Using Ontology and Modelling Concepts to Develop Smart Applications

Author(s):  
Bas Bach ◽  
Mark von Rosing ◽  
Henrik von Scheel

Innovating one's organizations alongside the digital transformation that the industry 4.0 and with it the internet of things enables, is a complex undertaking. This case story covers the passage and stages that the Dutch railway transportation industry went through in applying standards from bodies like ISO, OMG and LEADing Practice to developing smart applications and solutions to fit customer needs. They used these the standards together with the Business Ontology, specific the role oriented modelling concepts and managed it all in the process and application lifecycle. The case story covers the aspects of smart application development with smart cards. Like the internet has revolutionised the world, smart cards have revolutionised the traveler's world. Smart cards are secure portable storage devices enabling millions of users around the world for advanced and easy transport flow. This case story elaborates on the Dutch Railway process of cutting edge smart application development within advanced customer process handling through the role oriented processes and services. It elaborates on the Trans Link Systems, which was established by the various Dutch public transport companies to implement a single payment system for public transport, that together with the smart card system OV-chipkaart is made available to the people using public transport in the Netherlands. The case story was chosen not only for their leading practices applied in developing the Railway customer system of the future, but specific they way they did it. Their advanced role oriented processes and services modelling and role oriented architecture thinking in developing cutting edge smart applications. Interlinking the role oriented process lifecycle with the application lifecycle to support the 5 large transport organizations business model, service model, revenue model as well as the performance model.

Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


M/C Journal ◽  
1998 ◽  
Vol 1 (1) ◽  
Author(s):  
Joseph Crawfoot

Cities are an important symbol of our contemporary era. They are not just places of commerce, but are emblems of the people who live within them. A significant feature of cities are their meeting places; areas that have either been designed or appropriated by the people. An example of this is the café. Cafés hold a unique place in history, as sites that have witnessed the growth of revolution, relationships great and small, between people and ideas, and more recently, technology. Computers are transcending their place in the private home or office and are now finding their way into café culture. What I am suggesting is that this is bringing about a new way of understanding how cafés foster community and act as media for social interaction. To explore this idea further I will look at the historical background of the café, particularly within Parisian culture. For W. Scott Haine, cities such as Paris have highly influential abilities. As he points out "the Paris milieu determined the consciousness of workers as much as their labor" (114). While specifically related to Paris, Haine is highlighting an important aspect in the relationship between people and the built environment. He suggests that buildings and streets are not just inanimate objects, but structures that shape our habits and our beliefs. Towards the middle of the nineteenth century, Paris was developing a new cultural level, referred to as Bohemia. Derived from the French word for Gypsy (Seigel 5) it was used to denote a class of people who in the eyes of Honoré de Balzac were the talent of the future (Seigel 4). People who would be diplomats, artists, journalists, soldiers, who at that moment existed in a transient state with much social but little material wealth. Emerging within this Bohemian identity were the bourgeois. They were individuals who led a working class existence, they usually held property but more importantly they helped provide the physical environment for Bohemian culture to flourish. Bourgeois society had the money to patronize Bohemian artists. As Seigel says "Bohemian and bourgeois were -- and are -- parts of a single field: they imply, require, and attract each other" (5). Cafés were a site of symbiosis between these two groups. As Seigel points out they were not so much established to create a Bohemian world away from the reality of working life, but to provide a space were the predominantly bourgeois clientèle could be entertained (216). These ideas of entertainment saw the rise of the literary café, a venue not just for drinking and socialization but where potential writers and orators could perform for an audience. Contemporary society has seen a strong decline in Bohemian culture, with the (franchised) café being appropriated by the upper class as a site of lattes and mud cake. Recent developments in Internet technology however have prompted a change in this trend. Whereas in the past cafés had brought about a symbiosis between the classes of Bohemian and bourgeois society they are now becoming sites that foster relationships between the middle class and computer technology. Computers and the Internet have their origins within a privileged community, of government departments, defence forces and universities. It is only in the past three years that Internet technology has moved out of a realm of expert knowledge to achieve a broad level of usage in the average household. Certain barriers still exist though in terms of a person's ability to gain access to this medium. Just as Bohemian culture arose out of a population of educated people lacking skills of manual labor and social status (Seigel 217), computers and Internet culture offer a means for people to go beyond their social boundaries. Cafés were sites for Bohemians to transcend the social, political, and economic dictates that had shaped their lives. In a similar fashion the Internet offers a means for people to explore beyond their physical world. Internet cafés have been growing steadily around the world. What they represent is a change in the concept of social interaction. As in the past with the Paris café and the exchange of ideas, Internet cafés have become places were people can interact not just on a face-to-face basis but also through computer-mediated communication. What this points to is a broadening in the idea of the café as a medium of social interaction. This is where the latte and mud cake trend is beginning to break down. By placing Internet technology within cafés, proprietors are inviting a far greater section of the community within their walls. While these experiences still attract a price tag they suggest a change in the idea that would have seen both the café and the Internet as commodities of the élite. What this is doing is re-invigorating the idea of the streets belonging to the middle class and other sub-cultures, allowing people access to space so that relationships and communities can be formed. References Haine, W. Scott. The World of the Paris Cafe: Sociability amongst the French Working Class 1789 - 1914. Baltimore: Johns Hopkins UP, 1996. Seigel, Jerrold. Bohemian Paris: Culture, Politics and the Boundaries of Bourgeois Life, 1830 - 1930. New York: Penguin Books, 1987. Citation reference for this article MLA style: Joseph Crawfoot. "Cybercafé, Cybercommunity." M/C: A Journal of Media and Culture 1.1 (1998). [your date of access] <http://www.uq.edu.au/mc/9807/cafe.php>. Chicago style: Joseph Crawfoot, "Cybercafé, Cybercommunity," M/C: A Journal of Media and Culture 1, no. 1 (1998), <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]). APA style: Joseph Crawfoot. (1998) Cybercafé, cybercommunity. M/C: A Journal of Media and Culture 1(1). <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]).


2017 ◽  
Vol 1 (2) ◽  
pp. 50-60
Author(s):  
Untung Rahardja ◽  
Nikita Jova Tejosuwito ◽  
Fernanda Setyobudi Armansyah

Kecanggihan  teknologi  device  yang  semakin  merambah  di  dunia  pengetahuan  dan  teknologi membuat pengembangan sistem pemanfaatan baru seperti aplikasi Pen+ berbasis mobile yang dimanfaatkan oleh dosen dalam menginput hasil nilai ujian mahasiswa. Seluruh orang di dunia pasti  memiliki  handphone.  Teknologi  yang  digunakan  pada  handphone  kini  telah  menjadi smartphone yang lebih banyak fitur-fitur aplikasi yang canggih menggunakan jaringan internet. Oleh  karena  itu  dengan  mengembangkan  suatu  aplikasi  Pen+  berbasis  mobile  yang  dapat  di akses  secara  online  untuk  dosen  bisa  melakukan  penginputan  nilai  lebih  cepat  dan  efektif. Aplikasi  Pen+  berbasis  mobile  yang  digunakan  juga  mempermudah  pelayanan  dengan  lebih dahulu   login   dengan   email   secara   pribadi   dan   lebih   nyaman   dibutuhkan   kapan   saja. Pengembangan  aplikasi  Pen+  juga  melalui  perencanaan,  desain,  dan  pengujian.  Maka  hasil dari  penelitian  ini  yaitu  dimana  aplikasi  Pen+  berbasis  mobile  dapat di download  dengan mudah dan kapan saja untuk memudahkan penilaian secara online. Kata Kunci : Aplikasi, Pen+, Mobile, Dosen The sophistication of device technology is increasingly pervasive in the world of knowledge and technology makes the development of new systems such as the utilization of Pen + based mobile application  that  is  used by lecturer in entering the results of student test scores. All the people in  the  world  would  have  a  mobile.  The  technology  used  in  mobile  phones  have  now  become more  smartphone  features  advanced  application  uses  the  internet.  Therefore, by developing a Pen + based mobile application that can be accessed online to the lecturer can make inputting values more quickly and effectively. Pen + based mobile application that is used also facilitate service  with  advance  login  with  your  email  private  and  more  comfortable  whenever  needed. Pen + application development also through planning, design, and testing. So the results of this analysis,  which  Pen  +  based  mobile  application  can  be  downloaded  easily and at any time to facilitate the online assessment. Keywords : Applications, Pen +, Mobile, Lecturer  


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rajeesh Kumar N.V. ◽  
Arun M. ◽  
Baraneetharan E. ◽  
Stanly Jaya Prakash J. ◽  
Kanchana A. ◽  
...  

Purpose Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a vaccine as early as possible. Even though there is no specific treatment for the pandemic disease, the world is now struggling to control the spread by implementing the lockdown worldwide and giving awareness to the people to wear masks and use sanitizers. The new technologies, including the Internet of things (IoT), are gaining global attention towards the increasing technical support in health-care systems, particularly in predicting, detecting, preventing and monitoring of most of the infectious diseases. Similarly, it also helps in fighting against COVID-19 by monitoring, contract tracing and detecting the COVID-19 pandemic by connection with the IoT-based smart solutions. IoT is the interconnected Web of smart devices, sensors, actuators and data, which are collected in the raw form and transmitted through the internet. The purpose of this paper is to propose the concept to detect and monitor the asymptotic patients using IoT-based sensors. Design/methodology/approach In recent days, the surge of the COVID-19 contagion has infected all over the world and it has ruined our day-to-day life. The extraordinary eruption of this pandemic virus placed the World Health Organization (WHO) in a hazardous position. The impact of this contagious virus and scarcity among the people has forced the world to get into complete lockdown, as the number of laboratory-confirmed cases is increasing in millions all over the world as per the records of the government. Findings COVID-19 patients are either symptomatic or asymptotic. Symptomatic patients have symptoms such as fever, cough and difficulty in breathing. But patients are also asymptotic, which is very difficult to detect and monitor by isolating them. Originality/value Asymptotic patients are very hazardous because without knowing that they are infected, they might spread the infection to others, also asymptotic patients might be having very serious lung damage. So, earlier prediction and monitoring of asymptotic patients are mandatory to save their life and prevent them from spreading.


2001 ◽  
Vol 1 (3) ◽  
pp. 303-319 ◽  
Author(s):  
THOM FRÜHWIRTH ◽  
SLIM ABDENNADHER

Most cities in Germany regularly publish a booklet called the Mietspiegel. It basically contains a verbal description of an expert system. It allows the calculation of the estimated fair rent for a flat. By hand, one may need a weekend to do this task. With our computerized version, the Munich Rent Advisor, the user just fills in a form in a few minutes, and the rent is calculated immediately. We also extended the functionality and applicability of the Mietspiegel so that the user need not answer all questions on the form. The key to computing with partial information using high-level programming was to use constraint logic programming. We rely on the Internet, and more specifically the World Wide Web, to provide this service to a broad user group, the citizens of Munich and the people who are planning to move to Munich. To process the answers from the questionnaire and return its result, we wrote a small simple stable special-purpose web server directly in ECLiPSe. More than 10,000 people have used our service in the last three years. This article describes the experiences in implementing and using the Munich Rent Advisor. Our results suggest that logic programming with constraints can be an important ingredient in intelligent internet systems.


2020 ◽  
Vol 4 (2) ◽  
pp. 21-39
Author(s):  
Abdul Munir ◽  
Riki Harianto

live streaming is a latest innovation for people to express themselves and exchange ideas. The current social media that is becoming a trend among the people and using live streaming as a means to interact is social media live streaming Bigo live. The existence of bigo live as an internet community forum (Cyber Community) certainly changes in the norms and values ​​adopted by these users, so it cannot be denied that in the internet community (Cyber Community) there are changes and rules that occur . One of them appears an interaction created virtually in the world, where the emergence of a form of deviation that occurs in social media live streaming bigo live, one of which is cyber sexual harassment. The method used in this study uses visual methods. The theory used in this paper is the theory of routine activities where observations take place and observe every bigo live social media user.


Author(s):  
Satish Agarwal ◽  
Priyanka Bhagoliwal

<div><p><em>The mobile phone handset industry is growing at a fast pace in the world and  is dominating the Indian market with Hi-Tech products and innovation. This industry offers products and services with advanced technology and innovation making it an important gadget for survival among the people. It is hard to imagine a life without mobile phones. The study describes the various features of mobile phone handsets which are valued by the teenagers so as to place and promote the products perfectly. The study found that  teenagers frequently use mobile phones mainly for games, social  networking, chatting on Whatsapp, listening to music, browsing the internet, and feels that mobile phone handset is  a style statement and it exhibits their status, standard, esteem etc. </em><strong></strong></p></div>


2019 ◽  
Vol 1 (04) ◽  
pp. 256-264 ◽  
Author(s):  
Dr. Abul Bashar

The world is striving to become smart with the latest findings evolved in the communication and the information technology. The emerging of the things that could automatically and intelligently render service to the people in cooperative way acts as a part of this smart world and the internet of things take the significant role in the development of the smart world as it is capable of connecting every tangible things of the world. Though this technological advancement paves way for a seamless and an efficient way of communication, the excess energy consumed by the various add –ons used along with the devices that make the world smart cause environmental pollution and unknown destructions. Multitude of strides researched in improving the energy efficiency in the devices to make the internet of things sustainable and green is reviewed in the paper along with its applications hoping that this would create awareness in the development of the future smart applications.


Author(s):  
Sun-ha Hong

Today, machines observe, record, and sense the world—not just for us but also often instead of us and indifferently to our meaning. The intertwined problems of technological knowledge and (our) knowledge of technology manifest in the growing industry of smart machines, the Internet of Things, and other means for self-tracking. The automation of the care of the self is buoyed by a popular fantasy of data’s intimacy, of machines that know you better than yourself. Yet as the technology becomes normalized, the hacker ethic gives way to a market-driven shift in which more and more of “my” personal truth is colonized by machines (and the people behind the machines) that I cannot question.


2022 ◽  
pp. 238-255
Author(s):  
Desi Setiana ◽  
Siti Norsarah ◽  
Norainna Besar ◽  
Tiro Anna ◽  
Marlina Nasution ◽  
...  

The internet and technologies are revolving around the world today. Most of the people around this world have access to the internet easily nowadays; it can lead to a most common and dangerous problem, which is cyber bullying. Cyber bullying is considered as a crime which usually occurs among the young people. Cases from cyberbullying have shown that there is a growing significantly which is becoming a worrying topic for the societies to be aware of. This study revealed cyberbullying teen actors involved within the area of Jakarta. The result is very interesting. Parents play a vital role to the teens as they will become a support for them (actor and victim) and also peer groups give the high impact of the actors to conduct cyberbullying to another group. Much cyberbullying happens for the same reasons as any other form of bullying. Generally, the cyber bullies act in such manner due to them being insecure, to gain popularity, social pressure, and jealousy as well as personal grudges.


Sign in / Sign up

Export Citation Format

Share Document