85 research outputs found

    When the Social Meets the Semantic: Social Semantic Web or Web 2.5

    Full text link
    The social trend is progressively becoming the key feature of current Web understanding (Web 2.0). This trend appears irrepressible as millions of users, directly or indirectly connected through social networks, are able to share and exchange any kind of content, information, feeling or experience. Social interactions radically changed the user approach. Furthermore, the socialization of content around social objects provides new unexplored commercial marketplaces and business opportunities. On the other hand, the progressive evolution of the web towards the Semantic Web (or Web 3.0) provides a formal representation of knowledge based on the meaning of data. When the social meets semantics, the social intelligence can be formed in the context of a semantic environment in which user and community profiles as well as any kind of interaction is semantically represented (Semantic Social Web). This paper first provides a conceptual analysis of the second and third version of the Web model. That discussion is aimed at the definition of a middle concept (Web 2.5) resulting in the convergence and integration of key features from the current and next generation Web. The Semantic Social Web (Web 2.5) has a clear theoretical meaning, understood as the bridge between the overused Web 2.0 and the not yet mature Semantic Web (Web 3.0).Pileggi, SF.; Fernández Llatas, C.; Traver Salcedo, V. (2012). When the Social Meets the Semantic: Social Semantic Web or Web 2.5. Future Internet. 4(3):852-854. doi:10.3390/fi4030852S85285443Chi, E. H. (2008). The Social Web: Research and Opportunities. Computer, 41(9), 88-91. doi:10.1109/mc.2008.401Bulterman, D. C. A. (2001). SMIL 2.0 part 1: overview, concepts, and structure. IEEE Multimedia, 8(4), 82-88. doi:10.1109/93.959106Boll, S. (2007). MultiTube--Where Web 2.0 and Multimedia Could Meet. IEEE Multimedia, 14(1), 9-13. doi:10.1109/mmul.2007.17Fraternali, P., Rossi, G., & Sánchez-Figueroa, F. (2010). Rich Internet Applications. IEEE Internet Computing, 14(3), 9-12. doi:10.1109/mic.2010.76Lassila, O., & Hendler, J. (2007). Embracing «Web 3.0». IEEE Internet Computing, 11(3), 90-93. doi:10.1109/mic.2007.52Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud Computing: Distributed Internet Computing for IT and Scientific Research. IEEE Internet Computing, 13(5), 10-13. doi:10.1109/mic.2009.103Mangione-Smith, W. H. (1998). Mobile computing and smart spaces. IEEE Concurrency, 6(4), 5-7. doi:10.1109/4434.736391Greaves, M. (2007). Semantic Web 2.0. IEEE Intelligent Systems, 22(2), 94-96. doi:10.1109/mis.2007.40Bojars, U., Breslin, J. G., Peristeras, V., Tummarello, G., & Decker, S. (2008). Interlinking the Social Web with Semantics. IEEE Intelligent Systems, 23(3), 29-40. doi:10.1109/mis.2008.50Definition of Web 2.0http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.htmlZhang, D., Guo, B., & Yu, Z. (2011). The Emergence of Social and Community Intelligence. Computer, 44(7), 21-28. doi:10.1109/mc.2011.65Pentlan, A. (2005). Socially aware, computation and communication. Computer, 38(3), 33-40. doi:10.1109/mc.2005.104Staab, S., Domingos, P., Mika, P., Golbeck, J., Li Ding, Finin, T., … Vallacher, R. R. (2005). Social Networks Applied. IEEE Intelligent Systems, 20(1), 80-93. doi:10.1109/mis.2005.16The Semantic Webhttp://www.scientificamerican.com/article.cfm?id=the-semantic-webDecker, S., Melnik, S., van Harmelen, F., Fensel, D., Klein, M., Broekstra, J., … Horrocks, I. (2000). The Semantic Web: the roles of XML and RDF. IEEE Internet Computing, 4(5), 63-73. doi:10.1109/4236.877487OWL Web Ontology Language Overviewhttp://www.w3.org/TR/owl-features/Vetere, G., & Lenzerini, M. (2005). Models for semantic interoperability in service-oriented architectures. IBM Systems Journal, 44(4), 887-903. doi:10.1147/sj.444.0887Fensel, D., & Musen, M. A. (2001). The semantic web: a brain for humankind. IEEE Intelligent Systems, 16(2), 24-25. doi:10.1109/mis.2001.920595Shadbolt, N., Berners-Lee, T., & Hall, W. (2006). The Semantic Web Revisited. IEEE Intelligent Systems, 21(3), 96-101. doi:10.1109/mis.2006.62Dodds, P. S., & Danforth, C. M. (2009). Measuring the Happiness of Large-Scale Written Expression: Songs, Blogs, and Presidents. Journal of Happiness Studies, 11(4), 441-456. doi:10.1007/s10902-009-9150-9Pang, B., & Lee, L. (2008). Opinion Mining and Sentiment Analysis. Foundations and Trends® in Information Retrieval, 2(1–2), 1-135. doi:10.1561/1500000011Thelwall, M., Buckley, K., & Paltoglou, G. (2011). Sentiment strength detection for the social web. Journal of the American Society for Information Science and Technology, 63(1), 163-173. doi:10.1002/asi.21662Blogmeterhttp://www.blogmeter.it/Christakis, N. A., & Fowler, J. H. (2010). Social Network Sensors for Early Detection of Contagious Outbreaks. PLoS ONE, 5(9), e12948. doi:10.1371/journal.pone.0012948Jansen, B. J., Zhang, M., Sobel, K., & Chowdury, A. (2009). Twitter power: Tweets as electronic word of mouth. Journal of the American Society for Information Science and Technology, 60(11), 2169-2188. doi:10.1002/asi.21149Bernal, P. A. (2010). Web 2.5: The Symbiotic Web. International Review of Law, Computers & Technology, 24(1), 25-37. doi:10.1080/13600860903570145Mikroyannidis, A. (2007). Toward a Social Semantic Web. Computer, 40(11), 113-115. doi:10.1109/mc.2007.405Jung, J. J. (2012). Computational reputation model based on selecting consensus choices: An empirical study on semantic wiki platform. Expert Systems with Applications, 39(10), 9002-9007. doi:10.1016/j.eswa.2012.02.03

    MAFC: Multi-Agent Fog Computing Model for Healthcare Critical Tasks Management

    Get PDF
    Producción CientíficaIn healthcare applications, numerous sensors and devices produce massive amounts of data which are the focus of critical tasks. Their management at the edge of the network can be done by Fog computing implementation. However, Fog Nodes suffer from lake of resources That could limit the time needed for final outcome/analytics. Fog Nodes could perform just a small number of tasks. A difficult decision concerns which tasks will perform locally by Fog Nodes. Each node should select such tasks carefully based on the current contextual information, for example, tasks’ priority, resource load, and resource availability. We suggest in this paper a Multi-Agent Fog Computing model for healthcare critical tasks management. The main role of the multi-agent system is mapping between three decision tables to optimize scheduling the critical tasks by assigning tasks with their priority, load in the network, and network resource availability. The first step is to decide whether a critical task can be processed locally; otherwise, the second step involves the sophisticated selection of the most suitable neighbor Fog Node to allocate it. If no Fog Node is capable of processing the task throughout the network, it is then sent to the Cloud facing the highest latency. We test the proposed scheme thoroughly, demonstrating its applicability and optimality at the edge of the network using iFogSim simulator and UTeM clinic data

    Web services approach for ambient assisted living in mobile environments

    Get PDF
    Web services appeared as a promising technology for Web environments independent of technologies, services, and applications. First, a performance comparison study between the two most used Web service architectures, SOAP and REST, is presented, considering messages exchange between clients and a server. Based on this study, the REST architecture was chosen to deploy the system because it gets better results compared to SOAP architecture. Currently, there are some issues related with this approach that should be studied. For instance, if massive quantities of data are sent to databases it can influence significantly the performance of the whole system. The Advanced Message Queuing Protocol (AMPQ) appears as a promising solution to address this problem. Then, in order to evaluate the performance of this approach, this work presents a performance evaluation and a comparison study of RESTful Web services and the AMQP Protocol considering exchanging messages between clients and a server. The study is based on the averaged exchanged messages for a certain period of time. It was observed and concluded that, for large quantities of messages exchange, the best results comes from the Advanced Message Queuing Protocol. Message Queuing Telemetry Transport (MQTT) was addressed in this work because it is a similar protocol to AMQP but it can be used by mobile devices with a processing capacity smallest unlike the AMQP that needs greater processing capacity. These studies are performed in the context of Ambient Assisted Living environments, since the work was applied to this topic in order to experiment the effectiveness and evaluate the performance of these protocols in this scenario

    Lessons from an innovation-leader and tools to learn them

    Get PDF
    Purpose: A number of recent reports have suggested that communication and management skills are important competences for engineers today and are likely to continue so in the future. While participation in strategy management decisions is expected to be important for engineers in technology driven firms, little attention is given to strategy management tools in many undergraduate engineering courses. The paper demonstrates one approach to tackling this issue. Design/methodology/approach: The authors initially present a critique of the use of standard strategy management tools SWOT analysis and Porter’s 5 Forces for decision making about future company policy. This critique is then complemented by a case-study of a university start-up, a recognized innovation-leader, in which SWOT analysis, Porter’s 5 Forces and PESTLE analysis are applied retrospectively as sense-making constructs to understand the firm’s previous policy decisions. Findings and Originality/value: The paper illustrates the potential of retrospective use of strategy management tools is demonstrated. Research limitations/implications: An obstacle confronting researchers in studies of this type is that for reasons of confidentiality it is difficult to gain access to current objective data on the financial situation and policy decisions of a firm. Furthermore this work presents a single case study. Both limitations are addressed in the appropriate section of the article. Originality/value: The value of the retrospective use of strategy management tools is illustrated. The paper makes proposals regarding how such data can be employed in role-play activities in preparing engineers to develop interdisciplinary communication skills in the context of strategy management decision makingPeer Reviewe

    Intelligent support for knowledge sharing in virtual communities

    Get PDF
    Virtual communities where people with common interests and goals communicate, share resources, and construct knowledge, are currently one of the fastest growing web environments. A common misconception is to believe that a virtual community will be effective when people and technology are present. Appropriate support for the effective functioning of online communities is paramount. In this line, personalisation and adaptation can play a crucial role, as illustrated by recent user modelling approaches that support social web-groups. However, personalisation research has mainly focused on adapting to the needs of individual members, as opposed to supporting communities to function as a whole. In this research, we argue that effective support tailored to virtual communities requires considering the wholeness of the community and facilitating the processes that influence the success of knowledge sharing and collaboration. We are focusing on closely knit communities that operate in the boundaries of organisations or in the educational sector. Following research in organisational psychology, we have identified several processes important for effective team functioning which can be applied to virtual communities and can be examined or facilitated by analysing community log data. Based on the above processes we defined a computational framework that consists of two major parts. The first deals with the extraction of a community model that represents the whole community and the second deals with the application of the model in order to identify what adaptive support is needed and when. The validation of this framework has been done using real virtual community data and the advantages of the adaptive support have been examined based on the changes happened after the interventions in the community combined with user feedback. With this thesis we contribute to the user modelling and adaptive systems research communities with: (a) a novel framework for holistic adaptive support in virtual communities, (b) a mechanism for extracting and maintaining a semantic community model based on the processes identified, and (c) deployment of the community model to identify problems and provide holistic support to a virtual community. We also contribute to the CSCW community with a novel approach in providing semantically enriched community awareness and to the area of social networks with a semantically enriched approach for modeling change patterns in a closely-knit VC.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Annual Report, 2013-2014

    Get PDF
    Beginning in 2004/2005- issued in online format onl

    Security Enhanced EMV-Based Mobile Payment Protocol

    Get PDF
    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions
    corecore