37 research outputs found

    Leveraging RSS Data For An Improved Radiolocation Estimation Algorithm Realization In LoRaWAN Using A Two-Tier Normalization

    Get PDF
    An attempt to further enhance the accuracy and reliability of M-iWMLR localization algorithm using a new weight matrix that was formulated with two-tier RSS data normalization is presented. The two-tier normalization: data clipping and z-score normalization were applied to form a new weight matrix in this work. Data clipping was first applied to reduce significantly the effects of outliers on the RSS data while z-score normalization provides data consistency. The new localization algorithm herein, referred to as Ext.M-iWMLR algorithm is carefully evaluated by the use of location accuracy (location error), root mean square error (RMSE), range of error, and R2 score metrics. This algorithm is validated with the Modified Improved Weighted Multiple Linear Regression (M-iWMLR). The simulation results generated with MATLAB show that the Ext.M-iWMLR algorithm, at 95 percentile reduced the mean location error by 19.45%. The range of error and RMSE are reduced by 11.08% and 17.95%, respectively. Furthermore, the respective R2 scores were increased by 5.71% and 17.17% for the latitude and longitude coordinates. It was established that the new weight matrix formulated through two-step normalization enhanced all the considered metrics

    Exploring Myths in Digital Forensics: Separating Science From Ritual

    Get PDF
    Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and rapidly changing field. Digital forensics methodology was developed more by practitioners in its early days rather than by computer scientists. This led to accepted best practices in the field that may not represent the best or, at least, tested, science. This paper explores some of these differences in the practice and evolution between digital and other forensic sciences, and recommends scientific approaches to apply to many digital forensic practice rituals

    Towards Reliable Multi-Path Routing : An Integrated Cooperation Model for Drones

    Get PDF
    Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security. In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes as an additional security layer to monitor their behavior and evaluate their level of reliability. To exemplify our solution, we focus on drone fleets (UAVs) as a pertinent case study. Drones frequently operate in dynamic, challenging environments, relying on Ad-hoc networks for communication. They serve as an apt illustration, highlighting the complexities of the issue and the efficacy of our proposed remedy. The simulation results show the effectiveness of our proposed solution compared to stae-of-the-artsolutions

    Análisis forense digital y su papel en la promoción del enjuiciamiento penal

    Get PDF
    Digital forensics is essentially synonymous with computer forensics, but the term "digital forensics" is generally used for the technical review of all devices that have the ability to store data. Today, digital criminology is challenged in cloud computing. The first problem is to understand why and how criminal and social actions are so unique and complex. The second problem is the lack of accurate scientific tools for forensic medicine in cyberspace. So far, no complete tools or explanations for criminology have been provided in the virtual infrastructure, and no training for security researchers has been provided in detail. Therefore, the author of the present descriptive-analytical research is based on library resources and using fish taking tools. To investigate suspicious cases related to cyberspace, criminologists must be well-equipped with technical and legal issues to deal with. In this article, we analyze digital criminology and its role in judicial law. The benefit of computer forensic knowledge is not only an indispensable necessity for security and judicial institutions, but also professional users and owners of computer systems, systems and networks must be fully aware of and properly comply with its legal and technical requirements.El análisis forense digital es esencialmente sinónimo de análisis forense informático, pero el término "análisis forense digital" se utiliza generalmente para la revisión técnica de todos los dispositivos que tienen la capacidad de almacenar datos. Hoy en día, la criminología digital se enfrenta al desafío de la computación en la nube. El primer problema es comprender por qué y cómo las acciones criminales y sociales son tan únicas y complejas. El segundo problema es la falta de herramientas científicas precisas para la medicina forense en el ciberespacio. Hasta ahora, no se han proporcionado herramientas completas o explicaciones para la criminología en la infraestructura virtual, y no se ha proporcionado ninguna formación detallada a los investigadores de seguridad. Por lo tanto, el autor de la presente investigación descriptivo-analítica se basa en los recursos de la biblioteca y en el uso de herramientas de pesca. Para investigar casos sospechosos relacionados con el ciberespacio, los criminólogos deben estar bien equipados con los problemas técnicos y legales que abordar. En este artículo analizamos la criminología digital y su papel en el derecho judicial. El beneficio del conocimiento forense informático no solo es una necesidad indispensable para las instituciones de seguridad y judiciales, sino que también los usuarios profesionales y propietarios de sistemas, sistemas y redes informáticas deben conocer y cumplir debidamente sus requisitos legales y técnicos

    Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks

    Get PDF
    The high-level contributions of this paper are the design and development of two distributed spanning tree-based data gathering algorithms for wireless mobile sensor networks and their exhaustive simulation study to investigate a complex stability vs. node-network lifetime tradeoff that has been hitherto not explored in the literature. The topology of the mobile sensor networks changes dynamically with time due to random movement of the sensor nodes. Our first data gathering algorithm is stability-oriented and it is based on the idea of finding a maximum spanning tree on a network graph whose edge weights are predicted link expiration times (LET). Referred to as the LET-DG tree, the data gathering tree has been observed to be more stable in the presence of node mobility. However, stability-based data gathering coupled with more leaf nodes has been observed to result in unfair use of certain nodes (the intermediate nodes spend more energy compared to leaf nodes), triggering pre-mature node failures eventually leading to network failure (disconnection of the network of live nodes). As an alternative, we propose an algorithm to determine a minimum-distance spanning tree (MST) based data gathering tree that is more energy-efficient and prolongs the node and network lifetimes, at the cost frequent tree reconfigurations

    Cognitive radio policy-based adaptive blind rendezvous protocols for disaster response

    Get PDF
    In disaster scenarios, with damaged network infrastructure, cognitive radio (CR) can be used to provide temporary network access in the first few hours. Since spectrum occupancy will be unknown, the radios must rely on spectrum sensing and opportunistic access. An initial goal is to establish rendezvous between CR nodes to set up the network. The unknown primary radio (PR) activity and CR node topology makes this a challenging task. Existing blind rendezvous strategies provide guarantees on time to rendezvous, but assume channels with no PR activity and no external interferers. To handle this problem of blind multi-node rendezvous in the presence of primary users, we propose an Extended Modular Clock Algorithm which abandons the guarantee on time to rendezvous, an information exchange mechanism for the multi-node problem, and various cognitive radio operating policies. We show that the adapted protocols can achieve up to 80% improvement in the expected time to rendezvous and reduce the harmful interference caused to the primary radio

    An Intelligent Approach to Optimize Link State Routing Protocol in Vehicular Ad-Hoc Network

    Get PDF
    Vehicular ad-hoc network (VANET) is one of the research areas of mobile ad-hoc network (MANET) with some limitations like road constraint, speed of vehicles , location, direction of vehicle, traffic conditions structure of highways etc. and the formation of VANET takes place by moving vehicles in particular direction. The advantages of VANET are several - road side assistance, safety of drivers, spreading of information regarding any miss-happening on the road etc. Spreading the message requires communication among running vehicles. Due to vehicle speed in network the communication system failure occur most of the time, this results data delivery failure in the network. Therefore, Routing of data packet in the VANETs are more challenging task. Each vehicle in VANET has onboard unit (OBU), which provides the necessary environment for communication among vehicles and the system has routing protocols for the dissemination of message packets between the vehicles. Performance of routing algorithm depends upon the parameter selection and selection of next-hop methods for further communication with other nodes in the network. In this paper we proposes the connectivity methods and routing algorithms which draws inspiration from Swarm Intelligence to obtain different parameters to improve data dissemination. Simulation results show that our protocol will perform better than the existing solutions in terms of data dissemination under the condition of the alternating network connectivity.

    The influence of LED road stud color on driver behavior and perception along horizontal curves at nighttime

    Get PDF
    Scotopic lighting conditions (reduced level of natural light or presence of artificial lighting) may impair driving performance and, therefore, impact on road safety. Thanks to technological developments, low-cost light emitting diode (LED) studs are now being considered as an alternative and affordable pavement marking solution to assist drivers in these conditions. By helping them to maintain their vehicle within the marked lane, the studs should prevent any deterioration in driver performance when negotiating curves at nighttime. However, the few studies that investigated the impact of LED studs on driving performance produced inconsistent results, and the question of whether they actively improve driver performance remains open. Furthermore, while international road regulations allow the use of LED studs, they do not provide consistent prescriptions for their lighting color.Here, we assessed the influence of different LED lighting colors (red, white, and unlit) on longitudinal and transversal driver behavior when negotiating road curves with different radii and sense of direction. In the study, thirty-six drivers drove a dynamic virtual scenario featuring twenty-four curves. After the driving simulation, participants completed a static perception test in which they assessed each curve in terms of the perceived levels of risk, pleasantness, and arousal they experienced while driving on it.In comparison with the unlit and red lit curves, those marked with white lighting LED studs were perceived as less risky, less arousing, and more pleasant independently of the radii and curve direction. Furthermore, when entering these curves, participants tended to shift their driving trajectories towards the center of the road. This effect was most evident on the central part of the curve. Further studies are expected to corroborate these results by focusing on different road geometries and LED stud layouts, as well as testing driving behavior in controlled road field studies

    The effects of value innovation on companies' performance in Yemen telecommunications industry

    Get PDF
    Innovation has been recognized to be the key to growth and survival for the telecommunications industry. Globalization, liberalization, and privatization, which are the most associated terms with this sector, resulted in fierce competition and make it more challenging for telecommunications firms to expand their market share, and hence, increase customer base, sales volume, and ultimately profit. The new strategy to succeed is innovation differentiation which leads to break out of the competition and create an uncontested market. That can be done by the provision of high-value innovative services which translate into consumer satisfaction and promote customer loyalty. This study aims to propose a new theoretical model to enhance the value innovation practices. It studies the contribution of value innovation in the telecommunications industry in Yemen and its effects on customer satisfaction, customer loyalty, firm performance sustainable growth. Accordingly, the study adopts a combination of quantitative and qualitative research design. Firstly, a questionnaire survey was conducted and data collected for 304 respondents of mobile service providers in Yemen to examine the effects of value innovation on customer satisfaction, customer loyalty, firm’s performance, and firm’s sustainable growth. Besides that, the generated data and proposed model were measured and analyzed by using the Statistical Package for Social Science (SPSS) and SmartPLS software. In consequence, the results empirically validated the theoretical research model confirming the significance of value innovation approach to achieve through promoting customer satisfaction and loyalty. Secondly, 10 semi-structured interviews for telecommunications senior executives and experts were conducted to deep dive into Yemen telecommunications issues and underlying problems and difficulties regarding innovation in the Yemen telecommunications industry. The generated data were analyzed using descriptive analysis, coding, and content analysis to report the outcomes of conducted interviews and provide a concrete foundation of information and facts of the nature of innovation management in the Yemen telecommunications industry. Thus, 19 sub-themes were synthesized and discussed with relevant to four main categorized themes including innovation management practices and organizational difficulties and challenges; World Trade Organization (WTO) accession and market liberalization; value innovation adoption; and future aspirations and expectations with regards to innovation. Finally, the integrated results and outcomes were employed to propose a roadmap that could efficiently enhance value innovation activities, promote customer satisfaction and loyalty, growth
    corecore