82 research outputs found

    iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks

    Get PDF
    Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA??????an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protection and data privacy-preservation mechanisms work synergistically. We evaluate the iPDA scheme in terms of the efficacy of privacy preservation, communication overhead, and data aggregation accuracy, comparing with a typical data aggregation scheme--- TAG, where no integrity protection and privacy preservation is provided. Both theoretical analysis and simulation results show that iPDA achieves the design goals while still maintains the efficiency of data aggregation

    Towards a National Security Analysis Approach via Machine Learning and Social Media Analytics

    Get PDF
    Various severe threats at national and international level, such as health crises, radicalisation, or organised crime, have the potential of unbalancing a nation's stability. Such threats impact directly on elements linked to people's security, known in the literature as human security components. Protecting the citizens from such risks is the primary objective of the various organisations that have as their main objective the protection of the legitimacy, stability and security of the state. Given the importance of maintaining security and stability, governments across the globe have been developing a variety of strategies to diminish or negate the devastating effects of the aforementioned threats. Technological progress plays a pivotal role in the evolution of these strategies. Most recently, artificial intelligence has enabled the examination of large volumes of data and the creation of bespoke analytical tools that are able to perform complex tasks towards the analysis of multiple scenarios, tasks that would usually require significant amounts of human resources. Several research projects have already proposed and studied the use of artificial intelligence to analyse crucial problems that impact national security components, such as violence or ideology. However, the focus of all this prior research was examining isolated components. However, understanding national security issues requires studying and analysing a multitude of closely interrelated elements and constructing a holistic view of the problem. The work documented in this thesis aims at filling this gap. Its main contribution is the creation of a complete pipeline for constructing a big picture that helps understand national security problems. The proposed pipeline covers different stages and begins with the analysis of the unfolding event, which produces timely detection points that indicate that society might head toward a disruptive situation. Then, a further examination based on machine learning techniques enables the interpretation of an already confirmed crisis in terms of high-level national security concepts. Apart from using widely accepted national security theoretical constructions developed over years of social and political research, the second pillar of the approach is the modern computational paradigms, especially machine learning and its applications in natural language processing

    An Experimental Study of Home Gateway Characteristics

    Get PDF
    Many residential and small business users connect to the Internet via home gateways, such as DSL and cable modems. The characteristics of these devices heavily influence the quality and performance of the Internet service that these users receive. Anecdotal evidence suggests that an extremely diverse set of behaviors exists in the deployed base, forcing application developers to design for the lowest common denominator. This paper experimentally analyzes some characteristics of a substantial number of different home gateways: binding timeouts, queuing delays, throughput, protocol support and others.Peer reviewe

    Study of Middle-box Behavior on Transport Layer Protocols

    Get PDF
    Peer reviewe

    Public Works, Modernity, and Chinese Nationalism in Shanghai, 1911-1941

    Get PDF
    This thesis focuses on the roads and public services created by the SMC because they are a topic which clearly illustrates the ambiguity of colonial modernism in Shanghai. This colonial modernism, which in Shanghai was largely instigated by the SMC, is a process which not only made the Chinese victims of colonial modernity, but also taught the Chinese the value of this Western modernity. This thesis explores these thoughts in terms of the actual use of land in Shanghai to build roads and the administration of these roads, but also includes the use of land for other public services. While much of the recent literature on Chinese modernity has moved to cultural areas such as film, architecture, and fashion, this essay will attempt to re-examine the urban expansion of Shanghai by focusing less on the diplomatic aspect of this topic and instead on examining the use of each parcel of land as a part of the urban infrastructure and how this affected the modernization and nationalism in China. It will do so by exploring the urban expansion of Shanghai, especially the building of roads and other public services, during the majority of the Chinese Republican Period. The essay is divided into four chapters based on major changes in the expansion of the International Settlement and the relationship between the SMC and its Chinese and other counterparts. The first chapter discusses the time period from 1911-1915 when the SMC continued to expand as they had previously done during the Ch'ing dynasty. The second chapter focuses on the years 1916-1927 when formal expansion was no longer a viable option and the SMC turned to building extra-Settlement. The third chapter discusses the years between 1928-1936 when the KMT created a new administration in Shanghai and the SMC slowly began to lose control of the roads to the new Chinese administration. The final chapter discusses the disruption of urban expansion during the Japanese war and occupation from 1937-1941. This essay will attempt to examine the urban expansion of Shanghai by focusing less on cultural aspects and instead on use of land, construction of roads, and the development of urban infrastructure, which gave rise to colonial modernism and Chinese nationalism

    Modeling Factions for \u27Effects Based Operations\u27: Part I Leader and Follower Behaviors

    Get PDF
    This paper presents a synthetic approach for generating role playing simulation games intended to support analysts (and trainees) interested in testing alternative competing courses of action (operations) and discovering what effects they are likely to precipitate in potential ethno-political conflict situations. Simulated leaders and followers capable of playing these games are implemented in a cognitive modeling framework, called PMFserv, which covers value systems, personality and cultural factors, emotions, relationships, perception, stress/coping style and decision making. Of direct interest, as Sect. 1.1 explains, is mathematical representation and synthesis of best-of-breed behavioral science models within this framework to reduce dimensionality and to improve the realism and internal validity of the agent implementations. Sections 2 and 3 present this for leader profiling instruments and group membership decision-making, respectively. Section 4 serves as an existence proof that the framework has generated several training and analysis tools, and Sect. 5 concludes with lessons learned. Part II turns to the question of assessment of the synthesis and its usage in course of action studies

    Daily Eastern News: November 17, 2006

    Get PDF
    https://thekeep.eiu.edu/den_2006_nov/1015/thumbnail.jp

    Daily Eastern News: November 17, 2006

    Get PDF
    https://thekeep.eiu.edu/den_2006_nov/1015/thumbnail.jp
    corecore