66 research outputs found

    On the vulnerabilities of voronoi-based approaches to mobile sensor deployment

    Get PDF
    Mobile sensor networks are the most promising solution to cover an Area of Interest (AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a distributed deployment algorithm, without resorting to human supervision for device positioning and network configuration. In this paper, we focus on the vulnerabilities of the deployment algorithms based on Voronoi diagrams to coordinate mobile sensors and guide their movements. We give a geometric characterization of possible attack configurations, proving that a simple attack consisting of a barrier of few compromised sensors can severely reduce network coverage. On the basis of the above characterization, we propose two new secure deployment algorithms, named SecureVor and Secure Swap Deployment (SSD). These algorithms allow a sensor to detect compromised nodes by analyzing their movements, under different and complementary operative settings. We show that the proposed algorithms are effective in defeating a barrier attack, and both have guaranteed termination. We perform extensive simulations to study the performance of the two algorithms and compare them with the original approach. Results show that SecureVor and SSD have better robustness and flexibility and excellent coverage capabilities and deployment time, even in the presence of an attac

    Progressive damage assessment and network recovery after massive failures

    Get PDF
    After a massive scale failure, the assessment of damages to communication networks requires local interventions and remote monitoring. While previous works on network recovery require complete knowledge of damage extent, we address the problem of damage assessment and critical service restoration in a joint manner. We propose a polynomial algorithm called Centrality based Damage Assessment and Recovery (CeDAR) which performs a joint activity of failure monitoring and restoration of network components. CeDAR works under limited availability of recovery resources and optimizes service recovery over time. We modified two existing approaches to the problem of network recovery to make them also able to exploit incremental knowledge of the failure extent. Through simulations we show that CeDAR outperforms the previous approaches in terms of recovery resource utilization and accumulative flow over time of the critical service

    Network recovery after massive failures

    Get PDF
    This paper addresses the problem of efficiently restoring sufficient resources in a communications network to support the demand of mission critical services after a large scale disruption. We give a formulation of the problem as an MILP and show that it is NP-hard. We propose a polynomial time heuristic, called Iterative Split and Prune (ISP) that decomposes the original problem recursively into smaller problems, until it determines the set of network components to be restored. We performed extensive simulations by varying the topologies, the demand intensity, the number of critical services, and the disruption model. Compared to several greedy approaches ISP performs better in terms of number of repaired components, and does not result in any demand loss. It performs very close to the optimal when the demand is low with respect to the supply network capacities, thanks to the ability of the algorithm to maximize sharing of repaired resources

    On critical service recovery after massive network failures

    Get PDF
    This paper addresses the problem of efficiently restoring sufficient resources in a communications network to support the demand of mission critical services after a large-scale disruption. We give a formulation of the problem as a mixed integer linear programming and show that it is NP-hard. We propose a polynomial time heuristic, called iterative split and prune (ISP) that decomposes the original problem recursively into smaller problems, until it determines the set of network components to be restored. ISP's decisions are guided by the use of a new notion of demand-based centrality of nodes. We performed extensive simulations by varying the topologies, the demand intensity, the number of critical services, and the disruption model. Compared with several greedy approaches, ISP performs better in terms of total cost of repaired components, and does not result in any demand loss. It performs very close to the optimal when the demand is low with respect to the supply network capacities, thanks to the ability of the algorithm to maximize sharing of repaired resources

    Network analysis and algorithm solutions in critical emergency scenarios

    Get PDF
    Critical emergency scenarios in network communication, mobile wireless sensor networks and Smart Grids. Network recovery after massive disruption, algorithms for damaged networks, protocols for damaged networks, progressive monitoring of a damaged network, progressive flow restoration of a damaged network. Analysis of the vulnerabilities of the deployment algorithm for Mobile Wireless Sensor Netowkrs in human hostile environment, Algorithms for Mobile Wireless Sensor Networks under attack. Analysis of the cascading failures phenomenon in the Smart Grids, Prevents Large Blackout in the Smart Grids, Reduce the energy demand on the Smart Grids using the Internet of Things

    Network recovery from massive failures under uncertain knowledge of damages

    Get PDF
    This paper addresses progressive network recovery under uncertain knowledge of damages. We formulate the problem as a mixed integer linear programming (MILP), and show that it is NP-Hard. We propose an iterative stochastic recovery algorithm (ISR) to recover the network in a progressive manner to satisfy the critical services. At each optimization step, we make a decision to repair a part of the network and gather more information iteratively, until critical services are completely restored. Three different algorithms are used to find a feasible set and determine which node to repair, namely, 1) an iterative shortest path algorithm (ISR-SRT), 2) an approximate branch and bound (ISR-BB) and 3) an iterative multi-commodity LP relaxation (ISR-MULT). Further, we have modified the state-of-the-Art iterative split and prune (ISP) algorithm to incorporate the uncertain failures. Our results show that ISR-BB and ISR- MULT outperform the state-of-the-Art 'progressive ISP' algorithm while we can configure our choice of trade-off between the execution time, number of repairs (cost) and the demand loss. We show that our recovery algorithm, on average, can reduce the total number of repairs by a factor of about 3 with respect to ISP, while satisfying all critical deman

    Managing Contingencies in Smart Grids via the Internet of Things

    Get PDF
    This paper proposes a framework for contingency management using smart loads, which are realized through the emerging paradigm of the Internet of things. The framework involves the system operator, the load serving entities (LSEs), and the end-users with smart home management systems that automatically control adjustable loads. The system operator uses an efficient linear equation solver to quickly calculate the load curtailment needed at each bus to relieve congested lines after a contingency. Given this curtailment request, an LSE calculates a power allowance for each of its end-use customers to maximize the aggregate user utility. This large-scale NP-hard problem is approximated to a convex optimization for efficient computation. A smart home management system determines the appliances allowed to be used in order to maximize the user's utility within the power allowance given by the LSE. Since the user's utility depends on the near-future usage of the appliances, the framework provides the Welch-based reactive appliance prediction (WRAP) algorithm to predict the user behavior and maximize utility. The proposed framework is validated using the New England 39-bus test system. The results show that power system components at risk can be quickly alleviated by adjusting a large number of small smart loads. Additionally, WRAP accurately predicts the users' future behavior, minimizing the impact on the aggregate users' utility

    Institutional investors\u2019 activism under concentrated ownership and the role of proxy advisors. Evidence from the Italian say-on-pay

    Get PDF
    Where corporate ownership is concentrated, the incentives for institutional shareholders to engage with firms in their portfolio are not clear a priori. Making use of a unique dataset of Say-on-Pay (SOP) votes in Italian listed firms, we provide evidence that specific classes of institutional investors do actively monitor investee firms under concentrated ownership, and that Proxy Advisors (PAs) perform an informational role: i) while general shareholder dissent on SOP is low, dissent by mutual and pension funds holding small equity positions (nonblockholders) is high; ii) nonblockholders\u2019 dissent is negatively correlated with ownership concentration, suggesting that they tend to trust control shareholders to act as delegated monitors on managerial remuneration; iii) voting by institutional investors is strongly correlated with PA recommendations; iv) institutional investors do not follow PA recommendations blindly but look at specific reasons of concern expressed in PA reports. Our results may have relevant policy implications

    Report of a case of discoid lupus erythematosus localised to the oral cavity: immunofluorescence findings.

    Get PDF
    Discoid Lupus Erythematosus (DLE) is a chronic disease with a typical cutaneous involvement. This pathology rarely involves mucosa: oral cavity is interested in 20% of DLE patients. We describe a case of oral DLE in a 50-year-old woman with an anamnesis for autoimmune disorders. This study shows the helpful role of immunofluorescence in the diagnosis of autoimmune diseases. The first diagnostic step was the clinical observation of the oral mucosa: the lesion area was erythematous, athrophic and hyperkeratotic. The patient then underwent laboratory examination. We utilized human epithelial cells (Hep-2010) for Indirect Immuno-Fluorescence (IIF). Moreover, the biopsy site for Direct Immuno-Fluorescence (DIF) and histopathological analysis was the untreated oral lesion. IIF detected an increase of Anti-Nuclear Antibody (ANA) and positivity for SSA-RO. By DIF, we observed IgG/IgA/fibrinogen along basal layer. Multiple biopsies reported signs of chronic basal damage. Steroid systemic therapy induced a considerable lesion regression. We suggest the use of immunofluorescence with the integration of further data to improve diagnosis of rare diseases and to establish a suitable therapy

    Surgical Effectiveness of Uniportal-VATS Lobectomy Compared to Open Surgery in Early-Stage Lung Cancer

    Get PDF
    BackgroundAlthough the feasibility and safety of Uniportal-Video-Assisted thoracic surgery (U-VATS) has been proven, its surgical effectiveness is still debated. The aim of this study is to assess the equivalence of the U-VATS approach compared with an open technique in terms of surgical (nodal-upstaging, complications, and post-operative results) and short-term survival outcomes. MethodsThe clinical data of patients undergoing lobectomy for NSCLC at our center, from January 2014 to December 2019, were analyzed retrospectively. All patients undergoing open or U-VATS lobectomy with lymphadenectomy for early-stage lung cancer (cT1-T3N0, stages IA-IIB) were included in the study. Only 230 patients satisfied the inclusion criteria. Group bias was reduced through 1:1 propensity score matching, which resulted in 46 patients in each group (open surgery and U-VATS). ResultsThe intra- and post-operative mortality were null in both groups. There was no difference in the post-operative complications (p: 1.00) between U-VATS and open lobectomy. There was also no recorded difference in the pathological nodal up-staging [11 (23.9%) after thoracotomy vs. 8 (17.4%) after U-VATS, p: 0.440). The chest tube duration was longer in the open group (p: 0.025), with a higher post-operative pain (p: 0.001). Additionally, the 3-year overall survival (OS) was 78% after U-VATS lobectomy vs. 74% after open lobectomy (p: 0.204), while 3-year disease-specific survival (DSS) was 97 vs. 89% (p: 0.371), respectively. The 3-year disease-free survival (DFS) was 62% in the U-VATS group and 66% in the thoracotomy group, respectively (p: 0.917). ConclusionsUniportal-VATS lobectomy for the treatment of early-stage lung cancer seems to be a safe and effective technique with similar surgical and short-term survival outcomes as open surgery, but with lower post-operative pain and shorter in-hospital stay
    • …
    corecore