scope project presentation sc ientific inn o vation p roduct conc e pt 2009-2011 4.12.2009
DESCRIPTION
Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009. Time schedule for Scope presentations. 10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET 10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/1.jpg)
Scope project presentationSCientific innOvation Product concEpt 2009-2011
4.12.2009
![Page 2: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/2.jpg)
Time schedule for Scope presentations
10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS10:45 - 11:00 WP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATION11:00 - 11:15 WP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY11:15 - 12:00 Arjen mobiilipalvelut
![Page 3: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/3.jpg)
JyU Tekes Programs in Nutshell• Two different programs
1. Scope – innovative product concepts2. Personal Mobile Space – mobile applications for
learning and well-being• Key targets:
– Identify new business and job opportunities for Jyväskylä area by combining competences of experienced Nokia R&D people, JyU researchers and students
– Focus to industries where Central Finland has existing regional business infrastructure (security, logistics, software…).
– Strengthen the JyU academic infrastructure by establishing international collaboration with the main academic centers in Europe and the US.
![Page 4: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/4.jpg)
Scope Program FrameworkWP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNETWP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMSWP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATIONWP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY
Agora Center / Researc
h Institute
s
JYU Student
s
Ex-NOKIA
Engineers
Development Partners•Private Companies (NSN, EADS etc.)•Public Organisations (Ministry of Health Care etc.)
•Partner-driven research results•Spin-Off companies•Validated service concept ideas•Pilot/prototype systems •(Graduates)•(Scientific benchmarks)
People
Results
Scope Program Framework
Market/ Business Demand
![Page 5: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/5.jpg)
WP1: Data anomaly detection in mobile networks and internet
4.12.2009
![Page 6: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/6.jpg)
6
Intrusion Detection Systems (IDS)IDS is a network security device that monitors network and/or system activities for malicious attacks.
Traditional IDS is based on signatures:• Looks for signatures of specific attack
type that has already been documented
![Page 7: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/7.jpg)
New technology for IDS- Anomaly detection
• New mathematical method to detect deviations from normal network behaviour without delay
• Enables the protection of complex networks against a variety of new threats
• Method has two steps:- Study and analysis of the behavior of the networking data sets (Training step). - Output from the training step enables online detection of anomalies
![Page 8: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/8.jpg)
Use of the new method in mobile networks
• Prove that the method can be applied to find anomalies from IP traffic in mobile networks
• Steps to go– Sample data collection from Nokia Test Network
(NTN), validate the usability of the data– Collect data from NTN for training steps– Implement the anomaly detection system into
NTN– Create malware into NTN– Detect the anomalies
• For the implementation of the anomaly detection system into NTN we need SW designers – Matlab, Wireshark, Editcap, Python, C++
![Page 9: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/9.jpg)
WP2: Personal Security via Smart Mobile Technology
WP2a: Personalized Mobile Notification Channel
4.12.2009
![Page 10: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/10.jpg)
10
Emergency NotificationDuring crises and emergencies, individuals at risk need accurate and timely information in order to take protective measures. Traditional means of public warning, such as broadcast media and outdoor warning sirens, have demonstrated repeatedly that they do not reach all members of a population at risk, nor do they result in behavioral compliance by all those who do receive emergency directives.
![Page 11: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/11.jpg)
11
Emergency Notification(current state analysis)
![Page 12: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/12.jpg)
12
Emergency Notification(What we can do in future, maybe)
![Page 13: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/13.jpg)
13
Public Notification is a global challenge
• Whether natural disaster, terrorism, civil unrest, industrial accidents, etc., authorities must secure the safety of public
• National notification strategies in many countries --- weather, tsunami, “all hazard – all warning”
• Multi-channel alerts:
![Page 14: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/14.jpg)
3
G
M
ult
imedia
Web
MM
S
SM
S
Global Market
• 4,1 billion mobiles phones globally• Effective notification technologies
must address handset capabilities (from feature-less phone to smart phone)
• Customer can be individual, service provider, enterprise, government (local, regional, national)
14
Why wireless technology?
![Page 15: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/15.jpg)
SCOPE WP2 Innovation (differentiators)
• Influence technical standards – early implementation (e.g., CAP)
• Choose the “right” channel for the message• Trust Mechanism / Integrate with Social
Networks • Multimodal Notification (one message, many
representations)• Context awareness / Personalization• Exceed current/emerging eInclusion
regulations
15
![Page 16: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/16.jpg)
SCOPE WP2 examples
16
• Understanding of new technologies • User personalization• Usability• Context awareness• understanding of different software platforms and limitations
• C++, Java, Python, QT, Symbian etc…• project management skills• quality awareness end user point of view (ie. Performance)• software module design and intergration • software testing skills (results, analysis and improvement ideas
![Page 17: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/17.jpg)
WP3: Centralized Mobile Logistics Optimization System
Mika Rantaniva
![Page 18: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/18.jpg)
VRP* Solver
Mobile Logistics Optimization System
Simulat
or
1. Run optimization
2. Dispatch
Implementing this…
… to test and further develop optimization…
3. Update status
…and study mobile tools for field personnel
work
*VRP = Vehicle Routing Problem
![Page 19: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/19.jpg)
The VRP algorithm core is based on world-class scientific research
• Prof. Olli Bräysy belongs to top three researchers globally in Vehicle Routing Problem (VRP) area
• Applications & Innoroad References– Transportation services (Transpoint, Neste Oil)– Waste management (L&T)– Newspaper and mail delivery (Keskisuomalainen)– Home care and meal delivery (City of Jyväskylä)– Public transport (School transportation)– Etc.
![Page 20: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/20.jpg)
Key competence needs• Simulator / other VRP related research
– Programming skills (Java, C, C++)– Optimisation, simulation and operation research
studies benefit– Longer-term interest to academic research– More information: Olli Bräysy 044-3591974
• Mobile tools for service personnel– Application programming skills (e.g. Java)– Cognitive studies (usability/end-user view)– This part depends on company funding
![Page 21: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/21.jpg)
SCOPE WG4 “Tactical platform architecture to enchance development of Public Safety situation awareness
systems”
![Page 22: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/22.jpg)
Target of the work:– Define
• “Universal PMR Gateway” to connect TETRA network to exisisting and future applications and services by using standardized/de facto protocols
• some future applications based on the customer requirements
– Build demonstrator environment (e.g. Gateway + Java application)
– Verify • Build demostrator to show functionality both of
the application and gateway
![Page 23: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/23.jpg)
Scope WP4 – Project schedule overview
2H/2009 2H/20101H/2010 1H/2011
Pre-study ready•Customer requirements•Current data methods•Used applications
1st version release•GW definition v1•Verification environment•Example java application
Ver 2 study ready•Customer requirements updated•New data methods•New applications
2nd version ready•GW definition v2•Specifications for data•Verification environment
Future recommendations•GW Protocols•Future
TETRA1 TEDS Wideband broadband for
PMR
Current IT communications
Future IT communications
Technologies
TWC
![Page 24: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/24.jpg)
Applications needs for TETRA terminals
1. Emergency notification system
– Based on Java ME application on EADS terminal• Java MIDP 2.0 (JSR 118) platform • XHTML browser • Integrated GPS receiver
– Work to be done:• Specification of the application
– features– UI– Usability
• Coding• Testing• Documentation
Kaasuvaroitus koko Jyväskylän alueella.
![Page 25: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/25.jpg)
Applications needs for TETRA terminals
2.Police Blog- Some ideas:
1.With EADS TETRA terminals- Java based application- TETRA SDS service is used
2.With External portable devices (e.g. Win CE, iPhone, Symbian, Android)
- Sw platforms and tools to be selected accordingly- TETRA SDS service is used
3.With external portable PC- Emulate current police tactical information
system- Sw platforms and tools to be selected accordingly
![Page 26: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/26.jpg)
Work to be done:• Specification of the applications
– Creation of concept– features– UI– Usabiliity
• Coding• Testing• Documentation
![Page 27: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/27.jpg)
Demo: Emergency Notification Message System
FM –radio station
Emergency notification messages are sent from TETRA terminal directly to:
- FM car radios via RDS- another TETRA terminal- cellular phone- car navigator via RDS-TMC
TMC service
Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound.
UniversalPMR Gateway
TETRA” Westbound laneon Westminster Bridge is closed due to a traffic accident. Please use another way westbound”
![Page 28: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/28.jpg)
Demo: Police Blog (ver 1)
- User writes the chat txt with his/herown TETRA terminal using:
- drop down menus- free text input
- User can browse through chattingsessions and search free text from it
LP12:Auto XTV345 palanut Vasara katu 14 pihassa
TETRA
- Another TETRA terminal recives chatsand stores in server- Chatting can be browsed afterwards
![Page 29: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/29.jpg)
Demo: Police Blog (ver 2)
- User writes the chat txt with his/herCE/Android/Symbian device connectedto TETRA terminal
- User can browse through chattingsessions and search free text from it
Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound.
TETRA
- Another TETRA terminal recives chatsand stores in server- Chatting can be browsed afterwards
![Page 30: Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009](https://reader036.vdocuments.site/reader036/viewer/2022070402/5681387d550346895da02eb5/html5/thumbnails/30.jpg)
Demo: Police Blog (ver 3)
- User writes the chat txt with his/herPC Connected to TETRA terminal
- User can browse through chattingsessions and search free text from it
TETRA
- Blog server recives blogs and stores it - Blogs can be browsed and searched afterwards