which is dependent on the
platform's life quality, may be impacted by the absence of the network node
power source. We developed the Safe Routing Approach (SRA), which uses
behaviour analysis to track and monitor attackers who discard packets during
the route discovery process. The attacking node recognition system is made for
irregular routing node detection to protect the controller network's usual
properties from becoming recognized as an attack node. The suggested method
examines the nearby attack nodes and conceals the trusted node in the routing
pathway. The path is instantly assigned after the initial discovery of trust
nodes based on each node's strength value. It extends the network's life span
and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy
consumption, network performance, and detection of attack nodes, the suggested
approach is contrasted with AIS, ZIDS, and Improved AODV. The findings
demonstrate that the recommended strategy performs superior in terms of PDR,
residual energy, and network throughput
Supporting the tutor in the design and support of adaptive e-learning
The further development and deployment of e-learning faces a number of threats. First, in order to meet the increasing demands of learners, staff have to develop and plan a wide and complex variety of learning activities that, in line with contemporary pedagogical models, adapt to the learners’ individual needs. Second, the deployment of e-learning, and therewith the freedom to design the appropriate kind of activities is bound by strict economical conditions, i.e. the amount of time available to staff to support the learning process. In this thesis two models have been developed and implemented that each address a different need. The first model covers the need to support the design task of staff, the second one the need to support the staff in supervising and giving guidance to students' learning activities. More specifically, the first model alleviates the design task by offering a set of connected design and runtime tools that facilitate adaptive e-learning. The second model alleviates the support task by invoking the knowledge and skills of fellow-students. Both models have been validated in near-real-world task settings
Automated driving and autonomous functions on road vehicles
In recent years, road vehicle automation has become an important and popular topic for research
and development in both academic and industrial spheres. New developments received
extensive coverage in the popular press, and it may be said that the topic has captured the
public imagination. Indeed, the topic has generated interest across a wide range of academic,
industry and governmental communities, well beyond vehicle engineering; these include computer
science, transportation, urban planning, legal, social science and psychology. While this
follows a similar surge of interest – and subsequent hiatus – of Automated Highway Systems
in the 1990’s, the current level of interest is substantially greater, and current expectations
are high. It is common to frame the new technologies under the banner of “self-driving cars”
– robotic systems potentially taking over the entire role of the human driver, a capability that
does not fully exist at present. However, this single vision leads one to ignore the existing
range of automated systems that are both feasible and useful. Recent developments are underpinned
by substantial and long-term trends in “computerisation” of the automobile, with
developments in sensors, actuators and control technologies to spur the new developments in
both industry and academia. In this paper we review the evolution of the intelligent vehicle
and the supporting technologies with a focus on the progress and key challenges for vehicle
system dynamics. A number of relevant themes around driving automation are explored in
this article, with special focus on those most relevant to the underlying vehicle system dynamics.
One conclusion is that increased precision is needed in sensing and controlling vehicle
motions, a trend that can mimic that of the aerospace industry, and similarly benefit from
increased use of redundant by-wire actuators
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles
Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause deaths of hundreds of thousands of people due to not getting treatment in time. Thus, we need to develop an efficient and smart emergency system to ensure the timely arrival of an ambulance service to the place of the accident in order to provide timely medical help to those injured. In addition, we also need to communicate promptly with other entities such as hospitals so that they can make appropriate arrangements and provide timely medical information to emergency personnel on the scene including alerting those related to the injured person(s). In this paper, we have developed an intelligent protocol that uses connected and autonomous vehicles\u27 scenarios in Intelligent Transportation System (ITS) so that prompt emergency services can be provided to reduce the death rate caused. The proposed protocol smartly connects with all the relevant entitles during the emergency while maintaining a smooth traffic flow for the arrival of the ambulance service. Moreover, our protocol also mitigates the broadcasting of messages circulating over the network for delay sensitive tasks. The evaluation results, based on the performance metrics such as channel collision, average packet delay, packet loss, and routing-overhead demonstrate that our proposed protocol outperforms previously proposed protocols such as Emergency Message Dissemination for Vehicular (EMDV), Contention Based Broadcasting (CBB), and Particle Swarm Optimization Contention-based Broadcast (PCBB) protocols. Finally, we discuss several issues and challenges that need to be addressed in the network in order to achieve more a reliable, efficient, connected, and autonomous vehicular network
A Distributed and Adaptive Revocation Mechanism for P2P networks
International audienceWith the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of the P2P protocol and does not need complex consensus and cryptographic mechanisms, hardly scalable. The reputation criteria evolve with the contribution of a peer to the network in order to highlight and help fight against selfish or malicious behaviours. The preliminary results show that the user perceived delays are not highly impacted and that our solution is resistant to reputation and revocation attacks
Enabling the V2X Economy Revolution Using a Blockchain-based Value Transaction Layer for Vehicular Ad-hoc Networks
The next generation of tightly interconnected vehicles offers a variety of new technological as well as business opportunities. Those vehicles form so called vehicular ad-hoc networks (VANETs) in order to enable vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-human (V2H), or in general vehicle-to-everything (V2X) communication and interaction. A variety of manufacturers started implementing specific use cases, but limited to their own brands and products. However, a platform- and manufacturer-agnostic default standard for interactions and transaction within this new economy is still missing. This paper fills the gap in the state of the art by introducing a novel blockchain-based V2X platform that enables a transaction and interaction layer for goods and services required to kick-start the upcoming V2X economy. We present the general functions and features of the system, outline the requirements and goals as well as the architecture of the V2X platform. Moreover, we detail the system engagement processes of the identified stakeholders inside the V2X ecosystem and the theoretical foundations of those interactions and transactions
Five-country Study on Service and Volunteering in Southern Africa: Zambia Country Report
The study documents and analyses civic service and volunteering in Zambia and also identifies formal and informal civic service programmes in Zambia
- …