59 research outputs found

    Towards a user-centric social approach to web services composition, execution, and monitoring

    Get PDF
    This paper discusses the intertwine of social networks of users and social networks of Web services to compose, execute, and monitor Web services. Each network provides details that permit achieving this intertwine and thus, completing the three operations. A user social-network is used to advise users on the next Web services to select based on their peers’ experiences, whereas a Web service social network is used to advise users on the substitutes to select in case a Web service fails, for example. To make the intertwine of these social networks happen, three components are developed: composer, executor, and monitor. The social composer develops composite Web services considering relations between users and the ones between Web services. The social executor assesses the impact of these relations on these compositeWeb services execution progress. Finally, the social monitor replaces failing Web services to guarantee the execution continuity of these composite Web services. A running example and a prototype illustrate and demonstrate the intertwine of these social networks, respectively.Zakaria Maamar, Noura Faci, Quan Z. Sheng and Lina Ya

    CASE HISTORIES USING SYNTHETIC FIBER REINFORCED CONCRETE

    Get PDF
    Synthetic fiber reinforced concrete has been used in shotcrete for many years. This paper discusses select project case histories from around the world. The discussion focuses on why fibers are used and explains how there are many benefits, advantages, and features regarding the choice of fibers. Also discussed is why and how the fibers affect the overall project performance, schedule, costs, and construct-ability. Further discussion shows that the fiber choice is in the details. The best fiber choice must meet certain project criteria established by all the decision makers involved in the project. Lastly, the versatility in the use of a specific blend of synthetic fibers in shotcrete shows the potential for even more diverse applications of synthetic fiber reinforcement

    Conformal invariance: from Weyl to SO(2,d)

    Full text link
    The present work deals with two different but subtilely related kinds of conformal mappings: Weyl rescaling in d>2d>2 dimensional spaces and SO(2,d) transformations. We express how the difference between the two can be compensated by diffeomorphic transformations. This is well known in the framework of String Theory but in the particular case of d=2d=2 spaces. Indeed, the Polyakov formalism describes world-sheets in terms of two-dimensional conformal field theory. On the other hand, B. Zumino had shown that a classical four-dimensional Weyl-invariant field theory restricted to live in Minkowski space leads to an SO(2,4)-invariant field theory. We extend Zumino's result to relate Weyl and SO(2,d) symmetries in arbitrary conformally flat spaces (CFS). This allows us to assert that a classical SO(2,d)SO(2,d)-invariant field does not distinguish, at least locally, between two different dd-dimensional CFSs.Comment: 5 pages, no figures. There are slight modifications to match with the published versio

    Norm-based and Commitment-driven Agentification of the Internet of Things

    Get PDF
    There are no doubts that the Internet-of-Things (IoT) has conquered the ICT industry to the extent that many governments and organizations are already rolling out many anywhere,anytime online services that IoT sustains. However, like any emerging and disruptive technology, multiple obstacles are slowing down IoT practical adoption including the passive nature and privacy invasion of things. This paper examines how to empower things with necessary capabilities that would make them proactive and responsive. This means things can, for instance reach out to collaborative peers, (un)form dynamic communities when necessary, avoid malicious peers, and be “questioned” for their actions. To achieve such empowerment, this paper presents an approach for agentifying things using norms along with commitments that operationalize these norms. Both norms and commitments are specialized into social (i.e., application independent) and business (i.e., application dependent), respectively. Being proactive, things could violate commitments at run-time, which needs to be detected through monitoring. In this paper, thing agentification is illustrated with a case study about missing children and demonstrated with a testbed that uses di_erent IoT-related technologies such as Eclipse Mosquitto broker and Message Queuing Telemetry Transport protocol. Some experiments conducted upon this testbed are also discussed

    Irrigation and energy: Issues and challenges

    Full text link
    Water‐efficient agriculture has implied a large increase in energy consumption for irrigation in recent decades. In many irrigation systems, energy costs are now threatening their sustainability. However, new opportunities have arisen for the use of renewable energies in the irrigation sector. These are some of the aspects of the multifaceted multiple‐actor 'water–food–energy' nexus. Technical, economic and environmental issues are linked in many ways, involving farmers, water users' associations, energy suppliers, engineers and other stakeholders. The ICID session 'Irrigation and energy' triggered discussions on these multiple dimensions. This paper presents a synthesis of the presentations, discussions and conclusions. Four main questions are addressed: How do irrigation productivity and sustainability of water resources exploitation change when farmers have access to energy? What do we know about energy efficiency in irrigation systems, at farm and collective network levels? How can this efficiency be optimized by using advanced technologies, modelling tools, improved management? Is energy production an opportunity for irrigation systems? These questions have been posed based on multiple case studies from different parts of the world. The BRL network, in southern France, illustrates advanced strategies and opportunities to reduce energy consumption and develop energy production at a network level. General conclusions are drawn from this synthesis, illustrating trade‐offs and synergies that can be identified in the irrigation sector at different scales, while opportunities for future research are proposed

    SARS-CoV-2 congenital infection and pre-eclampsia-like syndrome in dichorionic twins: A case report and review of the literature

    Get PDF
    Although the route of transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) is mainly respiratory, vertical transmission seems possible.1 We report the case of a woman with a dichorionic diamniotic twin pregnancy admitted to Hospital ClĂ­nico Universitario Lozano Blesa at 38+4 weeks of gestation due to severe pre-eclampsia in the context of a SARS-CoV-2 infection (positive nasopharyngeal PCR; Viasure, CerTest Biotec., Zaragoza, Spain) with a probable transplacental transmission of the virus to both twins..

    Cloud versus Edge: Who Serves the Internet-of-Things Better?

    Get PDF
    Usually announced to the ICT community as rivals in the Internet-of-Things (IoT) context, cloud and edge could work together according to their respective capabilities. Today’s IoT applications cannot be dependent on a single technology (either SQL or noSQL) nor a single operation model (either centralized or decentralized). The challenges are multiple including complexity of user scenarios, multiplicity of things, sensitivity of data, etc. This paper raises the question of who serves IoT better? Cloud, only; edge, only; or both together. To answer this question, clouds’ and edges’ duties are identified and then a set of collaborative scenarios are discussed with respect to these duties

    Enterprise 2.0: Research challenges and opportunities

    Get PDF
    © Springer International Publishing Switzerland 2015. Blending Web 2.0 technologies with enterprise information systems is setting up the stage for a new generation of information systems that will help enterprises open up new communication channels with their stakeholders. Contrary to traditional enterprises with top-down command flow and bottom-up feedback flow, the same flows in Enterprise 2.0 cross all levels and in all directions bringing people together in the development of creative and innovative ideas. The power of Web 2.0 technologies stems from their ability to capture real-world phenomena such as collaboration, competition, and partnership that can be converted into useful and structured information sources from which enterprises can draw information about markets’ trends, consumers’ habits, suppliers’ strategies, etc. This paper discusses the research efforts that our international research group has put into the topic of Enterprise 2.0 (aka Social Enterprise). In particular, our research group advocates that existing practices for managing enterprise information systems need to be re-visited in a way that permits to capture social relations that arise inside and outside the enterprise, to establish guidelines and techniques to assist IT practitioners integrate social relations into their design, development, and maintenance efforts of these information systems, and last but not least to identify and tackle challenges that prevent capturing social relations

    Weaving Cognition into the Internet-of-Things: Application to Water Leaks

    Get PDF
    Despite the growing interest in the Internet-of-Things, many organizations remain reluctant to integrating things into their business processes. Different reasons justify this reluctance including things’ limited capabilities to act upon the cyber-physical environment in which they operate. To address this specific limitation, this paper examines thing empowerment with cognitive capabilities that would make them for instance, selective of the forthcoming business processes in which they would participate. The selection is based on things’ restrictions like limitedness and goals to achieve like improved reputation. For demonstration and implementation purposes, water leaks are used as a case study. A BPEL-based business process driving the fixing of water leaks is implemented involving different cognitive-empowered things like moisture sensor
    • 

    corecore