RonPub

Loading...

RonPub Banner

RonPub -- Research Online Publishing

RonPub (Research online Publishing) is an academic publisher of online, open access, peer-reviewed journals.  RonPub aims to provide a platform for researchers, developers, educators, and technical managers to share and exchange their research results worldwide.

RonPub Is Open Access:

RonPub publishes all of its journals under the open access model, defined under BudapestBerlin, and Bethesda open access declarations:

  • All articles published by RonPub is fully open access and online available to readers free of charge.  
  • All open access articles are distributed under  Creative Commons Attribution License,  which permits unrestricted use, distribution and reproduction free of charge in any medium, provided that the original work is properly cited. 
  • Authors retain all copyright to their work.
  • Authors may also publish the publisher's version of their paper on any repository or website. 

RonPub Is Cost-Effective:

To be able to provide open access journals, RonPub defray publishing cost by charging a one-time publication fee for each accepted article. One of RonPub objectives is providing a fast and high-quality but lower-cost publishing service. In order to ensure that the fee is never a barrier to publication, RonPub offers a fee waiver for authors who do not have funds to cover publication fees. We also offer a partial fee waiver for editors and reviewers of RonPub as as reward for their work. See the respective Journal webpage for the concrete publication fee.

RonPub Publication Criteria

What we are most concerned about is the quality, not quantity, of publications. We only publish high-quality scholarly papers. Publication Criteria describes the criteria that should be met for a contribution to be acceptable for publication in RonPub journals.

RonPub Publication Ethics Statement:

In order to ensure the publishing quality and the reputation of the publisher, it is important that all parties involved in the act of publishing adhere to the standards of the publishing ethical behaviour. To verify the originality of submissions, we use Plagiarism Detection Tools, like Anti-Plagiarism, PaperRater, Viper, to check the content of manuscripts submitted to our journals against existing publications.

RonPub follows the Code of Conduct of the Committee on Publication Ethics (COPE), and deals with the cases of misconduct according to the COPE Flowcharts

Long-Term Preservation in the German National Library

Our publications are archived and permanently-preserved in the German National Library. The publications, which are archived in the German National Library, are not only long-term preserved but also accessible in the future, because the German National Library ensures that digital data saved in the old formats can be viewed and used on current computer systems in the same way they were on the original systems which are long obsolete.

Where is RonPub?

RonPub is a registered corporation in Lübeck, Germany. Lübeck is a beautiful coastal city, owing wonderful sea resorts and sandy beaches as well as good restaurants. It is located in northern Germany and is 60 kilometer away from Hamburg.

For Authors

Manuscript Preparation

Authors should first read the author guidelines of the corresponding journal. Manuscripts must be prepared using the manuscript template of the respective journal. It is available as word and latex version for download at the Author Guidelines of the corresponding journal page. The template describes the format and structure of manuscripts and other necessary information for preparing manuscripts. Manuscripts should be written in English. There is no restriction on the length of manuscripts.

Submission

Authors submit their manuscripts via the submit page of the corresponding journal. Authors first submit their manuscripts in PDF format. Once a manuscript is accepted, the author then submits the revised manuscript as PDF file and word file or latex folder (with all the material necessary to generate the PDF file). The work described in the submitted manuscript must be previously unpublished; it is not under consideration for publication anywhere else. 

Authors are welcome to suggest qualified reviewers for their papers, but this is not mandatory. If the author wants to do so, please provide the name, affiliations and e-mail addresses for all suggested reviewers.

Manuscript Status

After submission of manuscripts, authors will receive an email to confirm receipt of manuscripts within a few days. Subsequent enquiries concerning paper progress should be made to the corresponding editorial office (see individual journal webpage for concrete contact information).

Review Procedure

RonPub is committed to enforcing a rigorous peer-review process. All manuscripts submitted for publication in RonPub journals are strictly and thoroughly peer-reviewed. When a manuscript is submitted to a RonPub journal, the editor-in-chief of the journal assigns it to an appropriate editor who will be in charge of the review process of the manuscript. The editor first suggests potential reviewers and then organizes the peer-reviewing herself/himself or entrusts it to the editor office. For each manuscript, typically three review reports will be collected. The editor and the editor-in-chief evaluate the manuscript itself and the review reports and make an accept/revision/reject decision. Authors will be informed with the decision and reviewing results within 6-8 weeks on average after the manuscript submission. In the case of revision, authors are required to perform an adequate revision to address the concerns from evaluation reports. A new round of peer-review will be performed if necessary.

Accepted manuscripts are published online immediately.

Copyrights

Authors publishing with RonPub open journals retain the copyright to their work. 

All articles published by RonPub is fully open access and online available to readers free of charge.  RonPub publishes all open access articles under the Creative Commons Attribution License,  which permits unrestricted use, distribution and reproduction freely, provided that the original work is properly cited.

Digital Archiving Policy

Our publications have been archived and permanently-preserved in the German National Library. The publications, which are archived in the German National Library, are not only long-term preserved but also accessible in the future, because the German National Library ensures that digital data saved in the old formats can be viewed and used on current computer systems in the same way they were on the original systems which are long obsolete. Further measures will be taken if necessary. Furthermore, we also encourage our authors to self-archive their articles published on the website of RonPub.

For Editors

About RonPub

RonPub is academic publisher of online, open access, peer-reviewed journals. All articles published by RonPub is fully open access and online available to readers free of charge.

RonPub is located in Lübeck, Germany. Lübeck is a beautiful harbour city, 60 kilometer away from Hamburg.

Editor-in-Chief Responsibilities

The Editor-in-Chief of each journal is mainly responsible for the scientific quality of the journal and for assisting in the management of the journal. The Editor-in-Chief suggests topics for the journal, invites distinguished scientists to join the editorial board, oversees the editorial process, and makes the final decision whether a paper can be published after peer-review and revisions.

As a reward for the work of a Editor-in-Chief, the Editor-in-Chief will obtain a 25% discount of the standard publication fee for her/his papers (the Editor-in-Chief is one of authors) published in any of RonPub journals.

Editors’ Responsibilities

Editors assist the Editor-in-Chief in the scientific quality and in decision about topics of the journal. Editors are also encouraged to help to promote the journal among their peers and at conferences. An editor invites at least three reviewers to review a manuscript, but may also review him-/herself the manuscript. After carefully evaluating the review reports and the manuscript itself, the editor makes a commendation about the status of the manuscript. The editor's evaluation as well as the review reports are then sent to EiC, who make the final decision whether a paper can be published after peer-review and revisions. 

The communication with Editorial Board members is done primarily by E-mail, and the Editors are expected to respond within a few working days on any question sent by the Editorial Office so that manuscripts can be processed in a timely fashion. If an editor does not respond or cannot process the work in time, and under some special situations, the editorial office may forward the requests to the Publishers or Editor-in-Chief, who will take the decision directly.

As a reward for the work of editors, an editor will obtain a 25% discount of the standard publication fee for her/his papers (the editor is one of authors) published in any of RonPub journals.

Guest Editors’ Responsibilities

Guest Editors are responsible of the scientific quality of their special issues. Guest Editors will be in charge of inviting papers, of supervising the refereeing process (each paper should be reviewed at least by three reviewers), and of making decisions on the acceptance of manuscripts submitted to their special issue. As regular issues, all accepted papers by (guest) editors will be sent to the EiC of the journal, who will check the quality of the papers, and make the final decsion whether a paper can be published.

Our editorial office will have the right directly asking authors to revise their paper if there are quality issues, e.g. weak quality of writing, and missing information. Authors are required to revise their paper several times if necessary. A paper accepted by it's quest editor may be rejected by the EiC of the journal due to a low quality. However, this occurs only when authors do not really take efforts to revise their paper. A high-quality publication needs the common efforts from the journal, reviewers, editors, editor-in-chief and authors.

The Guest Editors are also expected to write an editorial paper for the special issue. As a reward for work, all guest editors and reviewers working on a special issue will obtain a 25% discount of the standard publication fee for any of their papers published in any of RonPub journals for one year.

Reviewers’ Responsiblity

A reviewer is mainly responsible for reviewing of manuscripts, writing reviewing report and suggesting acception or deny of manuscripts. Reviews are encouraged to provide input about the quality and management of the journal, and help promote the journal among their peers and at conferences.  

Upon the quality of reviewing work, a reviewer will have the potential to be promoted to a full editorial board member. 

As a reward for the reviewing work, a reviewer will obtain a 25% discount of the standard publication fee for her/his papers (the review is one of authors) published in any of RonPub journals.

Launching New Journals

RonPub always welcomes suggestions for new open access journals in any research area. We are also open for publishing collaborations with research societies. Please send your proposals for new journals or for publishing collaboration to This email address is being protected from spambots. You need JavaScript enabled to view it. .

Publication Criteria

This part provides important information for both the scientific committees and authors.

Ethic Requirement:

For scientific committees: Each editor and reviewer should conduct the evaluation of manuscripts objectively and fairly.
For authors: Authors should present their work honestly without fabrication, falsification, plagiarism or inappropriate data manipulation.

Pre-Check:

In order to filter fabricated submissions, the editorial office will check the authenticity of the authors and their affiliations before a peer-review begins. It is important that the authors communicate with us using the email addresses of their affiliations and provide us the URL addresses of their affiliations. To verify the originality of submissions, we use various plagiarism detection tools to check the content of manuscripts submitted to our journal against existing publications. The overall quality of paper will be also checked including format, figures, tables, integrity and adequacy. Authors may be required to improve the quality of their paper before sending it out for review. If a paper is obviously of low quality, the paper will be directly rejected.

Acceptance Criteria:

The criteria for acceptance of manuscripts are the quality of work. This will concretely be reflected in the following aspects:

  • Novelty and Practical Impact
  • Technical Soundness
  • Appropriateness and Adequacy of 
    • Literature Review
    • Background Discussion
    • Analysis of Issues
  • Presentation, including 
    • Overall Organization 
    • English 
    • Readability

For a contribution to be acceptable for publication, these points should be at least in middle level.

Guidelines for Rejection:

  • If the work described in the manuscript has been published, or is under consideration for publication anywhere else, it will not be evaluated.
  • If the work is a plagiarism, or contains data falsification or fabrication, it will be rejected.
  • Manuscripts, which have seriously technical flaws, will not be accepted.

Call for Journals

Research Online Publishing (RonPub, www.ronpub.com) is a publisher of online, open access and peer-reviewed scientific journals.  For more information about RonPub please visit this link.

RonPub always welcomes suggestions for new journals in any research area. Please send your proposals for journals along with your Curriculum Vitae to This email address is being protected from spambots. You need JavaScript enabled to view it. .

We are also open for publishing collaborations with research societies. Please send your publishing collaboration also to This email address is being protected from spambots. You need JavaScript enabled to view it. .

Be an Editor / Be a Reviewer

RonPub always welcomes qualified academicians and practitioners to join as editors and reviewers. Being an editor/a reviewer is a matter of prestige and personnel achievement. Upon the quality of reviewing work, a reviewer will have the potential to be promoted to a full editorial board member.

If you would like to participate as a scientific committee member of any of RonPub journals, please send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with your curriculum vitae. We will revert back as soon as possible. For more information about editors/reviewers, please visit this link.

Contact RonPub

Location

RonPub UG (haftungsbeschränkt)
Hiddenseering 30
23560 Lübeck
Germany

Comments and Questions

For general inquiries, please e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. .

For specific questions on a certain journal, please visit the corresponding journal page to see the email address.

RonPub's Transparent Impact Factor of the Year 2019: 1.56

There are numerous criticisms on the use of impact factors and debates about the validity of the impact factor as a measure of journal importance [1, 2, 3, 5, 6, 8, 9]. Several national-level institutions like the German Research Foundation [4] and Science and the Technology Select Committee [7] of the United Kingdom urge their funding councils to only evaluate the quality of individual articles, not the reputation of the journal in which they are published. Nevertherless, we are sometimes asked about the impact factors of our journals. Therefore, we provide here the impact factors for readers who are still interested in impact factors. Our impact factors are calculated in the same way as the one of Thomson Reuters, but the impact factors for our journals are not computed by the company Thomson Reuters and they are computed by ourselves and can be validated by anyone, because we present all data for computing the impact factor (to anyone asking neither for registration nor for fees). These data are provided here and each reader can re-compute and check the calculation of these impact factors. Therefore, we call our impact factor Transparent Impact Factor.

For the calculation of the Impact Factor of an year Y we need the number A of articles published in the years Y-1 and Y-2 (excluding editorials). Furthemore, we determine the number of citations B in the year Y, which cite articles of RonPub published in the years Y-1 or Y-2. The (2-Years) Transparent Impact Factor is then determined by B/A.

There are A := 52 articles published in the years 2017 and 2018. These articles received B := 81 citations in scientific contributions published in 2019. These citations are listed below.

Therefore, the (2-Years) Transparent Impact Factor for the year 2019 is B/A = 1.56

References

  1. Björn Brembs, Katherine Button and Marcus Munafò. Deep impact: Unintended consequences of journal rank. Frontiers in Human Neuroscience, 7 (291): 1–12, 2013.
  2. Ewen Callaway. Beat it, impact factor! Publishing elite turns against controversial metric. Nature, 535 (7611): 210–211, 2016.
  3. Masood Fooladi, Hadi Salehi, Melor Md Yunus, Maryam Farhadi, Arezoo Aghaei Chadegani, Hadi Farhadi, Nader Ale Ebrahim. Does Criticisms Overcome the Praises of Journal Impact Factor? Asian Social Science, 9 (5), 2013.
  4. German Research Foundation, "Quality not Quantity" – DFG Adopts Rules to Counter the Flood of Publications in Research, Press Release No. 7, 2010.
  5. Khaled Moustafa. The disaster of the impact factor. Science and Engineering Ethics, 21 (1): 139–142, 2015.
  6. Mike Rossner, Heather Van Epps, Emma Hill. Show me the data. Journal of Cell Biology, 179 (6): 1091–2, 2007.
  7. Science and Technology Committee, Scientific Publications: Free for all? Tenth Report of the Science and Technology Committee of the House of Commons, 2004.
  8. Maarten van Wesel. Evaluation by Citation: Trends in Publication Behavior, Evaluation Criteria, and the Strive for High Impact Publications. Science and Engineering Ethics, 22 (1): 199–225, 2016.
  9. Time to remodel the journal impact factor. Nature, 535 (466), 2016.

Citations

This list of citations may not be complete. Please contact us, if citations are missing. There might be errors in the citation data due to automatic processing.

 Open Access 

An NVM Aware MariaDB Database System and Associated IO Workload on File Systems

Jan Lindström, Dhananjoy Das, Nick Piggin, Santhosh Konundinya, Torben Mathiasen, Nisha Talagala, Dulcardo Arteaga

Open Journal of Databases (OJDB), 4(1), Pages 1-21, 2017, Downloads: 7194

Full-Text: pdf | URN: urn:nbn:de:101:1-201705194662 | GNL-LP: 1132360927 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: MariaDB is a community-developed fork of the MySQL relational database management system and originally designed and implemented in order to use the traditional spinning disk architecture. With Non-Volatile memory (NVM) technology now in the forefront and main stream for server storage (Data centers), MariaDB addresses the need by adding support for NVM devices and introduces NVM Compression method. NVM Compression is a novel hybrid technique that combines application level compression with flash awareness for optimal performance and storage efficiency. Utilizing new interface primitives exported by Flash Translation Layers (FTLs), we leverage the garbage collection available in flash devices to optimize the capacity management required by compression systems. We implement NVM Compression in the popular MariaDB database and use variants of commonly available POSIX file system interfaces to provide the extended FTL capabilities to the user space application. The experimental results show that the hybrid approach of NVM Compression can improve compression performance by 2-7x, deliver compression performance for flash devices that is within 5% of uncompressed performance, improve storage efficiency by 19% over legacy Row-Compression, reduce data writes by up to 4x when combined with other flash aware techniques such as Atomic Writes, and deliver further advantages in power efficiency and CPU utilization. Various micro benchmark measurement and findings on sparse files call for required improvement in file systems for handling of punch hole operations on files.

BibTex:

    @Article{OJDB_2017v4i1n01_Lindstroem,
        title     = {An NVM Aware MariaDB Database System and Associated IO Workload on File Systems},
        author    = {Jan Lindstr\~{A}m and
                     Dhananjoy Das and
                     Nick Piggin and
                     Santhosh Konundinya and
                     Torben Mathiasen and
                     Nisha Talagala and
                     Dulcardo Arteaga},
        journal   = {Open Journal of Databases (OJDB)},
        issn      = {2199-3459},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {1--21},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201705194662},
        urn       = {urn:nbn:de:101:1-201705194662},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {MariaDB is a community-developed fork of the MySQL relational database management system and originally designed and implemented in order to use the traditional spinning disk architecture. With Non-Volatile memory (NVM) technology now in the forefront and main stream for server storage (Data centers), MariaDB addresses the need by adding support for NVM devices and introduces NVM Compression method. NVM Compression is a novel hybrid technique that combines application level compression with flash awareness for optimal performance and storage efficiency. Utilizing new interface primitives exported by Flash Translation Layers (FTLs), we leverage the garbage collection available in flash devices to optimize the capacity management required by compression systems. We implement NVM Compression in the popular MariaDB database and use variants of commonly available POSIX file system interfaces to provide the extended FTL capabilities to the user space application. The experimental results show that the hybrid approach of NVM Compression can improve compression performance by 2-7x, deliver compression performance for flash devices that is within 5\% of uncompressed performance, improve storage efficiency by 19\% over legacy Row-Compression, reduce data writes by up to 4x when combined with other flash aware techniques such as Atomic Writes, and deliver further advantages in power efficiency and CPU utilization. Various micro benchmark measurement and findings on sparse files call for required improvement in file systems for handling of punch hole operations on files.}
    }
0 citations in 2019

 Open Access 

Assessing and Improving Domain Knowledge Representation in DBpedia

Ludovic Font, Amal Zouaq, Michel Gagnon

Open Journal of Semantic Web (OJSW), 4(1), Pages 1-19, 2017, Downloads: 7583

Full-Text: pdf | URN: urn:nbn:de:101:1-201705194949 | GNL-LP: 1132361354 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: With the development of knowledge graphs and the billions of triples generated on the Linked Data cloud, it is paramount to ensure the quality of data. In this work, we focus on one of the central hubs of the Linked Data cloud, DBpedia. In particular, we assess the quality of DBpedia for domain knowledge representation. Our results show that DBpedia has still much room for improvement in this regard, especially for the description of concepts and their linkage with the DBpedia ontology. Based on this analysis, we leverage open relation extraction and the information already available on DBpedia to partly correct the issue, by providing novel relations extracted from Wikipedia abstracts and discovering entity types using the dbo:type predicate. Our results show that open relation extraction can indeed help enrich domain knowledge representation in DBpedia.

BibTex:

    @Article{OJSW_2017v4i1n01_Font,
        title     = {Assessing and Improving Domain Knowledge Representation in DBpedia},
        author    = {Ludovic Font and
                     Amal Zouaq and
                     Michel Gagnon},
        journal   = {Open Journal of Semantic Web (OJSW)},
        issn      = {2199-336X},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {1--19},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201705194949},
        urn       = {urn:nbn:de:101:1-201705194949},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {With the development of knowledge graphs and the billions of triples generated on the Linked Data cloud, it is paramount to ensure the quality of data. In this work, we focus on one of the central hubs of the Linked Data cloud, DBpedia. In particular, we assess the quality of DBpedia for domain knowledge representation. Our results show that DBpedia has still much room for improvement in this regard, especially for the description of concepts and their linkage with the DBpedia ontology. Based on this analysis, we leverage open relation extraction and the information already available on DBpedia to partly correct the issue, by providing novel relations extracted from Wikipedia abstracts and discovering entity types using the dbo:type predicate. Our results show that open relation extraction can indeed help enrich domain knowledge representation in DBpedia.}
    }
0 citations in 2019

 Open Access 

A Classification Framework for Beacon Applications

Gottfried Vossen, Stuart Dillon, Fabian Schomm, Florian Stahl

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 1-11, 2017, Downloads: 5250, Citations: 3

Full-Text: pdf | URN: urn:nbn:de:101:1-201704245012 | GNL-LP: 1130624145 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Beacons have received considerable attention in recent years, which is partially due to the fact that they serve as a flexible and versatile replacement for RFIDs in many applications. However, beacons are mostly considered from a purely technical perspective. This paper provides a conceptual view on application scenarios for beacons and introduces a novel framework for characterizing these. The framework consists of four dimensions: device movement, action trigger, purpose type, and connectivity requirements. Based on these, three archetypical scenarios are described. Finally, event-condition-action rules and online algorithms are used to formalize the backend of a beacon architecture.

BibTex:

    @Article{OJIOT_2017v3i1n01_Vossen,
        title     = {A Classification Framework for Beacon Applications},
        author    = {Gottfried Vossen and
                     Stuart Dillon and
                     Fabian Schomm and
                     Florian Stahl},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {1--11},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201704245012},
        urn       = {urn:nbn:de:101:1-201704245012},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Beacons have received considerable attention in recent years, which is partially due to the fact that they serve as a flexible and versatile replacement for RFIDs in many applications. However, beacons are mostly considered from a purely technical perspective. This paper provides a conceptual view on application scenarios for beacons and introduces a novel framework for characterizing these. The framework consists of four dimensions: device movement, action trigger, purpose type, and connectivity requirements. Based on these, three archetypical scenarios are described. Finally, event-condition-action rules and online algorithms are used to formalize the backend of a beacon architecture.}
    }
1 citation in 2019:

Indoor navigation systems based on data mining techniques in internet of things: a survey

Mahbubeh Sattarian, Javad Rezazadeh, Reza Farahbakhsh, Alireza Bagheri

Wireless Networks, 25(3), Pages 1385-1402, 2019.

 Open Access 

The mf-index: A Citation-Based Multiple Factor Index to Evaluate and Compare the Output of Scientists

Eric Oberesch, Sven Groppe

Open Journal of Web Technologies (OJWT), 4(1), Pages 1-32, 2017, Downloads: 4784, Citations: 4

Full-Text: pdf | URN: urn:nbn:de:101:1-2017070914565 | GNL-LP: 1136555501 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Comparing the output of scientists as objective as possible is an important factor for, e.g., the approval of research funds or the filling of open positions at universities. Numeric indices, which express the scientific output in the form of a concrete value, may not completely supersede an overall view of a researcher, but provide helpful indications for the assessment. This work introduces the most important citation-based indices, analyzes their advantages and disadvantages and provides an overview of the aspects considered by them. On this basis, we identify the criteria that an advanced index should fulfill, and develop a new index, the mf-index. The objective of the mf-index is to combine the benefits of the existing indices, while avoiding as far as possible their drawbacks and to consider additional aspects. Finally, an evaluation based on data of real publications and citations compares the mf-index with existing indices and verifies that its advantages in theory can also be determined in practice.

BibTex:

    @Article{OJWT_2017v4i1n01_Oberesch,
        title     = {The mf-index: A Citation-Based Multiple Factor Index to Evaluate and Compare the Output of Scientists},
        author    = {Eric Oberesch and
                     Sven Groppe},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {1--32},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017070914565},
        urn       = {urn:nbn:de:101:1-2017070914565},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Comparing the output of scientists as objective as possible is an important factor for, e.g., the approval of research funds or the filling of open positions at universities. Numeric indices, which express the scientific output in the form of a concrete value, may not completely supersede an overall view of a researcher, but provide helpful indications for the assessment. This work introduces the most important citation-based indices, analyzes their advantages and disadvantages and provides an overview of the aspects considered by them. On this basis, we identify the criteria that an advanced index should fulfill, and develop a new index, the mf-index. The objective of the mf-index is to combine the benefits of the existing indices, while avoiding as far as possible their drawbacks and to consider additional aspects. Finally, an evaluation based on data of real publications and citations compares the mf-index with existing indices and verifies that its advantages in theory can also be determined in practice.}
    }
1 citation in 2019:

The Study on the Essence of H-index and Its Derivative Indices

Tian-Long Fan, Lin-Yan Lü

Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 48(1), Pages 142-149, 2019.

 Open Access 

Mitigating Radio Interference in Large IoT Networks through Dynamic CCA Adjustment

Tommy Sparber, Carlo Alberto Boano, Salil S. Kanhere, Kay Römer

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 103-113, 2017, Downloads: 7642, Citations: 11

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613511 | GNL-LP: 113782025X | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The performance of low-power wireless sensor networks used to build Internet of Things applications often suffers from radio interference generated by co-located wireless devices or from jammers maliciously placed in their proximity. As IoT devices typically operate in unsupervised large-scale installations, and as radio interference is typically localized and hence affects only a portion of the nodes in the network, it is important to give low-power wireless sensors and actuators the ability to autonomously mitigate the impact of surrounding interference. In this paper we present our approach DynCCA, which dynamically adapts the clear channel assessment threshold of IoT devices to minimize the impact of malicious or unintentional interference on both network reliability and energy efficiency. First, we describe how varying the clear channel assessment threshold at run-time using only information computed locally can help to minimize the impact of unintentional interference from surrounding devices and to escape jamming attacks. We then present the design and implementation of DynCCA on top of ContikiMAC and evaluate its performance on wireless sensor nodes equipped with IEEE 802.15.4 radios. Our experimental investigation shows that the use of DynCCA in dense IoT networks can increase the packet reception rate by up to 50% and reduce the energy consumption by a factor of 4.

BibTex:

    @Article{OJIOT_2017v3i1n09_Sparber,
        title     = {Mitigating Radio Interference in Large IoT Networks through Dynamic CCA Adjustment},
        author    = {Tommy Sparber and
                     Carlo Alberto Boano and
                     Salil S. Kanhere and
                     Kay R\~{A}mer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {103--113},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613511},
        urn       = {urn:nbn:de:101:1-2017080613511},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The performance of low-power wireless sensor networks used to build Internet of Things applications often suffers from radio interference generated by co-located wireless devices or from jammers maliciously placed in their proximity. As IoT devices typically operate in unsupervised large-scale installations, and as radio interference is typically localized and hence affects only a portion of the nodes in the network, it is important to give low-power wireless sensors and actuators the ability to autonomously mitigate the impact of surrounding interference. In this paper we present our approach DynCCA, which dynamically adapts the clear channel assessment threshold of IoT devices to minimize the impact of malicious or unintentional interference on both network reliability and energy efficiency. First, we describe how varying the clear channel assessment threshold at run-time using only information computed locally can help to minimize the impact of unintentional interference from surrounding devices and to escape jamming attacks. We then present the design and implementation of DynCCA on top of ContikiMAC and evaluate its performance on wireless sensor nodes equipped with IEEE 802.15.4 radios. Our experimental investigation shows that the use of DynCCA in dense IoT networks can increase the packet reception rate by up to 50\% and reduce the energy consumption by a factor of 4.}
    }
2 citations in 2019:

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan

International Journal of Advanced Computer Research, 9(45), Pages 325-350, 2019.

Cross-technology Clear Channel Assessment for Low-Power Wide Area Networks

Charalampos Orfanidis, Laura Marie Feeney, Martin Jacobsson, Per Gunningberg

In The 16th IEEE International Conference on Mobile Ad-Hoc and Smart Systems, 2019.

 Open Access 

Sensing as a Service: Secure Wireless Sensor Network Infrastructure Sharing for the Internet of Things

Cintia B. Margi, Renan C. A. Alves, Johanna Sepulveda

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 91-102, 2017, Downloads: 6356, Citations: 9

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613467 | GNL-LP: 1137820209 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Internet of Things (IoT) andWireless Sensor Networks (WSN) are composed of devices capable of sensing/actuation, communication and processing. They are valuable technology for the development of applications in several areas, such as environmental, industrial and urban monitoring and processes controlling. Given the challenges of different protocols and technologies used for communication, resource constrained devices nature, high connectivity and security requirements for the applications, the main challenges that need to be addressed include: secure communication between IoT devices, network resource management and the protected implementation of the security mechanisms. In this paper, we present a secure Software-Defined Networking (SDN) based framework that includes: communication protocols, node task programming middleware, communication and computation resource management features and security services. The communication layer for the constrained devices considers IT-SDN as its basis. Concerning security, we address the main services, the type of algorithms to achieve them, and why their secure implementation is needed. Lastly, we showcase how the Sensing as a Service paradigm could enable WSN usage in more environments.

BibTex:

    @Article{OJIOT_2017v3i1n08_Margi,
        title     = {Sensing as a Service: Secure Wireless Sensor Network Infrastructure Sharing for the Internet of Things},
        author    = {Cintia B. Margi and
                     Renan C. A. Alves and
                     Johanna Sepulveda},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {91--102},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613467},
        urn       = {urn:nbn:de:101:1-2017080613467},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Internet of Things (IoT) andWireless Sensor Networks (WSN) are composed of devices capable of sensing/actuation, communication and processing. They are valuable technology for the development of applications in several areas, such as environmental, industrial and urban monitoring and processes controlling. Given the challenges of different protocols and technologies used for communication, resource constrained devices nature, high connectivity and security requirements for the applications, the main challenges that need to be addressed include: secure communication between IoT devices, network resource management and the protected implementation of the security mechanisms. In this paper, we present a secure Software-Defined Networking (SDN) based framework that includes: communication protocols, node task programming middleware, communication and computation resource management features and security services. The communication layer for the constrained devices considers IT-SDN as its basis. Concerning security, we address the main services, the type of algorithms to achieve them, and why their secure implementation is needed. Lastly, we showcase how the Sensing as a Service paradigm could enable WSN usage in more environments.}
    }
4 citations in 2019:

A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication

Michael Heigl, Martin Schramm, Dalibor Fiala

In IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops, Kyoto, Japan, Pages 906-911, 2019.

In-network performance measurements for Software Defined Wireless Sensor Networks

Thamires C. Luz, Gustavo A. Nunez Segura, Cntia B. Margi, Fbio Luciano Verdi

In 16th IEEE International Conference on Networking, Sensing and Control (ICNSC), Banff, AB, Canada, Pages 206-211, 2019.

On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks

Michael Heigl, Laurin Doerr, Martin Schramm, Dalibor Fiala

In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,, Pages 72-83, 2019.

The Cost of Software-Defining Things: A Scalability Study of Software-Defined Sensor Networks

Renan C. A. Alves, Doriedson A. G. Oliveira, Gustavo A. Nunez Segura, Cintia B. Margi

IEEE Access, 7, Pages 115093-115108, 2019.

 Open Access 

Multi-Layer Cross Domain Reasoning over Distributed Autonomous IoT Applications

Muhammad Intizar Ali, Pankesh Patel, Soumya Kanti Datta, Amelie Gyrard

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 75-90, 2017, Downloads: 8681, Citations: 5

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613451 | GNL-LP: 1137820195 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Due to the rapid advancements in the sensor technologies and IoT, we are witnessing a rapid growth in the use of sensors and relevant IoT applications. A very large number of sensors and IoT devices are in place in our surroundings which keep sensing dynamic contextual information. A true potential of the wide-spread of IoT devices can only be realized by designing and deploying a large number of smart IoT applications which can provide insights on the data collected from IoT devices and support decision making by converting raw sensor data into actionable knowledge. However, the process of getting value from sensor data streams and converting these raw sensor values into actionable knowledge requires extensive efforts from IoT application developers and domain experts. In this paper, our main aim is to propose a multi-layer cross domain reasoning framework, which can support application developers, end-users and domain experts to automatically understand relevant events and extract actionable knowledge with minimal efforts. Our framework reduces the efforts required for IoT applications development (i) by supporting automated application code generation and access mechanisms using IoTSuite, (ii) by leveraging from Machine-to-Machine Measurement (M3) framework to exploit semantic technologies and domain knowledge, and (iii) by using automated sensor discovery and complex event processing of relevant events (ACEIS Middleware) at the multiple data processing layers and different stages of the IoT application development life cycle. In the essence, our framework supports the end-users and IoT application developers to design innovative IoT applications by reducing the programming efforts, by identifying relevant events and by suggesting potential actions based on complex event processing and reasoning for cross-domain IoT applications.

BibTex:

    @Article{OJIOT_2017v3i1n07_Ali,
        title     = {Multi-Layer Cross Domain Reasoning over Distributed Autonomous IoT Applications},
        author    = {Muhammad Intizar Ali and
                     Pankesh Patel and
                     Soumya Kanti Datta and
                     Amelie Gyrard},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {75--90},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613451},
        urn       = {urn:nbn:de:101:1-2017080613451},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Due to the rapid advancements in the sensor technologies and IoT, we are witnessing a rapid growth in the use of sensors and relevant IoT applications. A very large number of sensors and IoT devices are in place in our surroundings which keep sensing dynamic contextual information. A true potential of the wide-spread of IoT devices can only be realized by designing and deploying a large number of smart IoT applications which can provide insights on the data collected from IoT devices and support decision making by converting raw sensor data into actionable knowledge. However, the process of getting value from sensor data streams and converting these raw sensor values into actionable knowledge requires extensive efforts from IoT application developers and domain experts. In this paper, our main aim is to propose a multi-layer cross domain reasoning framework, which can support application developers, end-users and domain experts to automatically understand relevant events and extract actionable knowledge with minimal efforts. Our framework reduces the efforts required for IoT applications development (i) by supporting automated application code generation and access mechanisms using IoTSuite, (ii) by leveraging from Machine-to-Machine Measurement (M3) framework to exploit semantic technologies and domain knowledge, and (iii) by using automated sensor discovery and complex event processing of relevant events (ACEIS Middleware) at the multiple data processing layers and different stages of the IoT application development life cycle. In the essence, our framework supports the end-users and IoT application developers to design innovative IoT applications by reducing the programming efforts, by identifying relevant events and by suggesting potential actions based on complex event processing and reasoning for cross-domain IoT applications.}
    }
2 citations in 2019:

Object (B)logging: a Decentralized Cognitive Paradigm for the Industrial Internet of Things

G. Capurso, M. Ruta, E. D. Sciascio

In IEEE International Conference on Systems, Man and Cybernetics (SMC), Pages 2518-2523, 2019.

A Context-Aware Fog Enabled Scheme for Real-Time Cross-Vertical IoT Applications.

Diptendu Sinha Roy, Ranjit Kumar Behera, K. Hemant Kumar Reddy, Rajkumar Buyya

IEEE Internet of Things Journal, 6(2), Pages 2400-2412, 2019.

 Open Access 

Rewriting Complex Queries from Cloud to Fog under Capability Constraints to Protect the Users' Privacy

Hannes Grunert, Andreas Heuer

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 31-45, 2017, Downloads: 5019, Citations: 4

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613421 | GNL-LP: 1137820160 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we show how existing query rewriting and query containment techniques can be used to achieve an efficient and privacy-aware processing of queries. To achieve this, the whole network structure, from data producing sensors up to cloud computers, is utilized to create a database machine consisting of billions of devices from the Internet of Things. Based on previous research in the field of database theory, especially query rewriting, we present a concept to split a query into fragment and remainder queries. Fragment queries can operate on resource limited devices to filter and preaggregate data. Remainder queries take these data and execute the last, complex part of the original queries on more powerful devices. As a result, less data is processed and forwarded in the network and the privacy principle of data minimization is accomplished.

BibTex:

    @Article{OJIOT_2017v3i1n04_Grunert,
        title     = {Rewriting Complex Queries from Cloud to Fog under Capability Constraints to Protect the Users' Privacy},
        author    = {Hannes Grunert and
                     Andreas Heuer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {31--45},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613421},
        urn       = {urn:nbn:de:101:1-2017080613421},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we show how existing query rewriting and query containment techniques can be used to achieve an efficient and privacy-aware processing of queries. To achieve this, the whole network structure, from data producing sensors up to cloud computers, is utilized to create a database machine consisting of billions of devices from the Internet of Things. Based on previous research in the field of database theory, especially query rewriting, we present a concept to split a query into fragment and remainder queries. Fragment queries can operate on resource limited devices to filter and preaggregate data. Remainder queries take these data and execute the last, complex part of the original queries on more powerful devices. As a result, less data is processed and forwarded in the network and the privacy principle of data minimization is accomplished.}
    }
0 citation in 2019

 Open Access 

Semantic Blockchain to Improve Scalability in the Internet of Things

Michele Ruta, Floriano Scioscia, Saverio Ieva, Giovanna Capurso, Eugenio Di Sciascio

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 46-61, 2017, Downloads: 13751, Citations: 48

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613488 | GNL-LP: 1137820225 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Generally scarce computational and memory resource availability is a well known problem for the IoT, whose intrinsic volatility makes complex applications unfeasible. Noteworthy efforts in overcoming unpredictability (particularly in case of large dimensions) are the ones integrating Knowledge Representation technologies to build the so-called Semantic Web of Things (SWoT). In spite of allowed advanced discovery features, transactions in the SWoT still suffer from not viable trust management strategies. Given its intrinsic characteristics, blockchain technology appears as interesting from this perspective: a semantic resource/service discovery layer built upon a basic blockchain infrastructure gains a consensus validation. This paper proposes a novel Service-Oriented Architecture (SOA) based on a semantic blockchain for registration, discovery, selection and payment. Such operations are implemented as smart contracts, allowing distributed execution and trust. Reported experiments early assess the sustainability of the proposal.

BibTex:

    @Article{OJIOT_2017v3i1n05_Ruta,
        title     = {Semantic Blockchain to Improve Scalability in the Internet of Things},
        author    = {Michele Ruta and
                     Floriano Scioscia and
                     Saverio Ieva and
                     Giovanna Capurso and
                     Eugenio Di Sciascio},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {46--61},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613488},
        urn       = {urn:nbn:de:101:1-2017080613488},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Generally scarce computational and memory resource availability is a well known problem for the IoT, whose intrinsic volatility makes complex applications unfeasible. Noteworthy efforts in overcoming unpredictability (particularly in case of large dimensions) are the ones integrating Knowledge Representation technologies to build the so-called Semantic Web of Things (SWoT). In spite of allowed advanced discovery features, transactions in the SWoT still suffer from not viable trust management strategies. Given its intrinsic characteristics, blockchain technology appears as interesting from this perspective: a semantic resource/service discovery layer built upon a basic blockchain infrastructure gains a consensus validation. This paper proposes a novel Service-Oriented Architecture (SOA) based on a semantic blockchain for registration, discovery, selection and payment. Such operations are implemented as smart contracts, allowing distributed execution and trust. Reported experiments early assess the sustainability of the proposal.}
    }
14 citations in 2019:

Blockchains for Smart Cities: A Survey

Ahmed G. Ghandour, Mohamed Elhoseny, Aboul Ella Hassanien

In Security in Smart Cities: Models, Applications, and Challenges, Pages 193-210, 2019.

Pruneable sharding-based blockchain protocol

Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang, Hui Li

Peer-to-Peer Networking and Applications, 12, Pages 934-950, 2019.

A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond.

Mingli Wu, Kun Wang, Xiaoqin Cai, Song Guo, Minyi Guo, Chunming Rong

IEEE Internet of Things Journal, 6(5), Pages 8114-8154, 2019.

Blockchain Technology for Applications in Internet of Things—Mapping From System Design Perspective

W. Viriyasitavat, L. D. Xu, Z. Bi, D. Hoonsopon

IEEE Internet of Things Journal, 6(5), Pages 8155-8168, 2019.

Applying the Concept of Knowledge Blockchains to Ontologies.

Hans-Georg Fill

In AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering, 2019.

Knowledge Graph-Enhanced Blockchains by Integrating a Graph-Data Service-Layer

B. A. Naim, W. Klas

In Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Pages 420-427, 2019.

Analysis of Blockchain Solutions for IoT: A Systematic Literature Review

Sin Kuang Lo, Yue Liu, Su Yen Chia, Xiwei Xu, Qinghua Lu, Liming Zhu, Huansheng Ning

IEEE Access, 7, Pages 58822-58835, 2019.

A Comparative Analysis of Blockchain Architecture and its Applications: Problems and Recommendations

T. Ali Syed, A. Alzahrani, S. Jan, M. S. Siddiqui, A. Nadeem, T. Alghamdi

IEEE Access, 7(), Pages 176838-176869, 2019.

Towards Blockchain and Semantic Web

Juan Cano-Benito, Andrea Cimmino, Ral Garca-Castro

In Business Information Systems Workshops - BIS International Workshops, Seville, Spain, Revised Papers, Pages 220-231, 2019.

Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review

B. Alotaibi

IEEE Sensors Journal, 19(23), Pages 10953-10971, 2019.

Advancements towards Global IoT Device Discovery and Integration

Anas Dawod, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ampalavanapillai Nirmalathas

In IEEE International Congress on Internet of Things (ICIOT), Milan, Italy, Pages 147-155, 2019.

Oficina domótica semántica usando tecnología blockchain

Juan Cano de Benito

2019. Master thesis, Universidad Politécnica de Madrid

Análisis del consumo de energía promedio en dispositivos IoT de baja potencia con Blockchain como solución de seguridad

Fattori de Andrade Ana Claudia

2019. Master thesis, Pontificia Universidad Javeriana

A Global IoT Device Discovery and Integration Vision

Dimitrios Georgakopoulos

In 5th IEEE International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, Pages 214-221, 2019.

 Open Access 

Differentially Private Linear Models for Gossip Learning through Data Perturbation

István Hegedus, Márk Jelasity

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 62-74, 2017, Downloads: 4147, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613445 | GNL-LP: 1137820187 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Privacy is a key concern in many distributed systems that are rich in personal data such as networks of smart meters or smartphones. Decentralizing the processing of personal data in such systems is a promising first step towards achieving privacy through avoiding the collection of data altogether. However, decentralization in itself is not enough: Additional guarantees such as differential privacy are highly desirable. Here, we focus on stochastic gradient descent (SGD), a popular approach to implement distributed learning. Our goal is to design differentially private variants of SGD to be applied in gossip learning, a decentralized learning framework. Known approaches that are suitable for our scenario focus on protecting the gradient that is being computed in each iteration of SGD. This has the drawback that each data point can be accessed only a small number of times. We propose a solution in which we effectively publish the entire database in a differentially private way so that linear learners could be run that are allowed to access any (perturbed) data point any number of times. This flexibility is very useful when using the method in combination with distributed learning environments. We show empirically that the performance of the obtained model is comparable to that of previous gradient-based approaches and it is even superior in certain scenarios.

BibTex:

    @Article{OJIOT_2017v3i1n06_Hegedus,
        title     = {Differentially Private Linear Models for Gossip Learning through Data Perturbation},
        author    = {Istv\~{A}n Hegedus and
                     M\~{A}rk Jelasity},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {62--74},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613445},
        urn       = {urn:nbn:de:101:1-2017080613445},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Privacy is a key concern in many distributed systems that are rich in personal data such as networks of smart meters or smartphones. Decentralizing the processing of personal data in such systems is a promising first step towards achieving privacy through avoiding the collection of data altogether. However, decentralization in itself is not enough: Additional guarantees such as differential privacy are highly desirable. Here, we focus on stochastic gradient descent (SGD), a popular approach to implement distributed learning. Our goal is to design differentially private variants of SGD to be applied in gossip learning, a decentralized learning framework. Known approaches that are suitable for our scenario focus on protecting the gradient that is being computed in each iteration of SGD. This has the drawback that each data point can be accessed only a small number of times. We propose a solution in which we effectively publish the entire database in a differentially private way so that linear learners could be run that are allowed to access any (perturbed) data point any number of times. This flexibility is very useful when using the method in combination with distributed learning environments. We show empirically that the performance of the obtained model is comparable to that of previous gradient-based approaches and it is even superior in certain scenarios.}
    }
0 citation in 2019

 Open Access 

Latency Optimization in Large-Scale Cloud-Sensor Systems

Adhithya Balasubramanian, Sumi Helal, Yi Xu

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 18-30, 2017, Downloads: 4116, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613410 | GNL-LP: 1137820152 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: With the advent of the Internet of Things and smart city applications, massive cyber-physical interactions between the applications hosted in the cloud and a huge number of external physical sensors and devices is an inevitable situation. This raises two main challenges: cloud cost affordability as the smart city grows (referred to as economical cloud scalability) and the energy-efficient operation of sensor hardware. We have developed Cloud-Edge-Beneath (CEB), a multi-tier architecture for large-scale IoT deployments, embodying distributed optimizations, which address these two major challenges. In this article, we summarize our prior work on CEB to set context for presenting a third major challenge for cloud sensor-systems, which is latency. Prolonged latency can potentially arise in servicing requests from cloud applications, especially given our primary focus on optimizing energy and cloud scalability. Latency, however, is an important factor to optimize for real-time and cyber-physical applications with limited tolerance to delays. Also, improving the responsiveness of any IoT application is bound to improve the user experience and hence the acceptability and adoption of smart city solutions by the city citizens. In this article, we aim to give a formal definition and formulation for the latency optimization problem under CEB. We propose a Prioritized Application Fragment Caching Algorithm (PAFCA) to selectively cache application fragments from the cloud to lower layers of CEB, as a key measure to optimize latency. The algorithm itself is an extension of one of the existing optimization algorithms of CEB (AFCA-1). As will be shown, PAFCA takes into account the expectations of cloud applications on real-timeliness of responses. Through experiments, we measure and validate the effect of PAFCA on latency and cloud scalability. We also introduce and discuss the trade-off between latency and sensor energy in this given context.

BibTex:

    @Article{OJIOT_2017v3i1n03_Balasubramanian,
        title     = {Latency Optimization in Large-Scale Cloud-Sensor Systems},
        author    = {Adhithya Balasubramanian and
                     Sumi Helal and
                     Yi Xu},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {18--30},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613410},
        urn       = {urn:nbn:de:101:1-2017080613410},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {With the advent of the Internet of Things and smart city applications, massive cyber-physical interactions between the applications hosted in the cloud and a huge number of external physical sensors and devices is an inevitable situation. This raises two main challenges: cloud cost affordability as the smart city grows (referred to as economical cloud scalability) and the energy-efficient operation of sensor hardware. We have developed Cloud-Edge-Beneath (CEB), a multi-tier architecture for large-scale IoT deployments, embodying distributed optimizations, which address these two major challenges. In this article, we summarize our prior work on CEB to set context for presenting a third major challenge for cloud sensor-systems, which is latency. Prolonged latency can potentially arise in servicing requests from cloud applications, especially given our primary focus on optimizing energy and cloud scalability. Latency, however, is an important factor to optimize for real-time and cyber-physical applications with limited tolerance to delays. Also, improving the responsiveness of any IoT application is bound to improve the user experience and hence the acceptability and adoption of smart city solutions by the city citizens. In this article, we aim to give a formal definition and formulation for the latency optimization problem under CEB. We propose a Prioritized Application Fragment Caching Algorithm (PAFCA) to selectively cache application fragments from the cloud to lower layers of CEB, as a key measure to optimize latency. The algorithm itself is an extension of one of the existing optimization algorithms of CEB (AFCA-1). As will be shown, PAFCA takes into account the expectations of cloud applications on real-timeliness of responses. Through experiments, we measure and validate the effect of PAFCA on latency and cloud scalability. We also introduce and discuss the trade-off between latency and sensor energy in this given context.}
    }
0 citation in 2019

 Open Access 

Data Credence in IoT: Vision and Challenges

Vladimir I. Zadorozhny, Prashant Krishnamurthy, Mai Abdelhakim, Konstantinos Pelechrinis, Jiawei Xu

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 114-126, 2017, Downloads: 5627, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613498 | GNL-LP: 1137820233 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: As the Internet of Things permeates every aspect of human life, assessing the credence or integrity of the data generated by "things" becomes a central exercise for making decisions or in auditing events. In this paper, we present a vision of this exercise that includes the notion of data credence, assessing data credence in an efficient manner, and the use of technologies that are on the horizon for the very large scale Internet of Things.

BibTex:

    @Article{OJIOT_2017v3i1n10_Zadorozhny,
        title     = {Data Credence in IoT: Vision and Challenges},
        author    = {Vladimir I. Zadorozhny and
                     Prashant Krishnamurthy and
                     Mai Abdelhakim and
                     Konstantinos Pelechrinis and
                     Jiawei Xu},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {114--126},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613498},
        urn       = {urn:nbn:de:101:1-2017080613498},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {As the Internet of Things permeates every aspect of human life, assessing the credence or integrity of the data generated by "things" becomes a central exercise for making decisions or in auditing events. In this paper, we present a vision of this exercise that includes the notion of data credence, assessing data credence in an efficient manner, and the use of technologies that are on the horizon for the very large scale Internet of Things.}
    }
0 citation in 2019

 Open Access 

A Highly Scalable IoT Architecture through Network Function Virtualization

Igor Miladinovic, Sigrid Schefer-Wenzl

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 127-135, 2017, Downloads: 7426, Citations: 22

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613543 | GNL-LP: 1137820284 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: As the number of devices for Internet of Things (IoT) is rapidly growing, existing communication infrastructures are forced to continually evolve. The next generation network infrastructure is expected to be virtualized and able to integrate different kinds of information technology resources. Network Functions Virtualization (NFV) is one of the leading concepts facilitating the operation of network services in a scalable manner. In this paper, we present an architecture involving NFV to meet the requirements of highly scalable IoT scenarios. We highlight the benefits and challenges of our approach for IoT stakeholders. Finally, the paper illustrates our vision of how the proposed architecture can be applied in the context of a state-of-the-art high-tech operating room, which we are going to realize in future work.

BibTex:

    @Article{OJIOT_2017v3i1n11_Miladinovic,
        title     = {A Highly Scalable IoT Architecture through Network Function Virtualization},
        author    = {Igor Miladinovic and
                     Sigrid Schefer-Wenzl},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {127--135},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613543},
        urn       = {urn:nbn:de:101:1-2017080613543},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {As the number of devices for Internet of Things (IoT) is rapidly growing, existing communication infrastructures are forced to continually evolve. The next generation network infrastructure is expected to be virtualized and able to integrate different kinds of information technology resources. Network Functions Virtualization (NFV) is one of the leading concepts facilitating the operation of network services in a scalable manner. In this paper, we present an architecture involving NFV to meet the requirements of highly scalable IoT scenarios. We highlight the benefits and challenges of our approach for IoT stakeholders. Finally, the paper illustrates our vision of how the proposed architecture can be applied in the context of a state-of-the-art high-tech operating room, which we are going to realize in future work.}
    }
6 citations in 2019:

A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems.

Ivan Farris, Tarik Taleb, Yacine Khettab, JaeSeung Song

IEEE Communications Surveys and Tutorials, 21(1), Pages 812-837, 2019.

A Survey on Securing IoT Architecture through Modern Techniques

Nithyashree CM, Sandeep Varma N

Available at SSRN 3508615, 2019.

Scalable IoT/M2M Platforms Based on Kubernetes-Enabled NFV MANO Architecture

Hung-Li Chen, Fuchun Joseph Lin

In International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2019, Atlanta, GA, USA, Pages 1106-1111, 2019.

Curriculum of a Telecommunications Study Program - A Matter of Trends?

I. Miladinovic, S. Schefer-Wenzl, H. Hirner

In 2019 15th International Conference on Telecommunications (ConTEL), Pages 1-6, 2019.

IoT Architecture for Smart Cities Leveraging Machine Learning and SDN

Igor Miladinovic, Sigrid Schefer-Wenzl, Heimo Hirner

In 27th Telecommunications Forum (TELFOR), Pages 1-4, 2019.

Towards Intelligent Multi-Access Edge Computing Using Machine Learning.

Igor Miladinovic, Sigrid Schefer-Wenzl

In Proceedings of the 13th Conference on Internet of Things, Infrastructures and Mobile Applications (IMCL), Thessaloniki, Greece, Pages 1109-1117, 2019.

 Open Access 

Towards a Model-driven Performance Prediction Approach for Internet of Things Architectures

Johannes Kroß, Sebastian Voss, Helmut Krcmar

Open Journal of Internet Of Things (OJIOT), 3(1), Pages 136-141, 2017, Downloads: 5145, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2017080613524 | GNL-LP: 1137820268 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Indisputable, security and interoperability play major concerns in Internet of Things (IoT) architectures and applications. In this paper, however, we emphasize the role and importance of performance and scalability as additional, crucial aspects in planning and building sustainable IoT solutions. IoT architectures are complicated system-of-systems that include different developer roles, development processes, organizational units, and a multilateral governance. Its performance is often neglected during development but becomes a major concern at the end of development and results in supplemental efforts, costs, and refactoring. It should not be relied on linearly scaling for such systems only by using up-to-date technologies that may promote such behavior. Furthermore, different security or interoperability choices also have a considerable impact on performance and may result in unforeseen trade-offs. Therefore, we propose and pursue the vision of a model-driven approach to predict and evaluate the performance of IoT architectures early in the system lifecylce in order to guarantee efficient and scalable systems reaching from sensors to business applications.

BibTex:

    @Article{OJIOT_2017v3i1n12_Kross,
        title     = {Towards a Model-driven Performance Prediction Approach for Internet of Things Architectures},
        author    = {Johannes Kro\~{A} and
                     Sebastian Voss and
                     Helmut Krcmar},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {136--141},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017 Conference in Munich, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017080613524},
        urn       = {urn:nbn:de:101:1-2017080613524},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Indisputable, security and interoperability play major concerns in Internet of Things (IoT) architectures and applications. In this paper, however, we emphasize the role and importance of performance and scalability as additional, crucial aspects in planning and building sustainable IoT solutions. IoT architectures are complicated system-of-systems that include different developer roles, development processes, organizational units, and a multilateral governance. Its performance is often neglected during development but becomes a major concern at the end of development and results in supplemental efforts, costs, and refactoring. It should not be relied on linearly scaling for such systems only by using up-to-date technologies that may promote such behavior. Furthermore, different security or interoperability choices also have a considerable impact on performance and may result in unforeseen trade-offs. Therefore, we propose and pursue the vision of a model-driven approach to predict and evaluate the performance of IoT architectures early in the system lifecylce in order to guarantee efficient and scalable systems reaching from sensors to business applications.}
    }
2 citations in 2019:

Enabling model-driven software development tools for the internet of things

Karim Jahed, Juergen Dingel

In Proceedings of the 11th International Workshop on Modelling in Software Engineerings (MiSE@ICSE), Montreal, QC, Canada, Pages 93-99, 2019.

Towards Performance Prediction for Stream Processing Applications

Johannes Rank, Dominik Paluch, Harald Kienegger, Helmut Krcmar

In Proceedings of the 31st GI-Workshop Grundlagen von Datenbanken, Saarburg, Germany, Pages 38-43, 2019.

 Open Access 

Scalable Generation of Type Embeddings Using the ABox

Mayank Kejriwal, Pedro Szekely

Open Journal of Semantic Web (OJSW), 4(1), Pages 20-34, 2017, Downloads: 4926

Full-Text: pdf | URN: urn:nbn:de:101:1-2017100112160 | GNL-LP: 1140718193 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Structured knowledge bases gain their expressive power from both the ABox and TBox. While the ABox is rich in data, the TBox contains the ontological assertions that are often necessary for logical inference. The crucial links between the ABox and the TBox are served by is-a statements (formally a part of the ABox) that connect instances to types, also referred to as classes or concepts. Latent space embedding algorithms, such as RDF2Vec and TransE, have been used to great effect to model instances in the ABox. Such algorithms work well on large-scale knowledge bases like DBpedia and Geonames, as they are robust to noise and are low-dimensional and real-valued. In this paper, we investigate a supervised algorithm for deriving type embeddings in the same latent space as a given set of entity embeddings. We show that our algorithm generalizes to hundreds of types, and via incremental execution, achieves near-linear scaling on graphs with millions of instances and facts. We also present a theoretical foundation for our proposed model, and the means of validating the model. The empirical utility of the embeddings is illustrated on five partitions of the English DBpedia ABox. We use visualization and clustering to show that our embeddings are in good agreement with the manually curated TBox. We also use the embeddings to perform a soft clustering on 4 million DBpedia instances in terms of the 415 types explicitly participating in is-a relationships in the DBpedia ABox. Lastly, we present a set of results obtained by using the embeddings to recommend types for untyped instances. Our method is shown to outperform another feature-agnostic baseline while achieving 15x speedup without any growth in memory usage.

BibTex:

    @Article{OJSW_2017v4i1n02_Kejriwal,
        title     = {Scalable Generation of Type Embeddings Using the ABox},
        author    = {Mayank Kejriwal and
                     Pedro Szekely},
        journal   = {Open Journal of Semantic Web (OJSW)},
        issn      = {2199-336X},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {20--34},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017100112160},
        urn       = {urn:nbn:de:101:1-2017100112160},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Structured knowledge bases gain their expressive power from both the ABox and TBox. While the ABox is rich in data, the TBox contains the ontological assertions that are often necessary for logical inference. The crucial links between the ABox and the TBox are served by is-a statements (formally a part of the ABox) that connect instances to types, also referred to as classes or concepts. Latent space embedding algorithms, such as RDF2Vec and TransE, have been used to great effect to model instances in the ABox. Such algorithms work well on large-scale knowledge bases like DBpedia and Geonames, as they are robust to noise and are low-dimensional and real-valued. In this paper, we investigate a supervised algorithm for deriving type embeddings in the same latent space as a given set of entity embeddings. We show that our algorithm generalizes to hundreds of types, and via incremental execution, achieves near-linear scaling on graphs with millions of instances and facts. We also present a theoretical foundation for our proposed model, and the means of validating the model. The empirical utility of the embeddings is illustrated on five partitions of the English DBpedia ABox. We use visualization and clustering to show that our embeddings are in good agreement with the manually curated TBox. We also use the embeddings to perform a soft clustering on 4 million DBpedia instances in terms of the 415 types explicitly participating in is-a relationships in the DBpedia ABox. Lastly, we present a set of results obtained by using the embeddings to recommend types for untyped instances. Our method is shown to outperform another feature-agnostic baseline while achieving 15x speedup without any growth in memory usage.}
    }
0 citations in 2019

 Open Access 

Machine Learning on Large Databases: Transforming Hidden Markov Models to SQL Statements

Dennis Marten, Andreas Heuer

Open Journal of Databases (OJDB), 4(1), Pages 22-42, 2017, Downloads: 6084, Citations: 16

Full-Text: pdf | URN: urn:nbn:de:101:1-2017100112181 | GNL-LP: 1140718215 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Machine Learning is a research field with substantial relevance for many applications in different areas. Because of technical improvements in sensor technology, its value for real life applications has even increased within the last years. Nowadays, it is possible to gather massive amounts of data at any time with comparatively little costs. While this availability of data could be used to develop complex models, its implementation is often narrowed because of limitations in computing power. In order to overcome performance problems, developers have several options, such as improving their hardware, optimizing their code, or use parallelization techniques like the MapReduce framework. Anyhow, these options might be too cost intensive, not suitable, or even too time expensive to learn and realize. Following the premise that developers usually are not SQL experts we would like to discuss another approach in this paper: using transparent database support for Big Data Analytics. Our aim is to automatically transform Machine Learning algorithms to parallel SQL database systems. In this paper, we especially show how a Hidden Markov Model, given in the analytics language R, can be transformed to a sequence of SQL statements. These SQL statements will be the basis for a (inter-operator and intra-operator) parallel execution on parallel DBMS as a second step of our research, not being part of this paper.

BibTex:

    @Article{OJDB_2017v4i1n02_Marten,
        title     = {Machine Learning on Large Databases: Transforming Hidden Markov Models to SQL Statements},
        author    = {Dennis Marten and
                     Andreas Heuer},
        journal   = {Open Journal of Databases (OJDB)},
        issn      = {2199-3459},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {22--42},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017100112181},
        urn       = {urn:nbn:de:101:1-2017100112181},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Machine Learning is a research field with substantial relevance for many applications in different areas. Because of technical improvements in sensor technology, its value for real life applications has even increased within the last years. Nowadays, it is possible to gather massive amounts of data at any time with comparatively little costs. While this availability of data could be used to develop complex models, its implementation is often narrowed because of limitations in computing power. In order to overcome performance problems, developers have several options, such as improving their hardware, optimizing their code, or use parallelization techniques like the MapReduce framework. Anyhow, these options might be too cost intensive, not suitable, or even too time expensive to learn and realize. Following the premise that developers usually are not SQL experts we would like to discuss another approach in this paper: using transparent database support for Big Data Analytics. Our aim is to automatically transform Machine Learning algorithms to parallel SQL database systems. In this paper, we especially show how a Hidden Markov Model, given in the analytics language R, can be transformed to a sequence of SQL statements. These SQL statements will be the basis for a (inter-operator and intra-operator) parallel execution on parallel DBMS as a second step of our research, not being part of this paper.}
    }
6 citations in 2019:

Sparse and Dense Linear Algebra for Machine Learning on Parallel-RDBMS Using SQL

Dennis Marten, Holger Meyer, Daniel Dietrich, Andreas Heuer

Open Journal of Big Data (OJBD), 5(1), Pages 1-34, 2019.

Calculating Fourier Transforms in SQL

Dennis Marten, Holger Meyer, Andreas Heuer

In Advances in Databases and Information Systems - 23rd European Conference (ADBIS), Bled, Slovenia, Proceedings, Pages 151-166, 2019.

Heterogenous Computing for Markov Models in Big Data

Mihaela Malita, George Vladut Popescu, Gheorghe M. Stefan

2019. Technical Report, University "Politehnica" of Bucharest

Database support for automotive analysis

Dennis Marten, Holger Meyer, Andreas Heuer

2019. Technical Report at University of Rostock

Database support for automotive analysis

Dennis Marten, Holger Meyer, Andreas Heuer

In Lernen, Wissen, Daten, Analysen (LWDA), Berlin, Germany, 2019.

Heterogeneous Computing for Markov Models in Big Data

M. Malita, G. V. Popescu, G. M. Stefan

In International Conference on Computational Science and Computational Intelligence (CSCI), Pages 1500-1505, 2019.

 Open Access 

Performance Aspects of Object-based Storage Services on Single Board Computers

Christian Baun, Henry-Norbert Cocos, Rosa-Maria Spanou

Open Journal of Cloud Computing (OJCC), 4(1), Pages 1-16, 2017, Downloads: 6179

Full-Text: pdf | URN: urn:nbn:de:101:1-2017100112204 | GNL-LP: 1140718231 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: When an object-based storage service is demanded and the cost for purchase and operation of servers, workstations or personal computers is a challenge, single board computers may be an option to build an inexpensive system. This paper describes the lessons learned from deploying different private cloud storage services, which implement the functionality and API of the Amazon Simple Storage Service on a single board computer, the development of a lightweight tool to investigate the performance and an analysis of the archived measurement data. The objective of the performance evaluation is to get an impression, if it is possible and useful to deploy object-based storage services on single board computers.

BibTex:

    @Article{OJCC_2017v4i1n01_Baun,
        title     = {Performance Aspects of Object-based Storage Services on Single Board Computers},
        author    = {Christian Baun and
                     Henry-Norbert Cocos and
                     Rosa-Maria Spanou},
        journal   = {Open Journal of Cloud Computing (OJCC)},
        issn      = {2199-1987},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {1--16},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017100112204},
        urn       = {urn:nbn:de:101:1-2017100112204},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {When an object-based storage service is demanded and the cost for purchase and operation of servers, workstations or personal computers is a challenge, single board computers may be an option to build an inexpensive system. This paper describes the lessons learned from deploying different private cloud storage services, which implement the functionality and API of the Amazon Simple Storage Service on a single board computer, the development of a lightweight tool to investigate the performance and an analysis of the archived measurement data. The objective of the performance evaluation is to get an impression, if it is possible and useful to deploy object-based storage services on single board computers.}
    }
0 citations in 2019

 Open Access 

Security and Compliance Ontology for Cloud Service Agreements

Ana Sofía Zalazar, Luciana Ballejos, Sebastian Rodriguez

Open Journal of Cloud Computing (OJCC), 4(1), Pages 17-25, 2017, Downloads: 5028, Citations: 2

Full-Text: pdf | URN: urn:nbn:de:101:1-2017100112242 | GNL-LP: 1140718274 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Cloud computing is a business paradigm where two important roles must be defined: provider and consumer. Providers offer services (e.g. web application, web services, and databases) and consumers pay for using them. The goal of this research is to focus on security and compliance aspects of cloud service. An ontology is introduced, which is the conceptualization of cloud domain, for analyzing different compliance aspects of cloud agreements. The terms, properties and relations are shown in a diagram. The proposed ontology can help service consumers to extract relevant data from service level agreements, to interpret compliance regulations, and to compare different contractual terms. Finally, some recommendations are presented for cloud consumers to adopt services and evaluate security risks.

BibTex:

    @Article{OJCC_2017v4i1n02_Zalazar,
        title     = {Security and Compliance Ontology for Cloud Service Agreements},
        author    = {Ana Sof\~{A}a Zalazar and
                     Luciana Ballejos and
                     Sebastian Rodriguez},
        journal   = {Open Journal of Cloud Computing (OJCC)},
        issn      = {2199-1987},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {17--25},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2017100112242},
        urn       = {urn:nbn:de:101:1-2017100112242},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Cloud computing is a business paradigm where two important roles must be defined: provider and consumer. Providers offer services (e.g. web application, web services, and databases) and consumers pay for using them. The goal of this research is to focus on security and compliance aspects of cloud service. An ontology is introduced, which is the conceptualization of cloud domain, for analyzing different compliance aspects of cloud agreements. The terms, properties and relations are shown in a diagram. The proposed ontology can help service consumers to extract relevant data from service level agreements, to interpret compliance regulations, and to compare different contractual terms. Finally, some recommendations are presented for cloud consumers to adopt services and evaluate security risks.}
    }
0 citation in 2019

 Open Access 

Technology Selection for Big Data and Analytical Applications

Denis Lehmann, David Fekete, Gottfried Vossen

Open Journal of Big Data (OJBD), 3(1), Pages 1-25, 2017, Downloads: 4848, Citations: 2

Full-Text: pdf | URN: urn:nbn:de:101:1-201711266876 | GNL-LP: 1147192790 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The term Big Data has become pervasive in recent years, as smart phones, televisions, washing machines, refrigerators, smart meters, diverse sensors, eyeglasses, and even clothes connect to the Internet. However, their generated data is essentially worthless without appropriate data analytics that utilizes information retrieval, statistics, as well as various other techniques. As Big Data is commonly too big for a single person or institution to investigate, appropriate tools are being used that go way beyond a traditional data warehouse and that have been developed in recent years. Unfortunately, there is no single solution but a large variety of different tools, each of which with distinct functionalities, properties and characteristics. Especially small and medium-sized companies have a hard time to keep track, as this requires time, skills, money, and specific knowledge that, in combination, result in high entrance barriers for Big Data utilization. This paper aims to reduce these barriers by explaining and structuring different classes of technologies and the basic criteria for proper technology selection. It proposes a framework that guides especially small and mid-sized companies through a suitable selection process that can serve as a basis for further advances.

BibTex:

    @Article{OJBD_2017v3n01_Lehmann,
        title     = {Technology Selection for Big Data and Analytical Applications},
        author    = {Denis Lehmann and
                     David Fekete and
                     Gottfried Vossen},
        journal   = {Open Journal of Big Data (OJBD)},
        issn      = {2365-029X},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {1--25},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201711266876},
        urn       = {urn:nbn:de:101:1-201711266876},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The term Big Data has become pervasive in recent years, as smart phones, televisions, washing machines, refrigerators, smart meters, diverse sensors, eyeglasses, and even clothes connect to the Internet. However, their generated data is essentially worthless without appropriate data analytics that utilizes information retrieval, statistics, as well as various other techniques. As Big Data is commonly too big for a single person or institution to investigate, appropriate tools are being used that go way beyond a traditional data warehouse and that have been developed in recent years. Unfortunately, there is no single solution but a large variety of different tools, each of which with distinct functionalities, properties and characteristics. Especially small and medium-sized companies have a hard time to keep track, as this requires time, skills, money, and specific knowledge that, in combination, result in high entrance barriers for Big Data utilization. This paper aims to reduce these barriers by explaining and structuring different classes of technologies and the basic criteria for proper technology selection. It proposes a framework that guides especially small and mid-sized companies through a suitable selection process that can serve as a basis for further advances.}
    }
0 citation in 2019

 Open Access 

Ontology-Based Data Integration in Multi-Disciplinary Engineering Environments: A Review

Fajar J. Ekaputra, Marta Sabou, Estefanía Serral, Elmar Kiesling, Stefan Biffl

Open Journal of Information Systems (OJIS), 4(1), Pages 1-26, 2017, Downloads: 6856, Citations: 4

Full-Text: pdf | URN: urn:nbn:de:101:1-201711266863 | GNL-LP: 1147192413 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Today's industrial production plants are complex mechatronic systems. In the course of the production plant lifecycle, engineers from a variety of disciplines (e.g., mechanics, electronics, automation) need to collaborate in multi-disciplinary settings that are characterized by heterogeneity in terminology, methods, and tools. This collaboration yields a variety of engineering artifacts that need to be linked and integrated, which on the technical level is reflected in the need to integrate heterogeneous data. Semantic Web technologies, in particular ontologybased data integration (OBDI), are promising to tackle this challenge that has attracted strong interest from the engineering research community. This interest has resulted in a growing body of literature that is dispersed across the Semantic Web and Automation System Engineering research communities and has not been systematically reviewed so far. We address this gap with a survey reflecting on OBDI applications in the context of Multi-Disciplinary Engineering Environment (MDEE). To this end, we analyze and compare 23 OBDI applications from both the Semantic Web and the Automation System Engineering research communities. Based on this analysis, we (i) categorize OBDI variants used in MDEE, (ii) identify key problem context characteristics, (iii) compare strengths and limitations of OBDI variants as a function of problem context, and (iv) provide recommendation guidelines for the selection of OBDI variants and technologies for OBDI in MDEE.

BibTex:

    @Article{OJIS_2017v4i1n01_Ekaputra,
        title     = {Ontology-Based Data Integration in Multi-Disciplinary Engineering Environments: A Review},
        author    = {Fajar J. Ekaputra and
                     Marta Sabou and
                     Estefan\~{A}a Serral and
                     Elmar Kiesling and
                     Stefan Biffl},
        journal   = {Open Journal of Information Systems (OJIS)},
        issn      = {2198-9281},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {1--26},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201711266863},
        urn       = {urn:nbn:de:101:1-201711266863},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Today's industrial production plants are complex mechatronic systems. In the course of the production plant lifecycle, engineers from a variety of disciplines (e.g., mechanics, electronics, automation) need to collaborate in multi-disciplinary settings that are characterized by heterogeneity in terminology, methods, and tools. This collaboration yields a variety of engineering artifacts that need to be linked and integrated, which on the technical level is reflected in the need to integrate heterogeneous data. Semantic Web technologies, in particular ontologybased data integration (OBDI), are promising to tackle this challenge that has attracted strong interest from the engineering research community. This interest has resulted in a growing body of literature that is dispersed across the Semantic Web and Automation System Engineering research communities and has not been systematically reviewed so far. We address this gap with a survey reflecting on OBDI applications in the context of Multi-Disciplinary Engineering Environment (MDEE). To this end, we analyze and compare 23 OBDI applications from both the Semantic Web and the Automation System Engineering research communities. Based on this analysis, we (i) categorize OBDI variants used in MDEE, (ii) identify key problem context characteristics, (iii) compare strengths and limitations of OBDI variants as a function of problem context, and (iv) provide recommendation guidelines for the selection of OBDI variants and technologies for OBDI in MDEE.}
    }
1 citation in 2019:

Virtual engineering of cyber-physical automation systems: The case of control logic

Georg Ferdinand Schneider, Hendro Wicaksono, Jivka Ovtcharova

Advanced Engineering Informatics, 39, Pages 127 - 143, 2019.

 Open Access 

Purposeful Searching for Citations of Scholarly Publications

Fabian Rosenthal, Sven Groppe

Open Journal of Information Systems (OJIS), 4(1), Pages 27-48, 2017, Downloads: 5995, Citations: 1

Full-Text: pdf | URN: urn:nbn:de:101:1-201711266882 | GNL-LP: 1147193223 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Citation data contains the citations among scholarly publications. The data can be used to find relevant sources during research, identify emerging trends and research areas, compute metrics for comparing authors or journals, or for thematic clustering. Manual administration of citation data is limited due to the large number of publications. In this work, we hence lay the foundations for the automatic search for scientific citations. The unique characteristics are a purposeful search of citations for a specified set of publications (of e.g., an author or an institute). Therefore, search strategies will be developed and evaluated in this work in order to reduce the costs for the analysis of documents without citations to the given set of publications. In our experiments, for authors with more than 100 publications about 75 % of the citations were found. The purposeful strategy examined thereby only 1.5 % of the 120 million publications of the used data set.

BibTex:

    @Article{OJIS_2017v4i1n02_Rosenthal,
        title     = {Purposeful Searching for Citations of Scholarly Publications},
        author    = {Fabian Rosenthal and
                     Sven Groppe},
        journal   = {Open Journal of Information Systems (OJIS)},
        issn      = {2198-9281},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {27--48},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201711266882},
        urn       = {urn:nbn:de:101:1-201711266882},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Citation data contains the citations among scholarly publications. The data can be used to find relevant sources during research, identify emerging trends and research areas, compute metrics for comparing authors or journals, or for thematic clustering. Manual administration of citation data is limited due to the large number of publications. In this work, we hence lay the foundations for the automatic search for scientific citations. The unique characteristics are a purposeful search of citations for a specified set of publications (of e.g., an author or an institute). Therefore, search strategies will be developed and evaluated in this work in order to reduce the costs for the analysis of documents without citations to the given set of publications. In our experiments, for authors with more than 100 publications about 75 \% of the citations were found. The purposeful strategy examined thereby only 1.5 \% of the 120 million publications of the used data set.}
    }
0 citation in 2019

 Open Access 

A Semantic Safety Check System for Emergency Management

Yogesh Pandey, Srividya K. Bansal

Open Journal of Semantic Web (OJSW), 4(1), Pages 35-50, 2017, Downloads: 6778, Citations: 2

Full-Text: pdf | URN: urn:nbn:de:101:1-201711266890 | GNL-LP: 1147193460 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: There has been an exponential growth and availability of both structured and unstructured data that can be leveraged to provide better emergency management in case of natural disasters and humanitarian crises. This paper is an extension of a semantics-based web application for safety check, which uses of semantic web technologies to extract different kinds of relevant data about a natural disaster and alerts its users. The goal of this work is to design and develop a knowledge intensive application that identifies those people that may have been affected due to natural disasters or man-made disasters at any geographical location and notify them with safety instructions. This involves extraction of data from various sources for emergency alerts, weather alerts, and contacts data. The extracted data is integrated using a semantic data model and transformed into semantic data. Semantic reasoning is done through rules and queries. This system is built using front-end web development technologies and at the back-end using semantic web technologies such as RDF, OWL, SPARQL, Apache Jena, TDB, and Apache Fuseki server. We present the details of the overall approach, process of data collection and transformation and the system built. This extended version includes a detailed discussion of the semantic reasoning module, research challenges in building this software system, related work in this area, and future research directions including the incorporation of geospatial components and standards.

BibTex:

    @Article{OJSW_2017v4i1n03_Pandey,
        title     = {A Semantic Safety Check System for Emergency Management},
        author    = {Yogesh Pandey and
                     Srividya K. Bansal},
        journal   = {Open Journal of Semantic Web (OJSW)},
        issn      = {2199-336X},
        year      = {2017},
        volume    = {4},
        number    = {1},
        pages     = {35--50},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201711266890},
        urn       = {urn:nbn:de:101:1-201711266890},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {There has been an exponential growth and availability of both structured and unstructured data that can be leveraged to provide better emergency management in case of natural disasters and humanitarian crises. This paper is an extension of a semantics-based web application for safety check, which uses of semantic web technologies to extract different kinds of relevant data about a natural disaster and alerts its users. The goal of this work is to design and develop a knowledge intensive application that identifies those people that may have been affected due to natural disasters or man-made disasters at any geographical location and notify them with safety instructions. This involves extraction of data from various sources for emergency alerts, weather alerts, and contacts data. The extracted data is integrated using a semantic data model and transformed into semantic data. Semantic reasoning is done through rules and queries. This system is built using front-end web development technologies and at the back-end using semantic web technologies such as RDF, OWL, SPARQL, Apache Jena, TDB, and Apache Fuseki server. We present the details of the overall approach, process of data collection and transformation and the system built. This extended version includes a detailed discussion of the semantic reasoning module, research challenges in building this software system, related work in this area, and future research directions including the incorporation of geospatial components and standards.}
    }
0 citation in 2019

 Open Access 

Combining Process Guidance and Industrial Feedback for Successfully Deploying Big Data Projects

Christophe Ponsard, Mounir Touzani, Annick Majchrowski

Open Journal of Big Data (OJBD), 3(1), Pages 26-41, 2017, Downloads: 5908, Citations: 7

Full-Text: pdf | URN: urn:nbn:de:101:1-201712245446 | GNL-LP: 1149497165 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Companies are faced with the challenge of handling increasing amounts of digital data to run or improve their business. Although a large set of technical solutions are available to manage such Big Data, many companies lack the maturity to manage that kind of projects, which results in a high failure rate. This paper aims at providing better process guidance for a successful deployment of Big Data projects. Our approach is based on the combination of a set of methodological bricks documented in the literature from early data mining projects to nowadays. It is complemented by learned lessons from pilots conducted in different areas (IT, health, space, food industry) with a focus on two pilots giving a concrete vision of how to drive the implementation with emphasis on the identification of values, the definition of a relevant strategy, the use of an Agile follow-up and a progressive rise in maturity.

BibTex:

    @Article{OJBD_2017v3i1n02_Ponsard,
        title     = {Combining Process Guidance and Industrial Feedback for Successfully Deploying Big Data Projects},
        author    = {Christophe Ponsard and
                     Mounir Touzani and
                     Annick Majchrowski},
        journal   = {Open Journal of Big Data (OJBD)},
        issn      = {2365-029X},
        year      = {2017},
        volume    = {3},
        number    = {1},
        pages     = {26--41},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201712245446},
        urn       = {urn:nbn:de:101:1-201712245446},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Companies are faced with the challenge of handling increasing amounts of digital data to run or improve their business. Although a large set of technical solutions are available to manage such Big Data, many companies lack the maturity to manage that kind of projects, which results in a high failure rate. This paper aims at providing better process guidance for a successful deployment of Big Data projects. Our approach is based on the combination of a set of methodological bricks documented in the literature from early data mining projects to nowadays. It is complemented by learned lessons from pilots conducted in different areas (IT, health, space, food industry) with a focus on two pilots giving a concrete vision of how to drive the implementation with emphasis on the identification of values, the definition of a relevant strategy, the use of an Agile follow-up and a progressive rise in maturity.}
    }
2 citations in 2019:

Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model

Eivind Kristoffersen, Oluseun Omotola Aremu, Fenna Blomsma, Patrick Mikalef, Jingyue Li

In Digital Transformation for a Sustainable Society in the 21st Century - 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society (I3E), Trondheim, Norway, Pages 177-189, 2019.

Measuring the Performance of Big Data Analytics Process

Ismail Mohamed Ali, Yusmadi Yah Jusoh, Rusli Abdullah, Rozi Nor, Haizan Nor, Lilly Suriani Affendey

Journal of Theoretical and Applied Information Technology, 97(14), 2019.

 Open Access 

Count Distinct Semantic Queries over Multiple Linked Datasets

Bogdan Kostov, Petr Kremen

Open Journal of Semantic Web (OJSW), 5(1), Pages 1-11, 2018, Downloads: 5443

Full-Text: pdf | URN: urn:nbn:de:101:1-201712245426 | GNL-LP: 1149497149 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper, we revise count distinct queries and their semantics over datasets with incomplete knowledge, which is a typical case for the linked data integration scenario where datasets are viewed as ontologies. We focus on counting individuals present in the signature of the ontology. Specifically, we investigate the Certain Epistemic Count (CEC) and the Possible Epistemic Count (PEC) interval based semantics. In the case of CEC semantics, we propose an algorithm for its evaluation and we prove its correctness under a practical constraint of the queried ontology. We conduct and report experiments with the implementation of the proposed algorithm. We also prove decidability of the PEC semantics.

BibTex:

    @Article{OJSW_2018v5i1n01_Kostov,
        title     = {Count Distinct Semantic Queries over Multiple Linked Datasets},
        author    = {Bogdan Kostov and
                     Petr Kremen},
        journal   = {Open Journal of Semantic Web (OJSW)},
        issn      = {2199-336X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {1--11},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201712245426},
        urn       = {urn:nbn:de:101:1-201712245426},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper, we revise count distinct queries and their semantics over datasets with incomplete knowledge, which is a typical case for the linked data integration scenario where datasets are viewed as ontologies. We focus on counting individuals present in the signature of the ontology. Specifically, we investigate the Certain Epistemic Count (CEC) and the Possible Epistemic Count (PEC) interval based semantics. In the case of CEC semantics, we propose an algorithm for its evaluation and we prove its correctness under a practical constraint of the queried ontology. We conduct and report experiments with the implementation of the proposed algorithm. We also prove decidability of the PEC semantics.}
    }
0 citations in 2019

 Open Access 

Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap

Olusola Akinrolabu, Steve New, Andrew Martin

Open Journal of Cloud Computing (OJCC), 5(1), Pages 1-19, 2018, Downloads: 11251

Full-Text: pdf | URN: urn:nbn:de:101:1-201712245432 | GNL-LP: 1149497157 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Cloud computing represents a significant paradigm shift in the delivery of information technology (IT) services. The rapid growth of the cloud and the increasing security concerns associated with the delivery of cloud services has led many researchers to study cloud risks and risk assessments. Some of these studies highlight the inability of current risk assessments to cope with the dynamic nature of the cloud, a gap we believe is as a result of the lack of consideration for the inherent risk of the supply chain. This paper, therefore, describes the cloud supply chain and investigates the effect of supply chain transparency in conducting a comprehensive risk assessment. We conducted an industry survey to gauge stakeholder awareness of supply chain risks, seeking to find out the risk assessment methods commonly used, factors that hindered a comprehensive evaluation and how the current state-of-the-art can be improved. The analysis of the survey dataset showed the lack of flexibility of the popular qualitative assessment methods in coping with the risks associated with the dynamic supply chain of cloud services, typically made up of an average of eight suppliers. To address these gaps, we propose a Cloud Supply Chain Cyber Risk Assessment (CSCCRA) model, a quantitative risk assessment model which is supported by decision support analysis and supply chain mapping in the identification, analysis and evaluation of cloud risks.

BibTex:

    @Article{OJCC_2018v5i1n01_Akinrolabu,
        title     = {Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap},
        author    = {Olusola Akinrolabu and
                     Steve New and
                     Andrew Martin},
        journal   = {Open Journal of Cloud Computing (OJCC)},
        issn      = {2199-1987},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {1--19},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201712245432},
        urn       = {urn:nbn:de:101:1-201712245432},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Cloud computing represents a significant paradigm shift in the delivery of information technology (IT) services. The rapid growth of the cloud and the increasing security concerns associated with the delivery of cloud services has led many researchers to study cloud risks and risk assessments. Some of these studies highlight the inability of current risk assessments to cope with the dynamic nature of the cloud, a gap we believe is as a result of the lack of consideration for the inherent risk of the supply chain. This paper, therefore, describes the cloud supply chain and investigates the effect of supply chain transparency in conducting a comprehensive risk assessment. We conducted an industry survey to gauge stakeholder awareness of supply chain risks, seeking to find out the risk assessment methods commonly used, factors that hindered a comprehensive evaluation and how the current state-of-the-art can be improved. The analysis of the survey dataset showed the lack of flexibility of the popular qualitative assessment methods in coping with the risks associated with the dynamic supply chain of cloud services, typically made up of an average of eight suppliers. To address these gaps, we propose a Cloud Supply Chain Cyber Risk Assessment (CSCCRA) model, a quantitative risk assessment model which is supported by decision support analysis and supply chain mapping in the identification, analysis and evaluation of cloud risks.}
    }
0 citations in 2019

 Open Access 

Halo Effect Contamination in Assessments of Web Interface Design

Daniel S. Soper, Farnaz Piepkorn

Open Journal of Information Systems (OJIS), 5(1), Pages 1-23, 2018, Downloads: 7485, Citations: 1

Full-Text: pdf | URN: urn:nbn:de:101:1-201801212408 | GNL-LP: 1151046418 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: This paper relies on findings and theory from both the human-computer interaction and cognitive psychology literatures in order to inquire into the extent to which the halo effect contaminates web interface design assessments. As a human cognitive bias, the halo effect manifests itself when a judge's evaluations of an entity's individual characteristics are negatively or positively distorted by the judge's overall affect toward the entity being judged. These distortions and halo-induced delusions have substantial negative implications for rational decisionmaking and the ability to objectively evaluate businesses, technologies, or other humans, and should hence be a critical consideration for both managers and organizations alike. Here we inquire into the halo effect using a controlled, randomized experiment involving more than 1,200 research subjects. Subjects' preexisting affective states were activated using polarizing issues including abortion rights, immigration policy, and gun control laws. Subjects were then asked to evaluate specific interface characteristics of six different types of websites, the textual content of which either supported or contradicted their preexisting affective beliefs. Comparing subject responses to objective control evaluations revealed strong evidence of halo effect contamination in assessments of web interface design, particularly among men. In light of the results, a theoretical framework integrating elements from cognitive and evolutionary psychology is proposed to explain the origins and purpose of the halo effect.

BibTex:

    @Article{OJIS_2018v5i1n01_Soper,
        title     = {Halo Effect Contamination in Assessments of Web Interface Design},
        author    = {Daniel S. Soper and
                     Farnaz Piepkorn},
        journal   = {Open Journal of Information Systems (OJIS)},
        issn      = {2198-9281},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {1--23},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201801212408},
        urn       = {urn:nbn:de:101:1-201801212408},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {This paper relies on findings and theory from both the human-computer interaction and cognitive psychology literatures in order to inquire into the extent to which the halo effect contaminates web interface design assessments. As a human cognitive bias, the halo effect manifests itself when a judge's evaluations of an entity's individual characteristics are negatively or positively distorted by the judge's overall affect toward the entity being judged. These distortions and halo-induced delusions have substantial negative implications for rational decisionmaking and the ability to objectively evaluate businesses, technologies, or other humans, and should hence be a critical consideration for both managers and organizations alike. Here we inquire into the halo effect using a controlled, randomized experiment involving more than 1,200 research subjects. Subjects' preexisting affective states were activated using polarizing issues including abortion rights, immigration policy, and gun control laws. Subjects were then asked to evaluate specific interface characteristics of six different types of websites, the textual content of which either supported or contradicted their preexisting affective beliefs. Comparing subject responses to objective control evaluations revealed strong evidence of halo effect contamination in assessments of web interface design, particularly among men. In light of the results, a theoretical framework integrating elements from cognitive and evolutionary psychology is proposed to explain the origins and purpose of the halo effect.}
    }
0 citation in 2019

 Open Access 

Modelling Patterns in Continuous Streams of Data

Ricardo Jesus, Mario Antunes, Diogo Gomes, Rui L. Aguiar

Open Journal of Big Data (OJBD), 4(1), Pages 1-13, 2018, Downloads: 4898, Citations: 3

Full-Text: pdf | URN: urn:nbn:de:101:1-201801234777 | GNL-LP: 1151148423 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The untapped source of information, extracted from the increasing number of sensors, can be explored to improve and optimize several systems. Yet, hand in hand with this growth goes the increasing difficulty to manage and organize all this new information. The lack of a standard context representation scheme is one of the main struggles in this research area. Conventional methods for extracting knowledge from data rely on a standard representation or a priori relation, which may not be feasible for IoT and M2M scenarios. With this in mind we propose a stream characterization model in order to provide the foundations for a novel stream similarity metric. Complementing previous work on context organization, we aim to provide an automatic stream organizational model without enforcing specific representations. In this paper we extend our work on stream characterization and devise a novel similarity method.

BibTex:

    @Article{OJBD_2018v4i1n01_Jesus,
        title     = {Modelling Patterns in Continuous Streams of Data},
        author    = {Ricardo Jesus and
                     Mario Antunes and
                     Diogo Gomes and
                     Rui L. Aguiar},
        journal   = {Open Journal of Big Data (OJBD)},
        issn      = {2365-029X},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {1--13},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201801234777},
        urn       = {urn:nbn:de:101:1-201801234777},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The untapped source of information, extracted from the increasing number of sensors, can be explored to improve and optimize several systems. Yet, hand in hand with this growth goes the increasing difficulty to manage and organize all this new information. The lack of a standard context representation scheme is one of the main struggles in this research area. Conventional methods for extracting knowledge from data rely on a standard representation or a priori relation, which may not be feasible for IoT and M2M scenarios. With this in mind we propose a stream characterization model in order to provide the foundations for a novel stream similarity metric. Complementing previous work on context organization, we aim to provide an automatic stream organizational model without enforcing specific representations. In this paper we extend our work on stream characterization and devise a novel similarity method.}
    }
1 citation in 2019:

Stream Generation: Markov Chains vs GANs

Ricardo Jesus, Mário Antunes, Pétia Georgieva, Diogo Gomes, Rui L. Aguiar.

In Proceedings of the 4th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,, Pages 177-184, 2019.

 Open Access 

Operation of Modular Smart Grid Applications Interacting through a Distributed Middleware

Stephan Cejka, Albin Frischenschlager, Mario Faschang, Mark Stefan, Konrad Diwold

Open Journal of Big Data (OJBD), 4(1), Pages 14-29, 2018, Downloads: 5865, Citations: 5

Full-Text: pdf | URN: urn:nbn:de:101:1-201801212419 | GNL-LP: 1151046426 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: IoT-functionality can broaden the scope of distribution system automation in terms of functionality and communication. However, it also poses risks regarding resource consumption and security. This article presents a field approved IoT-enabled smart grid middleware, which allows for flexible deployment and management of applications within smart grid operation. In the first part of the work, the resource consumption of the middleware is analyzed and current memory bottlenecks are identified. The bottlenecks can be resolved by introducing a new entity that allows to dynamically load multiple applications within one JVM. The performance was experimentally tested and the results suggest that its application can significantly reduce the applications' memory footprint on the physical device. The second part of the study identifies and discusses potential security threats, with a focus on attacks stemming from malicious software applications within the framework. In order to prevent such attacks a proxy based prevention mechanism is developed and demonstrated.

BibTex:

    @Article{OJBD_2018v4i1n02_Cejka,
        title     = {Operation of Modular Smart Grid Applications Interacting through a Distributed Middleware},
        author    = {Stephan Cejka and
                     Albin Frischenschlager and
                     Mario Faschang and
                     Mark Stefan and
                     Konrad Diwold},
        journal   = {Open Journal of Big Data (OJBD)},
        issn      = {2365-029X},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {14--29},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201801212419},
        urn       = {urn:nbn:de:101:1-201801212419},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {IoT-functionality can broaden the scope of distribution system automation in terms of functionality and communication. However, it also poses risks regarding resource consumption and security. This article presents a field approved IoT-enabled smart grid middleware, which allows for flexible deployment and management of applications within smart grid operation. In the first part of the work, the resource consumption of the middleware is analyzed and current memory bottlenecks are identified. The bottlenecks can be resolved by introducing a new entity that allows to dynamically load multiple applications within one JVM. The performance was experimentally tested and the results suggest that its application can significantly reduce the applications' memory footprint on the physical device. The second part of the study identifies and discusses potential security threats, with a focus on attacks stemming from malicious software applications within the framework. In order to prevent such attacks a proxy based prevention mechanism is developed and demonstrated.}
    }
3 citations in 2019:

Edge Device Security for Critical Cyber-Physical Systems

Stephan Cejka, Felix Knorr, Florian Kintzler

In 2nd Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR), Montreal, Canada, 2019.

Privacy Issues in Smart Buildings by examples in Smart Metering

Stephan Cejka, Felix Knorr, Florian Kintzler

In 25th International Conference on Electricity Distribution, Madrid, Spain, 2019.

Enabling Scalable Collaboration by Introducing Platform-Independent Communication for the Peer Model

Stephan Cejka

2019. Diploma thesis at the University Wien, Austria

 Open Access 

IT Project Success from the Management Perspective - A Quantitative Evaluation

Mark Harwardt

Open Journal of Information Systems (OJIS), 5(1), Pages 24-52, 2018, Downloads: 5964, Citations: 4

Full-Text: pdf | URN: urn:nbn:de:101:1-201804155750 | GNL-LP: 1156154707 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: This work investigates the effects that different success criteria and their dimensions may have on the success of IT projects. It focuses on a model that represents the management's view of the success of an IT project. This is of particular interest due to demand for developing and examining such a model. To show the effects of the success criteria and their dimensions a survey of 646 participants was conducted. The effects of the criteria and dimensions on IT project success were subsequently studied with structural equation modeling. Because of some inconsistencies within the original model of IT project success a deducted model had to be developed. Some of the success criteria and dimensions had to be rearranged or removed from the original model due to the results of the study. The new model shows that the perception and the results of a project have a significant impact on the success rating of an IT project.

BibTex:

    @Article{OJIS_2018v5i1n02_Harwardt,
        title     = {IT Project Success from the Management Perspective - A Quantitative Evaluation},
        author    = {Mark Harwardt},
        journal   = {Open Journal of Information Systems (OJIS)},
        issn      = {2198-9281},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {24--52},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201804155750},
        urn       = {urn:nbn:de:101:1-201804155750},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {This work investigates the effects that different success criteria and their dimensions may have on the success of IT projects. It focuses on a model that represents the management's view of the success of an IT project. This is of particular interest due to demand for developing and examining such a model. To show the effects of the success criteria and their dimensions a survey of 646 participants was conducted. The effects of the criteria and dimensions on IT project success were subsequently studied with structural equation modeling. Because of some inconsistencies within the original model of IT project success a deducted model had to be developed. Some of the success criteria and dimensions had to be rearranged or removed from the original model due to the results of the study. The new model shows that the perception and the results of a project have a significant impact on the success rating of an IT project.}
    }
2 citations in 2019:

A New Framework for Dynamical Resources Planning System in Shipbuilding Industry

Masjuraizi Che Soh, Siti Mariyam Shamsuddin, Shafaatunnur Hasan

International Journal of Advances in Soft Computing & Its Applications, 11(1), 2019.

Enterprise Implementations: The Impact of Systems Implementations Using Professional Services Consultants vs. Internal Resources and the Downstream Impact Post Implementations

Yves Belmont

2019. Dissertation, Georgia State University

 Open Access 

Cloud-Scale Entity Resolution: Current State and Open Challenges

Xiao Chen, Eike Schallehn, Gunter Saake

Open Journal of Big Data (OJBD), 4(1), Pages 30-51, 2018, Downloads: 5902, Citations: 18

Full-Text: pdf | URN: urn:nbn:de:101:1-201804155766 | GNL-LP: 1156154723 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Entity resolution (ER) is a process to identify records in information systems, which refer to the same real-world entity. Because in the two recent decades the data volume has grown so large, parallel techniques are called upon to satisfy the ER requirements of high performance and scalability. The development of parallel ER has reached a relatively prosperous stage, and has found its way into several applications. In this work, we first comprehensively survey the state of the art of parallel ER approaches. From the comprehensive overview, we then extract the classification criteria of parallel ER, classify and compare these approaches based on these criteria. Finally, we identify open research questions and challenges and discuss potential solutions and further research potentials in this field.

BibTex:

    @Article{OJBD_2018v4i1n03_Chen,
        title     = {Cloud-Scale Entity Resolution: Current State and Open Challenges},
        author    = {Xiao Chen and
                     Eike Schallehn and
                     Gunter Saake},
        journal   = {Open Journal of Big Data (OJBD)},
        issn      = {2365-029X},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {30--51},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-201804155766},
        urn       = {urn:nbn:de:101:1-201804155766},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Entity resolution (ER) is a process to identify records in information systems, which refer to the same real-world entity. Because in the two recent decades the data volume has grown so large, parallel techniques are called upon to satisfy the ER requirements of high performance and scalability. The development of parallel ER has reached a relatively prosperous stage, and has found its way into several applications. In this work, we first comprehensively survey the state of the art of parallel ER approaches. From the comprehensive overview, we then extract the classification criteria of parallel ER, classify and compare these approaches based on these criteria. Finally, we identify open research questions and challenges and discuss potential solutions and further research potentials in this field.}
    }
5 citations in 2019:

Heterogeneous Committee-Based Active Learning for Entity Resolution (HeALER)

Xiao Chen, Yinlong Xu, David Broneske, Gabriel Campero Durand, Roman Zoun, Gunter Saake

In Advances in Databases and Information Systems - 23rd European Conference, ADBIS 2019, Bled, Slovenia, September 8-11, 2019, Pages 69-85, 2019.

End-to-End Entity Resolution for Big Data: A Survey

Vassilis Christophides, Vasilis Efthymiou, Themis Palpanas, George Papadakis, Kostas Stefanidis

CoRR, abs/1905.06397, 2019.

The Best of Both Worlds: Combining Hand-Tuned and Word-Embedding-Based Similarity Measures for Entity Resolution

Xiao Chen, Gabriel Campero Durand, Roman Zoun, David Broneske, Yang Li, Gunter Saake

In Datenbanksysteme für Business, Technologie und Web (BTW 2019), 18. Fachtagung des GI-Fachbereichs „Datenbanken und Informationssysteme" (DBIS), 4.-8. März 2019, Rostock, Germany, Pages 215-224, 2019.

Towards task-based parallelization for entity resolution

Leonardo Gazzarri, Melanie Herschel

SICS Software-Intensive Cyber-Physical Systems, 2019.

An Evaluation of Deep Hashing for High-Dimensional Similarity Search on Embedded Data

Rutuja Shivraj Pawar

2019. Master Thesis at Otto-von-Guericke-Universität Magdeburg

 Open Access 

A Lightweight Network-Controlled Power Strip for Low-Cost Cluster Systems

Henry-Norbert Cocos, Christian Baun

Open Journal of Cloud Computing (OJCC), 5(1), Pages 20-29, 2018, Downloads: 4313

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519300682402240 | GNL-LP: 1163928445 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Low-cost clusters are not equipped with costly, sophisticated tools and cannot be controlled remotely. This work aims at addressing this issue and develops a lightweight network-controlled power strip, which enables administrators to monitor the cluster and perform operation via remote. The power strip is controlled via a web interface and a RESTful web service, which are implemented with the programming language Python and the web framework Flask. The solution is inexpensive and easy to implement and use. In this paper, we describe in detail the development and construction of the prototype of the solution and discuss its purchase cost and power consumption.

BibTex:

    @Article{OJCC_2018v5i1n02_Cocos,
        title     = {A Lightweight Network-Controlled Power Strip for Low-Cost Cluster Systems},
        author    = {Henry-Norbert Cocos and
                     Christian Baun},
        journal   = {Open Journal of Cloud Computing (OJCC)},
        issn      = {2199-1987},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {20--29},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519300682402240},
        urn       = {urn:nbn:de:101:1-2018080519300682402240},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Low-cost clusters are not equipped with costly, sophisticated tools and cannot be controlled remotely. This work aims at addressing this issue and develops a lightweight network-controlled power strip, which enables administrators to monitor the cluster and perform operation via remote. The power strip is controlled via a web interface and a RESTful web service, which are implemented with the programming language Python and the web framework Flask. The solution is inexpensive and easy to implement and use. In this paper, we describe in detail the development and construction of the prototype of the solution and discuss its purchase cost and power consumption.}
    }
0 citations in 2019

 Open Access 

Middleware Support for Generic Actuation in the Internet of Mobile Things

Sheriton Valim, Matheus Zeitune, Bruno Olivieri, Markus Endler

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 24-34, 2018, Downloads: 3403, Citations: 5

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519322337232186 | GNL-LP: 1163928666 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: As the Internet of Things is expanding towards applications in almost any sector of our economy and daily life, so is the demand of employing and integrating devices with actuation capabilities, such as smart bulbs, HVAC,smart locks, industrial machines, robots or drones. Many middleware platforms have been developed in orderto support the development of distributed IoT applications and facilitate the sensors-to-cloud communication andedge processing capabilities, but surprisingly very little has been done to provide middleware-level, support andgeneric mechanisms for discovering the devices and their interfaces, and executing the actuation commands, i.e.transferring them to the device. In this paper, we present a generic support for actuation as an extension ofContextNet, our mobile-cloud middleware for IoMT. We describe the design of the distributed actuation supportand present a proof of working implementation that enables remote control of a Sphero mobile BB-8 toy.

BibTex:

    @Article{OJIOT_2018v4i1n03_Valim,
        title     = {Middleware Support for Generic Actuation in the Internet of Mobile Things},
        author    = {Sheriton Valim and
                     Matheus Zeitune and
                     Bruno Olivieri and
                     Markus Endler},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {24--34},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519322337232186},
        urn       = {urn:nbn:de:101:1-2018080519322337232186},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {As the Internet of Things is expanding towards applications in almost any sector of our economy and daily life, so is the demand of employing and integrating devices with actuation capabilities, such as smart bulbs, HVAC,smart locks, industrial machines, robots or drones. Many middleware platforms have been developed in orderto support the development of distributed IoT applications and facilitate the sensors-to-cloud communication andedge processing capabilities, but surprisingly very little has been done to provide middleware-level, support andgeneric mechanisms for discovering the devices and their interfaces, and executing the actuation commands, i.e.transferring them to the device. In this paper, we present a generic support for actuation as an extension ofContextNet, our mobile-cloud middleware for IoMT. We describe the design of the distributed actuation supportand present a proof of working implementation that enables remote control of a Sphero mobile BB-8 toy.}
    }
1 citation in 2019:

Leveraging Application Development for the Internet of Mobile Things

Felipe Carvalho, Markus Endler, Francisco Silva e Silva

Open Journal of Internet Of Things (OJIOT), 5(1), Pages 105-116, 2019.

 Open Access 

Past, Present and Future of the ContextNet IoMT Middleware

Markus Endler, Francisco Silva e Silva

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 7-23, 2018, Downloads: 3884, Citations: 19

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519323267622857 | GNL-LP: 1163928682 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The Internet of Things with support to mobility is already transforming many application domains, such as smart cities and homes, environmental monitoring, health care, manufacturing, logistics, public security etc. in that it allows to collect and analyze data from the environment, people and machines, and to implement some form of control or steering on these elements of the physical world. But in order to speed the development of applications for the Internet of Mobile Things (IoMT), some middleware is required. This paper summarizes seven years of research and development on the ContextNet middle ware aimed at IoMT, discusses what we achieved and what we have learned so far. We also share our vision of possible future challenges and developments in the Internet of Mobile Things.

BibTex:

    @Article{OJIOT_2018v4i1n02_Endler,
        title     = {Past, Present and Future of the ContextNet IoMT Middleware},
        author    = {Markus Endler and
                     Francisco Silva e Silva},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {7--23},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519323267622857},
        urn       = {urn:nbn:de:101:1-2018080519323267622857},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The Internet of Things with support to mobility is already transforming many application domains, such as smart cities and homes, environmental monitoring, health care, manufacturing, logistics, public security etc. in that it allows to collect and analyze data from the environment, people and machines, and to implement some form of control or steering on these elements of the physical world. But in order to speed the development of applications for the Internet of Mobile Things (IoMT), some middleware is required. This paper summarizes seven years of research and development on the ContextNet middle ware aimed at IoMT, discusses what we achieved and what we have learned so far. We also share our vision of possible future challenges and developments in the Internet of Mobile Things.}
    }
7 citations in 2019:

Leveraging Application Development for the Internet of Mobile Things

Felipe Carvalho, Markus Endler, Francisco Silva e Silva

Open Journal of Internet Of Things (OJIOT), 5(1), Pages 105-116, 2019.

A Resource Management Architecture For Exposing Devices as a Service in the Internet of Things

Carlos Eduardo Pantoja, Heder Dorneles Soares, José Viterbo, Tielle Alexandre, Arthur Casals, Amal El-Fallah Seghrouchni

In 31st International Conference on Software Engineering and Knowledge Engineering (SEKE), Lisbonne, Portugal, 2019.

Secure distributed ledgers to support IoT technologies data

Adrian Concepcion Leon, Markus Endler

In Anais do XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, Gramado, Pages 141-154, 2019.

A Soft Real-Time Stream Reasoning Service for the Internet of Things

Ruhan dos Reis, Markus Endler, Vitor Pinheiro de Almeida, Edward Hermann Haeusler

In 13th IEEE International Conference on Semantic Computing (ICSC), Newport Beach, CA, USA, Pages 166-169, 2019.

Dynamic Discovery of IoT Services Based on Semantic Processing of Event Flows

Anderson Soares Costa, Rodolfo Sobreira Alves, Francisco Jos da Silva e Silva, Markus Endler

In Proceedings of the XV Brazilian Symposium on Information Systems (SBSI), Aracaju, Brazil, Pages 70:1-70:8, 2019.

Exposing IoT Objects in the Internet Using the Resource Management Architecture.

Carlos Eduardo Pantoja, Heder Dorneles Soares, Jos Viterbo, Tielle Alexandre, Amal El Fallah Seghrouchni, Arthur Casals

Int. J. Softw. Eng. Knowl. Eng., 29(11{\&}12), Pages 1703-1725, 2019.

Inviolable Presence Registration of Mobile Entities in the ContextNet Middleware (Short Paper)

Matheus Leal, Flávia Pisani, Markus Endler

In 9th Latin-American Symposium on Dependable Computing (LADC), Natal, Brazil, Pages 1-4, 2019.

 Open Access 

Service-Relationship Programming Framework for the Social IoT

Ahmed E. Khaled, Wyatt Lindquist, Abdelsalam (Sumi) Helal

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 35-53, 2018, Downloads: 3219, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519302286990058 | GNL-LP: 1163928488 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: We argue that for a true realization of innovative programming opportunities for smart spaces, the developers should be equipped with informative tools that assist them in building domain-related applications. Such tools should utilize the services offered by the space's smart things and consider the different relationships that may tie these services opportunistically to build applications. In this paper, we utilize our Inter-thing relationships programming framework to present a distributed programming ecosystem. The framework broadens the restricted set of thing-level relationships of the evolving social IoT paradigm with a set of service-level relationships. Such relationships provide guidance into how services belonging to different things can be combined to build meaningful applications. We also present a uniform way of describing the thing services and the service-level relationships along with new capabilities for the things to dynamically generate their own services, formulate the corresponding programmable interfaces (APIs) and create an ad-hoc network of socially related smart things at runtime. We then present the semantic rules that guide the establishment of IoT applications and finally demonstrate the features of the framework through a proof-of-concept application.

BibTex:

    @Article{OJIOT_2018v4i1n04_Khaled,
        title     = {Service-Relationship Programming Framework for the Social IoT},
        author    = {Ahmed E. Khaled and
                     Wyatt Lindquist and
                     Abdelsalam (Sumi) Helal},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {35--53},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519302286990058},
        urn       = {urn:nbn:de:101:1-2018080519302286990058},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {We argue that for a true realization of innovative programming opportunities for smart spaces, the developers should be equipped with informative tools that assist them in building domain-related applications. Such tools should utilize the services offered by the space's smart things and consider the different relationships that may tie these services opportunistically to build applications. In this paper, we utilize our Inter-thing relationships programming framework to present a distributed programming ecosystem. The framework broadens the restricted set of thing-level relationships of the evolving social IoT paradigm with a set of service-level relationships. Such relationships provide guidance into how services belonging to different things can be combined to build meaningful applications. We also present a uniform way of describing the thing services and the service-level relationships along with new capabilities for the things to dynamically generate their own services, formulate the corresponding programmable interfaces (APIs) and create an ad-hoc network of socially related smart things at runtime. We then present the semantic rules that guide the establishment of IoT applications and finally demonstrate the features of the framework through a proof-of-concept application.}
    }
0 citation in 2019

 Open Access 

Query Rewriting by Contract under Privacy Constraints

Hannes Grunert, Andreas Heuer

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 54-69, 2018, Downloads: 3493, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519303109386858 | GNL-LP: 116392850X | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we show how Query Rewriting rules and Containment checks of aggregate queries can be combined with Contract-based programming techniques. Based on the combination of both worlds, we are able to find new Query Rewriting rules for queries containing aggregate constraints. These rules can either be used to improve the overall system performance or, in our use case, to implement a privacy-aware way to process queries. By integrating them in our PArADISE framework, we can now process and rewrite all types of OLAP queries, including complex aggregate functions and group-by extensions. In our framework, we use the whole network structure, from data producing sensors up to cloud computers, to automatically deploy an edge computing subnetwork. On each edge node, so-called fragment queries of a genuine query are executed to filter and to aggregate data on resource restricted sensor nodes. As a result of integrating Contract-based programming approaches, we are now able to not only process less data but also to produce less data in the result. Thus, the privacy principle of data minimization is accomplished.

BibTex:

    @Article{OJIOT_2018v4i1n05_Grunert,
        title     = {Query Rewriting by Contract under Privacy Constraints},
        author    = {Hannes Grunert and
                     Andreas Heuer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {54--69},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519303109386858},
        urn       = {urn:nbn:de:101:1-2018080519303109386858},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we show how Query Rewriting rules and Containment checks of aggregate queries can be combined with Contract-based programming techniques. Based on the combination of both worlds, we are able to find new Query Rewriting rules for queries containing aggregate constraints. These rules can either be used to improve the overall system performance or, in our use case, to implement a privacy-aware way to process queries. By integrating them in our PArADISE framework, we can now process and rewrite all types of OLAP queries, including complex aggregate functions and group-by extensions. In our framework, we use the whole network structure, from data producing sensors up to cloud computers, to automatically deploy an edge computing subnetwork. On each edge node, so-called fragment queries of a genuine query are executed to filter and to aggregate data on resource restricted sensor nodes. As a result of integrating Contract-based programming approaches, we are now able to not only process less data but also to produce less data in the result. Thus, the privacy principle of data minimization is accomplished.}
    }
0 citation in 2019

 Open Access 

Towards Adaptive Actors for Scalable IoT Applications at the Edge

Jonathan Fürst, Mauricio Fadel Argerich, Kaifei Chen, Ernö Kovacs

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 70-86, 2018, Downloads: 4844, Citations: 7

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519303887853107 | GNL-LP: 1163928518 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Traditional device-cloud architectures are not scalable to the size of future IoT deployments. While edge and fog-computing principles seem like a tangible solution, they increase the programming effort of IoT systems, do not provide the same elasticity guarantees as the cloud and are of much greater hardware heterogeneity. Future IoT applications will be highly distributed and place their computational tasks on any combination of end-devices (sensor nodes, smartphones, drones), edge and cloud resources in order to achieve their application goals. These complex distributed systems require a programming model that allows developers to implement their applications in a simple way (i.e., focus on the application logic) and an execution framework that runs these applications resiliently with a high resource efficiency, while maximizing application utility. Towards such distributed execution runtime, we propose Nandu, an actor based system that adapts and migrates tasks dynamically using developer provided hints as seed information. Nandu allows developers to focus on sequential application logic and transforms their application into distributed, adaptive actors. The resulting actors support fine-grained entry points for the execution environment. These entry points allow local schedulers to adapt actors seamlessly to the current context, while optimizing the overall application utility according to developer provided requirements.

BibTex:

    @Article{OJIOT_2018v4i1n06_Fuerst,
        title     = {Towards Adaptive Actors for Scalable IoT Applications at the Edge},
        author    = {Jonathan F\~{A}rst and
                     Mauricio Fadel Argerich and
                     Kaifei Chen and
                     Ern\~{A} Kovacs},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {70--86},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519303887853107},
        urn       = {urn:nbn:de:101:1-2018080519303887853107},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Traditional device-cloud architectures are not scalable to the size of future IoT deployments. While edge and fog-computing principles seem like a tangible solution, they increase the programming effort of IoT systems, do not provide the same elasticity guarantees as the cloud and are of much greater hardware heterogeneity. Future IoT applications will be highly distributed and place their computational tasks on any combination of end-devices (sensor nodes, smartphones, drones), edge and cloud resources in order to achieve their application goals. These complex distributed systems require a programming model that allows developers to implement their applications in a simple way (i.e., focus on the application logic) and an execution framework that runs these applications resiliently with a high resource efficiency, while maximizing application utility. Towards such distributed execution runtime, we propose Nandu, an actor based system that adapts and migrates tasks dynamically using developer provided hints as seed information. Nandu allows developers to focus on sequential application logic and transforms their application into distributed, adaptive actors. The resulting actors support fine-grained entry points for the execution environment. These entry points allow local schedulers to adapt actors seamlessly to the current context, while optimizing the overall application utility according to developer provided requirements.}
    }
3 citations in 2019:

Exploiting Power-of-Choices for Load Balancing in Fog Computing.

Roberto Beraldi, Hussein M. Alnuweiri

In IEEE International Conference on Fog Computing (ICFC), Prague, Czech Republic, Pages 80-86, 2019.

Tegutsejate mudel Asjade Interneti hajusate rakenduste loomiseks servavõrgus Akka abil (Actor model in the IoT network edge for creating distributed applications using Akka)

Freddy Marcelo Surriabre Dick

2019. Master thesis at University of Tartu

El modelo de programación de actor aplicado a Edge Computing utilizando Calvin

Nelson R. Rodrı́guez, Marı́a Antonia Murazzo, Tatiana Runco

In XXV Congreso Argentino de Ciencias de la Computación (CACIC) (Universidad Nacional de Rı́o Cuarto, Córdoba), 2019.

 Open Access 

Smartwatch-Based IoT Fall Detection Application

Anne H. Ngu, Po-Teng Tseng, Manvick Paliwal, Christopher Carpenter, Walker Stipe

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 87-98, 2018, Downloads: 7599, Citations: 13

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519304951282148 | GNL-LP: 1163928534 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: This paper proposes using only the streaming accelerometer data from a commodity-based smartwatch (IoT) device to detect falls. The smartwatch is paired with a smartphone as a means for performing the computation necessary for the prediction of falls in realtime without incurring latency in communicating with a cloud server while also preserving data privacy. The majority of current fall detection applications require specially designed hardware and software which make them expensive and inaccessible to the general public. Moreover, a fall detection application that uses a wrist worn smartwatch for data collection has the added benefit that it can be perceived as a piece of jewelry and thus non-intrusive. We experimented with both Support Vector Machine and Naive Bayes machine learning algorithms for the creation of the fall model. We demonstrated that by adjusting the sampling frequency of the streaming data, computing acceleration features over a sliding window, and using a Naive Bayes machine learning model, we can obtain the true positive rate of fall detection in real-world setting with 93.33% accuracy. Our result demonstrated that using a commodity-based smartwatch sensor can yield fall detection results that are competitive with those of custom made expensive sensors.

BibTex:

    @Article{OJIOT_2018v4i1n07_Ngu,
        title     = {Smartwatch-Based IoT Fall Detection Application},
        author    = {Anne H. Ngu and
                     Po-Teng Tseng and
                     Manvick Paliwal and
                     Christopher Carpenter and
                     Walker Stipe},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {87--98},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519304951282148},
        urn       = {urn:nbn:de:101:1-2018080519304951282148},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {This paper proposes using only the streaming accelerometer data from a commodity-based smartwatch (IoT) device to detect falls. The smartwatch is paired with a smartphone as a means for performing the computation necessary for the prediction of falls in realtime without incurring latency in communicating with a cloud server while also preserving data privacy. The majority of current fall detection applications require specially designed hardware and software which make them expensive and inaccessible to the general public. Moreover, a fall detection application that uses a wrist worn smartwatch for data collection has the added benefit that it can be perceived as a piece of jewelry and thus non-intrusive. We experimented with both Support Vector Machine and Naive Bayes machine learning algorithms for the creation of the fall model. We demonstrated that by adjusting the sampling frequency of the streaming data, computing acceleration features over a sliding window, and using a Naive Bayes machine learning model, we can obtain the true positive rate of fall detection in real-world setting with 93.33\% accuracy. Our result demonstrated that using a commodity-based smartwatch sensor can yield fall detection results that are competitive with those of custom made expensive sensors.}
    }
3 citations in 2019:

Arabic English Cross-Lingual Plagiarism Detection Based on Keyphrases Extraction, Monolingual and Machine Learning Approach

Mokhtar Al-Suhaiqi, Muneer A.S. Hazaa, Mohammed Albared

Asian Journal of Research in Computer Science, 12(2), Pages 1-12, 2019.

Intelligent fall detection method based on accelerometer data from a wrist-worn smart watch

Lin Chen, Rong Li, Hang Zhang, Lili Tian, Ning Chen

Measurement, 140, Pages 215 - 226, 2019.

A Review on Security and Privacy Implications in the Implementation of Internet of Things (IoTs) in E-Health

Dorothy Bundi, Masese Nelson

International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), 8(8), 2019.

 Open Access 

Software-Defined Wireless Sensor Networks Approach: Southbound Protocol and Its Performance Evaluation

Cintia B. Margi, Renan C. A. Alves, Gustavo A. Nunez Segura, Doriedson A. G. Oliveira

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 99-108, 2018, Downloads: 4453, Citations: 14

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519305710189607 | GNL-LP: 1163928550 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Software Defined Networking (SDN) has been identified as a promising network paradigm for Wireless Sensor Networks (WSN) and the Internet of Things. It is a key tool for enabling Sensing as a Service, which provides infrastructure sharing thus reducing operational costs. While a few proposals on SDN southbound protocols designed for WSN are found in the literature, they lack adequate performance analysis. In this paper, we review ITSDN main features and present a performance evaluation with all the sensing nodes transmitting data periodically. We conducted a number of experiments varying the number of nodes and assessing the impact of flow table maximum capacity. We assessed the metrics of data delivery, data delay, control overhead and energy consumption in order to show the tradeoffs of using IT-SDN in comparison to the IETF RPL routing protocol. We discuss the main challenges still faced by IT-SDN in larger WSN, and how they could be addressed to make IT-SDN use worthwhile.

BibTex:

    @Article{OJIOT_2018v4i1n08_Margi,
        title     = {Software-Defined Wireless Sensor Networks Approach: Southbound Protocol and Its Performance Evaluation},
        author    = {Cintia B. Margi and
                     Renan C. A. Alves and
                     Gustavo A. Nunez Segura and
                     Doriedson A. G. Oliveira},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {99--108},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519305710189607},
        urn       = {urn:nbn:de:101:1-2018080519305710189607},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Software Defined Networking (SDN) has been identified as a promising network paradigm for Wireless Sensor Networks (WSN) and the Internet of Things. It is a key tool for enabling Sensing as a Service, which provides infrastructure sharing thus reducing operational costs. While a few proposals on SDN southbound protocols designed for WSN are found in the literature, they lack adequate performance analysis. In this paper, we review ITSDN main features and present a performance evaluation with all the sensing nodes transmitting data periodically. We conducted a number of experiments varying the number of nodes and assessing the impact of flow table maximum capacity. We assessed the metrics of data delivery, data delay, control overhead and energy consumption in order to show the tradeoffs of using IT-SDN in comparison to the IETF RPL routing protocol. We discuss the main challenges still faced by IT-SDN in larger WSN, and how they could be addressed to make IT-SDN use worthwhile.}
    }
6 citations in 2019:

No way back? An SDN protocol for directed IoT networks

Renan Cerqueira Afonso Alves, Cintia Borges Margi, Fernando Kuipers

In 15th Wireless On-demand Network systems and Services Conference, IEEE/IFIP WONS 2019, 2019.

A Review of Wireless Sensor Network Localisation Based on Software Defined Networking

O. P. Cloete, A. M. Abu-Mahfouz, G. P. Hancke

In IEEE International Conference on Industrial Technology (ICIT), Pages 1731-1736, 2019.

Understanding the Performance of Software Defined Wireless Sensor Networks under Denial of Service Attack

Gustavo A. Nunez Segura, Cintia Borges Margi, Arsenia Chorti

Open Journal of Internet Of Things (OJIOT), 5(1), Pages 58-68, 2019.

A Comparison of Data Aggregation Techniques in Software-Defined Wireless Sensor Network

Pineas M. Egidius, Adnan M. Abu-Mahfouz, Gerhard P. Hancke

In 28th IEEE International Symposium on Industrial Electronics (ISIE), Vancouver, BC, Canada, Pages 1551-1555, 2019.

The Cost of Software-Defining Things: A Scalability Study of Software-Defined Sensor Networks

Renan C. A. Alves, Doriedson A. G. Oliveira, Gustavo A. Nunez Segura, Cintia B. Margi

IEEE Access, 7, Pages 115093-115108, 2019.

Exploring Control-Message Quenching in SDN-based Management of 6LoWPANs

Musa Ndiaye, Adnan M. Abu-Mahfouz, Gerhard P. Hancke, Bruno J. Silva

In 17th IEEE International Conference on Industrial Informatics (INDIN), Helsinki, Finland, Pages 890-983, 2019.

 Open Access 

Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning

Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 109-125, 2018, Downloads: 4092, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519310495220214 | GNL-LP: 1163928577 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Packet manipulation attack is one of the challenging threats in cyber-physical systems (CPSs) and Internet of Things (IoT), where information packets are corrupted during transmission by compromised devices. These attacks consume network resources, result in delays in decision making, and could potentially lead to triggering wrong actions that disrupt an overall system's operation. Such malicious attacks as well as unintentional faults are difficult to locate/identify in a large-scale mesh-like multihop network, which is the typical topology suggested by most IoT standards. In this paper, first, we propose a novel network architecture that utilizes powerful nodes that can support two distinct communication link technologies for identification of malicious networked devices (with typical singlelink technology). Such powerful nodes equipped with dual-link technologies can reveal hidden information within meshed connections that is hard to otherwise detect. By applying machine intelligence at the dual-link nodes, malicious networked devices in an IoT network can be accurately identified. Second, we propose two techniques based on unsupervised machine learning, namely hard detection and soft detection, that enable dual-link nodes to identify malicious networked devices. Our techniques exploit network diversity as well as the statistical information computed by dual-link nodes to identify the trustworthiness of resource-constrained devices. Simulation results show that the detection accuracy of our algorithms is superior to the conventional watchdog scheme, where nodes passively listen to neighboring transmissions to detect corrupted packets. The results also show that as the density of the dual-link nodes increases, the detection accuracy improves and the false alarm rate decreases.

BibTex:

    @Article{OJIOT_2018v4i1n09_XinLiu,
        title     = {Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning},
        author    = {Xin Liu and
                     Mai Abdelhakim and
                     Prashant Krishnamurthy and
                     David Tipper},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {109--125},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519310495220214},
        urn       = {urn:nbn:de:101:1-2018080519310495220214},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Packet manipulation attack is one of the challenging threats in cyber-physical systems (CPSs) and Internet of Things (IoT), where information packets are corrupted during transmission by compromised devices. These attacks consume network resources, result in delays in decision making, and could potentially lead to triggering wrong actions that disrupt an overall system's operation. Such malicious attacks as well as unintentional faults are difficult to locate/identify in a large-scale mesh-like multihop network, which is the typical topology suggested by most IoT standards. In this paper, first, we propose a novel network architecture that utilizes powerful nodes that can support two distinct communication link technologies for identification of malicious networked devices (with typical singlelink technology). Such powerful nodes equipped with dual-link technologies can reveal hidden information within meshed connections that is hard to otherwise detect. By applying machine intelligence at the dual-link nodes, malicious networked devices in an IoT network can be accurately identified. Second, we propose two techniques based on unsupervised machine learning, namely hard detection and soft detection, that enable dual-link nodes to identify malicious networked devices. Our techniques exploit network diversity as well as the statistical information computed by dual-link nodes to identify the trustworthiness of resource-constrained devices. Simulation results show that the detection accuracy of our algorithms is superior to the conventional watchdog scheme, where nodes passively listen to neighboring transmissions to detect corrupted packets. The results also show that as the density of the dual-link nodes increases, the detection accuracy improves and the false alarm rate decreases.}
    }
2 citations in 2019:

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liang Liu, Jingxiu Yang, Weizhi Meng

Computers & Electrical Engineering, 77, Pages 339-353, 2019.

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liang Liu, Zuchao Ma, Weizhi Meng

Future Generation Comp. Syst., 101, Pages 865-879, 2019.

 Open Access 

Techniques for the Generation of Arbitrary Three-Dimensional Shapes in Tile-Based Self-Assembly Systems

Florian-Lennert Lau, Kristof Stahl, Stefan Fischer

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 126-134, 2018, Downloads: 3486, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519311410579164 | GNL-LP: 1163928593 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: A big challenge in nanorobotics is the construction of nanoscale objects. DNA is a bio-compatible tool to reliably and constructively create objects at the nanoscale. A possible tool to build nano-sized structures are tile-based self-assembly systems on the basis of DNA. It is challenging and time-consuming to efficiently design blueprints for the desired objects. This paper presents basic algorithms for the creation of tilesets for nxnxn-cubes in the aTAM model. Only few publications focus on three-dimensional DNA crystals. Three-dimensional shapes are likely to be of more use in nanorobotics. We present three variations: hollow cubes, cube-grids and filled cubes. The paper also presents a basic algorithm to create arbitrary, finite, connected, three-dimensional and predefined shapes at temperature 1, as well as ideas for more efficient algorithms. Among those are algorithms for spheres, ellipsoids, red blood cells and other promising designs. The algorithms and tilesets are tested/verified using a software that has been developed for the purpose of verifying three-dimensional sets of tiletypes and was influenced by the tool ISU TAS. Others can use the simulator and the algorithms to quickly create sets of tiletypes for their desired nanostructures. A long learning process may thus be omitted.

BibTex:

    @Article{OJIOT_2018v4i1n10_Lau,
        title     = {Techniques for the Generation of Arbitrary Three-Dimensional Shapes in Tile-Based Self-Assembly Systems},
        author    = {Florian-Lennert Lau and
                     Kristof Stahl and
                     Stefan Fischer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {126--134},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519311410579164},
        urn       = {urn:nbn:de:101:1-2018080519311410579164},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {A big challenge in nanorobotics is the construction of nanoscale objects. DNA is a bio-compatible tool to reliably and constructively create objects at the nanoscale. A possible tool to build nano-sized structures are tile-based self-assembly systems on the basis of DNA. It is challenging and time-consuming to efficiently design blueprints for the desired objects. This paper presents basic algorithms for the creation of tilesets for nxnxn-cubes in the aTAM model. Only few publications focus on three-dimensional DNA crystals. Three-dimensional shapes are likely to be of more use in nanorobotics. We present three variations: hollow cubes, cube-grids and filled cubes. The paper also presents a basic algorithm to create arbitrary, finite, connected, three-dimensional and predefined shapes at temperature 1, as well as ideas for more efficient algorithms. Among those are algorithms for spheres, ellipsoids, red blood cells and other promising designs. The algorithms and tilesets are tested/verified using a software that has been developed for the purpose of verifying three-dimensional sets of tiletypes and was influenced by the tool ISU TAS. Others can use the simulator and the algorithms to quickly create sets of tiletypes for their desired nanostructures. A long learning process may thus be omitted.}
    }
1 citation in 2019:

Computation of decision problems within messages in DNA-tile-based molecular nanonetworks

Florian-Lennert Adrian Lau, Florian Bther, Regine Geyer, Stefan Fischer

Nano Comm. Netw., 21, 2019.

 Open Access 

Towards Intrinsic Molecular Communication Using Isotopic Isomerism

Gunther Ardelt, Christoph Külls, Horst Hellbrück

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 135-143, 2018, Downloads: 3230, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519312150952526 | GNL-LP: 1163928607 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we introduce a new approach for molecular communication (MC). The proposed method uses isotopomers as symbols in a communication scenario, and we name this approach isotopic molecular communication (IMC). We propose a modulation scheme based on isotopic isomerism, where symbols are encoded via isotopes in molecules. This can be advantageous in applications where the communication has to be independent from chemical molecular concentration. Application scenarios include nano communications with isotopes in a macroscopic environment, i.e. encoding freshwater flow of rivers or drinking water utilities, or medical applications where blood carries isotopomers used for communication in a human or animal body. We simulate the capacity of communication in the sense of symbols per second and maximum symbol rate for different applications. We provide estimations for the symbol rate per distance and we demonstrate the feasibility to identify isotopes reliably. In summary, this isotopic molecular communication is a new paradigm for data transfer independent from molecular concentrations and chemical reactions, and can provide higher throughput than ordinary molecular communications.

BibTex:

    @Article{OJIOT_2018v4i1n11_Ardelt,
        title     = {Towards Intrinsic Molecular Communication Using Isotopic Isomerism},
        author    = {Gunther Ardelt and
                     Christoph K\~{A}lls and
                     Horst Hellbr\~{A}ck},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {135--143},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519312150952526},
        urn       = {urn:nbn:de:101:1-2018080519312150952526},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we introduce a new approach for molecular communication (MC). The proposed method uses isotopomers as symbols in a communication scenario, and we name this approach isotopic molecular communication (IMC). We propose a modulation scheme based on isotopic isomerism, where symbols are encoded via isotopes in molecules. This can be advantageous in applications where the communication has to be independent from chemical molecular concentration. Application scenarios include nano communications with isotopes in a macroscopic environment, i.e. encoding freshwater flow of rivers or drinking water utilities, or medical applications where blood carries isotopomers used for communication in a human or animal body. We simulate the capacity of communication in the sense of symbols per second and maximum symbol rate for different applications. We provide estimations for the symbol rate per distance and we demonstrate the feasibility to identify isotopes reliably. In summary, this isotopic molecular communication is a new paradigm for data transfer independent from molecular concentrations and chemical reactions, and can provide higher throughput than ordinary molecular communications.}
    }
0 citation in 2019

 Open Access 

Dynamic Allocation of Smart City Applications

Igor Miladinovic, Sigrid Schefer-Wenzl

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 144-149, 2018, Downloads: 3729, Citations: 5

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519320192483088 | GNL-LP: 1163928623 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Cities around the world are evaluating the potential of Internet of Things (IoT) to automate and optimize public services. Cities that implement this approach are commonly referred to as smart cities. A smart city IoT architecture needs to be layered and scalable in order to fulfill not only today's but also future needs of smart cities. Network Function Virtualization (NFV) provides the scale and flexibility necessary for smart city services by enabling the automated control, management and orchestration of network resources. In this paper we consider a scalable, layered, NFV based smart city architecture and discuss the optimal location of applications regarding cloud computing and mobile edge computing (MEC). Introducing a novel concept of dynamic application allocation we show how to fully benefit from MEC and present relevant decision criteria.

BibTex:

    @Article{OJIOT_2018v4i1n12_Miladinovic,
        title     = {Dynamic Allocation of Smart City Applications},
        author    = {Igor Miladinovic and
                     Sigrid Schefer-Wenzl},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {144--149},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519320192483088},
        urn       = {urn:nbn:de:101:1-2018080519320192483088},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Cities around the world are evaluating the potential of Internet of Things (IoT) to automate and optimize public services. Cities that implement this approach are commonly referred to as smart cities. A smart city IoT architecture needs to be layered and scalable in order to fulfill not only today's but also future needs of smart cities. Network Function Virtualization (NFV) provides the scale and flexibility necessary for smart city services by enabling the automated control, management and orchestration of network resources. In this paper we consider a scalable, layered, NFV based smart city architecture and discuss the optimal location of applications regarding cloud computing and mobile edge computing (MEC). Introducing a novel concept of dynamic application allocation we show how to fully benefit from MEC and present relevant decision criteria.}
    }
2 citations in 2019:

IoT Architecture for Smart Cities Leveraging Machine Learning and SDN

Igor Miladinovic, Sigrid Schefer-Wenzl, Heimo Hirner

In 27th Telecommunications Forum (TELFOR), Pages 1-4, 2019.

Towards Intelligent Multi-Access Edge Computing Using Machine Learning

Igor Miladinovic, Sigrid Schefer-Wenzl

In Proceedings of the 13th Conference Internet of Things, Infrastructures and Mobile Applications (IMCL), Thessaloniki, Greece, Pages 1109-1117, 2019.

 Open Access 

Semantic Caching Framework: An FPGA-Based Application for IoT Security Monitoring

Laurent d'Orazio, Julien Lallet

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 150-157, 2018, Downloads: 4180, Citations: 7

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519321445601568 | GNL-LP: 116392864X | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Security monitoring is one subdomain of cybersecurity which aims to guarantee the safety of systems, continuously monitoring unusual events. The development of Internet Of Things leads to huge amounts of information, being heterogeneous and requiring to be efficiently managed. Cloud Computing provides software and hardware resources for large scale data management. However, performances for sequences of on-line queries on long term historical data may be not compatible with the emergency security monitoring. This work aims to address this problem by proposing a semantic caching framework and its application to acceleration hardware with FPGA for fast- and accurate-enough logs processing for various data stores and execution engines.

BibTex:

    @Article{OJIOT_2018v4i1n13_Orazio,
        title     = {Semantic Caching Framework: An FPGA-Based Application for IoT Security Monitoring},
        author    = {Laurent d'Orazio and
                     Julien Lallet},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {150--157},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519321445601568},
        urn       = {urn:nbn:de:101:1-2018080519321445601568},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Security monitoring is one subdomain of cybersecurity which aims to guarantee the safety of systems, continuously monitoring unusual events. The development of Internet Of Things leads to huge amounts of information, being heterogeneous and requiring to be efficiently managed. Cloud Computing provides software and hardware resources for large scale data management. However, performances for sequences of on-line queries on long term historical data may be not compatible with the emergency security monitoring. This work aims to address this problem by proposing a semantic caching framework and its application to acceleration hardware with FPGA for fast- and accurate-enough logs processing for various data stores and execution engines.}
    }
1 citation in 2019:

Evaluation de systemes de masses de données dans le cadre d’analyse de logs

Pierre Rolland, Laurent d’Orazio, Frédéric Majorczyk, Mohand Saıd Hacid

In Computer & Electronics Security Applications Rendez-vous (C&ESAR), 2019.

 Open Access 

Editorial of the Workshop on Very Large Internet of Things (VLIoT 2018)

Sven Groppe, Carlo Alberto Boano

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 1-6, 2018, Downloads: 3837

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519324071729480 | GNL-LP: 1163928704 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The 2nd "Very Large Internet of Things" (VLIoT) workshop in conjunction with the 44th International Conference on Very Large Data Bases (VLDB) taking place in Rio de Janeiro, Brazil in 2018 is a forum for all researchers in the area of Internet of Things especially interested in related data management issues. This editorial of a special issue containing the workshop's papers provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we determine and shortly analyze a statistics of the topics addressed by the accepted papers.

BibTex:

    @Article{OJIOT_2018v4i1n01_VLIoT2018,
        title     = {Editorial of the Workshop on Very Large Internet of Things (VLIoT 2018)},
        author    = {Sven Groppe and
                     Carlo Alberto Boano},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {1--6},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519324071729480},
        urn       = {urn:nbn:de:101:1-2018080519324071729480},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The 2nd "Very Large Internet of Things" (VLIoT) workshop in conjunction with the 44th International Conference on Very Large Data Bases (VLDB) taking place in Rio de Janeiro, Brazil in 2018 is a forum for all researchers in the area of Internet of Things especially interested in related data management issues. This editorial of a special issue containing the workshop's papers provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we determine and shortly analyze a statistics of the topics addressed by the accepted papers.}
    }
0 citations in 2019

 Open Access 

FICLONE: Improving DBpedia Spotlight Using Named Entity Recognition and Collective Disambiguation

Mohamed Chabchoub, Michel Gagnon, Amal Zouaq

Open Journal of Semantic Web (OJSW), 5(1), Pages 12-28, 2018, Downloads: 6571, Citations: 4

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519301478077663 | GNL-LP: 1163928461 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we present FICLONE, which aims to improve the performance of DBpedia Spotlight, not only for the task of semantic annotation (SA), but also for the sub-task of named entity disambiguation (NED). To achieve this aim, first we enhance the spotting phase by combining a named entity recognition system (Stanford NER ) with the results of DBpedia Spotlight. Second, we improve the disambiguation phase by using coreference resolution and exploiting a lexicon that associates a list of potential entities of Wikipedia to surface forms. Finally, to select the correct entity among the candidates found for one mention, FICLONE relies on collective disambiguation, an approach that has proved successful in many other annotators, and that takes into consideration the other mentions in the text. Our experiments show that FICLONE not only substantially improves the performance of DBpedia Spotlight for the NED sub-task but also generally outperforms other state-of-the-art systems. For the SA sub-task, FICLONE also outperforms DBpedia Spotlight against the dataset provided by the DBpedia Spotlight team.

BibTex:

    @Article{OJSW_2018v5i1n02_Cbabchoub,
        title     = {FICLONE: Improving DBpedia Spotlight Using Named Entity Recognition and Collective Disambiguation},
        author    = {Mohamed Chabchoub and
                     Michel Gagnon and
                     Amal Zouaq},
        journal   = {Open Journal of Semantic Web (OJSW)},
        issn      = {2199-336X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {12--28},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519301478077663},
        urn       = {urn:nbn:de:101:1-2018080519301478077663},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we present FICLONE, which aims to improve the performance of DBpedia Spotlight, not only for the task of semantic annotation (SA), but also for the sub-task of named entity disambiguation (NED). To achieve this aim, first we enhance the spotting phase by combining a named entity recognition system (Stanford NER ) with the results of DBpedia Spotlight. Second, we improve the disambiguation phase by using coreference resolution and exploiting a lexicon that associates a list of potential entities of Wikipedia to surface forms. Finally, to select the correct entity among the candidates found for one mention, FICLONE relies on collective disambiguation, an approach that has proved successful in many other annotators, and that takes into consideration the other mentions in the text. Our experiments show that FICLONE not only substantially improves the performance of DBpedia Spotlight for the NED sub-task but also generally outperforms other state-of-the-art systems. For the SA sub-task, FICLONE also outperforms DBpedia Spotlight against the dataset provided by the DBpedia Spotlight team.}
    }
2 citations in 2019:

Building annotated semantic model of software products towards integration of DBpedia with NVD vulnerability dataset

Brazhuk Andrei

International Journal of Open Information Technologies, 7(7), 2019.

Towards Building Knowledge Graphs from Natural Language Text with Open Relation Extraction and Semantic Disambiguation

Dag Vegard Kollstrøm Johnsen

2019. Master thesis at the University of Bergen

 Open Access 

Hijacking DNS Subdomains via Subzone Registration: A Case for Signed Zones

Peter Thomassen, Jan Benninger, Marian Margraf

Open Journal of Web Technologies (OJWT), 5(1), Pages 6-13, 2018, Downloads: 4848, Citations: 3

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018093019300979542360 | GNL-LP: 1168144450 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: We investigate how the widespread absence of signatures in DNS (Domain Name System) delegations, in combination with a common misunderstanding with regards to the DNS specification, has led to insecure deployments of authoritative DNS servers which allow for hijacking of subdomains without the domain owner's consent. This, in turn, enables the attacker to perform effective man-in-the-middle attacks on the victim's online services, including TLS (Transport Layer Security) secured connections, without having to touch the victim's DNS zone or leaving a trace on the machine providing the compromised service, such as the web or mail server. Following the practice of responsible disclosure, we present examples of such insecure deployments and suggest remedies for the problem. Most prominently, DNSSEC (Domain Name System Security Extensions) can be used to turn the problem from an integrity breach into a denial-of-service issue, while more thorough user management resolves the issue completely.

BibTex:

    @Article{OJWT_2018v5i1n02_Thomassen,
        title     = {Hijacking DNS Subdomains via Subzone Registration: A Case for Signed Zones},
        author    = {Peter Thomassen and
                     Jan Benninger and
                     Marian Margraf},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {6--13},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018093019300979542360},
        urn       = {urn:nbn:de:101:1-2018093019300979542360},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {We investigate how the widespread absence of signatures in DNS (Domain Name System) delegations, in combination with a common misunderstanding with regards to the DNS specification, has led to insecure deployments of authoritative DNS servers which allow for hijacking of subdomains without the domain owner's consent. This, in turn, enables the attacker to perform effective man-in-the-middle attacks on the victim's online services, including TLS (Transport Layer Security) secured connections, without having to touch the victim's DNS zone or leaving a trace on the machine providing the compromised service, such as the web or mail server. Following the practice of responsible disclosure, we present examples of such insecure deployments and suggest remedies for the problem. Most prominently, DNSSEC (Domain Name System Security Extensions) can be used to turn the problem from an integrity breach into a denial-of-service issue, while more thorough user management resolves the issue completely.}
    }
1 citation in 2019:

Understanding the Security Threats of Esoteric Subdomain Takeover and Prevention Scheme

S. M. Z. U. Rashid, M. I. Kamrul, A. Islam

In International Conference on Electrical, Computer and Communication Engineering (ECCE), Pages 1-4, 2019.

 Open Access 

Anonymous Shopping in the Internet by Separation of Data

Sven Groppe, Felix Kuhr, Mehmet Atilla Coskun

Open Journal of Web Technologies (OJWT), 5(1), Pages 14-22, 2018, Downloads: 3838, Citations: 2

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018093019301629565937 | GNL-LP: 1168144469 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Whenever clients shop in the Internet, they provide identifying data of themselves to parties like the webshop, shipper and payment system. These identifying data merged with their shopping history might be misused for targeted advertisement up to possible manipulations of the clients. The data also contains credit card or bank account numbers, which may be used for unauthorized money transactions by the involved parties or by criminals hacking the parties' computing infrastructure. In order to minimize these risks, we propose an approach for anonymous shopping by separation of data. We argue for the feasibility of our approach by discussing important operations like simple reclamation cases and criminal investigations.

BibTex:

    @Article{OJWT_2018v5i1n03_Groppe,
        title     = {Anonymous Shopping in the Internet by Separation of Data},
        author    = {Sven Groppe and
                     Felix Kuhr and
                     Mehmet Atilla Coskun},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {14--22},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018093019301629565937},
        urn       = {urn:nbn:de:101:1-2018093019301629565937},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Whenever clients shop in the Internet, they provide identifying data of themselves to parties like the webshop, shipper and payment system. These identifying data merged with their shopping history might be misused for targeted advertisement up to possible manipulations of the clients. The data also contains credit card or bank account numbers, which may be used for unauthorized money transactions by the involved parties or by criminals hacking the parties' computing infrastructure. In order to minimize these risks, we propose an approach for anonymous shopping by separation of data. We argue for the feasibility of our approach by discussing important operations like simple reclamation cases and criminal investigations.}
    }
0 citation in 2019

 Open Access 

Word Embeddings for Wine Recommender Systems Using Vocabularies of Experts and Consumers

Christophe Cruz, Cyril Nguyen Van, Laurent Gautier

Open Journal of Web Technologies (OJWT), 5(1), Pages 23-30, 2018, Downloads: 4028, Citations: 6

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018093019302313586232 | GNL-LP: 1168144477 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: This vision paper proposes an approach to use the most advanced word embeddings techniques to bridge the gap between the discourses of experts and non-experts and more specifically the terminologies used by the twocommunities. Word embeddings makes it possible to find equivalent terms between experts and non-experts, byapproach the similarity between words or by revealing hidden semantic relations. Thus, these controlledvocabularies with these new semantic enrichments are exploited in a hybrid recommendation system incorporating content-based ontology and keyword-based ontology to obtain relevant wines recommendations regardless of the level of expertise of the end user. The major aim is to find a non-expert vocabulary from semantic rules to enrich the knowledge of the ontology and improve the indexing of the items (i.e. wine) and the recommendation process.

BibTex:

    @Article{OJWT_2018v5i1n04_Cruz,
        title     = {Word Embeddings for Wine Recommender Systems Using Vocabularies of Experts and Consumers},
        author    = {Christophe Cruz and
                     Cyril Nguyen Van and
                     Laurent Gautier},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {23--30},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018093019302313586232},
        urn       = {urn:nbn:de:101:1-2018093019302313586232},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {This vision paper proposes an approach to use the most advanced word embeddings techniques to bridge the gap between the discourses of experts and non-experts and more specifically the terminologies used by the twocommunities. Word embeddings makes it possible to find equivalent terms between experts and non-experts, byapproach the similarity between words or by revealing hidden semantic relations. Thus, these controlledvocabularies with these new semantic enrichments are exploited in a hybrid recommendation system incorporating content-based ontology and keyword-based ontology to obtain relevant wines recommendations regardless of the level of expertise of the end user. The major aim is to find a non-expert vocabulary from semantic rules to enrich the knowledge of the ontology and improve the indexing of the items (i.e. wine) and the recommendation process.}
    }
0 citation in 2019

 Open Access 

Consuming Web Data in a Guiding App for Public Bus Users

Miguel Ángel Garrido Blázquez, Paloma Cáceres, Belén Vela, Carlos E. Cuesta, José María Cavero Barca, Almudena Sierra-Alonso

Open Journal of Web Technologies (OJWT), 5(1), Pages 31-43, 2018, Downloads: 3559, Citations: 3

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018093019302970779034 | GNL-LP: 1168144485 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The complexity of urban public bus networks in big cities makes their use very difficult. This paper presents Notify.me, a set of pervasive services for mobility that employs open data from the public bus network in Madrid. Our solution provides both a guiding service to assist users travelling by bus and a notifying service (visual, acoustical and sensorial) that informs them when a relevant point on their route has been reached (transfer or destination). Notify.me needs a starting point, which can be the user's current location, a destination and the preferences regarding the best route for the user. Notify.me requests a route from the Madrid public bus company via SOAP Web services. The back-end responds with the calculated route, the user's route, which includes the bus lines, the transfers and the pedestrian routes needed to reach the destination. Finally, an empirical evaluation of the experiences of users who employed Notify.me is presented.

BibTex:

    @Article{OJWT_2018v5i1n05_Blazquez,
        title     = {Consuming Web Data in a Guiding App for Public Bus Users},
        author    = {Miguel \~{A}ngel Garrido Bl\~{A}zquez and
                     Paloma C\~{A}ceres and
                     Bel\~{A}n Vela and
                     Carlos E. Cuesta and
                     Jos\~{A} Mar\~{A}a Cavero Barca and
                     Almudena Sierra-Alonso},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {31--43},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018093019302970779034},
        urn       = {urn:nbn:de:101:1-2018093019302970779034},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The complexity of urban public bus networks in big cities makes their use very difficult. This paper presents Notify.me, a set of pervasive services for mobility that employs open data from the public bus network in Madrid. Our solution provides both a guiding service to assist users travelling by bus and a notifying service (visual, acoustical and sensorial) that informs them when a relevant point on their route has been reached (transfer or destination). Notify.me needs a starting point, which can be the user's current location, a destination and the preferences regarding the best route for the user. Notify.me requests a route from the Madrid public bus company via SOAP Web services. The back-end responds with the calculated route, the user's route, which includes the bus lines, the transfers and the pedestrian routes needed to reach the destination. Finally, an empirical evaluation of the experiences of users who employed Notify.me is presented.}
    }
0 citation in 2019

 Open Access 

Webpage Ranking Analysis of Various Search Engines with Special Focus on Country-Specific Search

Sinan Babayigit, Sven Groppe

Open Journal of Web Technologies (OJWT), 5(1), Pages 44-64, 2018, Downloads: 4674, Citations: 1

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018093019303617104000 | GNL-LP: 1168144493 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In order to attract many visitors to their own website, it is extremely important for website developers that their webpage is one of the best ranked webpages of search engines. As a rule, search engine operators do not disclose their exact ranking algorithm, so that website developers usually have only vague ideas about which measures have particularly positive influences on the webpage ranking. Conversely, we ask the question: "What are the properties of the best ranked webpages?" For this purpose, we perform a detailed analysis, in which we compare the properties of the best ranked webpages with the worse ranked webpages. Furthermore, we compare countryspecific differences.

BibTex:

    @Article{OJWT_2018v5i1n06_Babayigit,
        title     = {Webpage Ranking Analysis of Various Search Engines with Special Focus on Country-Specific Search},
        author    = {Sinan Babayigit and
                     Sven Groppe},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {44--64},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018093019303617104000},
        urn       = {urn:nbn:de:101:1-2018093019303617104000},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In order to attract many visitors to their own website, it is extremely important for website developers that their webpage is one of the best ranked webpages of search engines. As a rule, search engine operators do not disclose their exact ranking algorithm, so that website developers usually have only vague ideas about which measures have particularly positive influences on the webpage ranking. Conversely, we ask the question: "What are the properties of the best ranked webpages?" For this purpose, we perform a detailed analysis, in which we compare the properties of the best ranked webpages with the worse ranked webpages. Furthermore, we compare countryspecific differences.}
    }
0 citation in 2019

 Open Access 

The First International Workshop on Web Data Processing & Reasoning (WDPAR 2018)

Sven Groppe, Christophe Cruz

Open Journal of Web Technologies (OJWT), 5(1), Pages 1-5, 2018, Downloads: 3837

Special Issue: Proceedings of the International Workshop on Web Data Processing & Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018110508370722588082 | GNL-LP: 1170594662 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The first Web Data Processing & Reasoning (WDPAR) workshop in conjunction with the 41st German Conference on Artificial Intelligence (KI) taking place in Berlin, Germany in 2018 is a forum for all researchers especially interested in processing of and reasoning on web data. The proceedings of WDPAR@KI 2018 are published in the Open Journal of Web Technologies (OJWT) (www.ronpub.com/ojwt) as special issue and the publisher of OJWT is RonPub. This editorial provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we introduce the accepted papers and their topics in the editorial.

BibTex:

    @Article{OJWT_2018v5i1n01e_WDRAR2018,
        title     = {The First International Workshop on Web Data Processing \& Reasoning (WDPAR 2018)},
        author    = {Sven Groppe and
                     Christophe Cruz},
        journal   = {Open Journal of Web Technologies (OJWT)},
        issn      = {2199-188X},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {1--5},
        note      = {Special Issue: Proceedings of the International Workshop on Web Data Processing \& Reasoning (WDPAR 2018) in conjunction with the 41st German Conference on Artificial Intelligence (KI) in Berlin, Germany.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018110508370722588082},
        urn       = {urn:nbn:de:101:1-2018110508370722588082},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The first Web Data Processing \& Reasoning (WDPAR) workshop in conjunction with the 41st German Conference on Artificial Intelligence (KI) taking place in Berlin, Germany in 2018 is a forum for all researchers especially interested in processing of and reasoning on web data. The proceedings of WDPAR@KI 2018 are published in the Open Journal of Web Technologies (OJWT) (www.ronpub.com/ojwt) as special issue and the publisher of OJWT is RonPub. This editorial provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we introduce the accepted papers and their topics in the editorial.}
    }
0 citations in 2019

 Open Access 

Effectiveness of NoSQL and NewSQL Databases in Mobile Network Event Data: Cassandra and ParStream/Kinetic

Petri Kotiranta, Marko Junkkari

Open Journal of Databases (OJDB), 5(1), Pages 1-13, 2018, Downloads: 5108

Full-Text: pdf | URN: urn:nbn:de:101:1-2018122318330989940385 | GNL-LP: 1174122692 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Continuously growing amount of data has inspired seeking more and more efficient database solutions for storing and manipulating data. In big data sets, NoSQL databases have been established as alternatives for traditional SQL databases. The effectiveness of these databases has been widely tested, but the tests focused only on key-value data that is structurally very simple. Many application domains, such as telecommunication, involve more complex data structures. Huge amount of Mobile Network Event (MNE) data is produced by an increasing number of mobile and ubiquitous applications. MNE data is structurally predetermined and typically contains a large number of columns. Applications that handle MNE data are usually insert intensive, as a huge amount of data are generated during rush hours. NoSQL provides high scalability and its column family stores suits MNE data well, but NoSQL does not support ACID features of the traditional relational databases. NewSQL is a new kind of databases, which provide the high scalability of NoSQL while still maintaining ACID guarantees of the traditional DBMS. In the paper, we evaluation NEM data storing and aggregating efficiency of Cassandra and ParStream/Kinetic databases and aim to find out whether the new kind of database technology can clearly bring performance advantages over legacy database technology and offers an alternative to existing solutions. Among the column family stores of NoSQL, Cassandra is especially a good choice for insert intensive applications due to its way to handle data insertions. ParStream is a novel and advanced NewSQL like database and is recently integrated into Cisco Kinetic. The results of the evaluation show that ParStream is much faster than Cassandra when storing and aggregating MNE data and the NewSQL is a very strong alternative to existing database solutions for insert intensive applications.

BibTex:

    @Article{OJDB_2018v5i1n01_Kotiranta,
        title     = {Effectiveness of NoSQL and NewSQL Databases in Mobile Network Event Data: Cassandra and ParStream/Kinetic},
        author    = {Petri Kotiranta and
                     Marko Junkkari},
        journal   = {Open Journal of Databases (OJDB)},
        issn      = {2199-3459},
        year      = {2018},
        volume    = {5},
        number    = {1},
        pages     = {1--13},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018122318330989940385},
        urn       = {urn:nbn:de:101:1-2018122318330989940385},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Continuously growing amount of data has inspired seeking more and more efficient database solutions for storing and manipulating data. In big data sets, NoSQL databases have been established as alternatives for traditional SQL databases. The effectiveness of these databases has been widely tested, but the tests focused only on key-value data that is structurally very simple. Many application domains, such as telecommunication, involve more complex data structures. Huge amount of Mobile Network Event (MNE) data is produced by an increasing number of mobile and ubiquitous applications. MNE data is structurally predetermined and typically contains a large number of columns. Applications that handle MNE data are usually insert intensive, as a huge amount of data are generated during rush hours. NoSQL provides high scalability and its column family stores suits MNE data well, but NoSQL does not support ACID features of the traditional relational databases. NewSQL is a new kind of databases, which provide the high scalability of NoSQL while still maintaining ACID guarantees of the traditional DBMS. In the paper, we evaluation NEM data storing and aggregating efficiency of Cassandra and ParStream/Kinetic databases and aim to find out whether the new kind of database technology can clearly bring performance advantages over legacy database technology and offers an alternative to existing solutions. Among the column family stores of NoSQL, Cassandra is especially a good choice for insert intensive applications due to its way to handle data insertions. ParStream is a novel and advanced NewSQL like database and is recently integrated into Cisco Kinetic. The results of the evaluation show that ParStream is much faster than Cassandra when storing and aggregating MNE data and the NewSQL is a very strong alternative to existing database solutions for insert intensive applications.}
    }
0 citations in 2019