4 research outputs found

    Improving routing in networks of Unmanned Aerial Vehicles: Reactive-Greedy-Reactive

    Get PDF
    Because of their specific characteristics, Unmanned Aeronautical Ad-hoc Networks (UAANETs) can be classified as a special kind of mobile ad hoc networks. Because of the high mobility of Unmanned Aerial Vehicles, designing a good routing protocol for UAANETs is challenging. Here, we present a new protocol called Reactive-Greedy-Reactive (RGR) as a promising routing protocol in high mobility and density-variable scenarios. RGR combines features of reactive MANET routing protocols such as Ad-hoc On-demand Distance Vector with geographic routing protocols, exploiting the unique characteristics of UAANETs. In addition to combining reactive and geographic routing, the protocol has a number of features to further improve the overall performance. We present the rationale and design of the protocol, discuss the specific performance improvements in detail and provide extensive simulation results that demonstrate that RGR outperforms purely reactive or geographic routing protocols. The results also demonstrate the impact of the various protocol modifications

    Intensional Cyberforensics

    Get PDF
    This work focuses on the application of intensional logic to cyberforensic analysis and its benefits and difficulties are compared with the finite-state-automata approach. This work extends the use of the intensional programming paradigm to the modeling and implementation of a cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an eductive manner of evaluation. This approach is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in previous work. As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional logic for the distributed evaluation of cyberforensic expressions. We also augment the work with credibility factors surrounding digital evidence and witness accounts, which have not been previously modeled. The Forensic Lucid programming language, used for this intensional cyberforensic analysis, formally presented through its syntax and operational semantics. In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, and JOOIP bound by the underlying intensional programming paradigm.Comment: 412 pages, 94 figures, 18 tables, 19 algorithms and listings; PhD thesis; v2 corrects some typos and refs; also available on Spectrum at http://spectrum.library.concordia.ca/977460

    Intensional Cyberforensics

    Get PDF
    This work focuses on the application of intensional logic to cyberforensic analysis and its benefits and difficulties are compared with the finite-state-automata approach. This work extends the use of the intensional programming paradigm to the modeling and implementation of a cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an eductive manner of evaluation. This approach is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in previous work. As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional logic for the distributed evaluation of cyberforensic expressions. We also augment the work with credibility factors surrounding digital evidence and witness accounts, which have not been previously modeled. The Forensic Lucid programming language, used for this intensional cyberforensic analysis, formally presented through its syntax and operational semantics. In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, MARFL, and JOOIP bound by the underlying intensional programming paradigm

    Formaciones imaginarias del diseñador gráfico en el discurso del campo académico.

    Get PDF
    En este trabajo se describe un proyecto de tesis doctoral en el que se analiza el discurso sobre el diseñador gráfico. Se parte del supuesto de que existe una tricotomía de su perfil: 1) el campo profesional, 2) el campo educativo y, 3) el campo académico. Proponemos que dicha tricotomía permite la identificación de imaginarios sobre el tema, y no solo eso, sino que también aporta elementos que conforman la identidad (Bauman, 2002) de un diseñador gráfico. La pregunta de investigación es ¿Cuál es la identidad discursiva del diseñador gráfico en el campo académico? La investigación descrita es de tipo cualitativo y deductivo; para la construcción la identidad discursiva (Van Dijk, T; 2008) del diseñador gráfico, se toman en cuenta diversas publicaciones: principalmente investigaciones y breves artículos difundidos en comunidades/foros de reflexión y debate en torno a la temática, además de memorias de congresos y libros. En apoyo al desarrollo del proyecto se ha diseñado un Laboratorio de Intervención en el Diseño, cuyos objetivos son impulsar el desarrollo social y cultural de los diseñadores gráficos por medio de la investigación, educación continua, producción y vinculación. En un primer acercamiento a las formaciones imaginarias (Pêcheux, 1978) sobre la identidad del diseñador gráfico se centran en el grado de erudición para la ejecución de su trabajo, en la cultura que demuestran y en la autonomía con la que producen
    corecore