Journal articles on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 journal articles for your research on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dong, Qingkuan, Mengmeng Chen, Lulu Li, and Kai Fan. "Cloud-based radio frequency identification authentication protocol with location privacy protection." International Journal of Distributed Sensor Networks 14, no. 1 (January 2018): 155014771875496. http://dx.doi.org/10.1177/1550147718754969.

Full text
Abstract:
With the development of the Internet of things and cloud storage, a large number of objects access to the Internet through radio frequency identification technology, cloud-based radio frequency identification system attracts more attention because it can reduce the costs of system maintenance by renting the cloud storage service on demand. Especially, it is very suitable for the small- and medium-sized enterprises. However, the security and privacy issues of the cloud-based radio frequency identification system are more serious than traditional radio frequency identification systems. The link between the reader and the cloud is no longer secure, and the cloud service provider is not trusted. Both the location privacy of the reader and the data privacy of the radio frequency identification system are not able to be exposed to the cloud service provider. In this article, a cloud-based radio frequency identification authentication protocol is proposed. It considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. In particular, in order to solve the reader’s location privacy problem, the proposed scheme introduces MIPv6 network framework without adding additional infrastructure. The experimental verification with AVISPA tool shows that the protocol satisfies the mutual authentication property. Compared with other cloud-based schemes, the proposed protocol has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Shiyong, and Gongliang Chen. "Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694171.

Full text
Abstract:
Distributed sensor networks have been widely applied to healthcare, environmental monitoring and management, intelligent transportation, and other fields in which network sensors collect and transmit information about their surrounding environment. Radio frequency identification technology transmits an object’s identification as a unique serial number—using radio waves as the transmission carrier—and is becoming an important building block for distributed sensor networks. However, the security of radio frequency identification systems is a major industrial concern that can significantly hinder the market growth of distributed sensor networks. Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. In this article, we generalize Trivium to the Trivium-Model algorithm and highlight that security is mainly determined by the internal state bits and the number of nonlinear terms. We propose principles for choosing parameters and generating better parameters that are feasible for low-cost radio frequency identification tags in distributed sensor networks. The new algorithm, named Micro-Trivium, requires less power and a smaller chip area than the original Trivium, which is proven using experimental data and results. Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Zhen, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, and Jin Wang. "An Ensemble Learning Method for Wireless Multimedia Device Identification." Security and Communication Networks 2018 (October 15, 2018): 1–9. http://dx.doi.org/10.1155/2018/5264526.

Full text
Abstract:
In the last decade, wireless multimedia device is widely used in many fields, which leads to efficiency improvement, reliability, security, and economic benefits in our daily life. However, with the rapid development of new technologies, the wireless multimedia data transmission security is confronted with a series of new threats and challenges. In physical layer, Radio Frequency Fingerprinting (RFF) is a unique characteristic of IoT devices themselves, which can difficultly be tampered. The wireless multimedia device identification via Radio Frequency Fingerprinting (RFF) extracted from radio signals is a physical-layer method for data transmission security. Just as people’s unique fingerprinting, different Internet of Things (IoT) devices exhibit different RFF which can be used for identification and authentication. In this paper, a wireless multimedia device identification system based on Ensemble Learning is proposed. The key technologies such as signal detection, RFF extraction, and classification model are discussed. According to the theoretical modeling and experiment validation, the reliability and the differentiability of the RFFs are evaluated and the classification results are shown under the real wireless multimedia device environments.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Zhen-Yu. "An radio-frequency identification security authentication mechanism for Internet of things applications." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986222. http://dx.doi.org/10.1177/1550147719862223.

Full text
Abstract:
Among various Internet of things technologies, radio-frequency identification technology is currently one of the most critical. Radio-frequency identification tags store messages collected by the reader; thereafter, the messages are transmitted to the backend system for processing and analysis, thereby forming a huge knowledge network and achieving the objective of intelligent management of objects. However, the personal information and privacy exposure, malicious tracking, and counterfeiting behaviors remain the unresolved issues in the security area. In this study, we developed a matrix-based authentication protocol that was protected by Hill Cipher Hard Problem by which it can provide confidentiality, anti-counterfeiting, and users’ location privacy. In addition, the identity verification of this scheme based on matrix needs only once matrix multiplication operation to know the outcome. Consequently, the analysis of computational complexity demonstrated that our scheme can handle the mass data from the reader, thereby achieving system extensibility.
APA, Harvard, Vancouver, ISO, and other styles
5

Gódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol." International Journal of Business Data Communications and Networking 6, no. 3 (July 2010): 66–94. http://dx.doi.org/10.4018/jbdcn.2010070104.

Full text
Abstract:
Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors’ have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol’s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system’s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Yu, Xiaolei Liu, and Yanmin Zhao. "Security Cryptanalysis of NUX for the Internet of Things." Security and Communication Networks 2019 (June 12, 2019): 1–12. http://dx.doi.org/10.1155/2019/2062697.

Full text
Abstract:
In order to adopt the restricted environment, such as radio frequency identification technology or sensor networking, which are the important components of the Internet of Things, lightweight block ciphers are designed. NUX is a 31-round iterative ultralightweight cipher proposed by Bansod et al. In this paper, we examine the resistance of NUX to differential and linear analysis and search for 1~31-round differential characteristics and linear approximations. In design specification, authors claimed that 25-round NUX is resistant to differential and linear attack. However, we can successfully perform 29-round differential attack on NUX with the 22-round differential characteristic found in this paper, which is 4 rounds more than the limitation given by authors. Furthermore, we present the key recovery attack on 22-round NUX using a 19-round linear approximation determined in this paper. Besides, distinguishing attack, whose distinguisher is built utilizing the property of differential propagation through NUX, is implemented on full NUX with data complexity 8.
APA, Harvard, Vancouver, ISO, and other styles
7

Hajny, Jan, Petr Dzurenda, and Lukas Malina. "Multidevice Authentication with Strong Privacy Protection." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–12. http://dx.doi.org/10.1155/2018/3295148.

Full text
Abstract:
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, He, Xin Chen, Feng Zhu, and Peng Li. "A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems." Wireless Communications and Mobile Computing 2021 (July 23, 2021): 1–14. http://dx.doi.org/10.1155/2021/8844178.

Full text
Abstract:
The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID-based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Shabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.

Full text
Abstract:
Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Diamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (June 8, 2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.

Full text
Abstract:
Purpose This paper aims to identify the controls provisioned in ISO/IEC 27001:2013 and ISO/IEC 27002:2013 that need to be extended to adequately meet, data protection requirements set by the General Data Protection Regulation (GDPR); it also indicates security management actions an organisation needs to perform to fulfil GDPR requirements. Thus, ISO/IEC 27001:2013 compliant organisations, can use this paper as a basis for extending the already existing security control modules towards data protection; and as guidance for reaching compliance with the regulation. Design/methodology/approach This study has followed a two-step approach; first, synergies between ISO/IEC 27001:2013 modules and GDPR requirements were identified, by analysing all 14 control modules of the ISO/IEC 27001:2013 and proposing the appropriate actions towards the satisfaction of data protection requirements. Second, this paper identified GDPR requirements not addressed by ISO/IEC 27001:2013. Findings The findings of this work include the identification of the common ground between the security controls that ISO/IEC 27001:2013 includes and the requirements that the GDPR imposes; the actions that need to be performed based on these security controls to adequately meet the data protection requirements that the GDPR imposes; and the identification of the remaining actions an ISO/IEC 27001 compliant organisation needs to perform to be able to adhere with the GDPR. Originality/value This paper provides a gap analysis and a further steps identification regarding the additional actions that need to be performed to allow an ISO/IEC 27001:2013 certified organisation to be compliant with the GDPR.
APA, Harvard, Vancouver, ISO, and other styles
11

Kelly, Eileen P., and G. Scott Erickson. "RFID tags: commercial applications v. privacy rights." Industrial Management & Data Systems 105, no. 6 (August 1, 2005): 703–13. http://dx.doi.org/10.1108/02635570510606950.

Full text
Abstract:
PurposeThis article seeks to examine the use of radio frequency identification (RFID) technology in commercial applications and to discuss whether regulation is needed to balance commercial economic interests versus consumer privacy and libertarian concerns.Design/methodology/approachThis paper covers discussions and comparative studies of others' work and thinking.FindingsRFID technology provides enormous economic benefits for both business and consumers, while simultaneously potentially constituting one of the most invasive surveillance technologies threatening consumer privacy.Practical implicationsThe use of RFID technology has profound consumer privacy, civil liberty and security implications.Originality/valueRFID technology is at an embryonic stage. Like many new technologies, it poses both potential benefit and harm to society. The article recommends that legislation is needed to tip the balance enough to provide adequate privacy protection without unduly harming economic efficiency.
APA, Harvard, Vancouver, ISO, and other styles
12

Dixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz, and Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection." Security and Communication Networks 2021 (June 14, 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.

Full text
Abstract:
Now a day’s advancement in technology increases the use of automation, mobility, smart devices, and application over the Internet that can create serious problems for protection and the privacy of digital data and raised the global security issues. Therefore, the necessity of intelligent systems or techniques can prevent and protect the data over the network. Cyberattack is the most prominent problem of cybersecurity and now a challenging area of research for scientists and researchers. These attacks may destroy data, system, and resources and sometimes may damage the whole network. Previously numerous traditional techniques were used for the detection and mitigation of cyberattack, but the techniques are not efficient for new attacks. Today’s machine learning and metaheuristic techniques are popularly applied in different areas to achieve efficient computation and fast processing of complex data of the network. This paper is discussing the improvements and enhancement of security models, frameworks for the detection of cyberattacks, and prevention by using different machine learning and optimization techniques in the domain of cybersecurity. This paper is focused on the literature of different metaheuristic algorithms for optimal feature selection and machine learning techniques for the classification of attacks, and some of the prominent algorithms such as GA, evolutionary, PSO, machine learning, and others are discussed in detail. This study provides descriptions and tutorials that can be referred from various literature citations, references, or latest research papers. The techniques discussed are efficiently applied with high performance for detection, mitigation, and identification of cyberattacks and provide a security mechanism over the network. Hence, this survey presents the description of various existing intelligent techniques, attack datasets, different observations, and comparative studies in detail.
APA, Harvard, Vancouver, ISO, and other styles
13

Korolyov, V., M. Ogurtsov, and A. Khodzinsky. "Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security." Cybernetics and Computer Technologies, no. 3 (October 27, 2020): 74–84. http://dx.doi.org/10.34229/2707-451x.20.3.7.

Full text
Abstract:
Introduction. Widespread use of unmanned aerial vehicles in the civilian and military spheres requires the development of new algorithms for identification friend or foe of targets, as used in the Armed Forces of Ukraine (AFU) devices of the "Parol" system are designed to service approximately 110 objects military equipment. AFU automation systems allow the use of additional sources of information about various objects from civil or special data transmission networks, which can be the basis for building a networked multi-level system of state recognition. Predictions of the development of quantum computers foresee the possibility of breaking modern algorithms for information security in polynomial time in the next 5-10 years, which requires the development and implementation of new encryption algorithms and revision of modern parameters. The purpose of the article is to develop a new algorithm for state recognition of objects, which can be scaled to process the required number of manned and unmanned aerial vehicles. Potential threats to classical cryptographic protection algorithms for data networks, which will result in the execution of algorithms such as Grover and Shore on quantum computers, were also discussed. Results. The article proposes a new multilevel algorithm of state recognition based on modern cryptographic methods of information protection, which allows to perform reliable automated identification of objects, scale systems using data on potential targets from other sources through secure special networks. Grover's search algorithm does not give a strong increase in key search performance for symmetric encryption algorithms, so there is no need to increase the key lengths for this type of information security algorithms. Post-quantum asymmetric encryption algorithms require additional study and comprehensive testing of information security or increasing the key lengths of cryptographic algorithms, which corresponds to the number of qubits, i.e. more than twice. The most promising is the family of asymmetric post-quantum cryptographic algorithms based on supersingular isogenic elliptic curves. Conclusions. The developed algorithm of identification friend or foe of objects is more secure compared to existing algorithms and is focused on the use of modern on-board computers and programmable radio modems. Shore's algorithm and the like will be a significant threat to modern asymmetric cryptography algorithms when the number of qubits of quantum computers exceeds the number of bits in public keys more than twice. Keywords: identification friend or foe, symmetric encryption, asymmetric cryptography, quantum computer, post-quantum cryptography.
APA, Harvard, Vancouver, ISO, and other styles
14

Cope, Jacqueline, Francois Siewe, Feng Chen, Leandros Maglaras, and Helge Janicke. "On data leakage from non-production systems." Information & Computer Security 25, no. 4 (October 9, 2017): 454–74. http://dx.doi.org/10.1108/ics-02-2017-0004.

Full text
Abstract:
Purpose This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies of production data in non-production environments. This can lead to personal and sensitive data being accidentally leaked if appropriate and rigorous security guidelines are not implemented. This paper aims to propose a comprehensive framework for minimising data leakage from non-production environments. The framework was evaluated using guided interviews and was proven effective in helping organisation manage sensitive data in non-production environments. Design/methodology/approach Authors conducted a thorough literature review on areas related to data leakage from non-production systems. By doing an analysis of advice, guidelines and frameworks that aims at finding a practical solution for selecting and implementing a de-identification solution of sensitive data, the authors managed to highlight the importance of all areas related to sensitive data protection. Based on these areas, a framework was proposed which was evaluated by conducting set of guided interviews. Findings This paper has researched the background information and produced a framework for an organisation to manage sensitive data in its non-production environments. This paper presents a proposed framework that describes a process flow from the legal and regulatory requirements to data treatment and protection, gained through understanding the organisation’s business, the production system, the purpose and the requirements of the non-production environment. The paper shows that there is some conflict between security and perceived usability, which may be addressed by challenging the perceptions of usability or identifying the compromise required. Non-production environments need not be the sole responsibility of the IT section, they should be of interest to the business area that is responsible for the data held. Originality/value This paper proposes a simplified business model and framework. The proposed model diagrammatically describes the interactions of elements affecting the organisation. It highlights how non-production environments may be perceived as separate from the business systems, but despite the perceptions, these are still subject to the same legal requirements and constraints. It shows the interdependency of data, software, technical infrastructure and human interaction and how the change of one element may affect the others. The proposed framework describes the process flow and forms a practical solution in assisting the decision-making process and providing documentary evidence for assurance and audit purposes. It looks at the requirements of the non-production system in relation to the legal and regulatory constraints, as well as the organisational requirements and business systems. The impact of human factors on the data is also considered to bring a holistic approach to the protection of non-production environments.
APA, Harvard, Vancouver, ISO, and other styles
15

Eridani, Dania, Eko Didik Widianto, Ike Pertiwi Windasari, Wildan Budi Bawono, and Nadia Febrianita Gunarto. "Internet of things based attendance system design and development in a smart classroom." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 3 (September 1, 2021): 1432. http://dx.doi.org/10.11591/ijeecs.v23.i3.pp1432-1439.

Full text
Abstract:
Attendance records are one of the main administrative roles on campuses. Therefore, several technologies can be used on an attendance system, including barcode, radio frequency identification (RFID), fingerprint, and faceprint. The main functions of attendance systems on campuses are mainly focused on how to obtain the attendee data list, store on the database, and display the list on the information system. This research proposes an attendance system in the smart classroom which supports the system’s previous activities as well as its integration with security and classroom management. In this system, the NodeMCU which was connected to the Wi-Fi router served as the controller, while the fingerspot revo FF-153BNC functioned as the system input. In addition, the database server was used to allocate attendee and classroom management data. This system is connected with the information system and classroom display unit, and component and system testing were applied in this research. The results showed that each system unit successfully integrated and managed the attendance, security, and classroom schedule.
APA, Harvard, Vancouver, ISO, and other styles
16

Naresh, Vankamamidi S., Sivaranjani Reddi, and Nistala V. E. S. Murthy. "Secure Lightweight IoT Integrated RFID Mobile Healthcare System." Wireless Communications and Mobile Computing 2020 (March 3, 2020): 1–13. http://dx.doi.org/10.1155/2020/1468281.

Full text
Abstract:
Patient safety is a global public health concern nowadays, especially in elderly people who need physiological health monitoring systems integrated with a technology which will help to oversee and manage the medical needs. In this direction, we propose a lightweight effective healthcare monitoring system designed by using the Internet of Things (IoT) and Radio Frequency Identification (RFID) tags. In this technique, we use dual-band RFID protocols which are the one working at a high frequency of 13.56 MHz and useful to figure out the individuals, and 2.45 GHz microwave bands are used to monitor corporal information. Sensors are used to monitor and collect patient physiological data; RFID tag is used to recognize the patient. This IoT-based RFID healthcare monitoring system provides acquisition of physiological information of elderly people and patients in hospital. Further, it is aiming to secure patient’s health recordings using hyper elliptic curve- (HEC-) based signcryption algorithm while allowing the doctor to access patient health information. Privacy is provided to variable length patient medical records using different genus curves, and the evaluation shows that the proposed algorithm is optimal with respect to healthcare.
APA, Harvard, Vancouver, ISO, and other styles
17

Si, Pengbo, Fei Wang, Enchang Sun, and Yuzhao Su. "BEI-TAB: Enabling Secure and Distributed Airport Baggage Tracking with Hybrid Blockchain-Edge System." Wireless Communications and Mobile Computing 2021 (September 23, 2021): 1–12. http://dx.doi.org/10.1155/2021/2741435.

Full text
Abstract:
Global air transport carries about 4.3 billion pieces of baggage each year, and up to 56 percent of travellers prefer obtaining real-time baggage tracking information throughout their trip. However, the traditional baggage tracking scheme is generally based on optical scanning and centralized storage systems, which suffers from low efficiency and information leakage. In this paper, a blockchain and edge computing-based Internet of Things (IoT) system for tracking of airport baggage (BEI-TAB) is proposed. Through the combination of radio frequency identification technology (RFID) and blockchain, real-time baggage processing information is automatically stored in blockchain. In addition, we deploy Interplanetary File System (IPFS) at edge nodes with ciphertext policy attribute-based encryption (CP-ABE) to store basic baggage information. Only hash values returned by the IPFS network are kept in blockchain, enhancing the scalability of the system. Furthermore, a multichannel scheme is designed to realize the physical isolation of data and to rapidly process multiple types of data and business requirements in parallel. To the best of our knowledge, it is the first architecture that integrates RFID, IPFS, and CP-ABE with blockchain technologies to facilitate secure, decentralized, and real-time characteristics for storing and sharing data for baggage tracking. We have deployed a testbed with both software and hardware to evaluate the proposed system, considering the performances of transaction processing time and speed. In addition, based on the characteristics of consortium blockchain, we improved the practical Byzantine fault tolerance (PBFT) consensus protocol, which introduced the node credit score mechanism and cooperated with the simplified consistency protocol. Experimental results show that the credit score-based PBFT consensus (CSPBFT) can shorten transaction delay and improve the long-term running efficiency of the system.
APA, Harvard, Vancouver, ISO, and other styles
18

Estrela, Vania V. "SDR-Based High-Definition Video Transmission for Biomedical Engineering." Medical Technologies Journal 4, no. 3 (December 7, 2020): 584–85. http://dx.doi.org/10.26415/2572-004x-vol4iss3p584-585.

Full text
Abstract:
Background: Software-Defined Radio (SDR) frameworks from cellular telephone base stations, e.g., Multiservice Distributed Access System (MDAS) and small cells, employ extensively integrated RF agile transceivers. The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow M2M communication, which is the backbone of IoMT and associated devices linked to cloud platforms containing stored data to be analyzed. Examples of IoMT include remote patient monitoring of people with chronic or long-term conditions, tracking patient medication orders and the location of patients admitted to hospitals, and patients' wearables to send info to caregivers. Infusion pumps connected to dashboards and hospital beds rigged with sensors measuring patients' vital signs are medical devices that can be converted to or deployed as IoMT technology. Methods: This work proposes an SDR architecture to allow wireless High-Definition (HD) video broadcast for biomedical applications. This text examines a Wideband Wireless Video (WWV) signal chain implementation using the transceivers, the data transmitted volume, the matching occupied RF bandwidth, the communication distance, the transmitter’s power, and the implementation of the PHY layer as Orthogonal Frequency Division Multiplexing (OFDM) with test results to evade RF interference. Results: As the IoMT grows, the amount of possible IoMT uses increases. Many mobile devices employ Near Field Communication (NFC) Radio Frequency Identification (RFID) tags allowing them to share data with IT systems. RFID tags in medical equipment and supplies allow hospital staff can remain aware of the quantities they have in stock. The practice of using IoMT devices to observe patients in their homes remotely is also known as telemedicine. This kind of treatment spares patients from traveling to healthcare facilities whenever they have a medical question or change in their condition. Conclusion: An SDR-based HD biomedical video transmission is proposed, with its benefits and disadvantages for biomedical WWV are discussed. The security of IoMT sensitive data is a developing concern for healthcare providers.
APA, Harvard, Vancouver, ISO, and other styles
19

Lv, Yaqiong, and Danping Lin. "Design an intelligent real-time operation planning system in distributed manufacturing network." Industrial Management & Data Systems 117, no. 4 (May 8, 2017): 742–53. http://dx.doi.org/10.1108/imds-06-2016-0220.

Full text
Abstract:
Purpose With the new generation Industry 4.0 coming, as well as globalization and outsourcing, products are fabricated by different parties in the distributed manufacturing network and enterprises face the challenge of consistent planning of semi-finished product in each manufacturing process in different geographical locations. The purpose of this paper is to propose a real-time operation planning system in the distributed manufacturing network to intelligently control/plan the manufacturing networks. Design/methodology/approach The feature of the proposed system is to model and simulate large distributed manufacturing networks to streamline the mechanical and production engineering processes with radio frequency identification (RFID) technology, which can keep track of process variants. To deal with concurrency and synchronization, the hierarchical timed colored Petri net (HTCPN) formalism for modeling is selected in this study. This method can help to model graphically and test the discrete events of concurrent operations. Fuzzy inference system can help for knowledge representation, so as to provide knowledge-based decision assistance in distributed manufacturing environment. Findings In this proposed system, there are two main sub-systems: one is the real-time modeling system, and the other one is intelligent operation planning system. These two systems are not parallel in the whole systems while the intelligent operation planning system should be embedded in any stage of the real-time modeling system as needed. That means real time modeling system provides the holistic structure of the studied distributed manufacturing system and realize real-time data transfer and information exchange. At the same time the embedded intelligent operation planning system fulfill operation plan function. Originality/value This new intelligent real-time operation system realizes real-time modeling with RFID-based HTCPN and smart fuzzy engine to fulfill intelligent operation planning which is highly desirable in the environment of Industry 4.0. The new intelligent manufacturing architecture will highly reduce the traditional planning workload and improve the planning results without manual error interference. The new system has been applied in a practical case to demonstrate its feasibility.
APA, Harvard, Vancouver, ISO, and other styles
20

Yakubu, Bashir Ishaku, Shua’ib Musa Hassan, and Sallau Osisiemo Asiribo. "AN ASSESSMENT OF SPATIAL VARIATION OF LAND SURFACE CHARACTERISTICS OF MINNA, NIGER STATE NIGERIA FOR SUSTAINABLE URBANIZATION USING GEOSPATIAL TECHNIQUES." Geosfera Indonesia 3, no. 2 (August 28, 2018): 27. http://dx.doi.org/10.19184/geosi.v3i2.7934.

Full text
Abstract:
Rapid urbanization rates impact significantly on the nature of Land Cover patterns of the environment, which has been evident in the depletion of vegetal reserves and in general modifying the human climatic systems (Henderson, et al., 2017; Kumar, Masago, Mishra, & Fukushi, 2018; Luo and Lau, 2017). This study explores remote sensing classification technique and other auxiliary data to determine LULCC for a period of 50 years (1967-2016). The LULCC types identified were quantitatively evaluated using the change detection approach from results of maximum likelihood classification algorithm in GIS. Accuracy assessment results were evaluated and found to be between 56 to 98 percent of the LULC classification. The change detection analysis revealed change in the LULC types in Minna from 1976 to 2016. Built-up area increases from 74.82ha in 1976 to 116.58ha in 2016. Farmlands increased from 2.23 ha to 46.45ha and bared surface increases from 120.00ha to 161.31ha between 1976 to 2016 resulting to decline in vegetation, water body, and wetlands. The Decade of rapid urbanization was found to coincide with the period of increased Public Private Partnership Agreement (PPPA). Increase in farmlands was due to the adoption of urban agriculture which has influence on food security and the environmental sustainability. The observed increase in built up areas, farmlands and bare surfaces has substantially led to reduction in vegetation and water bodies. The oscillatory nature of water bodies LULCC which was not particularly consistent with the rates of urbanization also suggests that beyond the urbanization process, other factors may influence the LULCC of water bodies in urban settlements. Keywords: Minna, Niger State, Remote Sensing, Land Surface Characteristics References Akinrinmade, A., Ibrahim, K., & Abdurrahman, A. (2012). Geological Investigation of Tagwai Dams using Remote Sensing Technique, Minna Niger State, Nigeria. Journal of Environment, 1(01), pp. 26-32. Amadi, A., & Olasehinde, P. (2010). Application of remote sensing techniques in hydrogeological mapping of parts of Bosso Area, Minna, North-Central Nigeria. International Journal of Physical Sciences, 5(9), pp. 1465-1474. Aplin, P., & Smith, G. (2008). Advances in object-based image classification. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 37(B7), pp. 725-728. Ayele, G. T., Tebeje, A. K., Demissie, S. S., Belete, M. A., Jemberrie, M. A., Teshome, W. M., . . . Teshale, E. Z. (2018). Time Series Land Cover Mapping and Change Detection Analysis Using Geographic Information System and Remote Sensing, Northern Ethiopia. Air, Soil and Water Research, 11, p 1178622117751603. Azevedo, J. A., Chapman, L., & Muller, C. L. (2016). Quantifying the daytime and night-time urban heat island in Birmingham, UK: a comparison of satellite derived land surface temperature and high resolution air temperature observations. Remote Sensing, 8(2), p 153. Blaschke, T., Hay, G. J., Kelly, M., Lang, S., Hofmann, P., Addink, E., . . . van Coillie, F. (2014). Geographic object-based image analysis–towards a new paradigm. ISPRS Journal of Photogrammetry and Remote Sensing, 87, pp. 180-191. Bukata, R. P., Jerome, J. H., Kondratyev, A. S., & Pozdnyakov, D. V. (2018). Optical properties and remote sensing of inland and coastal waters: CRC press. Camps-Valls, G., Tuia, D., Bruzzone, L., & Benediktsson, J. A. (2014). Advances in hyperspectral image classification: Earth monitoring with statistical learning methods. IEEE signal processing magazine, 31(1), pp. 45-54. Chen, J., Chen, J., Liao, A., Cao, X., Chen, L., Chen, X., . . . Lu, M. (2015). Global land cover mapping at 30 m resolution: A POK-based operational approach. ISPRS Journal of Photogrammetry and Remote Sensing, 103, pp. 7-27. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile networks and applications, 19(2), pp. 171-209. Cheng, G., Han, J., Guo, L., Liu, Z., Bu, S., & Ren, J. (2015). Effective and efficient midlevel visual elements-oriented land-use classification using VHR remote sensing images. IEEE transactions on geoscience and remote sensing, 53(8), pp. 4238-4249. Cheng, G., Han, J., Zhou, P., & Guo, L. (2014). Multi-class geospatial object detection and geographic image classification based on collection of part detectors. ISPRS Journal of Photogrammetry and Remote Sensing, 98, pp. 119-132. Coale, A. J., & Hoover, E. M. (2015). Population growth and economic development: Princeton University Press. Congalton, R. G., & Green, K. (2008). Assessing the accuracy of remotely sensed data: principles and practices: CRC press. Corner, R. J., Dewan, A. M., & Chakma, S. (2014). Monitoring and prediction of land-use and land-cover (LULC) change Dhaka megacity (pp. 75-97): Springer. Coutts, A. M., Harris, R. J., Phan, T., Livesley, S. J., Williams, N. S., & Tapper, N. J. (2016). Thermal infrared remote sensing of urban heat: Hotspots, vegetation, and an assessment of techniques for use in urban planning. Remote Sensing of Environment, 186, pp. 637-651. Debnath, A., Debnath, J., Ahmed, I., & Pan, N. D. (2017). Change detection in Land use/cover of a hilly area by Remote Sensing and GIS technique: A study on Tropical forest hill range, Baramura, Tripura, Northeast India. International journal of geomatics and geosciences, 7(3), pp. 293-309. Desheng, L., & Xia, F. (2010). Assessing object-based classification: advantages and limitations. Remote Sensing Letters, 1(4), pp. 187-194. Dewan, A. M., & Yamaguchi, Y. (2009). Land use and land cover change in Greater Dhaka, Bangladesh: Using remote sensing to promote sustainable urbanization. Applied Geography, 29(3), pp. 390-401. Dronova, I., Gong, P., Wang, L., & Zhong, L. (2015). Mapping dynamic cover types in a large seasonally flooded wetland using extended principal component analysis and object-based classification. Remote Sensing of Environment, 158, pp. 193-206. Duro, D. C., Franklin, S. E., & Dubé, M. G. (2012). A comparison of pixel-based and object-based image analysis with selected machine learning algorithms for the classification of agricultural landscapes using SPOT-5 HRG imagery. Remote Sensing of Environment, 118, pp. 259-272. Elmhagen, B., Destouni, G., Angerbjörn, A., Borgström, S., Boyd, E., Cousins, S., . . . Hambäck, P. (2015). Interacting effects of change in climate, human population, land use, and water use on biodiversity and ecosystem services. Ecology and Society, 20(1) Farhani, S., & Ozturk, I. (2015). Causal relationship between CO 2 emissions, real GDP, energy consumption, financial development, trade openness, and urbanization in Tunisia. Environmental Science and Pollution Research, 22(20), pp. 15663-15676. Feng, L., Chen, B., Hayat, T., Alsaedi, A., & Ahmad, B. (2017). The driving force of water footprint under the rapid urbanization process: a structural decomposition analysis for Zhangye city in China. Journal of Cleaner Production, 163, pp. S322-S328. Fensham, R., & Fairfax, R. (2002). Aerial photography for assessing vegetation change: a review of applications and the relevance of findings for Australian vegetation history. Australian Journal of Botany, 50(4), pp. 415-429. Ferreira, N., Lage, M., Doraiswamy, H., Vo, H., Wilson, L., Werner, H., . . . Silva, C. (2015). Urbane: A 3d framework to support data driven decision making in urban development. Visual Analytics Science and Technology (VAST), 2015 IEEE Conference on. Garschagen, M., & Romero-Lankao, P. (2015). Exploring the relationships between urbanization trends and climate change vulnerability. Climatic Change, 133(1), pp. 37-52. Gokturk, S. B., Sumengen, B., Vu, D., Dalal, N., Yang, D., Lin, X., . . . Torresani, L. (2015). System and method for search portions of objects in images and features thereof: Google Patents. Government, N. S. (2007). Niger state (The Power State). Retrieved from http://nigerstate.blogspot.com.ng/ Green, K., Kempka, D., & Lackey, L. (1994). Using remote sensing to detect and monitor land-cover and land-use change. Photogrammetric engineering and remote sensing, 60(3), pp. 331-337. Gu, W., Lv, Z., & Hao, M. (2017). Change detection method for remote sensing images based on an improved Markov random field. Multimedia Tools and Applications, 76(17), pp. 17719-17734. Guo, Y., & Shen, Y. (2015). Quantifying water and energy budgets and the impacts of climatic and human factors in the Haihe River Basin, China: 2. Trends and implications to water resources. Journal of Hydrology, 527, pp. 251-261. Hadi, F., Thapa, R. B., Helmi, M., Hazarika, M. K., Madawalagama, S., Deshapriya, L. N., & Center, G. (2016). Urban growth and land use/land cover modeling in Semarang, Central Java, Indonesia: Colombo-Srilanka, ACRS2016. Hagolle, O., Huc, M., Villa Pascual, D., & Dedieu, G. (2015). A multi-temporal and multi-spectral method to estimate aerosol optical thickness over land, for the atmospheric correction of FormoSat-2, LandSat, VENμS and Sentinel-2 images. Remote Sensing, 7(3), pp. 2668-2691. Hegazy, I. R., & Kaloop, M. R. (2015). Monitoring urban growth and land use change detection with GIS and remote sensing techniques in Daqahlia governorate Egypt. International Journal of Sustainable Built Environment, 4(1), pp. 117-124. Henderson, J. V., Storeygard, A., & Deichmann, U. (2017). Has climate change driven urbanization in Africa? Journal of development economics, 124, pp. 60-82. Hu, L., & Brunsell, N. A. (2015). A new perspective to assess the urban heat island through remotely sensed atmospheric profiles. Remote Sensing of Environment, 158, pp. 393-406. Hughes, S. J., Cabral, J. A., Bastos, R., Cortes, R., Vicente, J., Eitelberg, D., . . . Santos, M. (2016). A stochastic dynamic model to assess land use change scenarios on the ecological status of fluvial water bodies under the Water Framework Directive. Science of the Total Environment, 565, pp. 427-439. Hussain, M., Chen, D., Cheng, A., Wei, H., & Stanley, D. (2013). Change detection from remotely sensed images: From pixel-based to object-based approaches. ISPRS Journal of Photogrammetry and Remote Sensing, 80, pp. 91-106. Hyyppä, J., Hyyppä, H., Inkinen, M., Engdahl, M., Linko, S., & Zhu, Y.-H. (2000). Accuracy comparison of various remote sensing data sources in the retrieval of forest stand attributes. Forest Ecology and Management, 128(1-2), pp. 109-120. Jiang, L., Wu, F., Liu, Y., & Deng, X. (2014). Modeling the impacts of urbanization and industrial transformation on water resources in China: an integrated hydro-economic CGE analysis. Sustainability, 6(11), pp. 7586-7600. Jin, S., Yang, L., Zhu, Z., & Homer, C. (2017). A land cover change detection and classification protocol for updating Alaska NLCD 2001 to 2011. Remote Sensing of Environment, 195, pp. 44-55. Joshi, N., Baumann, M., Ehammer, A., Fensholt, R., Grogan, K., Hostert, P., . . . Mitchard, E. T. (2016). A review of the application of optical and radar remote sensing data fusion to land use mapping and monitoring. Remote Sensing, 8(1), p 70. Kaliraj, S., Chandrasekar, N., & Magesh, N. (2015). Evaluation of multiple environmental factors for site-specific groundwater recharge structures in the Vaigai River upper basin, Tamil Nadu, India, using GIS-based weighted overlay analysis. Environmental earth sciences, 74(5), pp. 4355-4380. Koop, S. H., & van Leeuwen, C. J. (2015). Assessment of the sustainability of water resources management: A critical review of the City Blueprint approach. Water Resources Management, 29(15), pp. 5649-5670. Kumar, P., Masago, Y., Mishra, B. K., & Fukushi, K. (2018). Evaluating future stress due to combined effect of climate change and rapid urbanization for Pasig-Marikina River, Manila. Groundwater for Sustainable Development, 6, pp. 227-234. Lang, S. (2008). Object-based image analysis for remote sensing applications: modeling reality–dealing with complexity Object-based image analysis (pp. 3-27): Springer. Li, M., Zang, S., Zhang, B., Li, S., & Wu, C. (2014). A review of remote sensing image classification techniques: The role of spatio-contextual information. European Journal of Remote Sensing, 47(1), pp. 389-411. Liddle, B. (2014). Impact of population, age structure, and urbanization on carbon emissions/energy consumption: evidence from macro-level, cross-country analyses. Population and Environment, 35(3), pp. 286-304. Lillesand, T., Kiefer, R. W., & Chipman, J. (2014). Remote sensing and image interpretation: John Wiley & Sons. Liu, Y., Wang, Y., Peng, J., Du, Y., Liu, X., Li, S., & Zhang, D. (2015). Correlations between urbanization and vegetation degradation across the world’s metropolises using DMSP/OLS nighttime light data. Remote Sensing, 7(2), pp. 2067-2088. López, E., Bocco, G., Mendoza, M., & Duhau, E. (2001). Predicting land-cover and land-use change in the urban fringe: a case in Morelia city, Mexico. Landscape and urban planning, 55(4), pp. 271-285. Luo, M., & Lau, N.-C. (2017). Heat waves in southern China: Synoptic behavior, long-term change, and urbanization effects. Journal of Climate, 30(2), pp. 703-720. Mahboob, M. A., Atif, I., & Iqbal, J. (2015). Remote sensing and GIS applications for assessment of urban sprawl in Karachi, Pakistan. Science, Technology and Development, 34(3), pp. 179-188. Mallinis, G., Koutsias, N., Tsakiri-Strati, M., & Karteris, M. (2008). Object-based classification using Quickbird imagery for delineating forest vegetation polygons in a Mediterranean test site. ISPRS Journal of Photogrammetry and Remote Sensing, 63(2), pp. 237-250. Mas, J.-F., Velázquez, A., Díaz-Gallegos, J. R., Mayorga-Saucedo, R., Alcántara, C., Bocco, G., . . . Pérez-Vega, A. (2004). Assessing land use/cover changes: a nationwide multidate spatial database for Mexico. International Journal of Applied Earth Observation and Geoinformation, 5(4), pp. 249-261. Mathew, A., Chaudhary, R., Gupta, N., Khandelwal, S., & Kaul, N. (2015). Study of Urban Heat Island Effect on Ahmedabad City and Its Relationship with Urbanization and Vegetation Parameters. International Journal of Computer & Mathematical Science, 4, pp. 2347-2357. Megahed, Y., Cabral, P., Silva, J., & Caetano, M. (2015). Land cover mapping analysis and urban growth modelling using remote sensing techniques in greater Cairo region—Egypt. ISPRS International Journal of Geo-Information, 4(3), pp. 1750-1769. Metternicht, G. (2001). Assessing temporal and spatial changes of salinity using fuzzy logic, remote sensing and GIS. Foundations of an expert system. Ecological modelling, 144(2-3), pp. 163-179. Miller, R. B., & Small, C. (2003). Cities from space: potential applications of remote sensing in urban environmental research and policy. Environmental Science & Policy, 6(2), pp. 129-137. Mirzaei, P. A. (2015). Recent challenges in modeling of urban heat island. Sustainable Cities and Society, 19, pp. 200-206. Mohammed, I., Aboh, H., & Emenike, E. (2007). A regional geoelectric investigation for groundwater exploration in Minna area, north west Nigeria. Science World Journal, 2(4) Morenikeji, G., Umaru, E., Liman, S., & Ajagbe, M. (2015). Application of Remote Sensing and Geographic Information System in Monitoring the Dynamics of Landuse in Minna, Nigeria. International Journal of Academic Research in Business and Social Sciences, 5(6), pp. 320-337. Mukherjee, A. B., Krishna, A. P., & Patel, N. (2018). Application of Remote Sensing Technology, GIS and AHP-TOPSIS Model to Quantify Urban Landscape Vulnerability to Land Use Transformation Information and Communication Technology for Sustainable Development (pp. 31-40): Springer. Myint, S. W., Gober, P., Brazel, A., Grossman-Clarke, S., & Weng, Q. (2011). Per-pixel vs. object-based classification of urban land cover extraction using high spatial resolution imagery. Remote Sensing of Environment, 115(5), pp. 1145-1161. Nemmour, H., & Chibani, Y. (2006). Multiple support vector machines for land cover change detection: An application for mapping urban extensions. ISPRS Journal of Photogrammetry and Remote Sensing, 61(2), pp. 125-133. Niu, X., & Ban, Y. (2013). Multi-temporal RADARSAT-2 polarimetric SAR data for urban land-cover classification using an object-based support vector machine and a rule-based approach. International journal of remote sensing, 34(1), pp. 1-26. Nogueira, K., Penatti, O. A., & dos Santos, J. A. (2017). Towards better exploiting convolutional neural networks for remote sensing scene classification. Pattern Recognition, 61, pp. 539-556. Oguz, H., & Zengin, M. (2011). Analyzing land use/land cover change using remote sensing data and landscape structure metrics: a case study of Erzurum, Turkey. Fresenius Environmental Bulletin, 20(12), pp. 3258-3269. Pohl, C., & Van Genderen, J. L. (1998). Review article multisensor image fusion in remote sensing: concepts, methods and applications. International journal of remote sensing, 19(5), pp. 823-854. Price, O., & Bradstock, R. (2014). Countervailing effects of urbanization and vegetation extent on fire frequency on the Wildland Urban Interface: Disentangling fuel and ignition effects. Landscape and urban planning, 130, pp. 81-88. Prosdocimi, I., Kjeldsen, T., & Miller, J. (2015). Detection and attribution of urbanization effect on flood extremes using nonstationary flood‐frequency models. Water resources research, 51(6), pp. 4244-4262. Rawat, J., & Kumar, M. (2015). Monitoring land use/cover change using remote sensing and GIS techniques: A case study of Hawalbagh block, district Almora, Uttarakhand, India. The Egyptian Journal of Remote Sensing and Space Science, 18(1), pp. 77-84. Rokni, K., Ahmad, A., Solaimani, K., & Hazini, S. (2015). A new approach for surface water change detection: Integration of pixel level image fusion and image classification techniques. International Journal of Applied Earth Observation and Geoinformation, 34, pp. 226-234. Sakieh, Y., Amiri, B. J., Danekar, A., Feghhi, J., & Dezhkam, S. (2015). Simulating urban expansion and scenario prediction using a cellular automata urban growth model, SLEUTH, through a case study of Karaj City, Iran. Journal of Housing and the Built Environment, 30(4), pp. 591-611. Santra, A. (2016). Land Surface Temperature Estimation and Urban Heat Island Detection: A Remote Sensing Perspective. Remote Sensing Techniques and GIS Applications in Earth and Environmental Studies, p 16. Shrivastava, L., & Nag, S. (2017). MONITORING OF LAND USE/LAND COVER CHANGE USING GIS AND REMOTE SENSING TECHNIQUES: A CASE STUDY OF SAGAR RIVER WATERSHED, TRIBUTARY OF WAINGANGA RIVER OF MADHYA PRADESH, INDIA. Shuaibu, M., & Sulaiman, I. (2012). Application of remote sensing and GIS in land cover change detection in Mubi, Adamawa State, Nigeria. J Technol Educ Res, 5, pp. 43-55. Song, B., Li, J., Dalla Mura, M., Li, P., Plaza, A., Bioucas-Dias, J. M., . . . Chanussot, J. (2014). Remotely sensed image classification using sparse representations of morphological attribute profiles. IEEE transactions on geoscience and remote sensing, 52(8), pp. 5122-5136. Song, X.-P., Sexton, J. O., Huang, C., Channan, S., & Townshend, J. R. (2016). Characterizing the magnitude, timing and duration of urban growth from time series of Landsat-based estimates of impervious cover. Remote Sensing of Environment, 175, pp. 1-13. Tayyebi, A., Shafizadeh-Moghadam, H., & Tayyebi, A. H. (2018). Analyzing long-term spatio-temporal patterns of land surface temperature in response to rapid urbanization in the mega-city of Tehran. Land Use Policy, 71, pp. 459-469. Teodoro, A. C., Gutierres, F., Gomes, P., & Rocha, J. (2018). Remote Sensing Data and Image Classification Algorithms in the Identification of Beach Patterns Beach Management Tools-Concepts, Methodologies and Case Studies (pp. 579-587): Springer. Toth, C., & Jóźków, G. (2016). Remote sensing platforms and sensors: A survey. ISPRS Journal of Photogrammetry and Remote Sensing, 115, pp. 22-36. Tuholske, C., Tane, Z., López-Carr, D., Roberts, D., & Cassels, S. (2017). Thirty years of land use/cover change in the Caribbean: Assessing the relationship between urbanization and mangrove loss in Roatán, Honduras. Applied Geography, 88, pp. 84-93. Tuia, D., Flamary, R., & Courty, N. (2015). Multiclass feature learning for hyperspectral image classification: Sparse and hierarchical solutions. ISPRS Journal of Photogrammetry and Remote Sensing, 105, pp. 272-285. Tzotsos, A., & Argialas, D. (2008). Support vector machine classification for object-based image analysis Object-Based Image Analysis (pp. 663-677): Springer. Wang, L., Sousa, W., & Gong, P. (2004). Integration of object-based and pixel-based classification for mapping mangroves with IKONOS imagery. International journal of remote sensing, 25(24), pp. 5655-5668. Wang, Q., Zeng, Y.-e., & Wu, B.-w. (2016). Exploring the relationship between urbanization, energy consumption, and CO2 emissions in different provinces of China. Renewable and Sustainable Energy Reviews, 54, pp. 1563-1579. Wang, S., Ma, H., & Zhao, Y. (2014). Exploring the relationship between urbanization and the eco-environment—A case study of Beijing–Tianjin–Hebei region. Ecological Indicators, 45, pp. 171-183. Weitkamp, C. (2006). Lidar: range-resolved optical remote sensing of the atmosphere: Springer Science & Business. Wellmann, T., Haase, D., Knapp, S., Salbach, C., Selsam, P., & Lausch, A. (2018). Urban land use intensity assessment: The potential of spatio-temporal spectral traits with remote sensing. Ecological Indicators, 85, pp. 190-203. Whiteside, T. G., Boggs, G. S., & Maier, S. W. (2011). Comparing object-based and pixel-based classifications for mapping savannas. International Journal of Applied Earth Observation and Geoinformation, 13(6), pp. 884-893. Willhauck, G., Schneider, T., De Kok, R., & Ammer, U. (2000). Comparison of object oriented classification techniques and standard image analysis for the use of change detection between SPOT multispectral satellite images and aerial photos. Proceedings of XIX ISPRS congress. Winker, D. M., Vaughan, M. A., Omar, A., Hu, Y., Powell, K. A., Liu, Z., . . . Young, S. A. (2009). Overview of the CALIPSO mission and CALIOP data processing algorithms. Journal of Atmospheric and Oceanic Technology, 26(11), pp. 2310-2323. Yengoh, G. T., Dent, D., Olsson, L., Tengberg, A. E., & Tucker III, C. J. (2015). Use of the Normalized Difference Vegetation Index (NDVI) to Assess Land Degradation at Multiple Scales: Current Status, Future Trends, and Practical Considerations: Springer. Yu, Q., Gong, P., Clinton, N., Biging, G., Kelly, M., & Schirokauer, D. (2006). Object-based detailed vegetation classification with airborne high spatial resolution remote sensing imagery. Photogrammetric Engineering & Remote Sensing, 72(7), pp. 799-811. Zhou, D., Zhao, S., Zhang, L., & Liu, S. (2016). Remotely sensed assessment of urbanization effects on vegetation phenology in China's 32 major cities. Remote Sensing of Environment, 176, pp. 272-281. Zhu, Z., Fu, Y., Woodcock, C. E., Olofsson, P., Vogelmann, J. E., Holden, C., . . . Yu, Y. (2016). Including land cover change in analysis of greenness trends using all available Landsat 5, 7, and 8 images: A case study from Guangzhou, China (2000–2014). Remote Sensing of Environment, 185, pp. 243-257.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Hong-xin, Jia Liu, Jun Xu, Fan Zhang, Xiao-tong Cui, and Shao-fei Sun. "Electromagnetic radiation-based IC device identification and verification using deep learning." EURASIP Journal on Wireless Communications and Networking 2020, no. 1 (October 19, 2020). http://dx.doi.org/10.1186/s13638-020-01808-z.

Full text
Abstract:
Abstract The electromagnetic radiation of electronic equipment carries information and can cause information leakage, which poses a serious threat to the security system; especially the information leakage caused by encryption or other important equipment will have more serious consequences. In the past decade or so, the attack technology and means for the physical layer have developed rapidly. And system designers have no effective method for this situation to eliminate or defend against threats with an absolute level of security. In recent years, device identification has been developed and improved as a physical-level technology to improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (including device identification and verification) are accomplished by monitoring and exploiting the characteristics of the IC’s unintentional electromagnetic radiation, without requiring any modification and process to hardware devices, thereby providing versatility and adapting existing hardware devices. Device identification based on deep residual networks and radio frequency is a technology applicable to the physical layer, which can improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (identification and verification) are accomplished by passively monitoring and utilizing the inherent properties of IC unintended RF transmissions without requiring any modifications to the analysis equipment. After the device performs a series of operations, the device is classified and identified using a deep residual neural network. The gradient descent method is used to adjust the network parameters, the batch training method is used to speed up the parameter tuning speed, the parameter regularization is used to improve the generalization, and finally, the Softmax classifier is used for classification. In the end, 28 chips of 4 models can be accurately identified into 4 categories, then the individual chips in each category can be identified, and finally 28 chips can be accurately identified, and the verification accuracy reached 100%. Therefore, the identification of radio frequency equipment based on deep residual network is very suitable as a countermeasure for implementing the device cloning technology and is expected to be related to various security issues.
APA, Harvard, Vancouver, ISO, and other styles
22

"Review Reports on User Authentication Methods in Cyber Security." WSEAS TRANSACTIONS ON COMMUNICATIONS 19 (October 6, 2020). http://dx.doi.org/10.37394/23204.2020.19.17.

Full text
Abstract:
The Internet has merged itself as an extremely ground- breaking stage that has changed the correspondence and business exchanges. Presently, the quantity of clients exploring the Internet is more than 2.4 billion. This enormous group of spectators requests online business, learning sharing, informal organizations and so on, which became exponentially in the course of recent years. Accordingly, it prompts the requirement for security and improved protection. As of late, misrepresentation over the Internet comprises one of the fundamental disadvantages for the across the board of the utilization of business applications. Along these lines, the three imperative security issues occur each day in our universe of straightforward design, even more decisively: recognizable proof, confirmation and approval. Distinguishing proof is a procedure that empowers acknowledgment of a substance, which might be either, a human, a machine, or another advantage, for example, a product program. In security frameworks, validation and approval are two reciprocal systems for figuring out who can get to the data assets over a system. Numerous arrangements have been proposed in the writing, from a straightforward secret phrase to late advancements dependent on RFID (Radio Frequency Identification) or biometrics. This paper gives an outline on existing verification techniques, and its upsides and downsides when planning online assistance.
APA, Harvard, Vancouver, ISO, and other styles
23

Asfoura, Evan, Mohammed Samir Abdel-Haq, and Gamal Kassem. "Conceptualization of Smart System Based on RFID Technologies for Controlling Vehicle Speed." TEM Journal, February 27, 2021, 192–96. http://dx.doi.org/10.18421/tem101-24.

Full text
Abstract:
The Internet of things and its (IoT) application become more and more effective in various fields of our life. It provides many tangible and intangible advantages. The success of (IoT) Applications required many complimentary dimensions like the enhancements of needed technologies, developing appropriate business models in addition to the security issues. Radio frequency identification (RFID) is one of the widely used technology that belong to IoT family. This paper will introduce a concept model which is performed in Saudi Arabia, and it can be applied in another country as well. Country’s specific requirements regarding legal issues and the use of IoT applications and technologies are taken into consideration, too. This idea is about Smart streets where reader for speed data is used from RFID chip placed in vehicles in order to control the speeds instead of the widely used camera system to increase the safety.
APA, Harvard, Vancouver, ISO, and other styles
24

Najib, Andi Ainun, Rendy Munadi, and Nyoman Bogi Aditya Karna. "Security system with RFID control using E-KTP and internet of things." Bulletin of Electrical Engineering and Informatics 10, no. 3 (June 1, 2021). http://dx.doi.org/10.11591/eei.v10i3.2834.

Full text
Abstract:
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
APA, Harvard, Vancouver, ISO, and other styles
25

Leder, Kerstin, Angelina Karpovich, Maria Burke, Chris Speed, Andrew Hudson-Smith, Simone O'Callaghan, Morna Simpson, et al. "Tagging is Connecting: Shared Object Memories as Channels for Sociocultural Cohesion." M/C Journal 13, no. 1 (March 22, 2010). http://dx.doi.org/10.5204/mcj.209.

Full text
Abstract:
Connections In Small Pieces Loosely Joined, David Weinberger identifies some of the obvious changes which the Web has brought to human relations. Social connections, he argues, used to be exclusively defined and constrained by the physics and physicality of the “real” world, or by geographical and material facts: it’s … true that we generally have to travel longer to get to places that are farther away; that to be heard at the back of the theater, you have to speak louder; that when a couple moves apart, their relationship changes; that if I give you something, I no longer have it. (xi) The Web, however, is a place (or many places) where the boundaries of space, time, and presence are being reworked. Further, since we built this virtual world ourselves and are constantly involved in its evolution, the Web can tell us much about who we are and how we relate to others. In Weinberger’s view, it demonstrates that “we are creatures who care about ourselves and the world we share with others”, and that “we live within a context of meaning” beyond what we had previously cared to imagine (xi-xii). Before the establishment of computer-mediated communication (CMC), we already had multiple means of connecting people commonly separated by space (Gitelman and Pingree). Yet the Web has allowed us to see each other whilst separated by great distances, to share stories, images and other media online, to co-construct or “produse” (Bruns) content and, importantly, to do so within groups, rather than merely between individuals (Weinberger 108). This optimistic evaluation of the Web and social relations is a response to some of the more cautious public voices that have accompanied recent technological developments. In the 1990s, Jan van Dijk raised concerns about what he anticipated as wide-reaching social consequences in the new “age of networks” (2). The network society, as van Dijk described it, was defined by new interconnections (chiefly via the World Wide Web), increased media convergence and narrowcasting, a spread of both social and media networks and the decline of traditional communities and forms of communication. Modern-day communities now consisted both of “organic” (physical) and “virtual” communities, with mediated communication seemingly beginning to replace, or at least supplement, face-to-face interaction (24). Recently, we have found ourselves on the verge of even more “interconnectedness” as the future seems determined by ubiquitous computing (ubicomp) and a new technological and cultural development known as the “Internet of Things” (Greenfield). Ubicomp refers to the integration of information technology into everyday objects and processes, to such an extent that the end-users are often unaware of the technology. According to Greenfield, ubicomp has significant potential to alter not only our relationship with technology, but the very fabric of our existence: A mobile phone … can be switched off or left at home. A computer … can be shut down, unplugged, walked away from. But the technology we're discussing here–ambient, ubiquitous, capable of insinuating itself into all the apertures everyday life affords it–will form our environment in a way neither of those technologies can. (6) Greenfield's ideas are neither hypothesis, nor hyperbole. Ubicomp is already a reality. Dodson notes, Ubicomp isn't just part of our ... future. Its devices and services are already here. Think of the use of prepaid smart cards for use of public transport or the tags displayed in our cars to help regulate congestion charge pricing or the way in which corporations track and move goods around the world. (7) The Internet of Things advances the ubicomp notion of objects embedded with the capacity to receive and transmit data and anticipates a move towards a society in which every device is “on” and in some way connected to the Internet; in other words, objects become networked. Information contained within and transmitted among networked objects becomes a “digital overlay” (Valhouli 2) over the physical world. Valhouli explains that objects, as well as geographical sites, become part of the Internet of Things in two ways. Information may become associated with a specific location using GPS coordinates or a street address. Alternatively, embedding sensors and transmitters into objects enables them to be addressed by Internet protocols, and to sense and react to their environments, as well as communicate with users or with other objects. (2) The Internet of Things is not a theoretical paradigm. It is a framework for describing contemporary technological processes, in which communication moves beyond the established realm of human interaction, to enable a whole range of potential communications: “person-to-device (e.g. scheduling, remote control, or status update), device-to-device, or device-to-grid” (Valhouli 2). Are these newer forms of communication in any sense meaningful? Currently, ubicomp's applications are largely functional, used in transport, security, and stock control. Yet, the possibilities afforded by the technology can be employed to enhance “connectedness” and “togetherness” in the broadest social sense. Most forms of technology have at least some social impact; this is particularly true of communication technology. How can that impact be made explicit? Here, we discuss one such potential application of ubicomp with reference to a new UK research project: TOTeM–Tales of Things and Electronic Memory. TOTeM aims to draw on personal narratives, digital media, and tagging to create an “Internet” of people, things, and object memories via Web 2.0 and mobile technologies. Communicating through Objects The TOTeM project, began in August 2009 and funded by Research Councils UK's Digital Economy Programme, is concerned with eliciting the memory and value of “old” artefacts, which are generally excluded from the discourse of the Internet of Things, which focuses on new and future objects produced with embedded sensors and transmitters. We focus instead on existing artefacts that hold significant personal resonance, not because they are particularly expensive or useful, but because they contain or “evoke” (Turkle) memories of people, places, times, events, or ideas. Objects across a mantelpiece can become conduits between events that happened in the past and people who will occupy the future (Miller 30). TOTeM will draw on user-generated content and innovative tagging technology to study the personal relationships between people and objects, and between people through objects. Our hypothesis is that the stories that are connected to particular objects can become binding ties between individuals, as they provide insights into personal histories and values that are usually not shared, not because they are somehow too personal or uninteresting, but because there is currently little systematic context for sharing them. Even in families, where objects routinely pass down through generations, the stories associated with these objects are generally either reduced to a vague anecdote or lost entirely. Beyond families, there are some objects whose stories are deemed culturally-significant: monuments, the possessions of historical figures, religious artefacts, and archaeological finds. The current value system which defines an object’s cultural significance appears to replicate Bourdieu's assessment of the hierarchies which define aesthetic concepts such as taste. In both cases, the popular, everyday, or otherwise mundane is deemed to possess less cultural capital than that which is less accessible or otherwise associated with the social elites. As a result, objects whose histories are well-known are mostly found in museums, untouchable and unused, whereas objects which are within reach, all around us, tend to travel from owner to owner without anyone considering what histories they might contain. TOTeM’s aim is to provide both a context and a mechanism for enabling individuals and community groups to share object-related stories and memories through digital media, via a custom-built platform of “tales of things”. Participants will be able to use real-life objects as conduits for memory, by producing “tales” about the object's personal significance, told through digital video, photographs, audio, or a mixture of media. These tales will be hosted on the TOTeM project's website. Through specifically-developed TOTeM technology, each object tale will generate a unique physical tag, initially in the form of RFID (Radio Frequency Identification) and QR (Quick Response) codes. TOTeM participants will be able to attach these tags/codes to their objects. When scanned with a mobile phone equipped with free TOTeM software or an RFID tag reader, each tag will access the individual object's tale online, playing the media files telling that object’s story on the mobile phone or computer. The object's user-created tale will be persistently accessible via both the Internet and 3G (third generation) mobile phones. The market share of 3G and 4G mobile networks is expanding, with some analysts predicting that they will account for 30% of the global mobile phone market by 2014 (Kawamoto). As the market for mobile phones with fast data transfer rates keeps growing, TOTeM will become accessible to an ever-growing number of mobile, as well as Internet, users. The TOTeM platform will serve two primary functions. It will become an archive for object memories and thus grow to become an “archaeology for the future”. We hope that future generations will be able to return to this repository and learn about the things that are meaningful to groups and individuals right now. The platform will also serve as an arena for contemporary communication. As the project develops, object memories will be directly accessible through tagged artefacts, as well as through browsing and keyword searches on the project website. Participants will be able to communicate via the TOTeM platform. On a practical level, the platform can bring together people who already share an interest in certain objects, times, or places (e.g. collectors, amateur historians, genealogists, as well as academics). In addition, we hope that the novelty of TOTeM’s approach to objects may encourage some of those individuals for whom non-participation in the digital world is not a question of access but one of apathy and perceived irrelevance (Ofcom 3). Tales of Things: Pilots Since the beginning of this research project, we have begun to construct the TOTeM platform and develop the associated tagging technology. While the TOTeM platform is being built, we have also used this time to conduct a pilot “tale-telling” phase, with the aim of exploring how people might choose to communicate object stories and how this might make them feel. In this initial phase, we focus on eliciting and constructing object tales, without the use of the TOTeM platform or the tagging technology, which will be tested in a future trial. Following Thomson and Holland’s autoethnographic approach, in the first instance, the TOTeM team and advisors shared their own tales with each other (some of these can be viewed on the TOTeM Website). Each of us chose an object that was personally significant to us, digitally recorded our object memories, and uploaded videos to a YouTube channel for discussion amongst the group. Team members in Edinburgh subsequently involved a group of undergraduate students in the pilot. Here, we offer some initial reflections on what we have learned from recording and sharing these early TOTeM tales. The objects the TOTeM team and advisors chose independently from each other included a birth tag, a box of slides, a tile, a block of surf wax, a sweet jar from Japan, a mobile phone, a concert ticket, a wrist band, a cricket bat, a watch, an iPhone, a piece of the Berlin Wall, an antique pocket sundial, and a daughter’s childhood toy. The sheer variety of the objects we selected as being personally significant was intriguing, as were the varying reasons for choosing the objects. Even there was some overlap in object choice, for instance between the mobile and the iPhone, the two items (one (relatively) old, one new) told conspicuously different stories. The mobile held the memory of a lost friend via an old text message; the iPhone was valued not only for its practical uses, but because it symbolised the incarnation of two childhood sci-fi fantasies: a James Bond-inspired tracking device (GPS) and the “Hitchhiker’s Guide to the Galaxy”. While the memories and stories linked to these objects were in many ways idiosyncratic, some patterns have emerged even at this early stage. Stories broadly differed in terms of whether they related to an individual’s personal experience (e.g. memorable moments or times in one’s life) or to their connection with other people. They could also relate to the memory of particular events, from football matches, concerts and festivals on a relatively local basis, to globally significant milestones, such as the fall of the Berlin Wall. In many cases, objects had been kept as tokens and reminders of particularly “colourful” and happy times. One student presented a wooden stick which he had picked up from a beach on his first parent-free “lads’ holiday”. Engraved on the stick were the names of the friends who had accompanied him on this memorable trip. Objects could also mark the beginning or end of a personal life stretch: for one student, his Dub Child vinyl record symbolised the moment he discovered and began to understand experimental music; it also constituted a reminder of the influence his brother had had on his musical taste. At other times, objects were significant because they served as mementos for people who had been “lost” in one way or another, either because they had moved to different places, or because they had gone missing or passed away. With some, there was a sense that the very nature of the object enabled the act of holding on to a memory in a particular way. The aforementioned mobile phone, though usually out of use, was actively recharged for the purposes of remembering. Similarly, an unused wind-up watch was kept going to simultaneously keep alive the memory of its former owner. It is commonly understood that the sharing of insights into one’s personal life provides one way of building and maintaining social relationships (Greene et al.). Self-disclosure, as it is known in psychological terms, carries some negative connotations, such as making oneself vulnerable to the judgement of others or giving away “too much too soon”. Often its achievement is dependent on timing and context. We were surprised by the extent to which some of us chose to disclose quite sensitive information with full knowledge of eventually making these stories public online. At the same time, as both researchers and, in a sense, as an audience, we found it a humbling experience to be allowed into people’s and objects’ meaningful pasts and presents. It is obvious that the invitation to talk about meaningful objects also results in stories about things and people we deeply care about. We have yet to see what shape the TOTeM platform will take as more people share their stories and learn about those of others. We don’t know whether it will be taken up as a fully-fledged communication platform or merely as an archive for object memories, whether people will continue to share what seem like deep insights into personal life stories, or if they choose to make more subversive (no less meaningful) contributions. Likewise, it is yet to be seen how the linking of objects with personal stories through tagging could impact people’s relationships with both the objects and the stories they contain. To us, this initial trial phase, while small in scale, has re-emphasised the potential of sharing object memories in the emerging network of symbolic meaning (Weinberger’s “context of meaning”). Seemingly everyday objects did turn out to contain stories behind them, personal stories which people were willing to share. Returning to Weinberger’s quote with which we began this article, TOTeM will enable the traces of material experiences and relationships to become persistently accessible: giving something away would no longer mean entirely not having it, as the narrative of the object’s significance would persist, and can be added to by future participants. Indeed, TOTeM would enable participants to “give away” more than just the object, while retaining access to the tale which would augment the object. Greenfield ends his discussion of the potential of ubicomp by listing multiple experiences which he does not believe would benefit from any technological augmentation: Going for a long run in the warm gentle rain, gratefully and carefully easing my body into the swelter of a hot springs, listening to the first snowfall of winter, savouring the texture of my wife’s lips … these are all things that require little or no added value by virtue of being networked, relational, correlated to my other activities. They’re already perfect, just as they stand. (258) It is a resonant set of images, and most people would be able to produce a similar list of meaningful personal experiences. Yet, as we have already suggested, technology and meaning need not be mutually exclusive. Indeed, as the discussion of TOTeM begins to illustrate, the use of new technologies in new contexts can augment the commercial applications of ubiquoutous computing with meaningful human communication. At the time of writing, the TOTeM platform is in the later stages of development. We envisage the website taking shape and its content becoming more and more meaningful over time. However, some initial object memories should be available from April 2010, and the TOTeM platform and mobile tagging applications will be fully operational in the summer of 2010. Our progress can be followed on www.youtotem.com and http://twitter.com/talesofthings. TOTeM looks forward to receiving “tales of things” from across the world. References Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. London: Routledge, 1984.Bruns, Axel. “The Future is User-Led: The Path towards Widespread Produsage.” fibreculture 11 (2008). 20 Mar. 2010 ‹http://www.journal.fibreculture.org/issue11/issue11_bruns_print.html›. Dodson, Sean. “Forward: A Tale of Two Cities.” Rob van Kranenburg. The Internet of Things: A Critique of Ambient Technology and the All-Seeing Network of RFID. Amsterdam: Institute of Network Cultures, Network Notebooks 02, 2008. 5-9. 20 Mar. 2010 ‹http://www.networkcultures.org/_uploads/notebook2_theinternetofthings.pdf›. Gitelman, Lisa, and Geoffrey B. Pingree. Eds. New Media: 1740-1915. Cambridge, MA: MIT Press, 2003. Greene, Kathryn, Valerian Derlega, and Alicia Mathews. “Self-Disclosure in Personal Relationships.” Ed. Anita L. Vangelisti and Daniel Perlman. Cambridge Handbook of Personal Relationships. Cambridge: Cambridge UP, 2006. 409-28. Greenfield, Adam. Everyware: The Dawning Age of Ubiquitous Computing. Berkeley, CA: New Riders, 2006. Kawamoto, Dawn. “Report: 3G and 4G Market Share on the Rise.” CNET News 2009. 20 Mar. 2010 ‹http://news.cnet.com/8301-1035_3-10199185-94.html›. Kwint, Marius, Christopher Breward, and Jeremy Aynsley. Material Memories: Design and Evocation. Oxford: Berg, 1999. Miller, Daniel. The Comfort of Things. Cambridge: Polity Press, 2008. Ofcom. ”Accessing the Internet at Home”. 2009. 20 Mar. 2010 ‹http://www.ofcom.org.uk/research/telecoms/reports/bbresearch/bbathome.pdf›. Thomson, Rachel, and Janet Holland. “‘Thanks for the Memory’: Memory Books as a Methodological Resource in Biographical Research.” Qualitative Research 5.2 (2005): 201-19. Turkle, Sherry. Evocative Objects: Things We Think With. Cambridge, MA: MIT Press, 2007. Valhouli, Constantine A. The Internet of Things: Networked Objects and Smart Devices. The Hammersmith Group Research Report, 2010. 20 Mar. 2010 ‹http://thehammersmithgroup.com/images/reports/networked_objects.pdf›. Van Dijk, Jan. The Network Society: Social Aspects of New Media. London: SAGE, 1999. Weinberger, David. Small Pieces Loosely Joined: How the Web Shows Us Who We Really Are. Oxford: Perseus Press, 2002.
APA, Harvard, Vancouver, ISO, and other styles
26

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text
Abstract:
Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child pornography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘Homocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography