The paper argues that an effective solution to information and knowledge management (KM) needs of practitioners in the construction industry can be found in the provision of an adapted knowledge environment that makes use of user profiling and document summarization techniques based on information retrieval sciences. The conceptualization of the domain through ontology takes a pivotal role in the proposed knowledge environment and provides a semantic referential to ensure relevance, accuracy, and completeness of information. A set of KM services articulated around the selected ontology have been developed, using the Web services model, tested, and validated in real organizational settings. This provided the basis for formulating recommendations and key success factors for any KM project development. 相似文献
The migration from circuit-switched networks to packet-switched networks necessitates the investigation of related issues such as service delivery, QoS, security, and service fraud and misuse. The latter can be seen as a combination of accounting and security aspects. In traditional telecommunication networks, fraud accounts for annual losses at an average of 3%–5% of the operators’ revenue and still increasing at a rate of more than 10% yearly. It is also expected that in VoIP networks, the situation will be worse due to the lack of strong built-in security mechanisms, and the use of open standards. This paper discusses the fraud problem in VoIP networks and evaluates the related available solutions. 相似文献
The problem of reconstructing a pattern of an object from its approximate discrete orthogonal projections in a 2-dimensional grid, may have no solution because the inaccuracy in the measurements of the projections may generate an inconsistent problem. To attempt to overcome this difficulty, one seeks to reconstruct a pattern with projection values having possibly some bounded differences with the given projection values and minimizing the sum of the absolute differences.
This paper addresses the problem of reconstructing a pattern with a difference at most equal to +1 or −1 between each of its projection values and the corresponding given projection value. We deal with the case of patterns which have to be horizontally and vertically convex and the case of patterns which have to be moreover connected, the so-called convex polyominoes. We show that in both cases, the problem of reconstructing a pattern can be transformed into a Satisfiability (SAT) Problem. This is done in order to take advantage of the recent advances in the design of solvers for the SAT Problem. We show, experimentally, that by adding two important features to CSAT (an efficient SAT solver), optimal patterns can be found if there exist feasible ones. These two features are: first, a method that extracts in linear time an optimal pattern from a set of feasible patterns grouped in a generic pattern (obtaining a generic pattern may be exponential in the worst case) and second, a method that computes actively a lower bound of the sum of absolute differences that can be obtained from a partially defined pattern. This allows to prune the search tree if this lower bound exceeds the best sum of absolute differences found so far. 相似文献
Tea is the second most consumed beverage in the world and its consumption has been associated with numerous potential health benefits. Factors such as fermentation methods, geographical origin and season can affect the primary and secondary metabolite composition of tea. In this study, a hydrophilic interaction liquid chromatography (HILIC) method coupled to high resolution mass spectrometry in both positive and negative ionisation modes was developed and optimised. The method when combined with principal component analysis to analyse three different types of tea, successfully distinguished samples into different categories, and provided evidence of the metabolites which differed between them. The accurate mass and high resolution attributes of the mass spectrometric data were utilised and relative quantification data were extracted post-data acquisition on 18 amino acids, showing significant differences in amino acid concentrations between tea types and countries. This study highlights the potential of HILIC chromatography combined with non-targeted mass spectrometric methods to provide a comprehensive understanding of polar metabolites in plant extracts. 相似文献
Contamination of public water ways with sewage represents a serious environmental and health risk. We monitored pollution of the river Thames by enumerating the indicator organism Escherichia coli. Samples were taken from a site in central London near Waterloo Bridge in different seasons. E. coli were quantified using a membrane filtration method, and correlated with the tidal variations of the river and meteorological data on rainfall and temperature. More frequent and severe incidents of pollution occurred in the autumn. Heavy rainfall resulted in sharp peaks of E. coli contamination that implies a potential increase of numbers of pathogenic micro‐organisms. Sixty percent of all samples were found to be in excess of the accepted upper limit of pollution set by European Union (EU) legislation for bathing water. This study demonstrated that frequent sewage pollution of the Thames results in high numbers of E. coli and incidents of detectable levels of pathogenic bacteria demonstrating the need for regular monitoring of bacterial pollution. 相似文献
Peer-to-peer (P2P) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting these networks from intruders and attackers is a real challenge. One of the constant threats on P2P networks is the propagation of active worms. Recent events show that active worms can spread automatically and flood the Internet in a very short period of time. Therefore, P2P systems can be a potential vehicle for active worms to achieve fast worm propagation in the Internet. Nowadays, BitTorrent is becoming more and more popular, mainly due its fair load distribution mechanism. Unfortunately, BitTorrent is particularly vulnerable to topology aware active worms. In this paper we analyze the impact of a new worm propagation threat on BitTorrent. We identify the BitTorrent vulnerabilities it exploits, the characteristics that accelerate and decelerate its propagation, and develop a mathematical model of their propagation. We also provide numerical analysis results. This will help the design of efficient detection and containment systems. 相似文献
Apart from the the increasing demand of smartphones in human-to-human (H2H) communications, the introduction of machine-to-machine (M2M) devices poses significant challenges to wireless cellular networks. In order to offer the ability to connect billion of devices to propel the society into a new era of connectivity in our homes, officies and smart cities, we design novel radio resource sharing algorithms in a H2H/M2M coexistence case to accommodate M2M communications while not severely degrading existing H2H services. We propose group-based M2M communications that share the same spectrum with H2H communications through device-to-device (D2D) communication, as one of the technology components of 5G architecture. First, we formulate radio resource sharing problem as a sum-rate maximization, problem for which the optimal solution is non-deterministic polynomial-time hard (NP-hard). To overcome the computational complexity of the optimal solution, we model the resource sharing problem as a bipartite graph, then propose a novel interference-aware graph-based resource sharing scheme using a fixed M2M transmit power. To further enhance the protection of H2H services, we introduce an adaptive power control mechanism into the interference-aware graph-based resource sharing scheme. M2M transmit power is efficiently adjusted using one among the two following alternative controllers, namely, either the proportional integral derivative (PID) or the fuzzy logic. The latter is proposed within the aim to assure the desired quality-of-service (QoS) of H2H users and increase the efficiency of M2M spectrum usage. In both cases (fixed and adaptive), a centralized and a semi-distributed instantiations are given. Simulation results show that adaptive M2M radio resource sharing scheme using fuzzy logic is the one that achieves the best compromise. In fact, it guarantees H2H performance in terms of throughput and fairness while maximizing the efficiency of M2M spectrum usage. Simulation results also show that in spite of its quite good performance, semi-distributed M2M resource sharing instantiation achieves them with a decline of up to 10% in terms of H2H throughput compared to the centralized instantiation. This is achieved through a markedly lower communication overhead.