CEWIT2015 Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

CEWIT2015 Proceedings CEWI T2015 The 12th International Conference and Expo on Emerging Technologies for a Smarter World October 19-20 • Melville Marriott PROCEEDINGS CEWIT 2015 is co-sponsored by IEEE Region 1 and its Long Island section. Peer-reviewed conference papers will be submitted for inclusion in the IEEE Xplore online database and El. 2 CONTENTS DAY 1 • MONDAY, OCTOBER 19, AM TRACK A: Big Data Analytics and Visualization Twitter Financial Community Sentiment and its Predictive Power to Market Movement .................................................................................................................5 Cost and Machine Learning: An Application to Feature Selection for Hidden Markov Models .........................................................................................................5 Real-Time Large-Scale Big Data Networks Analytics and Visualization Architecture .....................................................................................................................5 The Data Sensorium: Multimodal Exploration of Scientific Data Sets .............................................................................................................................................6 Exploring the Feasibility of Heterogeneous Computing of Complex Networks for Big Data Analysis ...............................................................................................6 EP-SPARQL Complex Event Stream Processing System and its Applications ..................................................................................................................................6 TRACK B: Health Technologies and Medical Devices Technology Innovation Reduces Medication Errors ..........................................................................................................................................................................6 Bringing the Most Common Health Intervention to the Digital Age Using Smart Phones ...............................................................................................................6 Dynamic Authentication of Wearable Devices in Medical Applications ...........................................................................................................................................7 Integrated Wireless Solutions for Managing Gastrointestinal Disorders .........................................................................................................................................7 Automated Medical Diagnostic Interpretation ................................................................................................................................................................................7 The Rise of Mobile Health Technology: The Challenge of Securing Teleradiology ............................................................................................................................8 Total Population Management Demonstration Model for Vulnerable Communities by Use of Interoperable Digital Health Solutions .............................................8 TRACK C: Cybersecurity A Digital Envelope Scheme for Document Sharing in a Private Cloud Storage ...............................................................................................................................9 Ensuring Online Data Privacy and Controlling Anonymity ...............................................................................................................................................................9 Predicting and Protecting Cross Site Request Forgery Attacks on Contemporary Web Applications ...............................................................................................9 Security Challenges and Data Implications by Using SmartWatch Devices in the Enterprise ........................................................................................................9 Increasing Privacy in a Data-Driven World ...................................................................................................................................................................................10 Investigating, Categorizing, and Mitigating Malware Download Paths ........................................................................................................................................10 What You Scan Is Not What I Visit - Bypassing Safe Browsing Lists ............................................................................................................................................10 TRACK D: Entrepreneur’s Toolkit I: Funding 101 Maintaining Your Edge in Intellectual Property .............................................................................................................................................................................11 Positioning Your Company for Fundability ....................................................................................................................................................................................11 Considerations to Taking an Equity Investment ............................................................................................................................................................................11 DAY 1 • MONDAY, OCTOBER 19, PM TRACK A: Big Data Analytics and Visualization Streaming Data Analysis and Decision Making in Big Data Environments ...................................................................................................................................12 Visually Studying Urban Mobility Patterns from Taxi Trajectory Data ............................................................................................................................................12 Large Scale Analytics for Medical Applications ............................................................................................................................................................................12 Big Data Platforms for Urban Data ..............................................................................................................................................................................................12 Revealing Patterns in the Injured Brain .......................................................................................................................................................................................13 Classification of Research Efforts in Big Data Analytics ..............................................................................................................................................................13 TRACK B: Internet of Things Spectral Partitioning Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks ...............................................................................................13 A New Circuit Design Framework for IoT Devices ..........................................................................................................................................................................14 Reliable Sensor Networks for Medical Applications ......................................................................................................................................................................14 A Robust Low-cost and Robust Sensor for Smart Particulate Sensing for PM2.5 Applications ....................................................................................................14 Measuring Social Networks Using Proximity Sensors .....................................................................................................................................................................15 Object Association and Identification through RFID Cluster Collaboration ...................................................................................................................................15 Can Bandwidth Sharing be Truthful? ............................................................................................................................................................................................15 TRACK C: Smart Energy and Smart Urban Systems Algorithms for Automatic Map Construction of Large Parking Structures .....................................................................................................................................15 Elemental Technologies for Realizing Fully-controlled Artificial Light-type Plant Factory .............................................................................................................16 Participatory Discovery Towards 2020 ..........................................................................................................................................................................................16 Review of Microcontroller Based Intelligent Traffic Light Control .................................................................................................................................................16 Modeling New York City’s Revolutionary Transit Signal Priority Program ......................................................................................................................................16 The Outlook of Applying “Internet of Things” to the Energy Sector by Text-mining .......................................................................................................................17 A Data-driven Approach to Soil Moisture Collection and Prediction .............................................................................................................................................17
Recommended publications
  • Wifi - Mobile BNG Offload Deployments SP-T07-I
    Toronto, Canada May 30th, 2013 WiFi - Mobile BNG Offload Deployments SP-T07-I Derick Linegar, [email protected] © 20112012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Agenda vSP Wi-Fi - Key drivers vIntelligent Broadband vSP Wi-Fi Deployments vSP WiFi Evolution with MPC Integration vCall Flow vReferences © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2 SP-WiFi Key Drivers © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 3 SP-WiFi Solutions © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 4 Why Should I Care About WiFi? The “New Normal” © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 5 Wi-Fi Subscribers, Wireline/Wi-Fi & Mobile Different Motivations Internet Mobile Operator Motivations • Data traffic growing exponentially Mobile Operators • Licensed spectrum limitations Mobile Mobile Operator1 Operator2 • Access – Trusted/Untrusted 3G/4G delivered Wireline / Wi-Fi Operator Gateway Peering via Mobile Motivation Backhaul Wireline Operator with • Increase Service Revenues Wi-Fi Access • Cater to multiple Mobile Operators • Provide a scalable peering model Wireline Wireline Operator 1 Operator 2 • Leverage existing infrastructure Subscriber Motivation • Always connected experience Wi-Fi Access • Seamless Authentication • Mobility/Roaming without Mobile Users disrupting apps © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 6 Terminology Primer Service Provider Wi-Fi Wireline Broadband Session Type IP Based Sessions PPP Based Sessions User type Mobile Users Fixed Residential Session Control Intelligent Services Gateway (ISG) – software component Place in Network Wireless Access Gateway Broadband Network Gateway (PIN) Designation (WAG) (BNG) © 2012 Cisco and/or its affiliates.
    [Show full text]
  • Pollinator Week Event Registration 2019 5 28 19.Xlsx
    POLLINATOR WEEK EVENTS 2019 Event Name Description Date Time Address City State Zip More Info Join Crescent Heights Community Garden and cath-earth-sis in the celebration of Pollinator Week! Wear your fave ‘bee friendly’ costumes to enjoy pollinator learning activities in the park! This family friendly event is open to all, with a suggested donation of $5 to Bee City Canada, Tree Canada or a conservation group of your For more information, please choice. contact Catherine Dowdell at garden (at) crescentheightsyyc Meet outside the Crescent Heights Community Association Hall by the (dot) ca or catherine.dowdell Building Bee Houses Community Garden from 1pm to 3pm. 6/22/2019 1:00 PM 1101 2 St NW Calgary AB T2M 2V7 (at) gmail (dot) com On June 19th, 2019, we plan to celebrate Pollinator Week by having a Pollinator Celebration at the University of Calgary community garden. The intention of this event is to educate attendees about the importance of pollinators and how to support and protect pollinators in our community. This event includes a campus BioBlitz, a bee box Registration Page: making workshop, and planting of native pollinator plants in the garden. https://www.eventbrite.ca/e/poll In addition, we will have experts provide information to attendees about inator-celebration-june-19th- bees and other pollinators through interactive displays following the 230pm-to-730pm-tickets- Pollinator Celebration above activities. 6/19/2019 2:30 PM Calgary AB T2N 4V5 60195492338 Employees at Arkansas Electric Cooperative Corporation will bring pollinator-dependent dishes to share at a potluck and learn about the AECC Pollinator Potluck importance of pollinators.
    [Show full text]
  • The Israeli Digital Rights Movement's Campaign for Privacy Efrat Daskal Hebrew University of Jerusalem, Israel
    INTERNET POLICY REVIEW Journal on internet regulation Volume 6 | Issue 3 The Israeli Digital Rights Movement's campaign for privacy Efrat Daskal Hebrew University of Jerusalem, Israel Published on 19 Sep 2017 | DOI: 10.14763/2017.3.711 Abstract: This study explores the persuasion techniques used by the Israeli Digital Rights Movement in its campaign against Israel’s biometric database. The research was based on analysing the movement's official publications and announcements and the journalistic discourse that surrounded their campaign within the political, judicial, and public arenas in 2009-2017. The results demonstrate how the organisation navigated three persuasion frames to achieve its goals: the unnecessity of a biometric database in democracy; the database’s ineffectiveness; and governmental incompetence in securing it. I conclude by discussing how analysing civil society privacy campaigns can shed light over different regimes of privacy governance. Keywords: Privacy, Government surveillance, Biometric Article information Received: 03 Apr 2017 Reviewed: 03 Jul 2017 Published: 19 Sep 2017 Licence: Creative Commons Attribution 3.0 Germany Competing interests: The author has declared that no competing interests exist that have influenced the text. URL: http://policyreview.info/articles/analysis/israeli-digital-rights-movements-campaign-privacy Citation: Daskal, E. (2017). The Israeli Digital Rights Movement's campaign for privacy. Internet Policy Review, 6(3). https://doi.org/10.14763/2017.3.711 Acknowledgements: I would like to thank the participants of the Early Stage Researchers Colloquium (ESRC) of the Humboldt Institute for Internet and Society (HIIG) from 2014 and especially Ulrike Hoeppner and Jörg Pohle for their insightful ideas and advice.
    [Show full text]
  • Masses, Crowds, Communities, Movements: Collective Action in the Internet Age
    PREPRINT (Authors Version). The Version of Record of this manuscript has been published and is available in Social Movement Studies (9.7.2015). DOI:10.1080/14742837.2015.1055722. Ulrich Dolata & Jan-Felix Schrape Masses, Crowds, Communities, Movements: Collective Action in the Internet Age This article investigates two questions: One, how might the very differently structured social collectives on the Internet – masses, crowds, communities and movements – be classified and distinguished? And two, what influence do the technological infrastructures in which they operate have on their formation, structure and activities? For this we differentiate between two main types of social collectives: non- organized collectives, which exhibit loosely-coupled collective behavior, and collective actors with a sepa- rate identity and strategic capability. Further, we examine the newness, or distinctive traits, of online- based collectives, which we identify as being the strong and hitherto non-existent interplay between the technological infrastructures that these collectives are embedded in and the social processes of coordina- tion and institutionalization they must engage in in order to maintain their viability over time. Conven- tional patterns of social dynamics in the development and stabilization of collective action are now sys- tematically intertwined with technology-induced processes of structuration. Keywords: Internet, collective action, social movements, digital communities, networks, socio-technical change Dolata/Schrape: Masses Crows, Communities, Movements Introduction From swarms and crowds to e-movements and e-communities, the Internet allows for new forms of collective behavior and action anywhere on the spectrum between indi- viduals and organizations. For example, online technologies allow for the aggregate compilation of consumer preferences, the obtaining of feedback from online shoppers and the use of social media (e.g., Facebook) or file-sharing platforms (e.g., The Pirate Bay).
    [Show full text]
  • Designing for Impact
    Social Justice Documentary Designing for Impact Jessica Clark, Center for Social Media, American University Barbara Abrash, Center for Media, Culture and History, NYU Research support Katie Donnelly, Elaine Kozma Design Manuela Garreton September 2011 www.centerforsocialmedia.orG With support from the Ford Foundation Table of contents Introduction 4 Evaluating Documentary, The State of the Field Why Now? 6 Current Methods 7 Missing Links 10 Case Studies 14 Case Study Takeaways 19 Appendix I (OWSHOULDFUNDERSANDºLMMAKERSINTEGRATE strategic design and evaluation? 23 Appendix II A Lion in The House 26 The Line 32 Lioness 39 Not In Our Town 46 Out In The Silence 53 State Of Fear: The Truth About Terrorism 59 Appendix III Related Visualizations 66 Appendix IV Resources 74 Introduction This working paper aims to synthesize current efforts to develop comparable EVALUATIONMETHODSFORSOCIALISSUEDOCUMENTARYºLMS!UTHOREDBYTWO RESEARCHERSWHOHAVEBEENJOINTLYDOCUMENTINGTHEºELD²STRANSFORMATIONOVER THEPASTºVEYEARS THISPAPEROFFERSAFRAMEWORKFORPLANNINGANDEVALUATING THEIMPACTOFTHESEºLMSINANETWORKEDMEDIAENVIRONMENT People come in as partic- TrackinG impact has become increasinGly complex as platforms and content ipants in a media project streams proliferate, and campaiGns evolve over several years. A sinGle piece of media can now spread across a variety of screens—a theater, a university and leave recognizing classroom, the Web, home televisions, a mobile phone and more. Each themselves as members screeninG carries with it different expectations, different measurement
    [Show full text]
  • Fresh Apps: an Empirical Study of Frequently-Updated Mobile Apps in the Google Play Store
    Empir Software Eng DOI 10.1007/s10664-015-9388-2 Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store Stuart McIlroy1 · Nasir Ali2 · Ahmed E. Hassan1 © Springer Science+Business Media New York 2015 Abstract Mobile app stores provide a unique platform for developers to rapidly deploy new updates of their apps. We studied the frequency of updates of 10,713 mobile apps (the top free 400 apps at the start of 2014 in each of the 30 categories in the Google Play store). We find that a small subset of these apps (98 apps representing ˜1 % of the studied apps) are updated at a very frequent rate — more than one update per week and 14 % of the studied apps are updated on a bi-weekly basis (or more frequently). We observed that 45 % of the frequently-updated apps do not provide the users with any information about the rationale for the new updates and updates exhibit a median growth in size of 6 %. This paper provides information regarding the update strategies employed by the top mobile apps. The results of our study show that 1) developers should not shy away from updating their apps very frequently, however the frequency varies across store categories. 2) Developers do not need to be too concerned about detailing the content of new updates. It appears that users are not too concerned about such information. 3) Users highly rank frequently-updated apps instead of being annoyed about the high update frequency. Communicated by: Andreas Zeller Stuart McIlroy [email protected] Nasir Ali [email protected] Ahmed E.
    [Show full text]
  • Arxiv:1908.10237V1 [Cs.NI] 27 Aug 2019 Network Node to Network Node in a Store-Carry-Forward Manner
    DTN7: An Open-Source Disruption-tolerant Networking Implementation of Bundle Protocol 7 Alvar Penning1, Lars Baumgärtner3, Jonas Höchst1;2, Artur Sterz1;2, Mira Mezini3, and Bernd Freisleben1;2 1 Dept. of Math. & Computer Science, Philipps-Universität Marburg, Germany {penning, hoechst, sterz, freisleb}@informatik.uni-marburg.de 2 Dept. of Electr. Engineering & Information Technology, TU Darmstadt, Germany {jonas.hoechst, artur.sterz}@maki.tu-darmstadt.de 3 Dept. of Computer Science, TU Darmstadt, Germany {baumgaertner, mezini}@cs.tu-darmstadt.de Abstract. In disruption-tolerant networking (DTN), data is transmit- ted in a store-carry-forward fashion from network node to network node. In this paper, we present an open source DTN implementation, called DTN7, of the recently released Bundle Protocol Version 7 (draft version 13). DTN7 is written in Go and provides features like memory safety and concurrent execution. With its modular design and interchangeable com- ponents, DTN7 facilitates DTN research and application development. Furthermore, we present results of a comparative experimental evalu- ation of DTN7 and other DTN systems including Serval, IBR-DTN, and Forban. Our results indicate that DTN7 is a flexible and efficient open-source multi-platform implementation of the most recent Bundle Protocol Version 7. Keywords: delay-tolerant networking · disruption-tolerant networking 1 Introduction Delay- or disruption-tolerant networking (DTN) is useful in situations where a reliable connection to a communication infrastructure cannot be established, e.g., during environmental monitoring in remote areas, if telecommunication networks are destroyed as a result of natural or man-made disasters, or if access is blocked due to political censorship. In DTN, messages are transmitted hop-to-hop from arXiv:1908.10237v1 [cs.NI] 27 Aug 2019 network node to network node in a store-carry-forward manner.
    [Show full text]
  • Share, Collaborate, Exploit ~ Defining Mobile Web 2.0
    WHITEPAPER Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 This whitepaper is an extract from: Mobile Web 2.0 Leveraging ‘Location, IM, Social Web & Search’ 2008-2013 . information you can do business with Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 Share, Collaborate, Exploit ~ Defining Mobile Web 2.0 Introduction The mercurial rise of social networking sites and user-generated content has rekindled users’ interest in accessing Web-based services on the move. That the mobile phone is an inherently personal device which is not only with us most of the time, but also contains a huge amount of personal data (contact lists of names and phone numbers, stored messages and emails etc.) makes it a logical extension for the social network and the host of other collaborative Web 2.0 applications gaining traction. Perhaps the major factors driving the shift in how the Internet operates – whether fixed or mobile – are those of user interaction and enhancement. The Web is no longer simply an online resource of information to be consulted, searched and acted upon. It has become a network of social communities and information databases that are constantly growing and improving as they continue to harness the collective intelligence of users. It could therefore be argued that whereas Web 1.0 served essentially as a broadcast medium (i.e. of information/knowledge) ‘Web 2.0’ takes the form of a platform whereby the creator of content, has become the focus. Defining Mobile Web 2.0 Difficulty in establishing a firm and accepted definition, plus the fact that many of Web 2.0’s core concepts cannot be replicated directly within the cellular environment, is paralleled in a similar debate on what exactly denotes Mobile Web 2.0.
    [Show full text]
  • DM Manuscript Civic Literacy Final
    Making Sense of Democratic Institutions Intertextually Communication on Social Media as a Civic Literacy Event Preceding Collective Action Dan Mercea, City University London 1 This paper has been accepted for publication in The Communication Review . The final (edited, revised and typeset) version of this paper will be published in The Communication Review , Vol. 18, Issue 3 by Taylor and Francis. All rights reserved. © Taylor and Francis, 2014. Communication on social media preceding coordinated street demonstrations is assayed for evidence of practice-based informal civic learning about conventional politics and mainstream media. This is done to offset a mounting interest in activist self-organisation and self-reflexivity with a scrutiny of networked communication as a civic literacy event. The article proposes that scepticism and criticality directed at media and political institutions provide fertile justification for their challenge, thereby rendering intertextual informal learning an expedient to collective action. Key words: informal civic learning, civic literacy, collective action, social movements, social media 1 Corresponding author: Dan Mercea, Department of Sociology, City University London, 26-38 Whiskin Street, London, EC1R 0JD, +44 (0)20 7040 4529, [email protected]. 1 In recent years, street protests have mushroomed across many parts of the world, including the European continent. From Greece to Spain, Ukraine to the UK, Etzioni’s (1970:4) notion of the demonstration democracy- a polity deeply marked by “public acts designed to call attention to or express a [contentious] position” seems to have been rejuvenated. Among those uprisings, some have sought to contain an increasingly pervasive and democratically unaccountable commercial encroachment on networked digital communication, as witnessed in the 2012 protests against the Anti-Counterfeiting Trade Agreement (henceforth ACTA) i.
    [Show full text]
  • West Lavington Manor Open Garden
    Market Lavington & Easterton Church & Community News June 2021 West Lavington Manor Open Garden This year we have a theme of “Fun for All” Our home, West Lavington Manor, is surrounded by a stunning five acre walled garden, designed by Sir John Danvers in the 17th C which we are opening to the public on Saturday 5th June, 2021, to raise money for charity as part of the National Garden Scheme! The open day is a great day out and will raise funds for NGS charities such as Marie Curie as well as our nominated local charities, the West Lavington Youth Club, and 1st Lavington Sea Scouts Executive Committee are starting a The Nestling Trust. public consultation on the future of the Scout Hall building - Half Term holiday entertainment! Face Painting, at 44 High Street. Treasure Hunt (to explore the garden, with bags of gold coins), Rowdey Ice Cream and other activities including mini golf! Artisan Market with garden accessories & homewares from No.59 Studio We would welcome local residents and other plants from Superior Plants , interested parties to visit us at the hall to give their Box Candles, Marlis Rawlins cards, on trend pyjamas P-J’s views: and local produce – Magnificent Seed Oil Strawberry Hill honey, th Saturday 12 June between 10.00 and 12.00 Andrew’s jams and apple juice, preserves from Susan West, Sunday 13 th June between 10.00 and 12.00 Wine Tasting and sales from a’Becketts Vineyard. Sunday 20 th June between 10.00 and 12.00 Delicious refreshments cakes to meet every child and adult’s fancy, scones with home made jam and cream, tea, coffee, quiche, sandwiches &delicious O’pork Pulled Pork, farm to table.
    [Show full text]
  • Reciprocity–Driven Sparse Network Formation
    1 Reciprocity–driven Sparse Network Formation Konstantinos P. Tsoukatos Department of Computer Science and Engineering Technological Education Institute of Thessaly, Greece Abstract A resource exchange network is considered, where exchanges among nodes are based on reciprocity. Peers receive from the network an amount of resources commensurate with their contribution. We assume the network is fully connected, and impose sparsity constraints on peer interactions. Finding the sparsest exchanges that achieve a desired level of reciprocity is in general NP-hard. To capture near– optimal allocations, we introduce variants of the Eisenberg–Gale convex program with sparsity penalties. We derive decentralized algorithms, whereby peers approximately compute the sparsest allocations, by reweighted ℓ1 minimization. The algorithms implement new proportional-response dynamics, with nonlinear pricing. The trade-off between sparsity and reciprocity and the properties of graphs induced by sparse exchanges are examined. Index Terms Network formation, proportional-response, nonlinear pricing, sparse interactions. I. INTRODUCTION The unprecedented increase in wireless traffic poses significant challenges for mobile operators, arXiv:1705.10122v1 [cs.SI] 29 May 2017 who face extensive infrastructure upgrades to accommodate the rising demand for data. To ease strain on networks, a viable alternative seeks to take advantage of already deployed resources, that presently remain underutilized. For example, in device-to-device communications, devices in close proximity may establish either direct links, or indirect communication via wireless relays, altogether bypassing the cellular infrastructure. In recently launched Wi-Fi internet services, e.g., FON (fon.com), Open Garden (opengarden.com), Karma (yourkarma.com), sharing wireless access is a prominent feature, and subscribers are rewarded for relaying each other’s traffic.
    [Show full text]
  • Large-Scale Hybrid Ad Hoc Network for Mobile Platforms: Challenges and Experiences
    Large-scale hybrid ad hoc network for mobile platforms: Challenges and Experiences Nirmit Desai, Wendy Chong, Heather Achilles, Shahrokh Daijavad Thomas La Porta IBM T. J. Watson Research Center Dept. of Computer Science and Engineering Yorktown Heights, NY, USA Penn State University fnirmit.desai, wendych, hachilles, [email protected] University Park, PA, USA [email protected] Abstract—Peer-to-peer (p2p) networks and Mobile ad hoc net- populated areas, e.g., sports arenas. The following are the key works (MANET) have been widely studied. However, a real-world characteristics in these scenarios: deployment for the masses has remained elusive. Ever-increasing density of mobile devices, especially in urban areas, has given CH0. No communication infrastructure such as WiFi ac- rise to new applications of p2p communication. However, the cess points to fall back on modern smartphone platforms have limited support for such CH1. Device users are mobile, pattern of mobility is not communications. Further, the issues of battery life, range, and predictable trust remain unaddressed. A key question then is, what kinds of CH . New information may arrive at any time applications can the modern mobile platforms support and what 2 challenges remain? This paper identifies a class of applications CH3. Trustworthy information is scarce, misinformation and presents a novel center-to-peer-to-peer (c2p2p) architecture and rumours are common place called Mesh Network Alerts (MNA) to support them. We describe CH4. Small payloads suffice in many cases and informa- our experiences in deploying MNA as a real-world system to tion retains value for a few minutes millions of users for relaying severe weather information along CH .
    [Show full text]