625,942 research outputs found

    On the Move to Meaningful Internet Systems: OTM 2015 Workshops: Confederated International Workshops: OTM Academy, OTM Industry Case Studies Program, EI2N, FBM, INBAST, ISDE, META4eS, and MSC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings

    Get PDF
    International audienceThis volume constitutes the refereed proceedings of the following 8 International Workshops: OTM Academy; OTM Industry Case Studies Program; Enterprise Integration, Interoperability, and Networking, EI2N; International Workshop on Fact Based Modeling 2015, FBM; Industrial and Business Applications of Semantic Web Technologies, INBAST; Information Systems, om Distributed Environment, ISDE; Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS; and Mobile and Social Computing for collaborative interactions, MSC 2015. These workshops were held as associated events at OTM 2015, the federated conferences "On The Move Towards Meaningful Internet Systems and Ubiquitous Computing", in Rhodes, Greece, in October 2015.The 55 full papers presented together with 3 short papers and 2 popsters were carefully reviewed and selected from a total of 100 submissions. The workshops share the distributed aspects of modern computing systems, they experience the application pull created by the Internet and by the so-called Semantic Web, in particular developments of Big Data, increased importance of security issues, and the globalization of mobile-based technologies

    Multibeam systems for the detection of gas flares in the water column

    Get PDF
    WĂ€rtsilĂ€ ELAC Nautik is one major global player in the multibeam business. The multibeam systems are marketed under the well-known brand name SeaBeam, including systems for medium water depth and deep-water areas. The ELAC SeaBeam 3012/3020 deep-water systems operate in the 12 kHz and 20 kHz frequency bands, whereas the ELAC SeaBeam 3030/3050 medium-depth systems operate in the 30 kHz and 50 kHz frequency bands. While formerly only continuous wave (CW) pulses were applied, the new Mk II series of the ELAC SeaBeam 3030/3050 multibeam systems offer the possibility to apply frequencymodulated (FM) pulses for increased measurement ranges, improved range resolution and better data quality. FM pulses require a correlation of the beamformed data of all beam directions with pulse replica in order to obtain pulse compression. Additionally, Doppler shifts of the operating frequencies induced by the ship’s movement have to be compensated. In order to obtain unrivalled data quality, the ELAC SeaBeam 3030 / 3050 multibeam ystems apply Doppler compensation not only on the bathymetric depth data, but also on the water column imaging (WCI) data. In order to provide high data density, all ELAC SeaBeam MBES can transmit two quasisimultaneous swaths per ping cycle, which are frequency-separated. Compared to the singleping mode, the data density is doubled. The ELAC SeaBeam 3030/3050 multibeam systems include a functionality for to automatic cyclical steering of the transmitted swaths in the along-ship direction. Via this functionality, which is called “Advanced Transmission Beam Steering”, an entire volume below the vessel can be insonified without requiring any movement of the vessel. The operator can specify an angle range and an angle increment, resulting in a periodic oscillation of the transmitted swaths from bow to aft and vice versa. This functionality is very helpful for the detection and analysis of gas flares, leakages or other objects in the water column during stationary vessel operation or on fixed platforms. WĂ€rtsilĂ€ ELAC Nautik GmbH Page 2 of 3 31. May 2016 On order to provide highest operational flexibility, the ELAC SeaBeam 3050 and ELAC SeaBeam 3030 are available as mobile systems, providing the sonar electronics in flight cases and utilizing mobile transducer brackets for spatial resolutions of 1.5° x 2° for ELAC SeaBeam 3050 and 3° x 2° for ELAC SeaBeam 3030. WĂ€rtsilĂ€ ELAC Nautik is the only supplier, offering a mobile 30 kHz multibeam of the sea water profile and sea water surface will be designed, studied, developed and applied to a real situation. A thermometer, based on distributed temperature sensor, will be designed, paying special attention to the involved materials, in order to avoid the damages of such corrosive environment. Nowadays, this techique is used in many infraestructures as bridge or airports by never has been used in sea, where the sea currents and biofouling are problems that will are wtudied at the project. However the optical fibers must been calibrated to know the uncertainty in temperature measure, and it is the purpose of the paper. system with a depth performance of more than 6,000 meters. WĂ€rtsilĂ€ ELAC Nautik is a main industrial partner within the German „Lighthouse“ Research Project SUGAR (Submarine Gas Hydrate Reservoirs) and cooperates with the GEOMAR Helmholtz Centre for Ocean Research Kiel. WĂ€rtsilĂ€ ELAC Nautik participates in a SUGAR subproject, which is related to gas flare detection. Gas flares at the seabed are indicators for potential gas hydrate reservoirs and potential leakages of gas deposits. Therefore, gas flare detection is important for the exploration of submarine gas hydrates and for environmental monitoring. Driven by the SUGAR project, the ELAC SeaBeam multibeam systems store WCI data with very high resolution. For the online and offline visualization of high-resolution WCI data, the ELAC WCI Viewer is utilized, providing different window types for data visualization, different scaling and range options, forward and backward data playback as movies or single pictures, object and event functionalities and the display of external sensor data. These capabilities help to identify and analyze any kinds of objects in the water column or on the bottom (e.g. gas seeps). Despite helpful aids for the online visualization of high-resolution WCI data, there is a need for an automatic processing of WCI data with respect to object detection. Such automatic processing will reduce the workload of survey operators significantly. Therefore, WĂ€rtsilĂ€ ELAC Nautik has developed an automatic object detector (ELAC AOD) which is dedicated to gas flares in the water column. Due to the huge data volumes of high-resolution WCI data, the development of the ELAC AOD was ambitious and challenging. The ELAC AOD was implemented within the MATLAB development environment. The ELAC AOD is dedicated to WCI data from ELAC SeaBeam 3030 and 3050 medium-depth multibeam systems and stores all relevant information of detected objects in so-called object log files. It is possible to import such object log files into the ELAC WCI Viewer for visualization purposes. Due to the above-mentioned characteristics, multibeam systems from WĂ€rtsilĂ€ ELAC Nautik are excellently applicable in order to detect and analyze gas flares in the water column. The presentation will provide detailed system information and important data examples.Peer Reviewe

    Security and Privacy for Ubiquitous Mobile Devices

    Get PDF
    We live in a world where mobile devices are already ubiquitous. It is estimated that in the United States approximately two thirds of adults own a smartphone, and that for many, these devices are their primary method of accessing the Internet. World wide, it is estimated that in May of 2014 there were 6.9 billion mobile cellular subscriptions, almost as much as the world population. of these 6.9 billion, approximately 1 billion are smart devices, which are concentrated in the developed world. In the developing world, users are moving from feature phones to smart devices as a result of lower prices and marketing efforts. Because smart mobile devices are ubiquitous, security and privacy are primary concerns. Threats such as mobile malware are already substantial, with over 2500 different types identified in 2010 alone. It is likely that, as the smart device market continues to grow, so to will concerns about privacy, security, and malicious software. This is especially true, because these mobile devices are relatively new. Our research focuses on increasing the security and privacy of user data on smart mobile devices. We propose three applications in this domain: (1) a service that provides private, mobile location sharing; (2) a secure, intuitive proximity networking solution; and (3) a potential attack vector in mobile devices, which utilizes novel covert channels. We also propose a first step defense mechanism against these covert channels. Our first project is the design and implementation of a service, which provides users with private and secure location sharing. This is useful for a variety of applications such as online dating, taxi cab services, and social networking. Our service allows users to share their location with one another with trust and location based access controls. We allow users to identify if they are within a certain distance of one another, without either party revealing their location to one another, or any third party. We design this service to be practical and efficient, requiring no changes to the cellular infrastructure and no explicit encryption key management for the users. For our second application, we build a modem, which enables users to share relatively small pieces of information with those that are near by, also known as proximity based networking. Currently there are several mediums which can be used to achieve proximity networking such as NFC, bluetooth, and WiFi direct. Unfortunately, these currently available schemes suffer from a variety of drawbacks including slow adoption by mobile device hardware manufactures, relatively poor usability, and wide range, omni-directional propagation. We propose a new scheme, which utilizes ultrasonic (high frequency) audio on typical smart mobile devices, as a method of communication between proximal devices. Because mobile devices already carry the necessary hardware for ultrasound, adoption is much easier. Additionally, ultrasound has a limited and highly intuitive propagation pattern because it is highly directional, and can be easily controlled using the volume controls on the devices. Our ultrasound modem is fast, achieving several thousand bits per second throughput, non-intrusive because it is inaudible, and secure, requiring attackers with normal hardware to be less than or equal to the distance between the sender and receiver (a few centimeters in our tests). Our third work exposes a novel attack vector utilizing physical media covert channels on smart devices, in conjunction with privilege escalation and confused deputy attacks. This ultimately results in information leakage attacks, which allow the attacker to gain access to sensitive information stored on a user\u27s smart mobile device such as their location, passwords, emails, SMS messages and more. Our attack uses our novel physical media covert channels to launder sensitive information, thereby circumventing state of the art, taint-tracking analysis based defenses and, at the same time, the current, widely deployed permission systems employed by mobile operating systems. We propose and implement a variety of physical media covert channels, which demonstrate different strengths such as high speed, low error rate, and stealth. By proposing several different channels, we make defense of such an attack much more difficult. Despite the challenging situation, in this work we also propose a novel defense technique as a first step towards research on more robust approaches. as a contribution to the field, we present these three systems, which together enrich the smart mobile experience, while providing mobile security and keeping privacy in mind. Our third approach specifically, presents a unique attack, which has not been seen in the wild , in an effort to keep ahead of malicious efforts

    The dynamics over the next few years of the Spanish mobile telecommunications market share: a mathematical modelling approach

    Full text link
    This is an author's accepted manuscript of an article published in: “Mathematical and Computer Modelling of Dynamical Systems: Methods, Tools and Applications in Engineering and Related Sciences"; Volume 20, Issue 6, 2014; copyright Taylor & Francis; available online at: http://dx.doi.org/10.1080/13873954.2013.843572Taking into account available data from 2002 to 2009 about the market share percentages of the Spanish mobile telecommunications service providers, a dynamic diffusion model to study the evolution of the clients’ change between the different companies during the period 2010–2016 is proposed. The constructed model provides a tool for forecasting short-term trends about the customers’ preferences with respect to mobile network operators taking into account both, autonomous decisions due to direct marketing and advertising strategies, and also decisions adopted through interaction via social influence. The model can provide insights to companies for designing strategies in order to gain market share.This work has been partially supported by the FIS PI-10/01433; the Spanish Government and European Regional Development Fund (FEDER) [grant number MTM2009-08587]; and the Universitat Politecnica de Valencia [grant number PAID06-11-2070].CervellĂł Royo, RE.; CortĂ©s, J.; Santonja, F.; Villanueva MicĂł, RJ. (2014). The dynamics over the next few years of the Spanish mobile telecommunications market share: a mathematical modelling approach. Mathematical and Computer Modelling of Dynamical Systems. 20(6):557-565. https://doi.org/10.1080/13873954.2013.843572S557565206Gruber, H. (1999). An investment view of mobile telecommunications in the European Union. Telecommunications Policy, 23(7-8), 521-538. doi:10.1016/s0308-5961(99)00042-7CortĂ©s, J.-C., Lombana, I.-C., & Villanueva, R.-J. (2010). Age-structured mathematical modeling approach to short-term diffusion of electronic commerce in Spain. Mathematical and Computer Modelling, 52(7-8), 1045-1051. doi:10.1016/j.mcm.2010.02.030Gruber, H. (2001). Competition and innovation. Information Economics and Policy, 13(1), 19-34. doi:10.1016/s0167-6245(00)00028-7Gruber, H., & Verboven, F. (2001). The diffusion of mobile telecommunications services in the European Union. European Economic Review, 45(3), 577-588. doi:10.1016/s0014-2921(00)00068-4Bettencourt, L. (1997). Customer voluntary performance: Customers as partners in service delivery. Journal of Retailing, 73(3), 383-406. doi:10.1016/s0022-4359(97)90024-5Herrera-GonzĂĄlez, F., & CastejĂłn-MartĂ­n, L. (2009). The endless need for regulation in telecommunication: An explanation. Telecommunications Policy, 33(10-11), 664-675. doi:10.1016/j.telpol.2009.07.001Santonja, F.-J., Morales, A., Villanueva, R.-J., & CortĂ©s, J.-C. (2012). Analysing the effect of public health campaigns on reducing excess weight: A modelling approach for the Spanish Autonomous Region of the Community of Valencia. Evaluation and Program Planning, 35(1), 34-39. doi:10.1016/j.evalprogplan.2011.06.00

    A Comparison of Information Technology Mediated Customer Services Between the U.S. and China

    Get PDF
    Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority of the U.S. and Chinese students prefer in-store and in person for eating out and prefer computer/mobile devices for ordering tickets for travel and entertainment. In addition, more than half of the U.S. students prefer in person services for retail and banking, and this number reduces to 40% for Chinese students. In most customer service quality measurements, the results also show that Chinese students give higher ratings for ordering through a computer/mobile device than ordering in store, indicating ordering through computer/mobile devices has become more acceptable in China and has been perceived as having better customer services quality than in-store ordering

    Architecture for Mobile Heterogeneous Multi Domain Networks

    Get PDF
    Multi domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy

    Emerging technologies for learning report (volume 3)

    Get PDF
    • 

    corecore