23 research outputs found

    Investigating the deployability of VoIP services over wireless interconnected micro aerial vehicles

    Get PDF
    Emerging technological devices, such as Unmanned Aircraft Vehicles (UAV) and Single Board Computers (SBC), are being increasingly employed in recent years, thanks to the advances in electronics and the wide variety of sensors that are endowed. This paper aims at analyzing the viability of deploying multimedia services, focusing on the voice scenario, over wireless interconnected Micro Air Vehicles (MAV), also known as drones. Toward this end, we assessed the performance both of the embedded wireless cards of current drones and also SBCs, which may be carried as payload in existing UAV solutions. Driven by the results obtained in these experiments, we then deployed an operational VoIP service over a network of commercial MAVs, to perform an experimental analysis on the resource capabilities of these devices and demonstrate that this type of service can certainly be used.This article has been partially supported by the European H2020 5GinFIRE project (grant agreement 732497) and the 5G‐City project (TEC2016‐76795‐C6‐3‐R) funded by the Spanish Ministry of Economy and Competitiveness

    Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks

    Get PDF
    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust communications during the emergency response operations are of paramount importance. Nevertheless, various reports have highlighted that after many devastating events, the current technologies used, failed to support the mission critical communications, resulting in further loss of lives. Inefficiencies of the current communications used for emergency response include lack of technology inter-operability between different jurisdictions, and high vulnerability due to their centralized infrastructure. In this article, we propose a flexible network architecture that provides a common networking platform for heterogeneous multi-operator networks, for interoperation in case of emergencies. A wireless mesh network is the main part of the proposed architecture and this provides a back-up network in case of emergencies. We first describe the shortcomings and limitations of the current technologies, and then we address issues related to the applications and functionalities a future emergency response network should support. Furthermore, we describe the necessary requirements for a flexible, secure, robust, and QoS-aware emergency response multi-operator architecture, and then we suggest several schemes that can be adopted by our proposed architecture to meet those requirements. In addition, we suggest several methods for the re-tasking of communication means owned by independent individuals to provide support during emergencies. In order to investigate the feasibility of multimedia transmission over a wireless mesh network, we measured the performance of a video streaming application in a real wireless metropolitan multi-radio mesh network, showing that the mesh network can meet the requirements for high quality video transmissions

    Level of Agreement in the Mental Models of Human Factors Practitioners and Systems Engineers Working in Collaborative Teams

    Get PDF
    Emerging research in complexity science recognizes traditional techniques for engineering systems do not always work for complex systems. Designing complex systems requires individuals to have knowledge of engineering as well as human performance. To this end, design efforts rely often on multi-disciplinary teams. While any two members of a design team may view the system design problem in vastly different manners, this study sought to identify a possible systemic effect on approach by the differing education and experience obtained by social practitioners, represented by human factors, and technical practitioners, represented by systems engineers. It further examined the impact of the complexity of the designed system designed on this systemic effect; in this case, two systems associated with unmanned aircraft systems (UAS). This study relied on measurement of individual mental models, using a graphical brainstorming tool to capture functional decompositions, argued as representing the problem domain component of an individual mental model. This study compared individual functional decomposition models against an average model composed from the same educational specialty, and from an average model composed from the opposite educational specialty. Participants developed models for a simple/closed problem and an open/complex problem. The researcher conducted a repeated measures multivariate analysis of variance on the effects of domain, problem type and the interaction between the two, as well as with interactions with educational specialty. The results indicated higher agreement among mental models when individuals were compared to the average model from their same specialty, that more agreement in mental models occurred in relation to the simple/closed problem than in relation to the open/complex problem, and that open/complex problems can exacerbate the level of mental model dis-agreement among team members with different educational backgrounds

    Reconfigurable middleware architectures for large scale sensor networks

    Get PDF
    Wireless sensor networks, in an effort to be energy efficient, typically lack the high-level abstractions of advanced programming languages. Though strong, the dichotomy between these two paradigms can be overcome. The SENSIX software framework, described in this dissertation, uniquely integrates constraint-dominated wireless sensor networks with the flexibility of object-oriented programming models, without violating the principles of either. Though these two computing paradigms are contradictory in many ways, SENSIX bridges them to yield a dynamic middleware abstraction unifying low-level resource-aware task reconfiguration and high-level object recomposition. Through the layered approach of SENSIX, the software developer creates a domain-specific sensing architecture by defining a customized task specification and utilizing object inheritance. In addition, SENSIX performs better at large scales (on the order of 1000 nodes or more) than other sensor network middleware which do not include such unified facilities for vertical integration

    Proceedings, MSVSCC 2012

    Get PDF
    Proceedings of the 6th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 19, 2012 at VMASC in Suffolk, Virginia

    Department of Defense Dictionary of Military and Associated Terms

    Get PDF
    The Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components

    Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    Get PDF
    Includes supplementary materialDisaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) process to address the military’s command and control capability gap. During the process, the R2C2 team conducted mission analysis, generated requirements, developed and modeled architectures, and analyzed and compared current operational systems versus the team’s R2C2 system. The R2C2 system provided a reachback capability to the Regional Combatant Commander’s (RCC) headquarters, a local communications network for situational assessments, and Internet access for civilian counterparts participating in Humanitarian Assistance/Disaster Relief operations. Because the team designed the R2C2 system to be modular, analysis concluded that the R2C2 system was the preferred method to provide the RCC with the required flexibility and scalability to deliver a rapidly deployable command and control capability to perform the range of military operations

    Machine

    Get PDF
    In today’s society of humans and machines, automation, animation, and ecosystems are terms of concern. Categories of life and technology have become mixed in governmental policies and drive economic exploitation and the pathologies of everyday life. This book both curiously and critically advances the term that underlies these new developments: machine. Contents: Introduction: Un/Civil Engineering (Thomas Pringle); Animation of the Technical and the Quest for Beauty (Gertrud Koch); For a Neganthropology of Automatic Society (Bernard Stiegler); The Ecosystem Is an Apparatus: From Machinic Ecology to the Politics of Resilience (Thomas Pringle)

    Machine

    Get PDF
    In today’s society of humans and machines, automation, animation, and ecosystems are terms of concern. Categories of life and technology have become mixed in governmental policies and drive economic exploitation and the pathologies of everyday life. This book both curiously and critically advances the term that underlies these new developments: machine

    Communication Security in Wireless Sensor Networks

    Get PDF
    A wireless sensor network (WSN) usually consists of a large number of small, low-cost devices that have limited energy supply, computation, memory, and communication capacities. Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Communication security is essential to the success of WSN applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in WSNs has ever been a challenging task due to various network & resource constraints and malicious attacks. This motivates the research on communication security for WSNs. This dissertation studies communication security in WSNs with respect to three important aspects. The first study addresses broadcast/multicast security in WSNs. We propose a multi-user broadcast authentication technique, which overcomes the security vulnerability of existing solutions. The proposed scheme guarantees immediate broadcast authentication by employing public key cryptography, and achieves the efficiency through integrating various techniques from different domains. We also address multicast encryption to solve data confidentiality concern for secure multicast. We propose an efficient multicast key management scheme supporting a wide range of multicast semantics, which utilizes the fact that sensors are both routers and end-receivers. The second study addresses data report security in WSNs. We propose a location-aware end-to-end security framework for WSNs, in which secret keys are bound to geographic locations so that the impact of sensor compromise are limited only to their vicinity. The proposed scheme effectively defeats not only bogus data injection attacks but also various DoS attacks. In this study, we also address event boundary detection as a specific case of secure data aggregation in WSNs. We propose a secure and fault-tolerant event boundary detection scheme, which securely detects the boundaries of large spatial events in a localized statistic manner. The third study addresses random key pre-distribution in WSNs. We propose a keyed-hash-chain-based key pool generation technique, which leads to a more efficient key pre-distribution scheme with better security resilience in the case of sensor compromise
    corecore