1,343 research outputs found

    Winnowing ontologies based on application use

    Get PDF
    The requirements of specific applications and services are often over estimated when ontologies are reused or built. This sometimes results in many ontologies being too large for their intended purposes. It is not uncommon that when applications and services are deployed over an ontology, only a few parts of the ontology are queried and used. Identifying which parts of an ontology are being used could be helpful to winnow the ontology, i.e., simplify or shrink the ontology to smaller, more fit for purpose size. Some approaches to handle this problem have already been suggested in the literature. However, none of that work showed how ontology-based applications can be used in the ontology-resizing process, or how they might be affected by it. This paper presents a study on the use of the AKT Reference Ontology by a number of applications and services,and investigates the possibility of relying on this usage information to winnow that ontology

    Identification as a deterrent for security enhancement in cognitive radio networks

    Get PDF
    Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary User Emulation Attack (PUEA). Specifically, a malicious CRN may mimic licensees’ (Primary Users (PUs)) signal characteristics to force another CRN to vacate its channels thinking that PUs have returned. While existing schemes are promising to some extent on detecting PUEAs, they are not able to prevent the attacks. In this article, we propose a PUEA Deterrent (PUED) algorithm that can provide PUEAs' commission details: offender CRNs and attacks’ time and bandwidth. There are many similarities between PUED and Closed-Circuit Television (CCTV) in terms of: deterrence strategy, reason for use, surveillance characteristics, surveillance outcome, and operation site. According to the criminology literature, robust CCTV systems have shown a significant reduction in visible offences (e.g. vehicle theft), reducing crime rates by 80%. Similarly, PUED will contribute the same effectiveness in deterring PUEAs. Furthermore, providing PUEAs’ details will prevent the network’s cognitive engine from considering the attacks as real PUs, consequently avoiding devising unreliable spectrum models for the attacked channels. Extensive simulations show the effectiveness of the PUED algorithm in terms of improving CRNs’ performance

    Virtual Machines Embedding for Cloud PON AWGR and Server Based Data Centres

    Full text link
    In this study, we investigate the embedding of various cloud applications in PON AWGR and Server Based Data Centres

    Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one

    Get PDF
    Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part

    Semantics, sensors, and the social web: The live social semantics experiments

    Get PDF
    The Live Social Semantics is an innovative application that encourages and guides social networking between researchers at conferences and similar events. The application integrates data and technologies from the Semantic Web, online social networks, and a face-to-face contact sensing platform. It helps researchers to find like-minded and influential researchers, to identify and meet people in their community of practice, and to capture and later retrace their real-world networking activities at conferences. The application was successfully deployed at two international conferences, attracting more than 300 users in total. This paper describes this application, and discusses and evaluates the results of its two deployment

    Social dynamics in conferences: analyses of data from the Live Social Semantics application

    Get PDF
    Popularity and spread of online social networking in recent years has given a great momentum to the study of dynamics and patterns of social interactions. However, these studies have often been confined to the online world, neglecting its interdependencies with the offline world. This is mainly due to the lack of real data that spans across this divide. The Live Social Semantics application is a novel platform that dissolves this divide, by collecting and integrating data about people from (a) their online social networks and tagging activities from popular social networking sites, (b) their publications and co-authorship networks from semantic repositories, and (c) their real-world face-to-face contacts with other attendees collected via a network of wearable active sensors. This paper investigates the data collected by this application during its deployment at three major conferences, where it was used by more than 400 people. Our analyses show the robustness of the patterns of contacts at various conferences, and the influence of various personal properties (e.g. seniority, conference attendance) on social networking patterns

    Influence and interaction of temperature, H2S and pH on concrete sewer pipe corrosion

    Get PDF
    Concrete sewer pipes are known to suffer from a process of hydrogen sulfide gas induced sulfuric acid corrosion. This leads to premature pipe degradation, performance failure and collapses which in turn may lead to property and health damage. The above work reports on a field study undertaken in working sewer manholes where the parameters of effluent temperature and pH as well as ambient temperature and concentration of hydrogen sulfide were continuously measured over a period of two months. Early results suggest that effluent pH has no direct effect on hydrogen sulfide build up; on average the effluent temperature is 3.5°C greater than the ambient temperature inside the manhole and also it was observed that hydrogen sulfate concentration increases with increasing temperature

    A new processing approach for reducing computational complexity in cloud-RAN mobile networks

    Get PDF
    Cloud computing is considered as one of the key drivers for the next generation of mobile networks (e.g. 5G). This is combined with the dramatic expansion in mobile networks, involving millions (or even billions) of subscribers with a greater number of current and future mobile applications (e.g. IoT). Cloud Radio Access Network (C-RAN) architecture has been proposed as a novel concept to gain the benefits of cloud computing as an efficient computing resource, to meet the requirements of future cellular networks. However, the computational complexity of obtaining the channel state information in the full-centralized C-RAN increases as the size of the network is scaled up, as a result of enlargement in channel information matrices. To tackle this problem of complexity and latency, MapReduce framework and fast matrix algorithms are proposed. This paper presents two levels of complexity reduction in the process of estimating the channel information in cellular networks. The results illustrate that complexity can be minimized from O(N3) to O((N/k)3), where N is the total number of RRHs and k is the number of RRHs per group, by dividing the processing of RRHs into parallel groups and harnessing the MapReduce parallel algorithm in order to process them. The second approach reduces the computation complexity from O((N/k)3) to O((N/k)2:807) using the algorithms of fast matrix inversion. The reduction in complexity and latency leads to a significant improvement in both the estimation time and in the scalability of C-RAN networks

    Semantic metrics

    Get PDF
    In the context of the Semantic Web, many ontology-related operations, e.g. ontology ranking, segmentation, alignment, articulation, reuse, evaluation, can be boiled down to one fundamental operation: computing the similarity and?or dissimilarity among ontological entities, and in some cases among ontologies themselves. In this paper, we review standard metrics for computing distance measures and we propose a series of semantic metrics. We give a formal account of semantic metrics drawn from a variety of research disciplines, and enrich them with semantics based on standard Description Logic constructs. We argue that concept-based metrics can be aggregated to produce numeric distances at ontology-level and we speculate on the usability of our ideas through potential areas
    corecore