7,293 research outputs found

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    New models for digital government: the role of service brokers in driving innovation

    Get PDF
    Executive summary Digital Government strategies are being rolled out in many Australian and international jurisdictions, ushering in a fundamentally different approach to the design and delivery of public sector services. Digital Government makes digital services (usually delivered through internet and mobile channels) the default delivery channels for the majority of services, and places them at the centre of innovating, designing and operating government services. Public sector or independent service brokers are increasingly important to delivering and designing these services. Service brokers are organisations or businesses that enable customers to interact with other organisations through easy-to-use and seamless interfaces. In the digital realm, a public sector service brokers example is one that provides a customer-focussed portal, such as the Federal Department of Human Services’ MyGov website. Independent service brokers from the private or community sectors can also provide greater service choice and innovation in how people interact with governments. Models for independent service brokers include Digital Mailboxes and Personal Safeboxes (eg Australia Post); public transport information service brokers (eg TripView, Tripgo and Google Transit), taxation service brokers (eg Xero and MYOB Online), community service brokers (eg HubCare) and access brokers for government services (eg public libraries, online access centres, etc) to assist those unable to access digital services. It is likely that the ambitious goals for large-scale adoption of digital government will only be achieved if governments encourage the involvement of independent service brokers to complement the role of public sector service brokers. However, there is currently little guidance on best practice models for agencies seeking to collaborate with independent service brokers or the other way around. This report addresses this critical knowledge gap by providing a practical guide to the service broker model. It explains the different roles of public sector and independent service brokers and provides case studies of service broker models. This will help to inform digital government strategies and policies to encourage the development of public sector and independent service brokers. It also considers how the emergence of a marketplace of service brokers will raise important issues such as how customer data is managed and protected, identity assured and how research and analysis of the data generated by these digital services can help inform better public policies and service improvement

    FISA Reform

    Get PDF
    Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the President\u27s Surveillance Program. It then examines how technology has altered the types of information available, as well as methods of transmission and storage. The article builds on this to develop a taxonomy for how a statutory approach to foreign intelligence gathering could be given force. It divides foreign intelligence gathering into two categories: front-end collection and back-end analysis and use. Each category contains a counterpoise structured to ensure the appropriate exercise of Congressionally-mandated authorities. For the front-end, this means balancing the manner of collection with requirements for approval. For the back-end, this means offsetting implementation with transparency and oversight. The article then considers the constituent parts of each category

    A Cloud-Based Architecture with embedded Pragmatics Renderer for Ubiquitous and Cloud Manufacturing

    Get PDF
    The paper presents a Cloud-based architecture for Ubiquitous and Cloud Manufacturing as a multilayer communicational architecture designated as the Communicational Architecture. It is characterised as (a) rich client interfaces (Rich Internet Application) with sufficient interaction to allow user agility and competence, (b) multimodal, for multiple client device classes support and (c) communicational to allow pragmatics, where human-to-human real interaction is completely supported. The main innovative part of this architecture is sustained by a semiotic framework organised on three main logical levels: (a) device level, which allows the user `to use' pragmatics with the system, (b) application level which results for a set of tools which allows users pragmatics-based interaction and (c) application server level that implements the Pragmatics renderer,a pragmatics supporting engine that supports all pragmatics services. The Pragmatics renderer works as a communication enabler, and consists of a set of integrated collaboration technology that makes the bridge between the user/devices and the `system'. A federated or community cloud is developed using a particular cloud REST ful Application Programming Interface that supports (cloud) services registration, composition and governance (pragmatics services behaves as SaaS in the cloud).The work is supported by the Portuguese National Funding Agency for science, research and technology (FCT), (1) Grant No. UID/CEC/00319/2013, and (2) `Ph.D. Scholarship Grant' reference SFRH/BD/85672/2012.info:eu-repo/semantics/publishedVersio

    Large Geographical Area Aerial Surveillance Systems Data Network Infrastructure Managed by Artificial Intelligence and Certified Over Blockchain: a Review

    Get PDF
    This paper proposes an aerial data network infrastructure for large geographical area surveillance systems. The work presents a review of previous works from the authors, existing technologies in the market and other scientific work, with the goal of creating a data network supported by Autonomous Tethered Aerostat Airships used for sensor fixing, drones deployment base and meshed data network nodes installation. The proposed approach for data network infrastructure supports several independent and heterogeneous services from independent, private and public companies. The presented solution employs Edge Artificial Intelligence (AI) systems for autonomous infrastructure management. The Edge AI used in the presented solution enables the AI management solution to work without the need of a permanent connection to cloud services and is constantly feed by the locally generated sensor data. These systems interact with other network AI services to accomplish coordinated tasks. Blockchain technology services are deployed to ensure secure and auditable decisions and operations, validated by the different involved ledgers

    Design and analysis of peer 2 peer operating system

    Get PDF
    The peer to peer computing paradigm has become a popular paradigm for deploying distributed applications. Examples: Kadmelia, Chord, Skype, Kazaa, Big Table. Multiagent systems have become a dominant paradigm within AI for deploying reasoning and analytics applications. Such applications are compute-intensive. In disadvantaged networks the ad-hoc architecture is the most suitable one. Examples: military scenarios, disaster scenarios. We combine the paradigms of peer-to-peer computing, multiagent systems, cloud computing, and ad-hoc networks to create the new paradigm of ad-hoc peer-to-peer mobile agent cloud (APMA cloud) that can provide the computing power of a cloud in “disadvantaged” regions (e.g., through RF using a router or GPRS) – To this end we have designed and implemented a peer to peer operating system –PPOS that can leverage the computing power of such a cloud
    • 

    corecore