In this study, we performed a simulation of mobile agents running on Agilla middleware designed for sensor networks. The simulations are performed using TOSSIM assuming that Agilla middleware is installed on the senso...
详细信息
In this paper, we present a modification of the ns2 code for the RTP/RTCP protocols. The legacy RTP/RTCP code in ns2 has not yet been validated but it provides a framework of the protocol's specification for exper...
详细信息
E-Learning is increasingly being integrated into universities as a new means of learning and teaching. The web-based learning system can increase the learning efficiency. This paper presents the design and implementat...
详细信息
Wireless Sensor Networks (WSNs) has been identified as a promising technology for supporting assistive environments. This article introduces PROTECT, a system that employs autonomous software objects referred to as Mo...
详细信息
ISBN:
(纸本)9781605580678
Wireless Sensor Networks (WSNs) has been identified as a promising technology for supporting assistive environments. This article introduces PROTECT, a system that employs autonomous software objects referred to as Mobile Agents (MAs) able of locating and informing visually impaired persons for potential risks. PROTECT utilizes a 3-tier architecture where the first tier comprises a Base Station (BS), the second tier mobile sinks (carried by blinds on their sticks) and the third tier stationary sensor nodes. This WSN is deployed in an urban environment. In the event of an alarm issued by a sensor node, the BS launches a number of MAs supplied with a near-optimal itineraries that visit the nodes in the alarm's surrounding area and notify visually impaired people for potential hazards in their proximity. In the event of communication problems (e.g. failure of some sensor nodes) PROTECT modifies the itineraries of the MAs to bypass the problematic areas avoiding disruption of the data collection process from working sensors. Simulation results confirm the high effectiveness of our proposed scheme in WSNs used in assistive environments and its performance gain over alternative approaches in data fusion tasks. Copyright 2008 ACM.
In this paper we propose a model for describing deceptive crimes in general and social engineering in particular. Our research approach was naïve inductivist and the methods used were literature study and intervi...
详细信息
ISBN:
(纸本)9781841021898
In this paper we propose a model for describing deceptive crimes in general and social engineering in particular. Our research approach was naïve inductivist and the methods used were literature study and interviews with the lead investigator in a grooming case, as we see many similarities between the techniques used in grooming, and those used in social engineering. From this we create cycles describing attacker, defender, and the victim and merge them into a model describing the cycle of deception. The model is then extended into a possible deception sphere. The resulting models can be used to educate about social engineering, to create automated social engineering attacks, to facilitate better incident reporting, and to understand the impact and economical aspects of defenses.
The problem of selecting an adequate set of variables from a given data set of a sampled function becomes crucial by the time of designing the model that will approximate it. Several approaches have been presented in ...
详细信息
We present a new simulation toolkit called TRAILS (Toolkit for Realism and Adaptivity In Large-scale Simulations), which extends the ns-2 simulator by adding important functionality and optimizing certain critical sim...
详细信息
We present a new simulation toolkit called TRAILS (Toolkit for Realism and Adaptivity In Large-scale Simulations), which extends the ns-2 simulator by adding important functionality and optimizing certain critical simulator operations. The added features provide the tools to study wireless networks of high dynamics. TRAILS facilitates the implementation of advanced mobility patterns, obstacle presence and disaster scenarios, and failures injection that can dynamically change throughout the execution of the simulation. Moreover, we define a set of utilities that enhance the use of ns-2. This functionality is implemented in a simple and flexible architecture, that follows design patterns, object oriented and generic programming principles, maintaining a proper balance between reusability, extendability and ease of use. We evaluate the performance of TRAILS and show that it offers significant speed-ups regarding the execution time of ns-2 in certain important, common wireless settings. Our results also show that this is achieved with minimum overhead in terms of memory usage.
Existing information systems often lack support to crisis and emergency situations. In such scenarios, the involved actors often engage in ad hoc collaborations necessary to understand and respond to the emerging even...
详细信息
ISBN:
(纸本)9783540928300
Existing information systems often lack support to crisis and emergency situations. In such scenarios, the involved actors often engage in ad hoc collaborations necessary to understand and respond to the emerging events. We propose a collaboration model and a prototype aiming to improve the consistency and effectiveness of emergent work activities. Our approach defends the requirement to construct shared situation awareness (SA). To support SA, we developed a collaborative artifact named situation matrixes (SM), which relates different situation dimensions (SD) of the crisis/emergency scenario. A method was also developed to construct and evaluate concrete SM and SD. This method was applied in two organizations' IT service desk teams, which often have to deal with emergency situations. The target organizations found our approach very relevant in organizing their response to emergencies.
Obscurances, from which ambient occlusion is a particular case, is a technology that produces natural-looking lighting effects in a faster way than global illumination. Its application in volume visualization is of sp...
详细信息
暂无评论