35 research outputs found

    Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems

    Get PDF
    The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians to vehicles is a type of cooperative intelligent transport system, within the group of early warning collision/safety system. In this article, we examine the research and applications carried out so far within the field of pedestrians to vehicles cooperative transport systems by leveraging the information coming from vulnerable road users’ smartphones. Moreover, an extensive literature review has been carried out in the fields of vulnerable road users outdoor localisation via smartphones and vulnerable road users next step/movement prediction, which are closely related to pedestrian to vehicle applications and research. We identify gaps that exist in these fields that could be improved/extended/enhanced or newly developed, while we address future research objectives and methodologies that could support the improvement/development of those identified gaps

    Annual Research Report, 2009-2010

    Get PDF
    Annual report of collaborative research projects of Old Dominion University faculty and students in partnership with business, industry and governmenthttps://digitalcommons.odu.edu/or_researchreports/1001/thumbnail.jp

    Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

    Get PDF
    Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    Annual Research Report, 2010-2011

    Get PDF
    Annual report of collaborative research projects of Old Dominion University faculty and students in partnership with business, industry and government.https://digitalcommons.odu.edu/or_researchreports/1000/thumbnail.jp

    Understanding Urban Human Mobility for Network Applications

    Get PDF
    Understanding urban human mobility is crucial for various mobile and network applications. This thesis addresses two key challenges presented by mobile applications, namely urban mobility modeling and its applications in Delay Tolerant Networks (DTNs). First, we model urban human mobility with transportation mode information. Our research is based on two real-life GPS datasets containing approximately 20 and 10 million GPS samples. Previous research has suggested that the trajectories in human mobility have statistically similar features as Lévy Walks. We attempt to explain the Lévy Walks behavior by decomposing them into different classes according to the different transportation modes, such as Walk/Run, Bike, Train/ Subway or Car/Taxi/Bus. We show that human mobility can be modelled as a mixture of different transportation modes, and that these single movement patterns can be approximated by a lognormal distribution rather than a power-law distribution. Then, we demonstrate that the mixture of the decomposed lognormal flight distributions associated with each modality is a power-law distribution, providing an explanation for the emergence of Lévy Walks patterns that characterize human mobility patterns. Second, we find that urban human mobility exhibits strong spatial and temporal patterns. We leverage such human mobility patterns to derive an optimal routing algorithm that minimizes the hop count while maximizing the number of needed nodes in DTNs. We propose a solution framework, called Ameba, for timely data delivery in DTNs. Simulation results with experimental traces indicate that Ameba achieves a comparable delivery ratio to a Flooding-based algorithm, but with much lower overhead. Third, we infer the functions of the sub-areas in three cities by analyzing urban mobility patterns. The analysis is based on three large taxi GPS datasets in Rome, San Francisco and Beijing containing 21, 11 and 17 million GPS points, respectively. We categorize the city regions into four categories, workplaces, entertainment places, residential places and other places. We show that the identification of these functional sub-areas can be utilized to increase the efficiency of urban DTN applications. The three topics pertaining to urban mobility examined in the thesis support the design and implementation of network applications for urban environments.Ihmisen liikkumisen ymmärtäminen on erittäin tärkeää monille mobiiliverkkojen sovelluksille. Tämä väitöskirja käsittelee mobiilikäyttäjien liikkuvuuden mallintamista ja sen soveltamista viiveitä sietävään tiedonvälitykseen urbaanissa ympäristössä. Aloitamme mallintamalla mobiilikäyttäjien liikkuvuutta ottaen huomioon kulkumuodon. Tutkimuksemme perustuu kahteen laajaan GPS-data-aineistoon. Käytetyissä data-aineisto koostuu 10 ja 20 miljoonan havaintopisteen kulkuvälineet sisältävistä GPS-tiedoista. Aikaisemmat tutkimukset ovat ehdottaneet, että liikkuvuusmalleilla on samankaltaisia tilastollisia ominaisuuksia kuin Lévy-kävelyillä. Tutkimuksemme selittää Lévy-kävelyiden käyttäytymisen jakamalla ne erilaisiin kulkumuotoihin, kuten kävely/juoksu, polkupyöräily, juna/metro tai auto/taksi/bussi. Näytämme, että ihmisten liikkuvuus voidaan mallintaa eri kulkumuotojen yhdistelminä ja että yksittäiset liikkuvuusmallit voidaan arvioida logaritmisella normaalijakaumalla paremmin kuin potenssilakia noudattavalla jakaumalla. Lisäksi osoitamme, että yhdistelmä kävelyjen lavennetusta logaritmisesta normaalijakaumasta eri kulkumuotojen kanssa on potenssilakia noudattava jakauma, joka selittää ihmisten liikkuvuusmalleja luonnehtivien Lévy-kävelymallien esiintymisen. Toiseksi osoitamme, että urbaanin ihmisen liikkuvuuteen kuuluu vahvoja aikaan ja paikkaan liittyviä malleja. Johdamme näistä ihmisten liikkuvuusmalleista optimaalisen reititysalgoritmin, joka minimoi tarvittavien hyppyjen määrän ja maksimoi tarvittavien solmujen määrän viiveitä sietävissä verkoissa. Esitämme ratkaisuksi arkkitehtuurikehyksen nimeltä Ameba, joka takaa oikea-aikaisen viestien välityksen viiveitä sietävissä verkoissa. Simulointitulosten perusteella Ameba saavuttaa tulvitukseen perustuvien algoritmien kanssa vertailukelpoisen viestien kuljetussuhteen, mutta pienemmällä resurssikustannuksella. Kolmanneksi päättelemme maantieteellisten osa-alueiden funktiot analysoimalla kolmen kaupungin urbaaneja liikkumismalleja. Analyysi perustuu kolmeen laajaan taksien GPS-paikkatiedosta. GPS-data on kerätty Roomassa, San Franciscossa, ja Pekingissä ja koostuu 21, 11, ja 17 miljoonasta havaintopisteestä. Luokittelemme kaupunkien alueet neljään luokkaan: työpaikat, viihde-, asuin-, ja muut paikat. Näytämme, että näiden luokkien tunnistamista voidaan käyttää parantamaan viiveitä sietävien verkkojen sovellusten tehokkuutta. Kaikki tässä väitöskirjassa käsitellyt mobiilikäyttäjien liikkuvuuden mallintamisen aihepiirit edesauttavat urbaanien ympäristöjen verkkojen sovellusten suunnittelua ja toteutusta

    Advances in Information Security and Privacy

    Get PDF
    With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue
    corecore