960 research outputs found

    Combining Multi-Agent Systems and Wireless Sensor Networks for Monitoring Crop Irrigation

    Get PDF
    [EN]Monitoring mechanisms that ensure efficient crop growth are essential on many farms, especially in certain areas of the planet where water is scarce. Most farmers must assume the high cost of the required equipment in order to be able to streamline natural resources on their farms. Considering that many farmers cannot afford to install this equipment, it is necessary to look for more effective solutions that would be cheaper to implement. The objective of this study is to build virtual organizations of agents that can communicate between each other while monitoring crops. A low cost sensor architecture allows farmers to monitor and optimize the growth of their crops by streamlining the amount of resources the crops need at every moment. Since the hardware has limited processing and communication capabilities, our approach uses the PANGEA architecture to overcome this limitation. Specifically, we will design a system that is capable of collecting heterogeneous information from its environment, using sensors for temperature, solar radiation, humidity, pH, moisture and wind. A major outcome of our approach is that our solution is able to merge heterogeneous data from sensors and produce a response adapted to the context. In order to validate the proposed system, we present a case study in which farmers are provided with a tool that allows us to monitor the condition of crops on a TV screen using a low cost device.European Commision (EC). Funding H2020/MSCARISE. Project Code: 641794European Commision (EC). Funding FP7/SPE/SME. Project Code: 283638European Commision (EC). Funding FP7/SP1/ENV. Project Code: 28294

    Flexibility Support for Homecare Applications Based on Models and Multi-Agent Technology

    Get PDF
    In developed countries, public health systems are under pressure due to the increasing percentage of population over 65. In this context, homecare based on ambient intelligence technology seems to be a suitable solution to allow elderly people to continue to enjoy the comforts of home and help optimize medical resources. Thus, current technological developments make it possible to build complex homecare applications that demand, among others, flexibility mechanisms for being able to evolve as context does (adaptability), as well as avoiding service disruptions in the case of node failure (availability). The solution proposed in this paper copes with these flexibility requirements through the whole life-cycle of the target applications: from design phase to runtime. The proposed domain modeling approach allows medical staff to design customized applications, taking into account the adaptability needs. It also guides software developers during system implementation. The application execution is managed by a multi-agent based middleware, making it possible to meet adaptation requirements, assuring at the same time the availability of the system even for stateful applications.This work was financed in part by the University of the Basque Country (UPV/EHU) under project UFI 11/28, by the Regional Government of the Basque Country under Project IT719-13, and by the MCYT&FEDER under project DPI 2012-37806-C02-01

    An Agent-Based Framework for Urban Mobility Simulation

    No full text
    International audienceMobility study is composed of many research areas which one interests us: urban mobility. In the literature, urban mobilities are represented by analytical techniques like stochastic laws or they are defined by simulation tools like Multi-Agents Systems (MAS). The goal of our work is to define citizen behaviour in order to observe population dynamics by a simulation. This strategy is facilitated by a meta-model and a toolkit which are used with a particular method. The latter begins by a conceptual representation of each mobile and finishes by a mobility simulator. This paper aims at describing the mobility simulation toolkit. Thanks to this framework, mobility simulator development is sim- plified. It allows us to create distributed applications which are based on MAS

    Share and reuse of context metadata resulting from interactions between users and heterogeneous web-based learning environments

    Get PDF
    L'intérêt pour l'observation, l'instrumentation et l'évaluation des systèmes éducatifs en ligne est devenu de plus en plus important ces dernières années au sein de la communauté des Environnements Informatique pour l'Apprentissage Humain (EIAH). La conception et le développement d'environnements d'apprentissage en ligne adaptatifs (AdWLE - Adaptive Web-based Learning Environments) représentent une préoccupation majeure aujourd'hui, et visent divers objectifs tels que l'aide au processus de réingénierie, la compréhension du comportement des utilisateurs, ou le soutient à la création de systèmes tutoriels intelligents. Ces systèmes gèrent leur processus d'adaptation sur la base d'informations détaillées reflétant le contexte dans lequel les étudiants évoluent pendant l'apprentissage : les ressour-ces consultées, les clics de souris, les messages postés dans les logiciels de messagerie instantanée ou les forums de discussion, les réponses aux questionnaires, etc. Les travaux présentés dans ce document sont destinés à surmonter certaines lacunes des systèmes actuels en fournissant un cadre dédié à la collecte, au partage et à la réutilisation du contexte représenté selon deux niveaux d'abstraction : le contexte brut (résultant des interactions directes entre utilisateurs et applications) et le contexte inféré (calculé à partir des données du contexte brut). Ce cadre de travail qui respecte la vie privée des usagers est fondé sur un standard ouvert dédié à la gestion des systèmes, réseaux et applications. Le contexte spécifique aux outils hétérogènes constituant les EIAHs est représenté par une structure unifiée et extensible, et stocké dans un référentiel central. Pour faciliter l'accès à ce référentiel, nous avons introduit une couche intermédiaire composée d'un ensemble d'outils. Certains d'entre eux permettent aux utilisateurs et applications de définir, collecter, partager et rechercher les données de contexte qui les intéressent, tandis que d'autres sont dédiés à la conception, au calcul et à la délivrance des données de contexte inférées. Pour valider notre approche, une mise en œuvre du cadre de travail proposé intègre des données contextuelles issues de trois systèmes différents : deux plates-formes d'apprentissage Moodle (celle de l'Université Paul Sabatier de Toulouse, et une autre déployée dans le cadre du projet CONTINT financé par l'Agence Nationale de la Recherche) et une instanciation locale du moteur de recherche de la fondation Ariadne. A partir des contextes collectés, des indicateurs pertinents ont été calculés pour chacun de ces environnements. En outre, deux applications qui exploitent cet ensemble de données ont été développées : un système de recommandation personnalisé d'objets pédagogiques ainsi qu'une application de visualisation fondée sur les technologies tactiles pour faciliter la navigation au sein de ces données de contexte.An interest for the observation, instrumentation, and evaluation of online educational systems has become more and more important within the Technology Enhanced Learning community in the last few years. Conception and development of Adaptive Web-based Learning Environments (AdWLE) in order to facilitate the process of re-engineering, to help understand users' behavior, or to support the creation of Intelligent Tutoring Systems represent a major concern today. These systems handle their adaptation process on the basis of detailed information reflecting the context in which students evolve while learning: consulted resources, mouse clicks, chat messages, forum discussions, visited URLs, quizzes selections, and so on. The works presented in this document are intended to overcome some issues of the actual systems by providing a privacy-enabled framework dedicated to the collect, share and reuse of context represented at two abstraction levels: raw context (resulting from direct interactions between users and applications) and inferred context (calculated on the basis of raw context). The framework is based on an open standard dedicated to system, network and application management, where the context specific to heterogeneous tools is represented as a unified and extensible structure and stored into a central repository. To facilitate access to this context repository, we introduced a middleware layer composed of a set of tools. Some of them allow users and applications to define, collect, share and search for the context data they are interested in, while others are dedicated to the design, calculation and delivery of inferred context. To validate our approach, an implementation of the suggested framework manages context data provided by three systems: two Moodle servers (one running at the Paul Sabatier University of Toulouse, and the other one hosting the CONTINT project funded by the French National Research Agency) and a local instantiation of the Ariadne Finder. Based on the collected context, relevant indicators have been calculated for each one of these environments. Furthermore, two applications which reuse the encapsulated context have been developed on top of the framework: a personalized system for recommending learning objects to students, and a visualization application which uses multi-touch technologies to facilitate the navigation among collected context entities

    Distributed Hierarchical IDS For MANET Over AODV+.

    Get PDF
    In this paper, we introduce background knowledge of wireless ad hoc networking mobile ad hoc network (MANET) as well as intrusion detection system (IDS) and mobile agents. This research study surveys, studies and compares the existing intrusion detection based on mobile agent for mobile ad hoc networks. Based on our best knowledge from previous researches we design distributed hierarchical /D^S inclusive of network-based and host-based intrusion detection system with due consideration to their characteristics on ad hoc on4emand distance vector routing protocol (AODV+)

    Teaching co-simulation basics through practice

    Get PDF
    International audienceCyber-physical system representation is one of the current challenges in Modeling and Simulation. In fact, multi-domain modeling requires new approaches to rigorously deal with it. Co-simulation, one of the approaches, lets modelers use several M&S tools in collaboration. The challenge is to find a way to enable co-simulation use for non-IT experts while being aware of assumptions and limitations involved. This paper deals with co-simulation basic principles teaching through practice. we propose an iterative and modular co-simulation process supported by a DSL-based environment for the MECSYCO co-simulation platform. Through a thermal use case, we are able to introduce co-simulation in a 4 hours tutorial destined to our students. Efficient energy management is one of this century challenges. The current trend to deal with it is to build cyber-physical system (CPS) [Kleissl and Agarwal, 2010]. CPS are physical systems monitored and supervised by one or several computers through a communication networks [Ra-jkumar et al., 2010]. Smart-grids are examples of CPS where the energy network is coupled with a communication network to enable remote monitoring and control. The Modeling and Simulation (M&S) of such systems is one of the current challenges in M&S due to the inter-disciplinary issues they raise. It requests the development of new methods which deal with multi-domain by integrating each expert point of view in the same rigorous and efficient M&S activity. Co-simulation [Gomes et al., 2018] is a way to achieve it

    Actes de la conférence BDA 2014 : Gestion de données - principes, technologies et applications

    No full text
    International audienceActes de la conférence BDA 2014 Conférence soutenue par l'Université Joseph Fourier, Grenoble INP, le CNRS et le laboratoire LIG. Site de la conférence : http://bda2014.imag.fr Actes en ligne : https://hal.inria.fr/BDA201

    Autonomous Vehicles:The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication

    Get PDF
    The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may raise more vulnerabilities in the data communication process between these vehicles and IoT devices. The data involved in the CVs may be encrypted using an asymmetric and symmetric algorithm. Autonomous vehicles with proactive cybersecurity solutions, power-based cyberattacks, and dynamic countermeasures are the modern issues/developments with emerging technology and evolving attacks. Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. In the future, CVs in data communication between autonomous vehicles (DCAV), the weaknesses of autonomous vehicular networks (AVN), and cyber threats to network functions form the primary security issues in big data communication, AVN, and DCAV. Therefore, efficient countermeasure models and security algorithms are required to minimize CVs and data breaches. As a technique, policies and rules of CVs with proxy and demilitarized zone (DMZ) servers were combined to enhance the efficiency of the countermeasure. In this study, we propose an information security approach that depends on the increasing energy levels of attacks and CVs by identifying the energy levels of each attack. To show the results of the performance of our proposed countermeasure, CV and energy consumption are compared with different attacks. Thus, the countermeasures can secure big data communication and DCAV using security algorithms related to cybersecurity and effectively prevent CVs and big data breaches during data communication

    Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing

    Get PDF
    To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes. That led to an environment where commercial wireless broadband need to share spectrum with the federal and non-federal operations. Implementing sharing regimes on a non-opportunistic basis means that sharing agreements must be implemented. To have meaning, those agreements must be enforceable.\ud \ud With the significant exception of license-free wireless systems, commercial wireless services are based on exclusive use. With the policy change facilitating spectrum sharing, it becomes necessary to consider how sharing might take place in practice. Beyond the technical aspects of sharing, that must be resolved lie questions about how usage rights are appropriately determined and enforced. This paper is reasoning about enforcement in a particular spectrum bands (1695-1710 MHz and 3.5 GHz) that are currently being proposed for sharing between commercial services and incumbent spectrum users in the US. We examine three enforcement approaches, exclusion zones, protection zones and pure ex post and consider their implications in terms of cost elements, opportunity cost, and their adaptability
    corecore