9 research outputs found
Intelligent tourist guiding service based on Smart-M3 platform
The paper proposes an intelligent tourist guiding service based on the Smart-M3 information platform and context management technology. It suggests attractions that are better to attend based on the tourist preferences and current situation in the region. The Smart-M3 platform implements a concept of the smart space providing the information sharing infrastructure in the intelligent tourist guiding service. The smart space is a decentralized infrastructure that allows different devices to share required information between them. The main benefit of the presented approach is to assist tourists in the region using their personal mobile devices. Such mobile devices need only Internet connection and capability to show appropriate information to tourists
M3-Driven smart space creation using a DD-WRT-Based device
The paper describes the process of smart space creation based on integration of Smart-M3 platform with a DD-WRT-based device. Smart-M3 is an open source platform which implements concept of smart space. Wi-Fi router is used as platform hosting which reduces the number of devices participating in smart space-based scenarios. The article covers a process of compilation and installation of Smart-M3 platform on DD-WRT-based Wi-Fi router. Evaluation shows that smart space organized this way can be used for scenarios with few participants. The authors developed “Smart-M3 Control Panel” web-service which allows users to control Smart-M3 platform by a graphical web interface. “Smart-M3 Control Panel” user can view the current status of platform; launch, stop, and reload it; view information storage content and change it; download log files; and change startup options. SocketIO interface was used for the user interaction with web service
Recommended from our members
Mitigate denial of service attacks in mobile ad-hoc networks
Wireless networks are proven to be more acceptable by users compared with wired networks for many reasons, namely the ease of setup, reduction in running cost, and ease of use in different situations such as disasters recovery. A Mobile ad-hoc network (MANET) is as an example of wireless networks. MANET consists of a group of hosts called nodes which can communicate freely via wireless links. MANET is a dynamic topology, self-configured, non-fixed infrastructure, and does not have any central administration that controls all nodes among the network. Every device, used in day-to-day living, is assumed to be a network device, and it is managed using Internet Protocols (IP). Information on every electronic device is collected using infrared sensors, voice or video sensors, Radio-Frequency Identification (RFID), etc. The new wireless networks and communications paradigm known as Internet of Things (IoT) is introduced which refers to the range of multiple interconnected devices which communicate and exchange data between one another. MANET becomes prone to many attacks mainly due to its specifications and challenges such as limited bandwidth, nodes mobility and limited energy. This research study focuses specifically on detecting Denial of Service attack (DoS) in MANET. The main purpose of DoS attack is to deprive legitimate users from using their authenticated services such as network resources. Thus, the network performance would degrade and exhaust the network resources such as computing power and bandwidth considerably which lead the network to be deteriorated. Therefore, this research aims to detect DoS attacks in both Single MANET (SM) and Multi MANETs (MM). A novel Monitoring, Detection, and Rehabilitation (MrDR) method is proposed in order to detect DoS attack in MANET. The proposed method is incorporating trust concept between nodes. Trust value is calculated in each node to decide whether the node is trusted or not. To address the problem when two or more MANETs merge to become one big MANET, the novel technique of Merging Using MrDR (MUMrDR) is also applied to detect DoS attack. As the mobility of nodes in MANET, the chance of MANETs merge or partition occurs. Both centralised and decentralised trust concepts are used to deal with IP address conflict and the merging process is completed by applying the MUMrDR method to detect DoS attacks in MM. The simulation results validate the effectiveness in the proposed method to detect different DoS attacks in both SM and MM
Advances on Smart Cities and Smart Buildings
Modern cities are facing the challenge of combining competitiveness at the global city scale and sustainable urban development to become smart cities. A smart city is a high-tech, intensive and advanced city that connects people, information, and city elements using new technologies in order to create a sustainable, greener city; competitive and innovative commerce; and an increased quality of life. This Special Issue collects the recent advancements in smart cities and covers different topics and aspects
Data and the city – accessibility and openness. a cybersalon paper on open data
This paper showcases examples of bottom–up open data and smart city applications and identifies lessons for future such efforts. Examples include Changify, a neighbourhood-based platform for residents, businesses, and companies; Open Sensors, which provides APIs to help businesses, startups, and individuals develop applications for the Internet of Things; and Cybersalon’s Hackney Treasures. a location-based mobile app that uses Wikipedia entries geolocated in Hackney borough to map notable local residents. Other experiments with sensors and open data by Cybersalon members include Ilze Black and Nanda Khaorapapong's The Breather, a "breathing" balloon that uses high-end, sophisticated sensors to make air quality visible; and James Moulding's AirPublic, which measures pollution levels. Based on Cybersalon's experience to date, getting data to the people is difficult, circuitous, and slow, requiring an intricate process of leadership, public relations, and perseverance. Although there are myriad tools and initiatives, there is no one solution for the actual transfer of that data