508 research outputs found

    A Novel Energy-Efficient Reservation System for Edge Computing in 6G Vehicular Ad Hoc Network

    Get PDF
    The roadside unit (RSU) is one of the fundamental components in a vehicular ad hoc network (VANET), where a vehicle communicates in infrastructure mode. The RSU has multiple functions, including the sharing of emergency messages and the updating of vehicles about the traffic situation. Deploying and managing a static RSU (sRSU) requires considerable capital and operating expenditures (CAPEX and OPEX), leading to RSUs that are sparsely distributed, continuous handovers amongst RSUs, and, more importantly, frequent RSU interruptions. At present, researchers remain focused on multiple parameters in the sRSU to improve the vehicle-to-infrastructure (V2I) communication; however, in this research, the mobile RSU (mRSU), an emerging concept for sixth-generation (6G) edge computing vehicular ad hoc networks (VANETs), is proposed to improve the connectivity and efficiency of communication among V2I. In addition to this, the mRSU can serve as a computing resource for edge computing applications. This paper proposes a novel energy-efficient reservation technique for edge computing in 6G VANETs that provides an energy-efficient, reservation-based, cost-effective solution by introducing the concept of the mRSU. The simulation outcomes demonstrate that the mRSU exhibits superior performance compared to the sRSU in multiple aspects. The mRSU surpasses the sRSU with a packet delivery ratio improvement of 7.7%, a throughput increase of 5.1%, a reduction in end-to-end delay by 4.4%, and a decrease in hop count by 8.7%. The results are generated across diverse propagation models, employing realistic urban scenarios with varying packet sizes and numbers of vehicles. However, it is important to note that the enhanced performance parameters and improved connectivity with more nodes lead to a significant increase in energy consumption by 2%

    Critical Heritage Studies and the Futures of Europe

    Get PDF
    Cultural and natural heritage are central to ‘Europe’ and ‘the European project’. They were bound up in the emergence of nation-states in the eighteenth and nineteenth centuries, where they were used to justify differences over which border conflicts were fought. Later, the idea of a ‘common European heritage’ provided a rationale for the development of the European Union. Now, the emergence of ‘new’ populist nationalisms shows how the imagined past continues to play a role in cultural and social governance, while a series of interlinked social and ecological crises are changing the ways that heritage operates. New discourses and ontologies are emerging to reconfigure heritage for the circumstances of the present and the uncertainties of the future. Taking the current role of heritage in Europe as its starting point, Critical Heritage Studies and the Futures of Europe presents a number of case studies that explore key themes in this transformation. Contributors draw on a range of disciplinary perspectives to consider, variously, the role of heritage and museums in the migration and climate ‘emergencies’; approaches to urban heritage conservation and practices of curating cities; digital and digitised heritage; the use of heritage as a therapeutic resource; and critical approaches to heritage and its management. Taken together, the chapters explore the multiple ontologies through which cultural and natural heritage have actively intervened in redrawing the futures of Europe and the world

    Flexible Hardware-based Security-aware Mechanisms and Architectures

    Get PDF
    For decades, software security has been the primary focus in securing our computing platforms. Hardware was always assumed trusted, and inherently served as the foundation, and thus the root of trust, of our systems. This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption. However, the recent outbreak of microarchitectural attacks has shaken these long-established trust assumptions in hardware entirely, thereby threatening the security of all of our computing platforms and bringing hardware and microarchitectural security under scrutiny. These attacks have undeniably revealed the grave consequences of hardware/microarchitecture security flaws to the entire platform security, and how they can even subvert the security guarantees promised by dedicated security architectures. Furthermore, they shed light on the sophisticated challenges particular to hardware/microarchitectural security; it is more critical (and more challenging) to extensively analyze the hardware for security flaws prior to production, since hardware, unlike software, cannot be patched/updated once fabricated. Hardware cannot reliably serve as the root of trust anymore, unless we develop and adopt new design paradigms where security is proactively addressed and scrutinized across the full stack of our computing platforms, at all hardware design and implementation layers. Furthermore, novel flexible security-aware design mechanisms are required to be incorporated in processor microarchitecture and hardware-assisted security architectures, that can practically address the inherent conflict between performance and security by allowing that the trade-off is configured to adapt to the desired requirements. In this thesis, we investigate the prospects and implications at the intersection of hardware and security that emerge across the full stack of our computing platforms and System-on-Chips (SoCs). On one front, we investigate how we can leverage hardware and its advantages, in contrast to software, to build more efficient and effective security extensions that serve security architectures, e.g., by providing execution attestation and enforcement, to protect the software from attacks exploiting software vulnerabilities. We further propose that they are microarchitecturally configured at runtime to provide different types of security services, thus adapting flexibly to different deployment requirements. On another front, we investigate how we can protect these hardware-assisted security architectures and extensions themselves from microarchitectural and software attacks that exploit design flaws that originate in the hardware, e.g., insecure resource sharing in SoCs. More particularly, we focus in this thesis on cache-based side-channel attacks, where we propose sophisticated cache designs, that fundamentally mitigate these attacks, while still preserving performance by enabling that the performance security trade-off is configured by design. We also investigate how these can be incorporated into flexible and customizable security architectures, thus complementing them to further support a wide spectrum of emerging applications with different performance/security requirements. Lastly, we inspect our computing platforms further beneath the design layer, by scrutinizing how the actual implementation of these mechanisms is yet another potential attack surface. We explore how the security of hardware designs and implementations is currently analyzed prior to fabrication, while shedding light on how state-of-the-art hardware security analysis techniques are fundamentally limited, and the potential for improved and scalable approaches

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Defying Convention: Devising new approaches to heritage values in Valletta, Malta.

    Get PDF
    This thesis is concerned with heritage values and significance in the context of the World Heritage listed city of Valletta, the capital of the Maltese Islands, and the author’s home. Though the city’s fortunes have ebbed and flowed over the years, it has recently experienced a period of accelerated regeneration. Now a popular destination for cultural tourists, Valletta is a city in transition, where renewal has led to the conservation and restoration of its urban fabric yet change wrought by these processes has had a demonstrable, detrimental effect on its lesser recognized heritage. An intentional focus on these ‘unofficial’ heritage values is the principal subject of this research, in order to produce an alternative reading of a heritage landscape most often associated with more traditional criteria. This research is framed and informed by more contemporary approaches to heritage values, and the intellectual foundation for this approach is drawn from recent scholarship and related heritage conventions. Of particular note are the Burra Charter (Australia ICOMOS 2013 [1979]) and the Faro Convention (Council of Europe 2005) which reconceptualize the ideas of significance and emphasize public contribution in the process of defining what it is about a heritage place that is significant. This thesis adopts an innovative, in-situ data collection method, where the participants lead the researcher on walks around the city. Interviews were conducted with 19 participants in three phases between 2021 and 2022. The interviews themselves are participant-defined and captured on video as well as audio. The resultant data are analysed, organized and presented thematically. This analysis demonstrates the pivotal role of social values in understanding significance from a grassroots perspective, an approach that has never previously been applied in the context of Valletta

    Space Governance for the 21st Century: Balancing Space Development with Sustainability

    Get PDF
    The development of space is occurring in new ways and at an accelerated pace compared to even just a decade ago. As new and greater volumes of space activities, like large constellations of small satellites, space traffic management, and on orbit rendezvous, proximity, servicing, and assembly operations become routine, new international governance will be necessary to balance the development of space with space sustainability. While some international space governance does exist, it is poorly suited to govern new space activities and the environmental threats posed by space development. The need for new governance is well documented, yet the international community, and specifically the United Nations Committee on the Peaceful Uses of Outer Space (COPUOS), has been unable to organize around space governance and produce effective international governance measures.This research will compare governance regimes of the air, maritime, and internet domains to understand how stakeholders and international organisations approach governance of a global commons. Through the examination of the International Maritime Organization, International Civil Aviation Organization, and the multistakeholder group responsible for internet governance this research will draw insight into the organisational structures, processes, tools, and techniques that aid in the creation of international governance to inform new governance for space.Findings offer insight into the organisational qualities, governance tools, and necessary change needed to govern space more effectively. First, despite differences across case studies, there are key features of effective international governance present in each. Each system of governance is designed based on unique features and qualities of that domain and its stakeholders. Still, decision-making processes, membership participation, enforcement, and keeping pace with new technology all play central roles in effective international governance.Proper consensus decision-making can play an outsized role in whether a forum can advance governance or not. The case studies make clear that to properly use consensus as a decision-making approach requires thoughtful consideration of the increased transaction costs weighed against necessary agreement compliance. For example, not all governance outputs require a high degree of compliance to be effective and therefore do not justify higher transaction costs associated with strict consensus processes. Similarly, thoughtful use of consensus also requires evaluating where in the diplomatic process consensus is required. Not every diplomatic decision requires full consensus. Yet, COPUOS currently does not adjust its decision-making approach based on output or where in the diplomatic process it requires consensus, which has allowed the forum's use of consensus to hinder the development of new governance.Another finding is that strong governance leverages a multitude of governance tools. Treaties are an important governance measure, but so too are standards and recommended practices, guidelines, codes, performance-based measures, audit schemes, scoping exercises, and educational resources, among other tools. Many of the emerging space activities will continue to evolve quickly, which requires producing governance in a timely manner and continuous evolution of agreements. In each case study, evolving activities were governed by a spectrum of measures that allowed the IO to affect member behaviour quickly and overtime through complementary outputs.Each case study made clear that effective governance requires constant work across multiple workstreams, yet COPUOS is a small three body organisation with too few resources to increase work cadence or volume. A larger secretariat and the capacity to create new subcommittees or working groups is likely to aid space governance. COPUOS will require major changes to accommodate space governance needs. Finally, this research offers recommendations for future research capable of exploring additional possible solutions to existing space governance problems
    corecore