941 resultados para mobile Internet


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a technique for high-dynamic range stereo for outdoor mobile robot applications. Stereo pairs are captured at a number of different exposures (exposure bracketing), and combined by projecting the 3D points into a common coordinate frame, and building a 3D occupancy map. We present experimental results for static scenes with constant and dynamic lighting as well as outdoor operation with variable and high contrast lighting conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates a mobile, wireless sensor/actuator network application for use in the cattle breeding industry. Our goal is to prevent fighting between bulls in on-farm breeding paddocks by autonomously applying appropriate stimuli when one bull approaches another bull. This is an important application because fighting between high-value animals such as bulls during breeding seasons causes significant financial loss to producers. Furthermore, there are significant challenges in this type of application because it requires dynamic animal state estimation, real-time actuation and efficient mobile wireless transmissions. We designed and implemented an animal state estimation algorithm based on a state-machine mechanism for each animal. Autonomous actuation is performed based on the estimated states of an animal relative to other animals. A simple, yet effective, wireless communication model has been proposed and implemented to achieve high delivery rates in mobile environments. We evaluated the performance of our design by both simulations and field experiments, which demonstrated the effectiveness of our autonomous animal control system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper demonstrates some interesting connections between the hitherto disparate fields of mobile robot navigation and image-based visual servoing. A planar formulation of the well-known image-based visual servoing method leads to a bearing-only navigation system that requires no explicit localization and directly yields desired velocity. The well known benefits of image-based visual servoing such as robustness apply also to the planar case. Simulation results are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ElectricCOW is a network, animal behaviour and agent simulator designed to allow detailed simulation of an ad-hoc model network built from small mote-like devices called flecks. Detailed radio communications, cattle behaviour and sensor and actuator network modelling allows a closed-loop environment, where the network can influence the behaviour of its mobile platforms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper demonstrates some interesting connections between the hitherto disparate fields of mobile robot navigation and image-based visual servoing. A planar formulation of the well-known image-based visual servoing method leads to a bearing-only navigation system that requires no explicit localization and directly yields desired velocity. The well known benefits of image-based visual servoing such as robustness apply also to the planar case. Simulation results are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hand-held mobile phone use while driving is illegal throughout Australia yet many drivers persist with this behaviour. This study aims to understand the internal, driver-related and external, situational-related factors influencing drivers’ willingness to use a hand-held mobile phone while driving. Sampling 160 university students, this study utilised the Theory of Planned Behaviour (TPB) to examine a range of belief-based constructs. Additionally, drivers’ personality traits of neuroticism and extroversion were measured with the Neuroticism Extroversion Openness-Five Factor Inventory (NEO-FFI). In relation to the external, situational-related factors, four different driving-related scenarios, which were intended to evoke differing levels of drivers’ reported stress, were devised for the study and manipulated drivers’ time urgency (low versus high) and passenger presence (alone versus with friends). In these scenarios, drivers’ willingness to use a mobile phone in general was measured. Hierarchical regression analyses across the four different driving scenarios found that, overall, the TPB components significantly accounted for drivers’ willingness to use a mobile phone above and beyond the demographic variables. Subjective norms, however, was only a significant predictor of drivers’ willingness in situations where the drivers were driving alone. Generally, neuroticism and extroversion did not significantly predict drivers’ willingness above and beyond the TPB and demographic variables. Overall, the findings broaden our understanding of the internal and external factors influencing drivers’ willingness to use a hand-held mobile phone while driving despite the illegality of this behaviour. The findings may have important practical implications in terms of better informing road safety campaigns targeting drivers’ mobile phone use which, in turn, may contribute to a reduction in the extent that mobile phone use contributes to road crashes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present research was a preliminary examination of young Australians’ mobile phone behaviour. The study explored the relationship between, and psychological predictors of, frequency of mobile phone use and mobile phone involvement conceptualised as people’s cognitive and behavioural interaction with their mobile phone. Participants were 946 Australian youth aged between 15 and 24 years. A descriptive measurement tool, the Mobile Phone Involvement Questionnaire (MPIQ), was developed. Self-identity and validation from others were explored as predictors of both types of mobile phone behaviour. A distinction was found between frequency of mobile phone use and mobile phone involvement. Only self-identity predicted frequency of use whereas both self-identity and validation from others predicted mobile phone involvement. These findings reveal the importance of distinguishing between frequency of use and people’s psychological relationship with their phone and that factors relating to one’s self-concept and approval from others both impact on young people’s mobile phone involvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spatial representations, metaphors and imaginaries (cyberspace, web pages) have been the mainstay of internet research for a long time. Instead of repeating these themes, this paper seeks to answer the question of how we might understand the concept of time in relation to internet research. After a brief excursus on the general history of the concept, this paper proposes three different approaches to the conceptualisation of internet time. The common thread underlying all the approaches is the notion of time as an assemblage of elements such as technical artefacts, social relations and metaphors. By drawing out time in this way, the paper addresses the challenge of thinking of internet time as coexistence, a clash of fluxes, metaphors, lived experiences and assemblages. In other words, this paper proposes a way to articulate internet time as a multiplicity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation about internet based interventions for depression, substance and alcohol abuse.