1,112 research outputs found

    In situ observations of fish associated with coral reefs off Ireland

    Get PDF
    The abundance and behaviour of fish on and around coral reefs at Twin Mounds and Giant Mounds, carbonate mounds located on the continental shelf off Ireland (600-1100. m), were studied using two Remotely Operated Vehicle (ROV) dives. We recorded 30 fish taxa on the dives, together with three species of Scleractinia (Lophelia pertusa, Madrepora oculata and Desmophyllum cristagalli) and a diverse range of other corals (Antipatharia, Alcyonacea, and Stylasteridae). Stands of live coral provided the only habitat in which Guttigadus latifrons was observed whereas Neocyttus helgae was found predominantly on structural habitats provided by dead coral. Significantly more fish were found on structurally complex coral rubble habitats than on flatter areas where coral rubble was clogged with sand. The most common species recorded was Lepidion eques (2136 individuals), which always occurred a few cm above bottom and was significantly more active on the reefs than on sedimentary habitats. Synaphobranchus kaupii (1157 indiv.). , N. helgae (198 indiv.) and Micromesistius poutassou (116 indiv.) were also common; S. kaupii did not exhibit habitat-related differences in behaviour, whilst N. helgae was more active over the reefs and other structured habitats whereas M. poutassou was more active with decreasing habitat complexity. Trawl damage and abandoned fishing gear was observed at both sites. We conclude that Irish coral reefs provide complex habitats that are home to a diverse assemblage of fish utilising the range of niches occurring both above and within the reef structure. © 2011 Elsevier Ltd

    Adaptive self-management of teams of autonomous vehicles

    Get PDF
    Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. Collaborating UAVs in a team form a Self- Managed Cell (SMC) with at least one commander. UAVs in an SMC may need to operate independently or in sub- groups, out of contact with the commander and the rest of the team in order to perform specific tasks, but must still be able to eventually synchronise state information. The SMC must also cope with intermittent and permanent communication failures as well permanent UAV failures. This paper describes a failure management scheme that copes with both communication link and UAV failures, which may result in temporary disjoint sub-networks within the SMC. A communication management protocol is proposed to control UAVs performing disconnected individual operations, while maintaining the SMCs structure by trying to ensure that all members of the mission regardless of destination or task, can communicate by moving UAVs to act as relays or by allowing the UAVs to rendezvous at intermittent intervals. Copyright 2008 ACM.Accepted versio

    Configuration Management for Distributed Software Services

    No full text
    The paper describes the SysMan approach to interactive configuration management of distributed software components (objects). Domains are used to group objects to apply policy and for convenient naming of objects. Configuration Management involves using a domain browser to locate relevant objects within the domain service; creating new objects which form a distributed service; allocating these objects to physical nodes in the system and binding the interfaces of the objects to each other and to existing services. Dynamic reconfiguration of the objects forming a service can be accomplished using this tool. Authorisation policies specify which domains are accessible by which managers and which interfaces can be bound together. Keywords Domains, object creation, object binding, object allocation, graphical management interface. 1 INTRODUCTION The object-oriented approach brings considerable benefits to the design and implementation of software for distributed systems (Kramer 1992). Con..

    Security policy refinement using data integration: a position paper.

    No full text
    In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of global-as-view database schema mappings, or to extensions thereof. We illustrate our ideas with an example. Copyright 2009 ACM

    Starfish: Policy Driven Self-management in Wireless Sensor Networks

    No full text
    Wireless sensor networks are a key aspect of many pervasive systems designed to aid people in their normal activities and adapt to their current context. However, these systems also need to be self-managing in discovering and configuring devices for services, detecting and responding to attacks, determining errors and faults and reconfiguring the system to mitigate these. In this paper we describe the Starfish framework for specifying and dynamically managing policies in sensor nodes. We discuss the components in the framework which include the Finger2 policy system for specifying dynamic adaptivity, a module library to simplify the programming the basic funtionality of nodes and a client side editor for managing policies. We describe policies for an adaptive healthcare body network then focus on policies for self-healing aspects of sensor networks and give examples of policy-based reconfigurations to deal with faults. © 2010 ACM

    Implementing interactive configuration management for distributed systems

    No full text
    Published versio

    Towards Self-Healing in Wireless Sensor Networks.

    No full text
    Faults in WSN are very common and appear in different levels of the system. For pervasive applications to be adopted by end-users there is a need for autonomic selfhealing. This paper discusses our initial approach to selfhealing in WSN and describes experiments with two case studies of body sensor deployment. We evaluate the impact of sensor faults on activity and gesture classification accuracy respectively and develop mechanisms that will allow detection of those faults during systems operation. © 2009 IEEE

    A policy based role object model

    No full text
    Enterprise roles dejine the duties and responsibilities of the individuals which are assigned to them This paper introduces a framework for the management of large distributed systems which makes use of the concepts developed in role theory. Our concept of a role groups the specifications of management policies which define the rights and duties corresponding to that role. Individuals m y then be assigned to or withdrawn from a role, to enable rapid and flexible organisational change, without altering the Specification of the policies. We extend this role concept to include relationships as means of specifying required interactions, duties and rights between related roles. Organisations may contain large numbers of similar roles with multiple relationships between them, so there is a need for reuse of specifications. Role and relationship classes permit multiple instantiation and inheritance is used for incremental extension of the organisational structure with minimal specification effort. We also briefly examine consistency and auditing issues related to this role framework. 1

    Security and management policy specification

    No full text
    Accepted versio
    corecore