Search results for "Computer Science"
showing 10 items of 22367 documents
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…
Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests
2020
In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…
Two novel subjective logic-based in-network data processing schemes in wireless sensor networks
2016
Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…
Cognitive biases in humanitarian sensemaking and decision-making lessons from field research
2016
Time and again, humanitarian decision-makers are confronted with stress and pressure, distorted, lacking and uncertain information, and thus they are working in conditions that are known to introduce or enforce biases. Decision analysis has been designed to overcome such biases, and a network of “digital responders” organized over the Internet has set out to improve judgments by providing better information. However, without any structured support to determine objectives, goals and preferences and detached from the context of operational decision-makers, remote analysts may face the very biases they are trying to help overcome. This article sets out to identify biases that matter for humani…
Analyzing Cascading Effects in Interdependent Critical Infrastructures
2018
International audience; Critical Infrastructures (CIs) are resources that are essential for the performance of society, including its economy and its security. Large-scale disasters, whether natural or man-made, can have devastating primary (direct) effects on some CI and significant indirect effects (cascading effects) on other CIs, because CIs are interconnected and depend on each other’s services. Recent work by Laugé et al. expressed the dependency values among CIs as dependency matrices for various durations of the primary CI failure. For better preparedness and mitigation of CI failures knowledge of the weak points in CI interdependencies is crucial. To this effect, we have developed …
Digital Volunteers in Disaster Response: Accessibility Challenges
2019
The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…
A Review of Qualitative Comments on a Proposed Master's Degree in Emergency Management
2017
Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation
2017
To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…