121,781 research outputs found
Integrating big data into a sustainable mobility policy 2.0 planning support system
It is estimated that each of us, on a daily basis, produces a bit more than 1 GB of digital content through our mobile phone and social networks activities, bank card payments, location-based positioning information, online activities, etc. However, the implementation of these large data amounts in city assets planning systems still remains a rather abstract idea for several reasons, including the fact that practical examples are still very strongly services-oriented, and are a largely unexplored and interdisciplinary field; hence, missing the cross-cutting dimension. In this paper, we describe the Policy 2.0 concept and integrate user generated content into Policy 2.0 platform for sustainable mobility planning. By means of a real-life example, we demonstrate the applicability of such a big data integration approach to smart cities planning process. Observed benefits range from improved timeliness of the data and reduced duration of the planning cycle to more informed and agile decision making, on both the citizens and the city planners end. The integration of big data into the planning process, at this stage, does not have uniform impact across all levels of decision making and planning process, therefore it should be performed gradually and with full awareness of existing limitations
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
Modeling IoT-aware Business Processes - A State of the Art Report
This research report presents an analysis of the state of the art of modeling
Internet of Things (IoT)-aware business processes. IOT links the physical world
to the digital world. Traditionally, we would find information about events and
processes in the physical world in the digital world entered by humans and
humans using this information to control the physical world. In the IoT
paradigm, the physical world is equipped with sensors and actuators to create a
direct link with the digital world. Business processes are used to coordinate a
complex environment including multiple actors for a common goal, typically in
the context of administrative work. In the past few years, we have seen
research efforts on the possibilities to model IoT- aware business processes,
extending process coordination to real world entities directly. This set of
research efforts is relatively small when compared to the overall research
effort into the IoT and much of the work is still in the early research stage.
To create a basis for a bridge between IoT and BPM, the goal of this report is
to collect and analyze the state of the art of existing frameworks for modeling
IoT-aware business processes.Comment: 42 page
Knowing Your Population: Privacy-Sensitive Mining of Massive Data
Location and mobility patterns of individuals are important to environmental
planning, societal resilience, public health, and a host of commercial
applications. Mining telecommunication traffic and transactions data for such
purposes is controversial, in particular raising issues of privacy. However,
our hypothesis is that privacy-sensitive uses are possible and often beneficial
enough to warrant considerable research and development efforts. Our work
contends that peoples behavior can yield patterns of both significant
commercial, and research, value. For such purposes, methods and algorithms for
mining telecommunication data to extract commonly used routes and locations,
articulated through time-geographical constructs, are described in a case study
within the area of transportation planning and analysis. From the outset, these
were designed to balance the privacy of subscribers and the added value of
mobility patterns derived from their mobile communication traffic and
transactions data. Our work directly contrasts the current, commonly held
notion that value can only be added to services by directly monitoring the
behavior of individuals, such as in current attempts at location-based
services. We position our work within relevant legal frameworks for privacy and
data protection, and show that our methods comply with such requirements and
also follow best-practice
Intelligent Management and Efficient Operation of Big Data
This chapter details how Big Data can be used and implemented in networking
and computing infrastructures. Specifically, it addresses three main aspects:
the timely extraction of relevant knowledge from heterogeneous, and very often
unstructured large data sources, the enhancement on the performance of
processing and networking (cloud) infrastructures that are the most important
foundational pillars of Big Data applications or services, and novel ways to
efficiently manage network infrastructures with high-level composed policies
for supporting the transmission of large amounts of data with distinct
requisites (video vs. non-video). A case study involving an intelligent
management solution to route data traffic with diverse requirements in a wide
area Internet Exchange Point is presented, discussed in the context of Big
Data, and evaluated.Comment: In book Handbook of Research on Trends and Future Directions in Big
Data and Web Intelligence, IGI Global, 201
Toward an efficient solution for dynamic ad hoc network interoperability
An ad hoc network is formed by an impromptu grouping of network capable nodes. The nodes forming the network have unconstrained mobility, and so provide a dynamic network topology. Current work in this research area has focused on designing routing protocols capable of efficiently forwarding packets in these dynamic network environments. This has led to several designs for ad hoc routing protocols based on various routing algorithms, each suited to specific usage characteristics. This paper will discuss issues relating to routing in ad hoc networks. We will describe an active networking based solution that provides dynamic routing protocol interoperability and enables migration of nodes between ad hoc groups. Our design is motivated by a squad and base scenario which consists of two groups wishing to communicate. These groups have contrasting deployment characteristics and so use different routing protocols
Rethinking connectivity as interactivity: a case study of Pakistan
Connectivity in developing countries has traditionally been viewed in terms of investment in transport and communications. This papers makes an effort to go beyond this traditional view and conceptualizes connectivity as networks between people and places. We split the overall national reforms agenda for connectivity into three prongs: a) transportation and related services, b) ICT, and c) social capital. We try to see the state of each of these three in case of Pakistan and then propose reforms keeping in view the current political economy milieu.Connectivity; Economic Growth; Transport; Communications; Social Capital
- âŠ