9,883 research outputs found
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Animals play a profoundly important and intricate role in our lives today.
Dogs have been human companions for thousands of years, but they now work
closely with us to assist the disabled, and in combat and search and rescue
situations. Farm animals are a critical part of the global food supply chain,
and there is increasing consumer interest in organically fed and humanely
raised livestock, and how it impacts our health and environmental footprint.
Wild animals are threatened with extinction by human induced factors, and
shrinking and compromised habitat. This review sets the goal to systematically
survey the existing literature in smart computing and sensing technologies for
domestic, farm and wild animal welfare. We use the notion of \emph{animal
welfare} in broad terms, to review the technologies for assessing whether
animals are healthy, free of pain and suffering, and also positively stimulated
in their environment. Also the notion of \emph{smart computing and sensing} is
used in broad terms, to refer to computing and sensing systems that are not
isolated but interconnected with communication networks, and capable of remote
data collection, processing, exchange and analysis. We review smart
technologies for domestic animals, indoor and outdoor animal farming, as well
as animals in the wild and zoos. The findings of this review are expected to
motivate future research and contribute to data, information and communication
management as well as policy for animal welfare
Context Aware Computing for The Internet of Things: A Survey
As we are moving towards the Internet of Things (IoT), the number of sensors
deployed around the world is growing at a rapid pace. Market research has shown
a significant growth of sensor deployments over the past decade and has
predicted a significant increment of the growth rate in the future. These
sensors continuously generate enormous amounts of data. However, in order to
add value to raw sensor data we need to understand it. Collection, modelling,
reasoning, and distribution of context in relation to sensor data plays
critical role in this challenge. Context-aware computing has proven to be
successful in understanding sensor data. In this paper, we survey context
awareness from an IoT perspective. We present the necessary background by
introducing the IoT paradigm and context-aware fundamentals at the beginning.
Then we provide an in-depth analysis of context life cycle. We evaluate a
subset of projects (50) which represent the majority of research and commercial
solutions proposed in the field of context-aware computing conducted over the
last decade (2001-2011) based on our own taxonomy. Finally, based on our
evaluation, we highlight the lessons to be learnt from the past and some
possible directions for future research. The survey addresses a broad range of
techniques, methods, models, functionalities, systems, applications, and
middleware solutions related to context awareness and IoT. Our goal is not only
to analyse, compare and consolidate past research work but also to appreciate
their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201
Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems
Computer networks are undergoing a phenomenal growth, driven by the rapidly
increasing number of nodes constituting the networks. At the same time, the
number of security threats on Internet and intranet networks is constantly
growing, and the testing and experimentation of cyber defense solutions
requires the availability of separate, test environments that best emulate the
complexity of a real system. Such environments support the deployment and
monitoring of complex mission-driven network scenarios, thus enabling the study
of cyber defense strategies under real and controllable traffic and attack
scenarios. In this paper, we propose a methodology that makes use of a
combination of techniques of network and security assessment, and the use of
cloud technologies to build an emulation environment with adjustable degree of
affinity with respect to actual reference networks or planned systems. As a
byproduct, starting from a specific study case, we collected a dataset
consisting of complete network traces comprising benign and malicious traffic,
which is feature-rich and publicly available
- …