The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the semantic gap between the domain knowledge and software application engineering by proposing a framework for mapping and integrating multiple heterogeneous data sources with application business logic by means of data semantic enrichment, aggregation, filtering and processing. Based on the main drawbacks identified in the current knowledge enhanced software application architectures,...
GIS information is important for e-Health surveillance because such information is required for monitoring, exchanging and shared across health GIS systems. However, interacting with the health GIS system is difficult for the users who may have less knowledge about GIS systems. This paper proposes a semantic query builder that provides a query service and can interact with health GIS systems. The...
This paper aims to present a repository which has as main objective to store and manage data derived from internal control mechanisms. The proposed repository receives information about the execution of organizational transactions which were collected by internal control mechanisms in an ERP database, thereby constituting an important tool for continuous monitoring of organizational transactions....
Integration of data from heterogeneous data sources is one of several technical challenges during the tunnel construction. BIM and relational database have maken their efforts for tunnel data organization, but they are not qualified for tunnel problem reasoning. This paper proposes a tunnel data organization method driven by Ontology, which is suitable for data reorganization as well as reasoning...
Innumerable terror and suspicious messages are sent through Instant Messengers (IM) and Social Networking Sites (SNS) which are untraced, leading to hindrance for network communications and cyber security. We propose a Framework that discover and predict such messages that are sent using IM or SNS like Facebook, Twitter, LinkedIn, and others. Further, these instant messages are put under surveillance...
Sometimes information systems fail or have operational and communication problems because designers may not have knowledge of the domain which is intended to be modeled. The same happens with systems for monitoring. Thus, an ontological model is needed to represent the organizational domain, which is intended to be monitored in order to develop an effective monitoring system. In this way, the purpose...
This article discusses risk-related knowledge-based content annotation in a domain of structural health monitoring (SHM) and introduces an extension of existing ontology-based document and content annotation method and a corresponding software tool that was developed to achieve this task.
Vast amounts of medical data are now routinely collected. This data is often subsequently used in medical research. However, the quality of the data can vary widely. Existing automated approaches to data quality assurance largely rely on threshold rules that can miss errors requiring complex domain knowledge to identify. In this paper we describe a framework to assess the reliability of medical data...
Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrusion...
In recent years, a lot of research concerns with the wireless sensor networks (WSN). With the increasing usages of WSN applications such as health care and disaster reporting, security requirements, wireless communication has become more critical. Researchers of intrusion detection system on WSN have suggested that systems¡¦ detecting mechanisms would likely affect their detections effective and lifetime...
In this paper, we propose a multi-agent methodology (MAM) for power system monitoring and protection. The uniqueness of the proposed architecture is the ability of MAM to evolve in the wake of an attack of malicious intent by mutation and thus always monitoring a power system bus remotely. Also, the architecture interacts with the mutated agents use a voting methodology thus alleviating the effect...
The paper introduces the architecture of a multiagent system for environmental monitoring and analysis, and focuses on the use of collaborative intelligence between the environmental agents (the agents that monitor and analyze the evolution of specific environment pollutants concentrations in different locations) and meteorological agents (that provide information about all meteorological parameters...
Aiming to discover the most suitable service cater to the discovery request of service consumer which includes functional requirements and nonfunctional requirements, this paper proposes a service registry model named as SRC (Service Registry on Cloud) which is an extension of the keywords based service registry model and deployed as a cloud application to provide behavior-aware and QoS-aware service...
Medical time series contain important information about the condition of a patient. However, due to the large amount of data and the staff shortage, it is difficult for physicians to monitor these time series for trends that suggest a relevant clinical detoriation due to a complication or new pathology. This paper proposes a framework that supports physicians in detecting patterns in time series....
This paper presents a new network management system with ontology-supported multi-agent techniques. This technique derived from the ontology combining with related free software - Ethereal and Cacti which stored the operating information of network management perfectly into the backend database; furthermore, from the view of the fundamental functions of information agents, the system could sketch...
Nowadays, with the rapid development of Web services technologies as a solution to achieve SOA, the number of Web services on the web that offer similar functions is increasing. Therefore, not only the discovery and selection of the best Web services based on functional property requirements and preferences of users is not sufficient, but also owning to improve and achieve more accurate results, the...
To operate in an e-business environment, an organization has to have a good command of knowledge on its markets, customers, products and services, methods and processes, competitors, employee skills and its regulatory environment. A base of clearly defined product information is a key foundation for an e-business system. The manipulation and exchange of semantically enriched and precise e-catalogs...
Current trends in healthcare technology include mobile-based applications. Relevant advances in the integration of vital signs monitoring devices with mobile platforms are widely reported nowadays. In this context, conceiving and designing an interoperable application is essential due to the growing necessity of integrating a huge and heterogeneous amount of biomedical data, coming from a wide range...
With the growing number of web services on the web that offer similar functions, it is required to use mechanisms for ranking and selecting them based on non-functional properties (i.e. QoS). Different QoS models and language may use different concepts, metrics, units, values for representing QoS information. It is difficult for an automatic semantic web service discovery system to be able to understand...
The problem of versioning is present in several application areas, such as temporal databases, real-time computing and ontologies. This problem is generally defined as managing changes in a timely manner without loss of existing data. However, ontology versioning is more complicated than versioning in database because of the usage and content of ontology which incorporates semantic aspects. Consequently,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.