JUSPN, volume-10 , Issue 1 (2018), PP 33 - 40
Published: 01 Oct 2018
by Samar El-Amine, Stephane Galland, Abderraffiaa Koukam from LE21, Univ. Bourgogne Franche-Comte, UTBM, 90010 Belfort Cedex, France
Abstract: Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognized to the social behaviors in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behavior will endure to be a challenge for imitations and mechanization methods developed so far read more... read less...
Keywords: Agent-Based Modeling (ABM); ABM Transportation Model; Social Behaviors
JUSPN, volume-10 , Issue 1 (2018), PP 27 - 32
Published: 07 Mar 2018
by Marquos Zaki, Ali Alquraini, Tarek Sheltami from King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia, 31261
Abstract: In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotive EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general. read more... read less...
Keywords: EEG, EMOTIV, Home Automation, eHealth, RasperryPi, BCI
JUSPN, volume-10 , Issue 1 (2018), PP 21 - 25
Published: 07 Mar 2018
by Jabril Abdelaziz, Mehdi Addab, Hamid Mcheick from Mathematics and Computer Science Dep. University of Quebec at Chicoutimi, Chicoutimi (Qc), Canada, Mathematics, Computer Science and Engineering Dep. University of Quebec at Rimouski, Rimouski (Qc), Canada
Abstract: The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model. read more... read less...
Keywords: fog computing, service aggregation, internet of things.
JUSPN, volume-10 , Issue 1 (2018), PP 11 - 19
Published: 07 Mar 2018
by Valderi R. Q. Leithardt, Luiz Henrique Andrade Correia, Guilherme A. Borges, Anubis G.M. Rossetto, Carlos O. Rolim, Claudio F. R. Geyer and Jorge M. Sá Silva from Laboratory of Embedded and Distributed Systems, University of Vale do Itajaí (UNIVALI), Itajaí, Brazil, 88302-202, Institute of Informatics, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil, 91.501-970, Federal University of Lavras, Lavras 37200-000, Brazil , Department of Computer Engineering, University of Coimbra, Coimbra, Portugal, 3000-370
Abstract: Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file. read more... read less...
Keywords: Ubiquitous computing, Privacy Management, History Control
Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition
JUSPN, volume-10 , Issue 1 (2018), PP 01 - 09
Published: 07 Mar 2018
by Georg MACHER, Harald SPORER, Eugen BRENNER, Christian KREINER from AVL List GmbH, Graz, AUSTRIA, 8010, TÜV Austria, Vienna, AUSTRIA, 1010, Graz University of Technology, Graz, AUSTRIA, 8010
Abstract: An important trend in the automotive domain is to adapt established functional safety processes and methods for security engineering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for this challenge, they can capitalize on experiences from many other domains, but must also face several unique challenges. Such as, that cyber-security engineering will now join reliability and safety as a cornerstone for success in the automotive industry and approaches need to be integrated into the mainly safety-oriented development lifecycle of the domain. The recently released SAE J3061 guidebook for cyber-physical vehicle systems focus on designing cyber-security aware systems in close relation to the automotive safety standard ISO 26262. The key contribution of this paper is to analyse a method to identify attack vectors on complex automotive systems via signal interfaces and propose a security classification scheme and protection mechanisms on signal layer. To that aim, the hardware-software interface (HSI), a central development artefact of the ISO 26262 functional safety development process, is used and extended to support the cyber-security engineering process and provide cyber-security countermeasures on signal layer. read more... read less...
Keywords: ISO26262, SAE J3061, automotive systems, hardware-software interfaces, cyber-security, functional safety