30
Scope project presentation SCientific innOvation Product concEpt 2009-2011 4.12.2009

Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009

Embed Size (px)

DESCRIPTION

Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009. Time schedule for Scope presentations. 10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET 10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS - PowerPoint PPT Presentation

Citation preview

Scope project presentationSCientific innOvation Product concEpt 2009-2011

4.12.2009

Time schedule for Scope presentations

10:15 - 10:30 WP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNET10:30 - 10:45 WP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMS10:45 - 11:00 WP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATION11:00 - 11:15 WP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY11:15 - 12:00 Arjen mobiilipalvelut

JyU Tekes Programs in Nutshell• Two different programs

1. Scope – innovative product concepts2. Personal Mobile Space – mobile applications for

learning and well-being• Key targets:

– Identify new business and job opportunities for Jyväskylä area by combining competences of experienced Nokia R&D people, JyU researchers and students

– Focus to industries where Central Finland has existing regional business infrastructure (security, logistics, software…).

– Strengthen the JyU academic infrastructure by establishing international collaboration with the main academic centers in Europe and the US.

Scope Program FrameworkWP1: DATA ANOMALY DETECTION IN MOBILE NETWORKS AND INTERNETWP2: PERSONAL SECURITY AND SMART MOBILE SYSTEMSWP3: CENTRALIZED LOGISTICS MONITORING VIA MOBILE COMMUNICATIONWP4: DATA PLATFORM ARCHITECTURE FOR PUBLIC SAFETY

Agora Center / Researc

h Institute

s

JYU Student

s

Ex-NOKIA

Engineers

Development Partners•Private Companies (NSN, EADS etc.)•Public Organisations (Ministry of Health Care etc.)

•Partner-driven research results•Spin-Off companies•Validated service concept ideas•Pilot/prototype systems •(Graduates)•(Scientific benchmarks)

People

Results

Scope Program Framework

Market/ Business Demand

WP1: Data anomaly detection in mobile networks and internet

4.12.2009

6

Intrusion Detection Systems (IDS)IDS is a network security device that monitors network and/or system activities for malicious attacks.

Traditional IDS is based on signatures:• Looks for signatures of specific attack

type that has already been documented

New technology for IDS- Anomaly detection

• New mathematical method to detect deviations from normal network behaviour without delay

• Enables the protection of complex networks against a variety of new threats

• Method has two steps:- Study and analysis of the behavior of the networking data sets (Training step). - Output from the training step enables online detection of anomalies

Use of the new method in mobile networks

• Prove that the method can be applied to find anomalies from IP traffic in mobile networks

• Steps to go– Sample data collection from Nokia Test Network

(NTN), validate the usability of the data– Collect data from NTN for training steps– Implement the anomaly detection system into

NTN– Create malware into NTN– Detect the anomalies

• For the implementation of the anomaly detection system into NTN we need SW designers – Matlab, Wireshark, Editcap, Python, C++

WP2: Personal Security via Smart Mobile Technology

WP2a: Personalized Mobile Notification Channel

4.12.2009

10

Emergency NotificationDuring crises and emergencies, individuals at risk need accurate and timely information in order to take protective measures. Traditional means of public warning, such as broadcast media and outdoor warning sirens, have demonstrated repeatedly that they do not reach all members of a population at risk, nor do they result in behavioral compliance by all those who do receive emergency directives.

11

Emergency Notification(current state analysis)

12

Emergency Notification(What we can do in future, maybe)

13

Public Notification is a global challenge

• Whether natural disaster, terrorism, civil unrest, industrial accidents, etc., authorities must secure the safety of public

• National notification strategies in many countries --- weather, tsunami, “all hazard – all warning”

• Multi-channel alerts:

3

G

M

ult

imedia

Web

MM

S

SM

S

Global Market

• 4,1 billion mobiles phones globally• Effective notification technologies

must address handset capabilities (from feature-less phone to smart phone)

• Customer can be individual, service provider, enterprise, government (local, regional, national)

14

Why wireless technology?

SCOPE WP2 Innovation (differentiators)

• Influence technical standards – early implementation (e.g., CAP)

• Choose the “right” channel for the message• Trust Mechanism / Integrate with Social

Networks • Multimodal Notification (one message, many

representations)• Context awareness / Personalization• Exceed current/emerging eInclusion

regulations

15

SCOPE WP2 examples

16

• Understanding of new technologies • User personalization• Usability• Context awareness• understanding of different software platforms and limitations

• C++, Java, Python, QT, Symbian etc…• project management skills• quality awareness end user point of view (ie. Performance)• software module design and intergration • software testing skills (results, analysis and improvement ideas

WP3: Centralized Mobile Logistics Optimization System

Mika Rantaniva

VRP* Solver

Mobile Logistics Optimization System

Simulat

or

1. Run optimization

2. Dispatch

Implementing this…

… to test and further develop optimization…

3. Update status

…and study mobile tools for field personnel

work

*VRP = Vehicle Routing Problem

The VRP algorithm core is based on world-class scientific research

• Prof. Olli Bräysy belongs to top three researchers globally in Vehicle Routing Problem (VRP) area

• Applications & Innoroad References– Transportation services (Transpoint, Neste Oil)– Waste management (L&T)– Newspaper and mail delivery (Keskisuomalainen)– Home care and meal delivery (City of Jyväskylä)– Public transport (School transportation)– Etc.

Key competence needs• Simulator / other VRP related research

– Programming skills (Java, C, C++)– Optimisation, simulation and operation research

studies benefit– Longer-term interest to academic research– More information: Olli Bräysy 044-3591974

• Mobile tools for service personnel– Application programming skills (e.g. Java)– Cognitive studies (usability/end-user view)– This part depends on company funding

SCOPE WG4 “Tactical platform architecture to enchance development of Public Safety situation awareness

systems”

Target of the work:– Define

• “Universal PMR Gateway” to connect TETRA network to exisisting and future applications and services by using standardized/de facto protocols

• some future applications based on the customer requirements

– Build demonstrator environment (e.g. Gateway + Java application)

– Verify • Build demostrator to show functionality both of

the application and gateway

Scope WP4 – Project schedule overview

2H/2009 2H/20101H/2010 1H/2011

Pre-study ready•Customer requirements•Current data methods•Used applications

1st version release•GW definition v1•Verification environment•Example java application

Ver 2 study ready•Customer requirements updated•New data methods•New applications

2nd version ready•GW definition v2•Specifications for data•Verification environment

Future recommendations•GW Protocols•Future

TETRA1 TEDS Wideband broadband for

PMR

Current IT communications

Future IT communications

Technologies

TWC

Applications needs for TETRA terminals

1. Emergency notification system

– Based on Java ME application on EADS terminal• Java MIDP 2.0 (JSR 118) platform • XHTML browser • Integrated GPS receiver

– Work to be done:• Specification of the application

– features– UI– Usability

• Coding• Testing• Documentation

Kaasuvaroitus koko Jyväskylän alueella.

Applications needs for TETRA terminals

2.Police Blog- Some ideas:

1.With EADS TETRA terminals- Java based application- TETRA SDS service is used

2.With External portable devices (e.g. Win CE, iPhone, Symbian, Android)

- Sw platforms and tools to be selected accordingly- TETRA SDS service is used

3.With external portable PC- Emulate current police tactical information

system- Sw platforms and tools to be selected accordingly

Work to be done:• Specification of the applications

– Creation of concept– features– UI– Usabiliity

• Coding• Testing• Documentation

Demo: Emergency Notification Message System

FM –radio station

Emergency notification messages are sent from TETRA terminal directly to:

- FM car radios via RDS- another TETRA terminal- cellular phone- car navigator via RDS-TMC

TMC service

Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound.

UniversalPMR Gateway

TETRA” Westbound laneon Westminster Bridge is closed due to a traffic accident. Please use another way westbound”

Demo: Police Blog (ver 1)

- User writes the chat txt with his/herown TETRA terminal using:

- drop down menus- free text input

- User can browse through chattingsessions and search free text from it

LP12:Auto XTV345 palanut Vasara katu 14 pihassa

TETRA

- Another TETRA terminal recives chatsand stores in server- Chatting can be browsed afterwards

Demo: Police Blog (ver 2)

- User writes the chat txt with his/herCE/Android/Symbian device connectedto TETRA terminal

- User can browse through chattingsessions and search free text from it

Westbound lane on Westminster Bridge is closed due to a traffic accident. Please use another way westbound.

TETRA

- Another TETRA terminal recives chatsand stores in server- Chatting can be browsed afterwards

Demo: Police Blog (ver 3)

- User writes the chat txt with his/herPC Connected to TETRA terminal

- User can browse through chattingsessions and search free text from it

TETRA

- Blog server recives blogs and stores it - Blogs can be browsed and searched afterwards