15,027 research outputs found
Understanding citizen science and environmental monitoring: final report on behalf of UK Environmental Observation Framework
Citizen science can broadly be defined as the involvement of volunteers in science. Over the past decade there has
been a rapid increase in the number of citizen science initiatives. The breadth of environmental-based citizen
science is immense. Citizen scientists have surveyed for and monitored a broad range of taxa, and also contributed
data on weather and habitats reflecting an increase in engagement with a diverse range of observational science.
Citizen science has taken many varied approaches from citizen-led (co-created) projects with local community
groups to, more commonly, scientist-led mass participation initiatives that are open to all sectors of society. Citizen
science provides an indispensable means of combining environmental research with environmental education and
wildlife recording.
Here we provide a synthesis of extant citizen science projects using a novel cross-cutting approach to objectively
assess understanding of citizen science and environmental monitoring including: 1. Brief overview of knowledge on the motivations of volunteers.
2. Semi-systematic review of environmental citizen science projects in order to understand the variety of
extant citizen science projects.
3. Collation of detailed case studies on a selection of projects to complement the semi-systematic review.
4. Structured interviews with users of citizen science and environmental monitoring data focussing on policy, in
order to more fully understand how citizen science can fit into policy needs.
5. Review of technology in citizen science and an exploration of future opportunities
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes
or terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it's
an autonomous system in which mobile hosts connected by wireless links are free
to be dynamically and some time act as routers at the same time, and we discuss
in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time, there is no direction
or limit the movement and so on, and thus needed a new optional path Agreement
(Routing Protocol) to identify nodes for these actions communicate with each
other path, An ideal choice way the agreement should not only be able to find
the right path, and the Ad Hoc Network must be able to adapt to changing
network of this type at any time. and we talk in details in this paper all the
information of Mobile Ad Hoc Network which include the History of ad hoc,
wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc
networks, and then we present more than 13 types of the routing Ad Hoc Networks
protocols have been proposed. In this paper, the more representative of routing
protocols, analysis of individual characteristics and advantages and
disadvantages to collate and compare, and present the all applications or the
Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa
Design and Application of Communication Gateway of EPA and MODBUS on Electric Power System
AbstractThrough the research of EPA Industrial Ethernet technology, MODBUS fieldbus technology, ARM embedded system and μC/OS-II real-time operating system, this paper discusses how to design and develop communication gateway of EPA and MODBUS. The communication gateway can realize bidirectional data transceiving on EPA protocol and MODBUS protocol. The communication gateway can provide a stable, secure, real-time and flexible solution for process control of the power plant
eCPD Programme - Enhanced Learning.
This collection of papers (edited by Kevin Donovan) has been produced by the Association for Learning Technology (ALT) for LSIS. They are based on the summaries used by presenters during workshops at the 2009 launch of the eCPD Programme
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful
energy awareness is essential when working with these devices.
Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features.
This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols.
The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and
has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference
publications in IEEE Explore and one workshop paper
Electronic security - risk mitigation in financial transactions : public policy issues
This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
Innovative Tokyo
This paper compares and contrasts Tokyo's innovation structure with the industrial districts model and the international hub model in the literature on urban and regional development. The Tokyo model embraces and yet transcends both industrial districts and international hub models. The paper details key elements making up the Tokyo model-organizational knowledge creation, integral and co-location systems of corporate R&D and new product development, test markets, industrial districts and clusters, participative consumer culture, continuous learning from abroad, local government policies, the national system of innovation, and the historical genesis of Tokyo in Japan's political economy. The paper finds that the Tokyo model of innovation will continue to evolve with the changing external environment, but fundamentally retains its main characteristics. The lessons from the Tokyo model is that openness, a diversified industrial base, the continuing development of new industries, and an emphasis on innovation, all contribute to the dynamism of a major metropolitan region.Labor Policies,Environmental Economics&Policies,Public Health Promotion,ICT Policy and Strategies,Agricultural Knowledge&Information Systems,ICT Policy and Strategies,Environmental Economics&Policies,Health Monitoring&Evaluation,Agricultural Knowledge&Information Systems,Innovation
- …