1 / 30

Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009

Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009. Time schedule for Scope presentations. 10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET 10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS

Download Presentation

Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Scope project presentationSCientific innOvation Product concEpt 2009-20114.12.2009

  2. Time schedule for Scope presentations 10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET 10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS 10:45 - 11:00 WP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATION 11:00 - 11:15 WP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY 11:15 - 12:00Arjen mobiilipalvelut

  3. JyU Tekes Programs in Nutshell • Two different programs • Scope – innovative product concepts • Personal Mobile Space – mobile applications for learning and well-being • Key targets: • Identify new business and job opportunities for Jyväskylä area by combining competences of experienced Nokia R&D people, JyU researchers and students • Focus to industries where Central Finland has existing regional business infrastructure (security, logistics, software…). • Strengthen the JyU academic infrastructure by establishing international collaboration with the main academic centers in Europe and the US.

  4. Scope Program Framework • Development Partners • Private Companies (NSN, EADS etc.) • Public Organisations (Ministry of Health Care etc.) JYU Students Scope Program Framework WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS WP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATION WP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY Ex-NOKIA Engineers People Agora Center / Research Institutes Results Market/ Business Demand • Partner-driven research results • Spin-Off companies • Validated service concept ideas • Pilot/prototype systems • (Graduates) • (Scientific benchmarks)

  5. WP1: Data anomaly detection in mobile networks and internet4.12.2009

  6. Intrusion Detection Systems (IDS) IDS is a network security device that monitors network and/or system activities for malicious attacks. Traditional IDS is based on signatures: • Looks for signatures of specific attack type that has already been documented 6

  7. New technology for IDS- Anomaly detection • New mathematical method to detect deviations from normal network behaviour without delay • Enables the protection of complex networks against a variety of new threats • Method has two steps:- Study and analysis of the behavior of the networking data sets (Training step). - Output from the training step enables online detection of anomalies

  8. Use of the new method in mobile networks • Prove that the method can be applied to find anomalies from IP traffic in mobile networks • Steps to go • Sample data collection from Nokia Test Network (NTN), validate the usability of the data • Collect data from NTN for training steps • Implement the anomaly detection system into NTN • Create malware into NTN • Detect the anomalies • For the implementation of the anomaly detection system into NTN we need SW designers – Matlab, Wireshark, Editcap, Python, C++

  9. WP2: Personal Security via Smart Mobile TechnologyWP2a: Personalized Mobile Notification Channel4.12.2009

  10. Emergency Notification During crises and emergencies, individuals at risk need accurate and timely information in order to take protective measures. Traditional means of public warning, such as broadcast media and outdoor warning sirens, have demonstrated repeatedly that they do not reach all members of a population at risk, nor do they result in behavioral compliance by all those who do receive emergency directives. 10

  11. Emergency Notification(current state analysis) 11

  12. Emergency Notification(What we can do in future, maybe) 12

  13. Public Notification is a global challenge Whether natural disaster, terrorism, civil unrest, industrial accidents, etc., authorities must secure the safety of public National notification strategies in many countries --- weather, tsunami, “all hazard – all warning” Multi-channel alerts: 13

  14. Global Market Why wireless technology? 4,1 billion mobiles phones globally Effective notification technologies must address handset capabilities (from feature-less phone to smart phone) Customer can be individual, service provider, enterprise, government (local, regional, national) 14 3G Multimedia Web MMS SMS

  15. SCOPE WP2 Innovation (differentiators) • Influence technical standards – early implementation (e.g., CAP) • Choose the “right” channel for the message • Trust Mechanism / Integrate with Social Networks • Multimodal Notification (one message, many representations) • Context awareness / Personalization • Exceed current/emerging eInclusion regulations 15

  16. SCOPE WP2 examples • Understanding of new technologies • User personalization • Usability • Context awareness • understanding of different software platforms and limitations • C++, Java, Python, QT, Symbian etc… • project management skills • quality awareness end user point of view (ie. Performance) • software module design and intergration • software testing skills (results, analysis and improvement ideas 16

  17. WP3: Centralized Mobile Logistics Optimization SystemMika Rantaniva

  18. Mobile Logistics Optimization System *VRP = Vehicle Routing Problem Implementing this… 1. Run optimization VRP* Solver 3. Update status Simulator 2. Dispatch … to test and further develop optimization… …and study mobile tools for field personnel work

  19. The VRP algorithm core is based on world-class scientific research • Prof. Olli Bräysy belongs to top three researchers globally in Vehicle Routing Problem (VRP) area • Applications & Innoroad References • Transportation services (Transpoint, Neste Oil) • Waste management (L&T) • Newspaper and mail delivery (Keskisuomalainen) • Home care and meal delivery (City of Jyväskylä) • Public transport (School transportation) • Etc.

  20. Key competence needs • Simulator / other VRP related research • Programming skills (Java, C, C++) • Optimisation, simulation and operation research studies benefit • Longer-term interest to academic research • More information: Olli Bräysy 044-3591974 • Mobile tools for service personnel • Application programming skills (e.g. Java) • Cognitive studies (usability/end-user view) • This part depends on company funding

  21. SCOPE WG4“Tactical platform architecture to enchance development of Public Safety situation awareness systems”

  22. Target of the work: • Define • “Universal PMR Gateway” to connect TETRA network to exisisting and future applications and services by using standardized/de facto protocols • some future applications based on the customer requirements • Build demonstrator environment (e.g. Gateway + Java application) • Verify • Build demostrator to show functionality both of the application and gateway

  23. Scope WP4 – Project schedule overview • Pre-study ready • Customer requirements • Current data methods • Used applications • 1st version release • GW definition v1 • Verification environment • Example java application • Ver 2 study ready • Customer requirements updated • New data methods • New applications • 2nd version ready • GW definition v2 • Specifications for data • Verification environment • Future recommendations • GW Protocols • Future 2H/2009 1H/2010 2H/2010 1H/2011 TWC Current IT communications TETRA1 TEDS Wideband broadband for PMR Future IT communications Technologies

  24. Kaasuvaroitus koko Jyväskylän alueella. Applications needs for TETRA terminals • Emergency notification system • Based on Java ME application on EADS terminal • Java MIDP 2.0 (JSR 118) platform • XHTML browser • Integrated GPS receiver • Work to be done: • Specification of the application • features • UI • Usability • Coding • Testing • Documentation

  25. Applications needs for TETRA terminals • Police Blog • Some ideas: • With EADS TETRA terminals • Java based application • TETRA SDS service is used • With External portable devices (e.g. Win CE, iPhone, Symbian, Android) • Sw platforms and tools to be selected accordingly • TETRA SDS service is used • With external portable PC • Emulate current police tactical informationsystem • Sw platforms and tools to be selected accordingly

  26. Work to be done: • Specification of the applications • Creation of concept • features • UI • Usabiliity • Coding • Testing • Documentation

  27. ” Westbound laneon Westminster Bridge is closed due to a traffic accident. Please use another way westbound” Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound. Demo: Emergency Notification Message System TETRA FM –radio station TMC service UniversalPMR Gateway Emergency notification messages are sent from TETRA terminal directly to: - FM car radios via RDS - another TETRA terminal - cellular phone - car navigator via RDS- TMC

  28. LP12:Auto XTV345 palanut Vasara katu 14 pihassa Demo: Police Blog (ver 1) TETRA - Another TETRA terminal recives chatsand stores in server - Chatting can be browsed afterwards - User writes the chat txt with his/herown TETRA terminal using: - drop down menus - free text input - User can browse through chattingsessions and search free text from it

  29. Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound. Demo: Police Blog (ver 2) TETRA - Another TETRA terminal recives chatsand stores in server - Chatting can be browsed afterwards - User writes the chat txt with his/herCE/Android/Symbian device connectedto TETRA terminal - User can browse through chattingsessions and search free text from it

  30. Demo: Police Blog (ver 3) TETRA - Blog server recives blogs and stores it - Blogs can be browsed and searched afterwards - User writes the chat txt with his/herPC Connected to TETRA terminal - User can browse through chattingsessions and search free text from it

More Related