3,502 research outputs found
Agile Data Offloading over Novel Fog Computing Infrastructure for CAVs
Future Connected and Automated Vehicles (CAVs) will be supervised by
cloud-based systems overseeing the overall security and orchestrating traffic
flows. Such systems rely on data collected from CAVs across the whole city
operational area. This paper develops a Fog Computing-based infrastructure for
future Intelligent Transportation Systems (ITSs) enabling an agile and reliable
off-load of CAV data. Since CAVs are expected to generate large quantities of
data, it is not feasible to assume data off-loading to be completed while a CAV
is in the proximity of a single Road-Side Unit (RSU). CAVs are expected to be
in the range of an RSU only for a limited amount of time, necessitating data
reconciliation across different RSUs, if traditional approaches to data
off-load were to be used. To this end, this paper proposes an agile Fog
Computing infrastructure, which interconnects all the RSUs so that the data
reconciliation is solved efficiently as a by-product of deploying the Random
Linear Network Coding (RLNC) technique. Our numerical results confirm the
feasibility of our solution and show its effectiveness when operated in a
large-scale urban testbed.Comment: To appear in IEEE VTC-Spring 201
Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges
5G networks are expected to be able to satisfy users' different QoS requirements. Network slicing is a promising technology for 5G networks to provide services tailored for users' specific QoS demands. Driven by the increased massive wireless data traffic from different application scenarios, efficient resource allocation schemes should be exploited to improve the flexibility of network resource allocation and capacity of 5G networks based on network slicing. Due to the diversity of 5G application scenarios, new mobility management schemes are greatly needed to guarantee seamless handover in network-slicing-based 5G systems. In this article, we introduce a logical architecture for network-slicing-based 5G systems, and present a scheme for managing mobility between different access networks, as well as a joint power and subchannel allocation scheme in spectrum-sharing two-tier systems based on network slicing, where both the co-tier interference and cross-tier interference are taken into account. Simulation results demonstrate that the proposed resource allocation scheme can flexibly allocate network resources between different slices in 5G systems. Finally, several open issues and challenges in network-slicing-based 5G networks are discussed, including network reconstruction, network slicing management, and cooperation with other 5G technologies
ARIES WP3 – Needs and Requirements Analyses
Information and communication technologies have increasingly
influenced and changed our daily life. They allow global
connectivity and easy access to distributed applications and
digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.
The Knowledge Application and Utilization Framework Applied to Defense COTS: A Research Synthesis for Outsourced Innovation
Purpose -- Militaries of developing nations face increasing budget pressures, high operations tempo, a blitzing pace of technology, and adversaries that often meet or beat government capabilities using commercial off-the-shelf (COTS) technologies. The adoption of COTS products into defense acquisitions has been offered to help meet these challenges by essentially outsourcing new product development and innovation. This research summarizes extant research to develop a framework for managing the innovative and knowledge flows. Design/Methodology/Approach – A literature review of 62 sources was conducted with the objectives of identifying antecedents (barriers and facilitators) and consequences of COTS adoption. Findings – The DoD COTS literature predominantly consists of industry case studies, and there’s a strong need for further academically rigorous study. Extant rigorous research implicates the importance of the role of knowledge management to government innovative thinking that relies heavily on commercial suppliers. Research Limitations/Implications – Extant academically rigorous studies tend to depend on measures derived from work in information systems research, relying on user satisfaction as the outcome. Our findings indicate that user satisfaction has no relationship to COTS success; technically complex governmental purchases may be too distant from users or may have socio-economic goals that supersede user satisfaction. The knowledge acquisition and utilization framework worked well to explain the innovative process in COTS. Practical Implications – Where past research in the commercial context found technological knowledge to outweigh market knowledge in terms of importance, our research found the opposite. Managers either in government or marketing to government should be aware of the importance of market knowledge for defense COTS innovation, especially for commercial companies that work as system integrators. Originality/Value – From the literature emerged a framework of COTS product usage and a scale to measure COTS product appropriateness that should help to guide COTS product adoption decisions and to help manage COTS product implementations ex post
Web Engineering Security (WES) Methodology
The impact of the World Wide Web on basic operational economical components in global information-rich civilizations is significant. The repercussions force organizations to provide justification for security from a business-case perspective and to focus on security from a Web application development environment standpoint. The need for clarity promoted an investigation through the acquisition of empirical evidence from a high level Web survey and a more detailed industry survey to analyze security in the Web application development environment ultimately contributing to the proposal of the Essential Elements (EE) and the Security Criteria for Web Application Development (SCWAD). The synthesis of information provided was used to develop the Web Engineering Security (WES) methodology. WES is a proactive, flexible, process neutral security methodology with customizable components that is based on empirical evidence and used to explicitly integrate security throughout an organization’s chosen application development process
Algorithms for advance bandwidth reservation in media production networks
Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results
System engineering for radio frequency communication consolidation with parabolic antenna stacking
2020 Fall.Includes bibliographical references.This dissertation implements System Engineering (SE) practices while utilizing Model Based System Engineering (MBSE) methods through software applications for the design and development of a parabolic stacked antenna. Parabolic antenna stacking provides communication system consolidation by having multiple antennas on a single pedestal which reduces the number of U.S. Navy shipboard topside antennas. The dissertation begins with defining early phase system lifecycle processes and the correlation of these early processes to activities performed when the system is being developed. Performing SE practices with the assistance of MBSE, Agile, Lean methodologies and SE / engineering software applications reduces the likelihood of system failure, rework, schedule delays, and cost overruns. Using this approach, antenna system consolidation via parabolic antenna stacking is investigated while applying SE principles and utilizing SE software applications. SE / engineering software such as IBM Rational Software, Innoslate, Antenna Magus, ExtendSim, and CST Microwave Studio were used to perform SE activities denoted in ISO, IEC, and IEEE standards. A method to achieve multi-band capabilities on a single antenna pedestal in order to reduce the amount of U.S. Navy topside antennas is researched. An innovative approach of parabolic antenna stacking is presented to reduce the amount of antennas that take up physical space on shipboard platforms. Process simulation is presented to provide an approach to improve predicting delay times for operational availability measures and to identify process improvements through lean methodologies. Finally, this work concludes with a summary and suggestions for future work
- …