We develop and compare the performance of two information management policies for wireless sensor networks. The first, sensor-centric utility-based (SCUB) is a distributed approach that instructs individual sensors to...
详细信息
We develop and compare the performance of two information management policies for wireless sensor networks. The first, sensor-centric utility-based (SCUB) is a distributed approach that instructs individual sensors to make their own decisions about what sensor information should be reported, based on a utility model for data. The second, resource manager (RM), is a consolidated approach that takes into account knowledge from all sensors before making decisions. We evaluate these policies through simulation in the context of dynamically deployed sensor networks in military scenarios. Our results show that both SCUB and RM yield longer lifetimes than cases where no policy is used. However, SCUB produces comparable lifetimes to RM while reporting significantly more data
The two goals of this project were to develop a household water purification method and to provide a framework for sustaining this technology in a low-income community. According to the World Health Organization, wate...
详细信息
The two goals of this project were to develop a household water purification method and to provide a framework for sustaining this technology in a low-income community. According to the World Health Organization, waterborne diseases are a leading cause of illness and death in developing countries. Over 1.1 billion people across the world lack access to an improved water supply, leading to diseases that disproportionately affect children. Water purification methods used in high-income nations are neither economically nor technically feasible in low-income countries. As a result, there is a critical need for inexpensive, appropriate water purification technologies. The system developed was tested in Tourou, Cameroon
作者:
James CraftWilliam ClevelandThe Information Systems Security Officer at the United States Agency for International Development (USAID)
Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager
Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, information Resources Management (M/IRM), informationsystems Secu...
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, information Resources Management (M/IRM), informationsystems Security Team. The USAID is an independent agency that provides economic, development, and humanitarian assistance around the world in support of the foreign policy goals of the United States. It is located in the Ronald Reagan Building in Washington, D.C.
Background subtraction is widely used as an effective method for detecting moving objects in a video image. However, background subtraction requires a prerequisite in that image variation cannot be observed, and the r...
详细信息
Our modern era is characterized by a large-scale web of interconnected and interdependent economic and infrastructure systems, coupled with threats of terrorism. This paper demonstrates the value of introducing interd...
详细信息
This project simulates and analyzes the inspection process of cargo containers as they enter the United States Seaports. The purpose for this project is to create a more efficient inspection process allowing more cont...
详细信息
ISBN:
(纸本)0974455946
This project simulates and analyzes the inspection process of cargo containers as they enter the United States Seaports. The purpose for this project is to create a more efficient inspection process allowing more containers to be inspected without too significant of a cost. The inspection process that was simulated has four major parts. The different stages in the process include: targeting containers, passive inspection, active inspection, and a manual inspection. The different stages included times, costs, and probabilities. These were used as input data for the model. Different scenarios of the simulation model were then created to find a more efficient system in which a greater number of containers could be inspected.
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr...
详细信息
Multiagent System engineering Methodology (MaSE) is a general purpose agent-based software engineering method for developing heterogeneous multiagent systems. The goal of MaSE is to guide a system developer from an in...
详细信息
ISBN:
(纸本)193241567X
Multiagent System engineering Methodology (MaSE) is a general purpose agent-based software engineering method for developing heterogeneous multiagent systems. The goal of MaSE is to guide a system developer from an initial system specification to a multiagent implementation. This paper discussed on gaps and weaknesses discovered in the MaSE analysis methodology. For removing the reported weaknesses, this paper introduces "domain modeling" to capture the overall view of the domain problem to be solved and to later systematically identify agents to be used in the system. MaSE is integrated with Pattern Oriented Analysis and Design (POAD) methodology to provide a systematic development process using patterns. "Agent Identification step" is also proposed by this paper to guide the agent identification process in the analysis phase. This paper will show that the integration of the POAD methodology to the MaSE methodology in the analysis phase could leverage the reuse level of the agent-based system.
暂无评论