3,054 research outputs found

    Proactive Multi-Copy Routing Protocol For Urban Vehicular Ad Hoc Network

    Get PDF
    A vehicular network topology is very dynamic compared to traditional mobile ad hoc network because of the movement and speed of the vehicles. Thus, a vehicular network is always partitioned due to this reason, especially if the vehicle density is low. In this situation where a direct end-to-end path between source and destination can be considered as non-existent, a regular ad hoc routing protocol with complete path discovery mechanism is not feasible since the routing path is usually disconnected due to the intermittent nature of network links. To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. It has been ascertained by the majority of researches in VANET that the carry and forward procedure can significantly affect an end-to-end delivery delay. This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. The paper emphases on replicating data packets and distribute them to different relays. The proposed protocol creates enough diversity to reach the destination vehicle with a small end-to-end delivery delay while keeping low routing overhead by routing multiple copies independently. The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanism

    Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

    Full text link
    Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections. The fast growth in variety and number of malware species made it very difficult for forensics investigators to provide an on time response. Therefore, Machine Learning (ML) aided malware analysis became a necessity to automate different aspects of static and dynamic malware investigation. We believe that machine learning aided static analysis can be used as a methodological approach in technical Cyber Threats Intelligence (CTI) rather than resource-consuming dynamic malware analysis that has been thoroughly studied before. In this paper, we address this research gap by conducting an in-depth survey of different machine learning methods for classification of static characteristics of 32-bit malicious Portable Executable (PE32) Windows files and develop taxonomy for better understanding of these techniques. Afterwards, we offer a tutorial on how different machine learning techniques can be utilized in extraction and analysis of a variety of static characteristic of PE binaries and evaluate accuracy and practical generalization of these techniques. Finally, the results of experimental study of all the method using common data was given to demonstrate the accuracy and complexity. This paper may serve as a stepping stone for future researchers in cross-disciplinary field of machine learning aided malware forensics.Comment: 37 Page

    Progress in ambient assisted systems for independent living by the elderly

    Get PDF
    One of the challenges of the ageing population in many countries is the efficient delivery of health and care services, which is further complicated by the increase in neurological conditions among the elderly due to rising life expectancy. Personal care of the elderly is of concern to their relatives, in case they are alone in their homes and unforeseen circumstances occur, affecting their wellbeing. The alternative; i.e. care in nursing homes or hospitals is costly and increases further if specialized care is mobilized to patients’ place of residence. Enabling technologies for independent living by the elderly such as the ambient assisted living systems (AALS) are seen as essential to enhancing care in a cost-effective manner. In light of significant advances in telecommunication, computing and sensor miniaturization, as well as the ubiquity of mobile and connected devices embodying the concept of the Internet of Things (IoT), end-to-end solutions for ambient assisted living have become a reality. The premise of such applications is the continuous and most often real-time monitoring of the environment and occupant behavior using an event-driven intelligent system, thereby providing a facility for monitoring and assessment, and triggering assistance as and when needed. As a growing area of research, it is essential to investigate the approaches for developing AALS in literature to identify current practices and directions for future research. This paper is, therefore, aimed at a comprehensive and critical review of the frameworks and sensor systems used in various ambient assisted living systems, as well as their objectives and relationships with care and clinical systems. Findings from our work suggest that most frameworks focused on activity monitoring for assessing immediate risks while the opportunities for integrating environmental factors for analytics and decision-making, in particular for the long-term care were often overlooked. The potential for wearable devices and sensors, as well as distributed storage and access (e.g. cloud) are yet to be fully appreciated. There is a distinct lack of strong supporting clinical evidence from the implemented technologies. Socio-cultural aspects such as divergence among groups, acceptability and usability of AALS were also overlooked. Future systems need to look into the issues of privacy and cyber security

    An Adaptive Mediation Framework for Workflow Management in the Internet of Things

    Get PDF
    TĂ€rkavad vĂ€rkvĂ”rksĂŒsteemid koosnevad arvukast hulgast heterogeensetest fĂŒĂŒsilistest seadmetest, mis ĂŒhenduvad Internetiga. Need seadmed suudavad pidevalt ĂŒmbritseva keskkonnaga suhelda ja osana lĂ”ppkasutaja rakendusestest edendada valdkondi nagu tark kodu, e-tervis, logistika jne. Selleks, et integreerida fĂŒĂŒsilisi seadmeid vĂ€rkvĂ”rgu haldussĂŒssteemidega, on töövoo haldussĂŒsteemid kerkinud esile sobiva lahendusena. Ent töövoo haldussĂŒsteemide rakendamine vĂ€rkvĂ”rku toob kaasa reaalajas teenuste komponeerimise vĂ€ljakutseid nagu pidev teenusavastus ja -kĂ€ivitus. Lisaks kerkib kĂŒsimus, kuidas piiratud resurssidega vĂ€rkvĂ”rgu seadmeid töövoo haldussĂŒsteemidega integreerida ning kuidas töövooge vĂ€rkvĂ”rgu seadmetel kĂ€ivitada. TĂ¶Ă¶ĂŒlesanded (nagu pidev seadmeavastus) vĂ”ivad vĂ€rkvĂ”rgus osalevatele piiratud arvutusjĂ”udluse ja akukestvusega seadmetele nagu nutitelefonid koormavaks osutuda. Siinkohal on vĂ”imalikuks lahenduseks töö delegeerimine pilve. KĂ€esolev magistritöö esitleb kontekstipĂ”hist raamistikku tĂ¶Ă¶ĂŒlesannete vahendamiseks vĂ€rkvĂ”rgurakendustes. Antud raamistikus modelleeritakse ning kĂ€itatakse tĂ¶Ă¶ĂŒlesandeid kasutades töövoogusid. Raamistiku prototĂŒĂŒbiga lĂ€bi viidud uurimus nĂ€itas, et raamistik on vĂ”imeline tuvastama, millal seadme avastusĂŒlesannete pilve delegeerimine on kuluefektiivsem. Vahel aga pole töövoo kĂ€itamistarkvara paigaldamine vĂ€rkvĂ”rgu seadmetele soovitav, arvestades energiasÀÀstlikkust ning kĂ€ituskiirust. KĂ€esolev töö vĂ”rdles kaht tĂŒĂŒpi töövookĂ€itust: a) töövoo mudeli kĂ€itamine kĂ€itusmootoriga ning b) töövoo mudelist tĂ”lgitud programmikoodi kĂ€itamine. LĂ€htudes katsetest pĂ€ris seadmetega, vĂ”rreldi nimetatud kahte meetodit silmas pidades sĂŒsteemiressursside- ning energiakasutust.Emerging Internet of Things (IoT) systems consist of great numbers of heterogeneous physical entities that are interconnected via the Internet. These devices can continuously interact with the surrounding environment and be used for user applications that benefit human life in domains such as assisted living, e-health, transportation etc. In order to integrate the frontend physical things with IoT management systems, Workflow Management Systems (WfMS) have gained attention as a viable option. However, applying WfMS in IoT faces real-time service composition challenges such as continuous service discovery and invocation. Another question is how to integrate resource-contained IoT devices with the WfMS and execute workflows on the IoT devices. Tasks such as continuous device discovery can be taxing for IoT-involved devices with limited processing power and battery life such as smartphones. In order to overcome this, some tasks can be delegated to a utility Cloud instance. This thesis proposes a context-based framework for task mediation in Internet of Things applications. In the framework, tasks are modelled and executed as workflows. A case study carried out with a prototype of the framework showed that the proposed framework is able to decide when it is more cost-efficient to delegate discovery tasks to the cloud. However, sometimes embedding a workflow engine in an IoT device is not beneficial considering agility and energy conservation. This thesis compared two types of workflow execution: a) execution of workflow models using an embedded workflow engine and b) execution of program code translations based on the workflow models. Based on experiments with real devices, the two methods were compared in terms of system resource and energy usage

    On Data Management in Pervasive Computing Environments

    Get PDF
    Abstract—This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of “beliefs,” “desires, ” and “intentions. ” We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance. Index Terms—Mobile data management, pervasive computing environments, data and knowledge representation, profile-driven caching algorithm, profile driven data management, data-centric routing algorithm. é
    • 

    corecore