416 research outputs found

    Application-layer Performance Analysis of PRIME in Smart Metering Networks

    Get PDF
    This paper assesses the performance of actual PRIME v1.3.6 and PRIME v1.4 systems when used for Smart Metering applications. The analysis is performed at the application level using the DLMS/COSEM stack. Hence, it considers performance indicators that are of practical interest for distribution system operators, such as the availability and the average time needed to read the energy load profile of all the meters. To this end, two test networks with 112 smart meters have been deployed in the laboratory (to ensure the stability of the network). In one of them all the Service Nodes communicate directly with the Base Node, while there exist up to 5 switching levels in the other tested network. First, the PRIME v1.3.6 system is evaluated, stressing the significant performance gain that can be obtained by implementing some MAC layer strategies, which are compatible with the specification but not specifically defined on it. Then,the improvement offered by the PRIME v1.4 system is assessed.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    A comparative study of steganography using watermarking and modifications pixels versus least significant bit

    Get PDF
    This article presents a steganography proposal based on embedding data expressed in base 10 by directly replacing the pixel values from images red, green blue (RGB) with a novel compression technique based on watermarks. The method considers a manipulation of the object to be embedded through a data compression triple process via LZ77 and base 64, watermark from low-quality images, embedded via discrete wavelet transformation-singular value decomposition (DWT-SVD), message embedded by watermark is recovered with data loss calculated, the watermark image and lost data is compressed again using LZ77 and base 64 to generate the final message. The final message is embedded in portable network graphic (PNG) images taken from the Microsoft common objects in context (COCO), ImageNet and uncompressed color image database (UCID) datasets, through a filtering process pixel of the images, where the selected pixels expressed in base 10, and the final message data is embedded by replacing units’ position of each pixel. In experimentation results an average of 40 dB in peak signal noise to ratio (PSNR) and 0.98 in the similarity structural index metric (SSIM) evaluation were obtained, and evasion steganalysis rates of up to 93% for stego-images, the data embedded average is 3.2 bpp

    MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection

    Full text link
    MOVICAB-IDS enables the more interesting projections of a massive traffic data set to be analysed, thereby providing an overview of any possible anomalous situations taking place on a computer network. This IDS responds to the challenges presented by traffic volume and diversity. It is a connectionist agent-based model extended by means of a functional and mobile visualization interface. The IDS is designed to be more flexible, accessible and portable by running on a great variety of applications, including small mobile ones such as PDA’s, mobile phones or embedded devices. Furthermore, its effectiveness has been demonstrated in different tests

    Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare

    Full text link

    Agent organisations: from independent agents to virtual organisations and societies of agents

    Get PDF
    Real world applications using agent-based solutions can include many agents that needs to communicate and interact with each other in order to meet their objectives. In organisations; Agent open multi-agent systems, problems can include not only the organisation of a large number of agents, but can also be heterogeneous and of unpredictable provenance or behavior. An overview of the alternatives for dealing with these problems is presented, highlighting the way they try to solve or mitigate them. This approach allows the development of complex systems in which there are agents that show very different behaviours and that are able to adapt to unforeseen changes in the environment. This makes it possible to simulate socio-technical or natural environments and observe their possible evolution without the ethical considerations involved in experimenting in real environments.This work has been developed as part of “Virtual-Ledgers-Tecnologías DLT/Blockchain y Cripto-IOT sobre organizaciones virtuales de agentes ligeros y su aplicación en la eficiencia en el transporte de última milla”, ID SA267P18, project financed by Junta Castilla y León, Consejería de Educación, and FEDER funds. It has been partially supported by the European Regional Development Fund (ERDF) through the Interreg Spain-Portugal V-A Program (POCTEP) under grant 0631_DIGITEC_3_E (Smart growth through the specialization of the cross-border business fabric in advanced digital technologies and blockchain.)

    A Guiding Agent: smart dynamic technology for solving distributed problems.

    Get PDF
    Mobile technology is everywhere nowadays in the developed world. This technology is mature enough to support intelligent applications and smart devices. Over the last few years we have developed a number of applications for PDAs and Mobile phones. This abstract outlines an information system that incorporate a recommender agent that helps the users of a shopping centre to identify offers, to find people or to define a plan which in the shopping centre for a day. The multiagent architecture incorporates a smart deliberative agent that take decisions with the help of casebased planners. The system that uses past experiences to recommend future actions has been tested successfully

    Impacto de las características de la red eléctrica en canales MIMO PLC domésticos

    Get PDF
    The recent release of indoor Power Line Communications (PLC) specifications with Multiple-Input Multiple-Output (MIMO) capabilities has significantly increased the bit rates achieved in these channels. However, the performance reached by the use of these methods may differ from one location to another due to the heterogeneous nature of the domestic power grid. In this work, a closer look at the relation between channel performance and the power grid cabling is taken. To that end, some channel features like attenuation, spatial correlation and capacity are analyzed by means of a set of 50 simulated channel topologies in the frequency band from 1 to 80 MHz.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Gaining deep knowledge of Android malware families through dimensionality reduction techniques

    Get PDF
    [Abstract] This research proposes the analysis and subsequent characterisation of Android malware families by means of low dimensional visualisations using dimensional reduction techniques. The well-known Malgenome data set, coming from the Android Malware Genome Project, has been thoroughly analysed through the following six dimensionality reduction techniques: Principal Component Analysis, Maximum Likelihood Hebbian Learning, Cooperative Maximum Likelihood Hebbian Learning, Curvilinear Component Analysis, Isomap and Self Organizing Map. Results obtained enable a clear visual analysis of the structure of this high-dimensionality data set, letting us gain deep knowledge about the nature of such Android malware families. Interesting conclusions are obtained from the real-life data set under analysis

    Analogue mouse pointer control via an online steady state visual evoked potential (SSVEP) brain-computer interface

    Get PDF
    The steady state visual evoked protocol has recently become a popular paradigm in brain–computer interface (BCI) applications. Typically (regardless of function) these applications offer the user a binary selection of targets that perform correspondingly discrete actions. Such discrete control systems are appropriate for applications that are inherently isolated in nature, such as selecting numbers from a keypad to be dialled or letters from an alphabet to be spelled. However motivation exists for users to employ proportional control methods in intrinsically analogue tasks such as the movement of a mouse pointer. This paper introduces an online BCI in which control of a mouse pointer is directly proportional to a user's intent. Performance is measured over a series of pointer movement tasks and compared to the traditional discrete output approach. Analogue control allowed subjects to move the pointer faster to the cued target location compared to discrete output but suffers more undesired movements overall. Best performance is achieved when combining the threshold to movement of traditional discrete techniques with the range of movement offered by proportional control
    corecore