31,209 research outputs found

    An active, ontology-driven network service for Internet collaboration

    No full text
    Web portals have emerged as an important means of collaboration on the WWW, and the integration of ontologies promises to make them more accurate in how they serve users’ collaboration and information location requirements. However, web portals are essentially a centralised architecture resulting in difficulties supporting seamless roaming between portals and collaboration between groups supported on different portals. This paper proposes an alternative approach to collaboration over the web using ontologies that is de-centralised and exploits content-based networking. We argue that this approach promises a user-centric, timely, secure and location-independent mechanism, which is potentially more scaleable and universal than existing centralised portals

    STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats

    Get PDF
    Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world. A cyber-attack on critical infrastructures could for example evolve along these threat vectors: chemical/biological contamination, physical or communications disruption between the network and the supervisory SCADA. Although conceptual and technological solutions to security and resilience are available, further work is required to bring them together in a risk management framework, strengthen the capacities of water utilities to systematically protect their systems, determine gaps in security technologies and improve risk management approaches. In particular, robust adaptable/flexible solutions for prevention, detection and mitigation of consequences in case of failure due to physical and cyber threats, their combination and cascading effects (from attacks to other critical infrastructure, i.e. energy) are still missing. There is (i) an urgent need to efficiently tackle cyber-physical security threats, (ii) an existing risk management gap in utilities’ practices and (iii) an un-tapped technology market potential for strategic, tactical and operational protection solutions for water infrastructure: how the H2020 STOP-IT project aims to bridge these gaps is presented in this paper.Postprint (published version

    Data Mining a Medieval Medical Text Reveals Patterns in Ingredient Choice That Reflect Biological Activity against Infectious Agents

    Get PDF
    We used established methodologies from network science to identify patterns in medicinal ingredient combinations in a key medieval text, the 15th-century Lylye of Medicynes, focusing on recipes for topical treatments for symptoms of microbial infection. We conducted experiments screening the antimicrobial activity of selected ingredients. These experiments revealed interesting examples of ingredients that potentiated or interfered with each other’s activity and that would be useful bases for future, more detailed experiments. Our results highlight (i) the potential to use methodologies from network science to analyze medieval data sets and detect patterns of ingredient combination, (ii) the potential of interdisciplinary collaboration to reveal different aspects of the ethnopharmacology of historical medical texts, and (iii) the potential development of novel therapeutics inspired by premodern remedies in a time of increased need for new antibiotics.The pharmacopeia used by physicians and laypeople in medieval Europe has largely been dismissed as placebo or superstition. While we now recognize that some of the materia medica used by medieval physicians could have had useful biological properties, research in this area is limited by the labor-intensive process of searching and interpreting historical medical texts. Here, we demonstrate the potential power of turning medieval medical texts into contextualized electronic databases amenable to exploration by the use of an algorithm. We used established methodologies from network science to reveal patterns in ingredient selection and usage in a key text, the 15th-century Lylye of Medicynes, focusing on remedies to treat symptoms of microbial infection. In providing a worked example of data-driven textual analysis, we demonstrate the potential of this approach to encourage interdisciplinary collaboration and to shine a new light on the ethnopharmacology of historical medical texts

    Telematics programme (1991-1994). EUR 15402 EN

    Get PDF

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201
    • …
    corecore