84,751 research outputs found

    Event-Cloud Platform to Support Decision- Making in Emergency Management

    Full text link
    The challenge of this paper is to underline the capability of an Event-Cloud Platform to support efficiently an emergency situation. We chose to focus on a nuclear crisis use case. The proposed approach consists in modeling the business processes of crisis response on the one hand, and in supporting the orchestration and execution of these processes by using an Event-Cloud Platform on the other hand. This paper shows how the use of Event-Cloud techniques can support crisis management stakeholders by automatizing non-value added tasks and by directing decision- makers on what really requires their capabilities of choice. If Event-Cloud technology is a very interesting and topical subject, very few research works have considered this to improve emergency management. This paper tries to fill this gap by considering and applying these technologies on a nuclear crisis use-case

    Connecting the World of Embedded Mobiles: The RIOT Approach to Ubiquitous Networking for the Internet of Things

    Full text link
    The Internet of Things (IoT) is rapidly evolving based on low-power compliant protocol standards that extend the Internet into the embedded world. Pioneering implementations have proven it is feasible to inter-network very constrained devices, but had to rely on peculiar cross-layered designs and offer a minimalistic set of features. In the long run, however, professional use and massive deployment of IoT devices require full-featured, cleanly composed, and flexible network stacks. This paper introduces the networking architecture that turns RIOT into a powerful IoT system, to enable low-power wireless scenarios. RIOT networking offers (i) a modular architecture with generic interfaces for plugging in drivers, protocols, or entire stacks, (ii) support for multiple heterogeneous interfaces and stacks that can concurrently operate, and (iii) GNRC, its cleanly layered, recursively composed default network stack. We contribute an in-depth analysis of the communication performance and resource efficiency of RIOT, both on a micro-benchmarking level as well as by comparing IoT communication across different platforms. Our findings show that, though it is based on significantly different design trade-offs, the networking subsystem of RIOT achieves a performance equivalent to that of Contiki and TinyOS, the two operating systems which pioneered IoT software platforms

    Net Gains: A Handbook for Network Builders Seeking Social Change

    Get PDF
    This handbook provides the growing number of people who are developing networks for social change with practical advice based on the experiences of network builders, case studies of networks small and large, local and international, and emerging scientific knowledge about "connectivity." It is intended to join, complement, and spur other efforts to capture and make widely available what is being learned in the business, government, and civil sectors about why and how to use networks, rather than solitary organizations, to generate large-scale impact

    Agent and cyber-physical system based self-organizing and self-adaptive intelligent shopfloor

    Get PDF
    The increasing demand of customized production results in huge challenges to the traditional manufacturing systems. In order to allocate resources timely according to the production requirements and to reduce disturbances, a framework for the future intelligent shopfloor is proposed in this paper. The framework consists of three primary models, namely the model of smart machine agent, the self-organizing model, and the self-adaptive model. A cyber-physical system for manufacturing shopfloor based on the multiagent technology is developed to realize the above-mentioned function models. Gray relational analysis and the hierarchy conflict resolution methods were applied to achieve the self-organizing and self-adaptive capabilities, thereby improving the reconfigurability and responsiveness of the shopfloor. A prototype system is developed, which has the adequate flexibility and robustness to configure resources and to deal with disturbances effectively. This research provides a feasible method for designing an autonomous factory with exception-handling capabilities

    Civic Identities, Online Technologies: From Designing Civics Curriculum to Supporting Civic Experiences

    Get PDF
    Part of the Volume on Civic Life Online: Learning How Digital Media Can Engage Youth.Youth today are often criticized for their lack of civic participation and involvement in political life. Technology has been blamed, amongst many other causes, for fostering social isolation and youth's retreat into a private world disconnected from their communities. However, current research is beginning to indicate that these might be inaccurate perceptions. The Internet has provided new opportunities to create communities that extend beyond geographic boundaries, to engage in civic and volunteering activities across local and national frontiers, to learn about political life, and to experience the challenges of democratic participation. How do we leverage youth's interest in new technologies by developing technology-based educational programs to promote civic engagement? This chapter explores this question by proposing socio-technical design elements to be considered when developing technology-rich experiences. It presents a typology to guide the design of Internet-based interventions, taking into account both the affordances of the technology and the educational approach to the use of the technology. It also presents a pilot experience in a northeastern university that offered a pre-orientation program in which incoming freshman designed a three-dimensional virtual campus of the future and developed new policies and programs to strengthen the relationship between college campus and neighbor communities

    German and Israeli Innovation: The Best of Two Worlds

    Get PDF
    This study reviews – through desk research and expert interviews with Mittelstand companies, startups and ecosystem experts – the current status of the Israeli startup ecosystem and the Mittelstand region of North Rhine- Westphalia (NRW), Germany. As a case study, it highlights potential opportunities for collaboration and analyzes different engagement modes that might serve to connect the two regions. The potential synergies between the two economies are based on a high degree of complementarity. A comparison of NRW’s key verticals and Israel’s primary areas of innovation indicates that there is significant overlap in verticals, such as artificial intelligence (AI), the internet of things (IoT), sensors and cybersecurity. Israeli startups can offer speed, agility and new ideas, while German Mittelstand companies can contribute expertise in production and scaling, access to markets, capital and support. The differences between Mittelstand companies and startups are less pronounced than those between startups and big corporations. However, three current barriers to fruitful collaboration have been identified: 1) a lack of access, 2) a lack of transparency regarding relevant players in the market, and 3) a lack of the internal resources needed to select the right partners, often due to time constraints or a lack of internal expertise on this issue. To ensure that positive business opportunities ensue, Mittelstand companies and startups alike have to be proactive in their search for cooperation partners and draw on a range of existing engagement modes (e.g., events, communities, accelerators). The interviews and the research conducted for this study made clear that no single mode of engagement can address all the needs and challenges associated with German-Israeli collaboration

    A Cognitive Framework to Secure Smart Cities

    Get PDF
    The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms
    • …
    corecore