1,703 research outputs found

    Personal area technologies for internetworked services

    Get PDF

    Southwest Research Institute assistance to NASA in biomedical areas of the technology

    Get PDF
    Significant applications of aerospace technology were achieved. These applications include: a miniaturized, noninvasive system to telemeter electrocardiographic signals of heart transplant patients during their recuperative period as graded situations are introduced; and economical vital signs monitor for use in nursing homes and rehabilitation hospitals to indicate the onset of respiratory arrest; an implantable telemetry system to indicate the onset of the rejection phenomenon in animals undergoing cardiac transplants; an exceptionally accurate current proportional temperature controller for pollution studies; an automatic, atraumatic blood pressure measurement device; materials for protecting burned areas in contact with joint bender splints; a detector to signal the passage of animals by a given point during ecology studies; and special cushioning for use with below-knee amputees to protect the integrity of the skin at the stump/prosthesis interface

    A Trust Management Framework for Vehicular Ad Hoc Networks

    Get PDF
    The inception of Vehicular Ad Hoc Networks (VANETs) provides an opportunity for road users and public infrastructure to share information that improves the operation of roads and the driver experience. However, such systems can be vulnerable to malicious external entities and legitimate users. Trust management is used to address attacks from legitimate users in accordance with a user’s trust score. Trust models evaluate messages to assign rewards or punishments. This can be used to influence a driver’s future behaviour or, in extremis, block the driver. With receiver-side schemes, various methods are used to evaluate trust including, reputation computation, neighbour recommendations, and storing historical information. However, they incur overhead and add a delay when deciding whether to accept or reject messages. In this thesis, we propose a novel Tamper-Proof Device (TPD) based trust framework for managing trust of multiple drivers at the sender side vehicle that updates trust, stores, and protects information from malicious tampering. The TPD also regulates, rewards, and punishes each specific driver, as required. Furthermore, the trust score determines the classes of message that a driver can access. Dissemination of feedback is only required when there is an attack (conflicting information). A Road-Side Unit (RSU) rules on a dispute, using either the sum of products of trust and feedback or official vehicle data if available. These “untrue attacks” are resolved by an RSU using collaboration, and then providing a fixed amount of reward and punishment, as appropriate. Repeated attacks are addressed by incremental punishments and potentially driver access-blocking when conditions are met. The lack of sophistication in this fixed RSU assessment scheme is then addressed by a novel fuzzy logic-based RSU approach. This determines a fairer level of reward and punishment based on the severity of incident, driver past behaviour, and RSU confidence. The fuzzy RSU controller assesses judgements in such a way as to encourage drivers to improve their behaviour. Although any driver can lie in any situation, we believe that trustworthy drivers are more likely to remain so, and vice versa. We capture this behaviour in a Markov chain model for the sender and reporter driver behaviours where a driver’s truthfulness is influenced by their trust score and trust state. For each trust state, the driver’s likelihood of lying or honesty is set by a probability distribution which is different for each state. This framework is analysed in Veins using various classes of vehicles under different traffic conditions. Results confirm that the framework operates effectively in the presence of untrue and inconsistent attacks. The correct functioning is confirmed with the system appropriately classifying incidents when clarifier vehicles send truthful feedback. The framework is also evaluated against a centralized reputation scheme and the results demonstrate that it outperforms the reputation approach in terms of reduced communication overhead and shorter response time. Next, we perform a set of experiments to evaluate the performance of the fuzzy assessment in Veins. The fuzzy and fixed RSU assessment schemes are compared, and the results show that the fuzzy scheme provides better overall driver behaviour. The Markov chain driver behaviour model is also examined when changing the initial trust score of all drivers

    Connected Discovery: What the Ubiquity of Digital Evidence Means for Lawyers and Litigation

    Get PDF
    More than ten years ago, the Zubulake case raised awareness of the importance of digital evidence in litigation. At that time, for many lawyers, the discovery process consisted of collecting paper documents, manually reviewing those paper documents, and responding to document requests by producing paper documents. Digital evidence existed, but was more limited in scope and volume than it is today. Back then it was often overlooked or not recognized as a potential source of valuable evidence to be obtained in discovery

    Irene Thomas v. Draper City and Appeal Board of Draper City : Brief of Respondent

    Get PDF
    Appeal From Decision of the Appeal Board of Draper Cit

    Guidelines for Data Collection Techniques and Methods for Roadside Station Origin-Destination Studies

    Full text link

    AI-Based Evidence in Criminal Trials?

    Get PDF

    Municipal Handbook (2011)

    Get PDF
    A comprehensive manual on municipal government in Tennessee. Updated through July 2011
    corecore