We describe a system architecture aimed at supporting Intelligence, Surveillance, and Reconnaissance (ISR) activities in a Company Intelligence Support Team (CoIST) using natural language-based knowledge representatio...
详细信息
ISBN:
(纸本)9781628410167
We describe a system architecture aimed at supporting Intelligence, Surveillance, and Reconnaissance (ISR) activities in a Company Intelligence Support Team (CoIST) using natural language-based knowledge representation and reasoning, and semantic matching of mission tasks to ISR assets. We illustrate an application of the architecture using a High Value Target (HVT) surveillance scenario which demonstrates semi-automated matching and assignment of appropriate ISR assets based on information coming in from existing sensors and human patrols operating in an area of interest and encountering a potential HVT vehicle. We highlight a number of key components of the system but focus mainly on the human/ machine conversational interaction involving soldiers on the field providing input in natural language via spoken voice to a mobile device, which is then processed to machine-processable Controlled Natural Language (CNL) and confirmed withthe soldier. the system also supports CoIST analysts obtaining real-time situation awareness on the unfolding events through fused CNL information via tools available at the Command and Control (C2). the system demonstrates various modes of operation including: automatic task assignment following inference of new high-importance information, as well as semi-automatic processing, providing the CoIST analyst with situation awareness information relevant to the area of operation.
In this paper we present the developed components and the electronic packaging design for a miniaturized, wireless neural electrode. Particularly, the whole system consists of a hook-up electrode for contacting the ne...
详细信息
In this paper we present the developed components and the electronic packaging design for a miniaturized, wireless neural electrode. Particularly, the whole system consists of a hook-up electrode for contacting the nerve and an electronic part that generates and sends stimulating signals to the nerve and records the neural signals. the hook-up electrode has been designed in a way that enhances the easy of positioning during the medical procedure and consists of biocompatible materials in order to avoid toxic tissue reactions. the most important component of the electronic part is a developed ASIC, which receives power and data from a coil and generates the stimulating signals and records signals coming from the nerve. the telemetric power and data transmission is based on a transponder principle. A separate sending and reading unit laid under the patient is providing energy and data transmission to the wireless system for stimulation and recording. the assembly of all components is ensured by a system-integration approach that maintains functioning of the whole wireless system properly and reliably. In this regard, the proposed wireless neural electrode offers a promising alternative for applications in neural electrical stimulation and recording.
Android has become the leading smartphone platform with hundreds of devices from various manufacturers available on the market today. All these phones closely resemble each other with similar hardware and software fea...
详细信息
ISBN:
(纸本)9781450322782
Android has become the leading smartphone platform with hundreds of devices from various manufacturers available on the market today. All these phones closely resemble each other with similar hardware and software features. Manufacturers must therefore customize the official Android system to differentiate their devices. Unfortunately, such heavily customization by third-party manufacturers often leads to serious vulnerabilities that do not exist in the official Android system. In this paper, we propose a comparative approach to systematically audit software in third-party phones by comparing them side-by-side to the official system. Specifically, we first retrieve pre-loaded apps and libraries from the phone and build a matching base system from the Android open source project repository. We then compare corresponding apps and libraries for potential vulnerabilities. To facilitate this process, we have designed and implemented DexDiff, a system that can pinpoint fine structural differences between two Android binaries and also present the changes in their surrounding contexts. Our experiments show that DexDiff is efficient and scalable. For example, it spends less than two and half minutes to process two 16.5MB (in total) files. DexDiff is also able to reveal a new vulnerability and details of the invasive CIQ mobile intelligence software.
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. the project gives a model for storing user data as decentralized packets on nodes on the network....
详细信息
ISBN:
(纸本)9781479926213;9781479926220
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. the project gives a model for storing user data as decentralized packets on nodes on the network. the model proposes a solution with redundant data to provide an efficient model, with maximum availability.
privacy has been acknowledged to be a critical requirement for composite services. In the previous research, we have introduced a privacy-preserving access model, but have no chance to detail the specifying of privacy...
详细信息
ISBN:
(纸本)9781479900930
privacy has been acknowledged to be a critical requirement for composite services. In the previous research, we have introduced a privacy-preserving access model, but have no chance to detail the specifying of privacy policies for a composite service. However, the privacy policies in the services should be consistent with each other, and it decides the feasibility and effectiveness of the model. therefore, this paper proposes a privacy policy composition mechanism that uses the existing policies of the atomic services. through the definition of policies in the model, the rules to create the user profile and data profile have been derived and the profile samples are given. In the end, an application example is shown to explain that how to use the profiles in the composition engine of the model and then give the implementation of the approach.
It is popular to access the cloud storage by mobile devices. However, this application suffer datasecurity risk, especial the data leakage and privacy violate problem. this risk exists not only in cloud storage syste...
详细信息
ISBN:
(纸本)9780819495884
It is popular to access the cloud storage by mobile devices. However, this application suffer datasecurity risk, especial the data leakage and privacy violate problem. this risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. the design basic idea, deploy model and key flows are detailed. the analysis from the security and performance shows the advantage.
To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framew...
详细信息
Value-added services have been promising applications in Vehicular Ad Hoc Networks (VANETs) in recent years. In VANETs, Road Side Units (RSUs) cannot cover all areas, causing intermittent connectivity. As a result, ho...
详细信息
the overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by the user, most applications ...
详细信息
ISBN:
(纸本)9781450319980
the overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by the user, most applications generate characteristic traffic from their background activities, such as periodic update requests or server synchronisation. Although the encryption of transmitted data in 3G networks prevents an eavesdropper from analysing the content, periodic traffic patterns leak side-channel information like timing and data volume. In this work, we extract such side-channel features from network traffic generated from the most popular applications, such as Facebook, WhatsApp, Skype, Dropbox, and others, and evaluate whether they can be used to reliably identify a smartphone. By computing fingerprints from ≈6 hours of background traffic, we show that 15 minutes of monitored traffic suffice to reliably identify a smartphone based on its behavioural fingerprint with a success probability of 90%. Copyright 2013 acm.
the confidentiality of data is one of the most important issues in cloud storage system. We address the privacy issue of decentralized cloud storage system using threshold cryptography. the major challenge of designin...
详细信息
暂无评论