Search results for "COMMUNICATION"
showing 10 items of 9338 documents
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…
Two novel subjective logic-based in-network data processing schemes in wireless sensor networks
2016
Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…
Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities
2017
New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...
Terrorism in the Website
2020
Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …
Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011
2013
This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…
Language constraints in producing prefiguration posters for a scientific exhibition
1997
The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…
Automatic Integration of Spatial Data into the Semantic Web
2017
International audience
Wissen, Verstehen, Glauben? Eine Fallstudie zur patientenzentrierten Kommunikation und partizipativen Entscheidungsfindung
2019
Zusammenfassung Patientenzentrierte Kommunikation und selbstbestimmte Entscheidungen gelten heutzutage als wichtige Aspekte der Arzt-Patienten-Beziehung. Im klinischen Alltag ist die Umsetzung dieser Konzepte jedoch immer wieder erschwert. In diesem Beitrag wird anhand eines Fallbeispiels diskutiert, worin die Grenzen der partizipativen Entscheidungsfindung bestehen und wieso das Vertrauen in die Handlungslogik der Institution insbesondere dann relevant wird, wenn es nur geringe Spielräume für eigene Entscheidungen gibt.
2019
This study analyzed the spatial-temporal interactions that sustained 2-vs-1 contexts in football at different field locations near the goal. Fifteen male players (under 15 years, age 13.2 ± 1.03 years, years of practice 4.2 ± 1.10 years), 5 defenders, 7 midfielders, and 3 attackers, participated in the study. Each participant performed a game to simulate a 2-vs-1 sub-phase as a ball carrier, second attacker, and defender at three different field locations, resulting in a total number of 142 trials. The movements of participants in each trial were recorded and digitized with TACTO software. Values of interpersonal distance between the ball carrier and defender and interpersonal angles betwee…