245,787 research outputs found

    Managing ubiquitous eco cities: the role of urban telecommunication infrastructure networks and convergence technologies

    Get PDF
    A successful urban management system for a Ubiquitous Eco City requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision making mechanism and necessary infrastructure and technologies. Rapidly developing information and telecommunication technologies and their platforms in the late 20th Century improves urban management and enhances the quality of life and place. Telecommunication technologies provide an important base for monitoring and managing activities over wired, wireless or fibre-optic networks. Particularly technology convergence creates new ways in which the information and telecommunication technologies are used. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices such as mobile phones and provides opportunities in the management of Ubiquitous Eco Cities. This paper discusses the recent developments in telecommunication networks and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities and how this technological shift is likely to be beneficial in improving the quality of life and place. The paper also introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for Ubiquitous Eco Cities

    A GeoSocial Intelligence Framework for Studying & Promoting Resilience to Seasonal Flooding in Jakarta, Indonesia

    Get PDF
    PetaJakarta.org is a web-based platform developed to harness the power of social media to gather, sort, and display information about flooding for Jakarta residents in real time. The platform runs on the open source software CogniCity—an OSS platform developed by the SMART Infrastructure Facility, University of Wollongong—which allows data to be collected and disseminated by community members through their location-enabled mobile devices. The project uses a GeoSocial Intelligence Framework to approach the complexity of Jakarta’s entangled hydraulic, hydrological and meteorological systems and thereby converts the noise of social media into knowledge about urban infrastructure and situational conditions related to flooding and inundation. In this paper, PetaJakarta.org co-directors Dr Tomas Holderness, Geomatics Research Fellow at the SMART Infrastructure Facility, Dr Etienne Turpin, Vice-Chancellor’s Postdoctoral Research Fellow at the SMART Infrastructure Facility, and Dr Rohan Wickramasuriyam, GIS Research Fellow at the SMART Infrastructure Facility, will discuss their GeoSocial Intelligence Framework as it applies to their current research in Jakarta. They will also present their preliminary findings from their 2014 Twitter #DataGrant, which has allowed them to develop a correlative analysis between historic social media information, the Jakarta government’s flood maps, and the infrastructure used to manage critical flood emergencies. Finally, they will speculate on several future applications of the CogniCity OSS and suggest how it might be developed to further promote an integrated civic co-management platform with the support of business, industry, government and community organizations

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    A robust self-organized public key management for mobile ad hoc networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized servers are infeasible for MANETs due to the absence of infrastructure, frequent mobility, and wireless link instability. In this paper, we propose a robust self-organized, public key management for MANETs. The proposed scheme relies on establishing a small number of trust relations between neighboring nodes during the network initialization phase. Experiences gained as a result of successful communications and node mobility through the network enhance the formation of a web of trust between mobile nodes. The proposed scheme allows each user to create its public key and the corresponding private key, to issue certificates to neighboring nodes, and to perform public key authentication through at least two independent certificate chains without relying on any centralized authority. A measure of the communications cost of the key distribution process has been proposed. Simulation results show that the proposed scheme is robust and efficient in the mobility environment of MANET and against malicious node attacks
    • 

    corecore