Search results for "NETWORK"

showing 10 items of 7718 documents

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Combined column-and-row-generation for the optimal communication spanning tree problem

2018

Abstract This paper considers the exact solution of the optimal communication spanning tree problem (OCSTP), which can be described as follows: Given an undirected graph with transportation costs on every edge and communication requirements for all pairs of vertices, the OCSTP seeks for a spanning tree that minimizes the sum of the communication costs between all pairs of vertices, where the communication cost of a pair of vertices is defined as their communication requirement multiplied by the transportation cost of the unique tree path that connects the two vertices. Two types of compact formulations for OCSTP were presented in the literature. The first one is a four-index model based on …

021103 operations researchSpanning treeGeneral Computer ScienceHeuristicComputer scienceIntersection (set theory)0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchFlow network01 natural sciencesTree (graph theory)GraphVertex (geometry)Combinatorics010201 computation theory & mathematicsModeling and SimulationPath (graph theory)Graph (abstract data type)MathematicsofComputing_DISCRETEMATHEMATICSComputers & Operations Research
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation

2017

To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…

021110 strategic defence & security studiesEmergency managementSituation awarenessbusiness.industryComputer scienceProperty (programming)Information sharing0211 other engineering and technologies030208 emergency & critical care medicine02 engineering and technologyComplex networkComputer securitycomputer.software_genreVisualizationTask (project management)03 medical and health sciences0302 clinical medicinebusinesscomputerSearch and rescue2017 IEEE 7th International Advance Computing Conference (IACC)
researchProduct

Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities

2017

New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...

021110 strategic defence & security studiesEmergency managementbusiness.industrymedia_common.quotation_subject05 social sciencesGeography Planning and Development0211 other engineering and technologies02 engineering and technologyBuilding and ConstructionPublic relationsSocial justiceInformation asymmetryInformation and Communications TechnologySociology0509 other social sciences050904 information & library sciencesSafety Risk Reliability and QualityResilience (network)businessEmpowermentCivil and Structural Engineeringmedia_commonSustainable and Resilient Infrastructure
researchProduct

Serious Game Design for Flooding Triggered by Extreme Weather

2017

Managing crises with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to a table-top exercise. This article presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such a way that the player will have limited resources, and elevated event pressure over time. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and used the involvement of testers, i…

021110 strategic defence & security studiesExtreme weatherComputer scienceComputingMilieux_PERSONALCOMPUTING0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing02 engineering and technologySerious gameWater resource managementFlooding (computer networking)International Journal of Information Systems for Crisis Response and Management
researchProduct

Ensuring the Reliability of an Autonomous Vehicle

2017

International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…

021110 strategic defence & security studiesFocus (computing)021103 operations researchComputer sciencebusiness.industryDistributed computingReliability (computer networking)0211 other engineering and technologiesAutomotive industry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTask (project management)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Systems Modeling LanguageComponent (UML)Systems architectureTime constraint[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct