Search results for "COMMUNICATION"

showing 10 items of 9338 documents

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities

2017

New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...

021110 strategic defence & security studiesEmergency managementbusiness.industrymedia_common.quotation_subject05 social sciencesGeography Planning and Development0211 other engineering and technologies02 engineering and technologyBuilding and ConstructionPublic relationsSocial justiceInformation asymmetryInformation and Communications TechnologySociology0509 other social sciences050904 information & library sciencesSafety Risk Reliability and QualityResilience (network)businessEmpowermentCivil and Structural Engineeringmedia_commonSustainable and Resilient Infrastructure
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011

2013

This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…

021110 strategic defence & security studiesManagement sciencebusiness.industry05 social sciences0211 other engineering and technologieskriiisiviestintä050801 communication & media studies02 engineering and technologyScientific literatureCrisis managementterrorismManagement Monitoring Policy and LawPublic relations16. Peace & justicekriisiviestintäManagement Information Systems0508 media and communicationsterrorismiPreparednessPolitical scienceTerrorismbusinesscrisis communication
researchProduct

Language constraints in producing prefiguration posters for a scientific exhibition

1997

The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…

021110 strategic defence & security studiesSociology of scientific knowledge010504 meteorology & atmospheric sciencesCloning (programming)CommunicationReproduction (economics)0211 other engineering and technologies02 engineering and technologySpace (commercial competition)01 natural sciencesExhibitionLinguistic analysisArts and Humanities (miscellaneous)AestheticsDevelopmental and Educational PsychologyTransposition (logic)SociologySocial science0105 earth and related environmental sciencesPublic Understanding of Science
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

Automatic Integration of Spatial Data into the Semantic Web

2017

International audience

021110 strategic defence & security studies[ INFO ] Computer Science [cs]Information retrieval[INFO.INFO-WB] Computer Science [cs]/Webbusiness.industryComputer scienceOntology-based data integration05 social sciences[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/Web0211 other engineering and technologies050801 communication & media studies02 engineering and technology[INFO] Computer Science [cs]Social Semantic Web0508 media and communicationsSemantic computingSemantic analyticsSemantic integration[INFO]Computer Science [cs]Semantic Web StackbusinessSemantic WebData WebComputingMilieux_MISCELLANEOUS
researchProduct

Wissen, Verstehen, Glauben? Eine Fallstudie zur patientenzentrierten Kommunikation und partizipativen Entscheidungsfindung

2019

Zusammenfassung Patientenzentrierte Kommunikation und selbstbestimmte Entscheidungen gelten heutzutage als wichtige Aspekte der Arzt-Patienten-Beziehung. Im klinischen Alltag ist die Umsetzung dieser Konzepte jedoch immer wieder erschwert. In diesem Beitrag wird anhand eines Fallbeispiels diskutiert, worin die Grenzen der partizipativen Entscheidungsfindung bestehen und wieso das Vertrauen in die Handlungslogik der Institution insbesondere dann relevant wird, wenn es nur geringe Spielräume für eigene Entscheidungen gibt.

03 medical and health sciences0302 clinical medicine05 social sciencesPedagogyHuman immunodeficiency virus (HIV)medicine050109 social psychology0501 psychology and cognitive sciences030212 general & internal medicinemedicine.disease_causePsychologyIntercultural communicationSpiritual Care
researchProduct

2019

This study analyzed the spatial-temporal interactions that sustained 2-vs-1 contexts in football at different field locations near the goal. Fifteen male players (under 15 years, age 13.2 ± 1.03 years, years of practice 4.2 ± 1.10 years), 5 defenders, 7 midfielders, and 3 attackers, participated in the study. Each participant performed a game to simulate a 2-vs-1 sub-phase as a ball carrier, second attacker, and defender at three different field locations, resulting in a total number of 142 trials. The movements of participants in each trial were recorded and digitized with TACTO software. Values of interpersonal distance between the ball carrier and defender and interpersonal angles betwee…

03 medical and health sciences0302 clinical medicineFootball soccer05 social sciences0501 psychology and cognitive sciencesInterpersonal communicationFootballMiddle zonePsychologySocial psychology030217 neurology & neurosurgery050105 experimental psychologyGeneral PsychologyFrontiers in Psychology
researchProduct