The presentation titled, "The role of semantic web technologies in smart environments" was presented by Faisal Razzak on 15/03/2013 (14:10) at DAUIN, Politecnico di Torino, Italy. The presentation provides an overview of the PhD Thesis and explores the potential role of semantic web technologies in smart/Intelligent environments. It ponders on two main contributions, i.e., User Intelligible goals and Semantic Data Exchange. Briefly talks about Domotic Effects framework (Modelling, Evaluation, Enforcement and Optimization) and Effects Ontology. It also talks about the concept of Linked Open Dynamic Data and Publisher Ontology.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Abstract: Watermarking is mainly projected for copy right protection, data safeguard, and data thrashing, etc. Nowadays all the communication requires protection. Estimation of video quality has a major role in today’s video distribution, communication control and e-commerce. Consumer fulfillment is achieved by providing good quality. Here the video input is changed into frames and the image set as watermark is embedded into the frames. The embedding process is carried out using DWT, then the embedded frame and other remaining frames are again changed into video file and it is transmitted. At the receiver side watermark image is extracted from the video. Finally, by using metrics such as TDR, PSNR the quality of watermark image is estimated under distortion. All experiments and tests are carried out using MATLAB.
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Abstract: Watermarking is mainly projected for copy right protection, data safeguard, and data thrashing, etc. Nowadays all the communication requires protection. Estimation of video quality has a major role in today’s video distribution, communication control and e-commerce. Consumer fulfillment is achieved by providing good quality. Here the video input is changed into frames and the image set as watermark is embedded into the frames. The embedding process is carried out using DWT, then the embedded frame and other remaining frames are again changed into video file and it is transmitted. At the receiver side watermark image is extracted from the video. Finally, by using metrics such as TDR, PSNR the quality of watermark image is estimated under distortion. All experiments and tests are carried out using MATLAB.
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
Mind the Gap_Bridging the Gap Between Research and Design.
How can we ensure that research insights have the power to inform and inspire design? Communicating insights in ways that are meaningful, actionable, descriptive and aspirational demonstrate value and illustrate futures rich with customer understanding. Insight translation is the next step in design research providing alignment within companies and inspiration for designers.
https://imatge-upc.github.io/wav2pix/
Speech is a rich biometric signal that contains information about the identity, gender and emotional state of the speaker. In this work, we explore its potential to generate face images of a speaker by conditioning a Generative Adversarial Network (GAN) with raw speech input. We propose a deep neural network that is trained from scratch in an end-to-end fashion, generating a face directly from the raw speech waveform without any additional identity information (e.g reference image or one-hot encoding). Our model is trained in a self-supervised fashion by exploiting the audio and visual signals naturally aligned in videos. With the purpose of training from video data, we present a novel dataset collected for this work, with high-quality videos of ten youtubers with notable expressiveness in both the speech and visual signals.
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
Communication is always having a great impact in every domain and how it is considered the meaning of the thoughts and expressions that attract the researchers to bridge this gap for every living being.
The objective of this project is to identify the symbolic expression through images so that the communication gap between a normal and hearing impaired person can be easily bridged.
Github Link:https://github.com/TrilokiDA/Hand_Sign_Language
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
Enacting Emergent Configurations in the IoT through Domain Objectsantbucc
In this paper, we: (i) present the IoT-FED architectural
approach to enable the automated formation and enactment of ECs. IoT-FED exploits heterogeneous and independently developed things, IoT services, and applications which are modeled as Domain Objects (DOs), a service-based
formalism. Additionally, we (ii) discuss the prototype we developed and the experiments run in our IoT lab, for validation purposes
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
Mind the Gap_Bridging the Gap Between Research and Design.
How can we ensure that research insights have the power to inform and inspire design? Communicating insights in ways that are meaningful, actionable, descriptive and aspirational demonstrate value and illustrate futures rich with customer understanding. Insight translation is the next step in design research providing alignment within companies and inspiration for designers.
https://imatge-upc.github.io/wav2pix/
Speech is a rich biometric signal that contains information about the identity, gender and emotional state of the speaker. In this work, we explore its potential to generate face images of a speaker by conditioning a Generative Adversarial Network (GAN) with raw speech input. We propose a deep neural network that is trained from scratch in an end-to-end fashion, generating a face directly from the raw speech waveform without any additional identity information (e.g reference image or one-hot encoding). Our model is trained in a self-supervised fashion by exploiting the audio and visual signals naturally aligned in videos. With the purpose of training from video data, we present a novel dataset collected for this work, with high-quality videos of ten youtubers with notable expressiveness in both the speech and visual signals.
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
Communication is always having a great impact in every domain and how it is considered the meaning of the thoughts and expressions that attract the researchers to bridge this gap for every living being.
The objective of this project is to identify the symbolic expression through images so that the communication gap between a normal and hearing impaired person can be easily bridged.
Github Link:https://github.com/TrilokiDA/Hand_Sign_Language
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
Enacting Emergent Configurations in the IoT through Domain Objectsantbucc
In this paper, we: (i) present the IoT-FED architectural
approach to enable the automated formation and enactment of ECs. IoT-FED exploits heterogeneous and independently developed things, IoT services, and applications which are modeled as Domain Objects (DOs), a service-based
formalism. Additionally, we (ii) discuss the prototype we developed and the experiments run in our IoT lab, for validation purposes
Towards application development for the internet of things updatedPankesh Patel
The Internet of Things (IoT) integrates the physical world with the existing Internet, and is rapidly gaining popularity, thanks to the increased adoption of smart phones and sensing devices. One of the important challenges in this domain is to enable domain experts to easily specify applications for the IoT. As a
first step towards developing a suitable programming
abstraction, in this paper we present a domain
model for applications in the Internet of Things, based on a
survey of recently proposed IoT applications from the real
world that represent a wide class of behaviors found in IoT
use cases.
Exploring Advanced Deep Learning Projects.pdfprakashdm2024
Join us as we beginning the expedition of the most up-to-date area of high level deep learning project: a detailed guide. The health diagnostics to natural language processing how artificial intelligence will shape our world is just briefly mentioned. Let’s get started by visiting the blog and unearth the recent developments, techniques, and hurdles in the field of deep learning, as the experts channel efforts towards making the impossible possible.
Grasping the Future: Virtual Hands Control for Fine Motor TasksRonald Punako, Jr.
Paper discusses measurement of learner presence when using virtual hands for fine motor tasks. Relationship and impacts to cognitive and psychomotor skills training are also discussed.
Approximate Semantic Matching of Heterogeneous EventsSouleiman Hasan
Event-based systems have loose coupling within space, time and
synchronization, providing a scalable infrastructure for
information exchange and distributed workflows. However,
event-based systems are tightly coupled, via event subscriptions
and patterns, to the semantics of the underlying event schema and
values. The high degree of semantic heterogeneity of events in
large and open deployments such as smart cities and the sensor
web makes it difficult to develop and maintain event-based
systems. In order to address semantic coupling within event-based
systems, we propose vocabulary free subscriptions together with
the use of approximate semantic matching of events. This paper
examines the requirement of event semantic decoupling and
discusses approximate semantic event matching and the
consequences it implies for event processing systems. We
introduce a semantic event matcher and evaluate the suitability of
an approximate hybrid matcher based on both thesauri-based and
distributional semantics-based similarity and relatedness
measures. The matcher is evaluated over a structured
representation of Wikipedia and Freebase events. Initial
evaluations show that the approach matches events with a
maximal combined precision-recall F1 score of 75.89% on
average in all experiments with a subscription set of 7
subscriptions. The evaluation shows how a hybrid approach to
semantic event matching outperforms a single similarity measure
approach.
Enabling High Level Application Development In The Internet Of ThingsPankesh Patel
The Internet of Things (IoT) combines Wireless Sensor and Actuation Networks (WSANs), Pervasive
computing, and the elements of the \\traditional" Internet such as Web and database servers. This leads to
the dual challenges of scale and heterogeneity in these systems, which comprise a large number of devices of
dierent characteristics. In view of the above, developing IoT applications is challenging because it involves
dealing with a wide range of related issues, such as lack of separation of concerns, need for domain experts to
write low level code, and lack of specialized domain specic languages (DSLs). Existing software engineering
approaches only cover a limited subset of the above-mentioned challenges.
In this work, we propose an application development process for the IoT that aims to comprehensively
address the above challenges. We rst present the semantic model of the IoT, based on which we identify
the roles of the various stakeholders in the development process, viz., domain expert, software designer,
application developer, device developer, and network manager, along with their skills and responsibilities.
To aid them in their tasks, we propose a model-driven development approach which uses customized lan-
guages for each stage of the development process: Srijan Vocabulary Language (SVL) for specifying the
domain vocabulary, Srijan Architecture Language (SAL) for specifying the architecture of the application,
and Srijan Network Language (SNL) for expressing the properties of the network on which the application
will execute; each customized to the skill level and area of expertise of the relevant stakeholder. For the
application developer specifying the internal details of each software component, we propose the use of a
customized generated framework using a language such as Java. Our DSL-based approach is supported by
code generation and task-mapping techniques in an application development tool developed by us. Our
initial evaluation based on two realistic scenarios shows that the use of our techniques/framework succeeds
in improving productivity while developing IoT applications.
Gooffellow G, Maino D. Control the computer with your eyes. AOANews 2012;51)5:33.
Can you really control a computer just using your eyes. Read this story in the AOANews to find out!
Home automation has recently gained a new momentum
thanks to the ever-increasing commercial availability of domotic components.
In this context, researchers are working to provide interoperation
mechanisms and to add intelligence on top of them. For supporting
intelligent behaviors, house modeling is an essential requirement to understand
current and future house states and to possibly drive more
complex actions. In this paper we propose a new house modeling ontology
designed to fit real world domotic system capabilities and to
support interoperation between currently available and future solutions.
Taking advantage of technologies developed in the context of the Semantic
Web, the DogOnt ontology supports device/network independent
description of houses, including both “controllable” and architectural elements.
States and functionalities are automatically associated to the
modeled elements through proper inheritance mechanisms and by means
of properly defined SWRL auto-completion rules which ease the modeling
process, while automatic device recognition is achieved through
classification reasoning.
Software Preservation: challenges and opportunities for reproductibility (Sci...Roberto Di Cosmo
Reprodicibility of scientific experiments, now mostly based on software tools, is in a sore state. We investigate here some of the causes and propose long term Software Preservation as one of the essential elements needed to bring our Science more in line with the Scientific Method.
"Keynote - Preserving Software: Challenges and Opportunities for Reproducibility of Science and Technology"
By Roberto Di Cosmo, Irill for ScilabTEC 2015
Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...SensorUp
This is a presentation file prepared for the Vespucci Summer Institute 2016 Week 2. It serves as the introductory material for discussions. It covers the introduction of the Internet of Things, smart cities, what do we mean by "smart" cities, and finally touched on the topic of startups for the IoT field.
Linked Open (Dynamic) Data for Smart sensing and Measuring environments. The paper was presented at The 3rd International Conference on Ambient Systems, Networks and Technologies August 27-29, 2012, Niagara Falls, Ontario, Canada
Recommendations for selection process automation in systematic reviewsFaisal Razzak
This is a report providing recommendations for the selection process automation in systematic reviews. It is completed as part of an exam for the course "Empirical methods in Software Engineering". Presented by Faisal Razzak.
The recommendations are based on the previous work described in "Linked Data approach for selection process automation in Systematic Reviews"
The Role of Semantic Web Technologies in Smart Environments
1. Politecnico di Torino
Dip. Automatica e Informatica
Final PhD Presentation @ DAUIN Torino, Italy
The Role of Semantic Web Technologies
in Smart Environments
Faisal Razzak
2. My PhD work
User Intelligible Goals
• Domotic Effects
• Modeling
• Evaluation
• Enforcement
• Optimization in Energy Management domain
Semantic Data Exchange
• Linked Open Dynamic Data -- LO(D)D
• Semantic Energy Information Publishing Framework (SEIPF)
Other Works – Internet of Things
• Spamming the Internet of Things (IoT)
• Web of Domotics (WoD)
• Eye Tracking Systems (Cogain Project)
2 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
4. Motivation
Users pour their personalities in order to use and
transform their personal environments (2006).
Resulted in “Programmable smart/ personal
environments”.
Davidoff, Scott, Min Lee, Charles Yiu, John Zimmerman, and Anind Dey. "Principles of smart home
control." UbiComp 2006: Ubiquitous Computing (2006): 19-34
4 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
5. Motivation
IST Advisory group published a draft titled „Ambient
Intelligence: From vision to reality‟. In order to build
intelligence, we need to innovate abstract concepts and
models to address human centric expressions of
personal style. (2003)
A series of workshops and interviews, concluded that
designers work top-down and like to start from abstract
descriptions. (2008)
The need for abstract models to address human centric
expressions
1) Ducatel, K., M. Bogdanowicz, F. Scapolo, J. Leijten, and J. C. Burgelman. "Ambient
intelligence: From vision to reality." IST Advisory Group Draft Rep., Eur. Comm(2003).
2) van Doorn, Mark, Arjen de Vries, and Emile Aarts. "End-User Software Engineering of
Smart Retail Environments: The Intelligent Shop Window." Ambient Intelligence(2008):
157-174.
5 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
6. The Issues
The issue of Device centric vision?
The question of Enforcement?
The question of Evaluation (monitoring)?
Can there be a unified model?
6 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
7. Domotic Effects Framework
Domotic Effects model Human
intelligible state and goal.
• It provides AMI designers with
an abstraction layer that
enables defining generic goals
inside the environment, in a
declarative way.
• The high-level nature allows
the residents to program their
personal, office or work spaces
as they see fit.
• Simple Effect (SE) and
DogEffects Ontology Complex Effect (CE)
7 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
12. How to put it simply?
Enforcement ? Evaluation
Users’ Goals Devices
Users
12 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
13. More Details
Mathematical Enforcement Evaluation
Formulation Architecture Architecture
Results
13 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
14. Enforcement
16 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
15. Evaluation – Zero Delay Simulation
17 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
16. Is it Applicable? -- Evaluation
Evaluation
In one experiment, results showed that for an iteration the
presence of 1500 CEs with the maximum level of 177 can
be evaluated in 118 ms (averaged over 150 times).
In another experiment results showed that for a single
device change, the presence of 1400 CEs with the
maximum level of 272 can be evaluated in 258 ms.
The goal was in less than 1 or 2 seconds.
18 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
17. Is it Applicable? -- Enforcement
Six use cases
Secure Home
Home Illumination
Morning Wakeup
Isolated Kitchen
Room Illumination
Air Passage across Home
All possible combination of use cases, i.e., 64
In summary, the implemented enforcement module was able to
resolve to devices in less than 100 ms.
The goal was in less than 1 or 2 seconds.
19 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
18. An enforcement with minimal power
consumption
Formulation
Results
Compared against
Enumeration approach.
For 90% of iterations the
result of power
consumption was better
or at least equal (in case
of minimal).
The heuristic solution
time was between 1 to
2 seconds for all cases.
Even for cases with
more than 100,000
(enumerated)
20
solutions.
Presentation @DAUIN, Razzak
Politecnico di Torino, Italy
19. User Intelligible goals – Domotic Effects
(Papers)
Published (ISI-Journal)
Fulvio Corno and Faisal Razzak. "Intelligent Energy Optimization for User
Intelligible Goals in Smart Home Environments." IEEE Transactions on Smart
Grid (2012): Vol. 3 Issue: 4, pp. 2128-2135, ISSN - 1949-3053
Submitted (ISI-Journal)
Fulvio Corno and Faisal Razzak: SAT Based enforcement of Domotic Effects in
Smart Environments
Fulvio Corno and Faisal Razzak: Monitoring of Smart Environments using
Domotic Effects
Currently Writing
Dario Bonino, Fulvio Corno and Faisal Razzak: Modeling Intelligible Effects in
Smart Homes
22 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
20. An Alternate View
Semantic web technologies provide both strong
structural representation and semantics.
AGAINST
Semantic web technologies provide only strong
structural representation.
Semantics comes from context (User and current
settings).
24 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
22. Context
Smart Sensing and Measuring Environments
Smart Homes Sensor and
Smart Factories
Smart Grid Actuator Networks
Environment monitoring
Social mobile applications
Smart Appliances
Affordable and efficient sensors
26 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
23. Context
Smart Sensing and Measuring Environments
Smart Appliances
acceleration
acceleration compass
compass GPS
air pressure proximity
temperature microphone
energy light camera
(active, reactive, rev
BT Scan
erse, kVAr, ...)
Affordable and efficient sensors
27 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
24. Context
Smart Sensing and Measuring Environments
Smart Appliances
Affordable and efficient sensors
Motion
RFID
Smoke Pressure
Gyroscope
Proximity 2D codes
28 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
25. Motivation
Applications need to access
information from multiple
Application Application environments
Standard way to publish
and consume information
Environ Environ Environ About accessible
ment ment ment environments
About available
Applian Applian Applian
applicances, sensors and
ces ces ces their characteristics
About the actual data
measured by sensors
sensors sensors sensors
29 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
26. Other Approaches
Handling Temporal Data (Time Ontology)
RDF Streaming Engines (C-SPARQL,
SPARQLStream, EP-SPARQL)
1. http://www.w3.org/TR/owl-time/
2. D. Anicic, P. Fodor, S. Rudolph, N. Stojanovic, EP-SPARQL: a unified language for event processing and stream
reasoning, in: Proceedings of the 20th international conference on World wide web, ACM, 2011, pp. 635–644.
3. D. Barbieri, D. Braga, S. Ceri, E. Della Valle, M. Grossniklaus, C-SPARQL: SPARQL for continuous querying, in:
Proceedings of the 18th international conference on World wide web, ACM, 2009, pp. 1061–1062.
4. S. Groppe, J. Groppe, D. Kukulenz, V. Linnemann, A SPARQL engine for streaming RDF data, in: Signal-Image
Technologies and Internet-Based System, 2007. Third International IEEE Conference on, IEEE, 2007, pp. 167–
174.
5. D. Le-Phuoc, M. Dao-Tran, J. Xavier Parreira, M. Hauswirth, A native and adaptive approach for unified
processing of linked streams and linked data, The Semantic Web–ISWC 2011 (2011) 370–388.
30 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
27. Approach
Applications need to access
Adopt Semantic Web information from multiple
«Linked Open Data environments
(LOD)» approach Standard way to publish
and consume information
Static information: About accessible
Can be encoded in RDF environments
according to a public
About available
Ontology
applicances, sensors and
their characteristics
Dynamic information: About the actual data
New approach to measured by sensors
represent streams of RDF
events
31 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
28. 32 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
29. Producer Consumer
Application Application
Publisher Publishes Views & Subscribe
Compone r
nt Compone
PID
nt
Document Subscribe
s to
E Channels
E
E E
Smart Environment
E E Channel 1 E E
E E Channel2 E E
Transport Mechanism (3rd party Cloud based Service)
33 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
30. General LO(D)D Architecture
Smart Static
Environment information
Producer publishes
Application about
E sensor
streams
G monitors
F
34 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
31. General LO(D)D Architecture
Smart Static
Environment information
Producer publishes
E Application about
E F sensor
G streams
E
G monitors describes
F
E Sensor
G E
data
F channel
G Sensor
updates F
data
channel
G
Sensor
data
channel
35 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
32. General LO(D)D Architecture
Smart Static subscribes
Environment information
Producer publishes
E Application about Consumer
E F sensor E Application
G streams
E
G monitors describes
F Consumer
E
E
E Sensor Application
G E E
data
F channel
G Sensor G
Consumer
updates F Application
data F
channel receives
G G
Sensor
data
channel
36 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
33. Proposed solutions
Producer Open source libraries and API to enable
Application
Consumer application to interact with LO(D)D data
Application
RDF document with meta-data (PID)
Static Publisher information
information
List of channels, their source data, their
about
sensor datatypes, and subscription URI/key
streams RDF «fragments» representing each event
E Contains: event#, sensor id, timestamp,
F
G value, unit of measure
E
Uses publish-subscribe pattern as transport
mechanism for distributing RDF fragments
Sensor
data
channel
37 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
34. Publisher Information Document (PID)
According to lightweight «Publisher» ontology
Contains declarations of all channels handled by this publisher
– all needed static information
Gives information to subscribe to channels
Created by <RDF:Description RDF:about="&Publisher;energymtr">
publisher API <publisher:Location RDF:datatype="&xsd;string">
Torino, Italia</publisher:Location>
Published
over http <publisher:subscribekey>sub-xxxxxx-
42904d46dEEEEE
</publisher:subscribekey>
<publisher:channelName>Energy Meters
</publisher:channelName>
<RDF:type RDF:resource="&Publisher;Channel"/>
</RDF:Description>
38 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
35. Event data fragments
Individual data points encoded in RDF
Self-consistent information (e.g. Unit of measure)
Standard syntax and semantics
Application-independent representation
Compact
<rdf:Description RDF:about = "&publisher;emergymtrChan1">
encodings <publisher:MeterNumber RDF:datatype="&xsd;int">
231 </publisher:MeterNumber>
available
<publisher:Unit RDF:datatype="&xsd;string" >
http://purl.oclc.org/NET/muo/ucum/unit/power-level/
bel-kilowatt</publisher:Unit>
<publisher:hasTimeStamp RDF:datatype="&xsd;dateTime">
2012-02-02T13:06:41.056Z </publisher:hasTimeStamp>
<publisher:hasCurrentValue RDF:datatype ="&xsd;double">
0.3 </publisher:hasCurrentValue>
</RDF:Description>
39 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
36. Cloud based Transport mechanism
Provides the updates to subscribers whenever
publishers update data
New RDF fragments are sent to the cloud service
Maintains list of subscribers
Handles logic to provide transport from Publisher to
many Subscriber in real time
It makes the Publisher a “light-weight component”
Publisher is independent from the number of connected
subscribers
...and others
pubsubhubbub
40 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
37. Experiment
Building Infrastructure
Politecnico di Torino
poliEnergy
PID
Publishes C
P
P
• 126 Electrical
Meters. poliEnergy
• Take reading Aggregator
PID
every 15
minutes
• Aggregates
reading into 3
ranges.
• Publishes using 3
C channels
42 Presentation @DAUIN, Politecnico di Razzak
Torino, Italy
38. Other Works
Spamming the Internet of Things
Faisal Razzak "Spamming the Internet of Things: A Possibility and its
probable Solution." Procedia Computer Science 10 (2012): 658-665.
MobiWIS 2012 in Canada.
Semantic Web Technologies‟ role in Smart Environments
Faisal Razzak. "Semantic Web Technologies’ role in Smart Environments."
P. Herrero et al. (Eds.): OTM 2012 Workshops, LNCS 7567, pp. 54–58,
2012.
OTM Workshops 2012 (Rome)
Semantic Energy Information Publishing Framework
1. Dario Bonino, Fulvio Corno, and Faisal Razzak. "Enabling machine
understandable exchange of energy consumption information in intelligent
domotic environments." Energy and Buildings 43, no. 6 (2011): 1392-
1402.
Web of Domotics
1. Faisal Razzak, Dario Bonino, and Fulvio Corno. "Mobile interaction with smart
environments through linked data." In Systems Man and Cybernetics
43 Presentation @DAUIN, Politecnico di Razzak
(SMC), 2010 IEEE International Conference on, IEEE, pp. 2922-2929.
Torino, Italy
39. Publications
International Journals
1. Fulvio Corno and Faisal Razzak. "Intelligent Energy Optimization for User Intelligible Goals in Smart
Home Environments." IEEE Transactions on Smart Grid (2012): Vol. 3 Issue: 4, pp. 2128-2135,
ISSN - 1949-3053
2. Dario Bonino, Fulvio Corno, and Faisal Razzak. "Enabling machine understandable exchange of
energy consumption information in intelligent domotic environments." Energy and Buildings 43, no.
6 (2011): 1392-1402.
Proceedings
1. Fulvio Corno and Faisal Razzak. "Publishing LO (D) D: Linked Open (Dynamic) Data for Smart Sensing
and Measuring Environments." Procedia Computer Science 10 (2012): 381-388.
2. Faisal Razzak "Spamming the Internet of Things: A Possibility and its probable Solution." Procedia
Computer Science 10 (2012): 658-665.
3. Faisal Razzak. "Semantic Web Technologies’ role in Smart Environments." P. Herrero et al. (Eds.): OTM
2012 Workshops, LNCS 7567, pp. 54–58, 2012.
4. Faisal Razzak, Dario Bonino, and Fulvio Corno. "Mobile interaction with smart environments through
linked data." In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on,
IEEE, pp. 2922-2929. 2010.
44 5. Emiliano Castellina, Faisal Razzak, and Fulvio Corno. "Environmental di
Presentation @DAUIN, Politecnico Control Application Compliant Razzak
Torino, Italy
with COGAIN Guidelines." COGAIN2009 Proceedings (2009): 31.
40. Acknowledgement
My work in PhD (till now) would not have been possible
without the knowledge and guidance of following people:
Prof. Fulvio Corno
Dr. Emiliano Castellina (now with Reply)
Dr. Dario Bonino
Muhammad Sanaullah
And all the teachers who taught PhD courses.
45 Razzak
41. Thank you all & Any Questions?
Reference
s
Faisal Razzak (raja.faisal@gmail.com)
Skype: faisal.razzak27
Presentations: http://www.slideshare.net/konware
Profile: http://polito.academia.edu/FaisalRazzak
LinkedIn: http://it.linkedin.com/pub/faisal-razzak/50/511/421/