Transaction ontology in the domain of infrastructure management1This paper is one of a selection of papers in this Special Issue on Construction Engineering and Management.

2012 ◽  
Vol 39 (9) ◽  
pp. 993-1004 ◽  
Author(s):  
Jehan Zeb ◽  
Thomas Froese

Information exchange processes (referred to as transactions) in the AEC/FM (architecture, engineering, construction and facility management) industry are mostly manual and performed on an ad hoc basis. There is a growing trend towards computer-based exchange of information. This allows for more extensive, rapid, and error-free exchange of information, but it requires more formal specifications and agreements to govern these data exchanges. This research focuses on the development of an ontology-supported protocol for formalizing these data exchanges. As part of the development effort, this paper describes a taxonomy of transactions and messages. The knowledge represented in the ontology is evaluated and potential areas of application of the ontology are identified using an industry IT survey.

2021 ◽  
Vol 23 (3) ◽  
pp. 41-45
Author(s):  
ESTER GARCÍA ◽  

The article highlights the progress of international taxation in the fight against the concealment of income in offshore jurisdictions and exposes the lights and shadows of the current legal framework for the exchange of information on bank accounts. The author examines the major problems of international taxation and how corporations avoid paying taxes in their jurisdictions and how it affects the financial sphere. The article studies bank secrecy with its harmful aspects and develops the solution to resolve the current issues. As a conclusion, the author focuses on cooperation between tax administrations and the positive outcomes from transparency and information exchange measures on the international taxation.


Author(s):  
A. N. Brysin ◽  
Yu. A. Zhuravleva ◽  
A. S. Mikaeva ◽  
S. A. Mikaeva

The article describes an electronic multifunctional adder for electricity metering SEM-3. The authors give the technical characteristics, the device and the principle of its operation. The presented adder is designed to monitor and account for the consumption of electricity generation and power directly from consumers, as well as in automated centralized accounting and control systems, and is designed for round-the-clock operation. The adder can collect and transmit information over six independent serial interfaces. The adder with a builtin GSM module provides bidirectional information exchange via cellular modem communication with remote devices and the transfer of accumulated data to the upper level of the automated electricity metering system. It provides bidirectional exchange of information over a local network with a PC over the built-in 10/100 Base-T Ethernet interface.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Muhammad Altaf Khan ◽  
Moustafa M. Nasralla ◽  
Muhammad Muneer Umar ◽  
Zeeshan Iqbal ◽  
Ghani Ur Rehman ◽  
...  

In ad hoc networks, the communication is usually made through multiple hops by establishing an environment of cooperation and coordination among self-operated nodes. Such nodes typically operate with a set of finite and scarce energy, processing, bandwidth, and storage resources. Due to the cooperative environment in such networks, nodes may consume additional resources by giving relaying services to other nodes. This aspect in such networks coined the situation of noncooperative behavior by some or all the nodes. Moreover, nodes sometimes do not cooperate with others due to their social likeness or their mobility. Noncooperative or selfish nodes can last for a longer time by preserving their resources for their own operations. However, such nodes can degrade the network's overall performance in terms of lower data gathering and information exchange rates, unbalanced work distribution, and higher end-to-end delays. This work surveys the main roots for motivating nodes to adapt selfish behavior and the solutions for handling such nodes. Different schemes are introduced to handle selfish nodes in wireless ad hoc networks. Various types of routing techniques have been introduced to target different types of ad hoc networks having support for keeping misbehaving or selfish nodes. The major solutions for such scenarios can be trust-, punishment-, and stimulation-based mechanisms. Some key protocols are simulated and analyzed for getting their performance metrics to compare their effectiveness.


2021 ◽  
Vol 233 ◽  
pp. 03012
Author(s):  
Liu Lina ◽  
Han Wei

For the whole process of civil engineering construction, slope support technology is a very key technical point of civil construction. Engineering and technical personnel shall be able to fully ensure the safety and firmness of the foundation structure of the engineering slope by setting up retaining walls or using other slope support treatment techniques, and extend the safe service life of civil engineering. Under this premise, engineering and technical personnel must integrate the technical measures of slope support into the construction process of civil engineering.


Author(s):  
Song Yinghua

Given the advances in science and technology, rapid development of socialist market economy and continuous advance of urbanization, it is necessary to enlarge the scale of engineering construction. As the form of engineering structure becomes more complex, large-scale and high-level projects with deep foundation have appeared in engineering construction. For construction engineering, one of its technologies includes solving the difficulties in construction. It is required to deal with the safety risk of construction in time to guarantee safety construction, timely solve the management difficulties and contradictory problems of the project and ensure both the safety of engineering construction and the rationalization of the institution setting of the safety supervision on the project. 


2021 ◽  
Author(s):  
Lubaid Ahmed

Due to recent advances in computing and communication technologies, Mobile Ad hoc Networks (MANETs) are becoming networks of choice for various applications such as emergencies [sic] preparedness and response, military and crisis management, and healthcare, to name a few. The main reason for this is that in MANET, information exchange between nodes can happen dynamically without pre-exisiting fixed network infrastructure with designated centralized access points. However, this privilege also comes with some security drawbacks, especially from a message security viewpoint because the implementation of hard-cryptographic security now becomes a challenging prospect. In this thesis, we improve a recently proposed method of message security in MANET (so called benchmark scheme, also referred to as trust-based multipath DSR routing scheme), by introducing a trust model that makes multi-path routing flexible enough to avoid non-trusted routes that may use brute force attacks to decrypt messages travelling through the network en route to their destinations. Simulation results, coupled with theoretical justification, affirm that the proposed solution is much more secured than the above-mentioned benchmark method and traditional multi-path routing algorithms.


The recent developments in wireless communication technologies along with the costs of hardware allow both V2V and V2I communications for information exchange. Such a network is called Vehicular ad Hoc Network (VANET) which is very important for various road safety and non-safety related applications. However, Due to the wireless nature of communication in VANETs, it is also prone to various security attacks which are originally present in wireless networks. Hence to realize the highest potential of VANET, the network should be free from attackers, there by all the information exchanged in the network must be reliable should be originated from authenticated source. The system can be processed by the fuzzy logic method. It does not require any keys for data transmission. The system design is very efficient compared to other techniques. So the users prevent from road accident and traffic jam.


Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 433 ◽  
Author(s):  
Lee Jinwoo

Sagawa and Ueda established a fluctuation theorem of information exchange by revealing the role of correlations in stochastic thermodynamics and unified the non-equilibrium thermodynamics of measurement and feedback control. They considered a process where a non-equilibrium system exchanges information with other degrees of freedom such as an observer or a feedback controller. They proved the fluctuation theorem of information exchange under the assumption that the state of the other degrees of freedom that exchange information with the system does not change over time while the states of the system evolve in time. Here we relax this constraint and prove that the same form of the fluctuation theorem holds even if both subsystems co-evolve during information exchange processes. This result may extend the applicability of the fluctuation theorem of information exchange to a broader class of non-equilibrium processes, such as a dynamic coupling in biological systems, where subsystems that exchange information interact with each other.


Proceedings ◽  
2018 ◽  
Vol 2 (19) ◽  
pp. 1212 ◽  
Author(s):  
Oihane Gómez-Carmona ◽  
Diego Casado-Mansilla ◽  
Diego López-de-Ipiña

The adaptation of cities to a future in which connectivity is at the service of the citizens will be a reality by creating interaction spaces and augmented urban areas. The research on this field falls within the scope of Smart Cities (SC) with the advantages that the common public spaces provide as new points for information exchange between the city, the urban furniture and their citizens. Kiosk systems have been recognized as an appropriate mean for providing event-aware and localized information to the right audience at the right time. Hence, in this article, we provide a vision of an eco-system of multifunctional urban furniture, where kiosks are part of them, designed not only for digital interaction but for sustainable use and symbolic integration into the urban environment as well. The proposed approach is conceived to drive services through digital urban nodes that facilitate tailored citizen-city communication and interaction. The central element of the designed platform consists on an intelligent digital kiosk which features a series of hardware and software components for sensing different environmental conditions, multimodal interaction with users and for conveying the captured data to the Cloud. The custom-based contents visualized to the users are controlled remotely through a management tool that allows to set-up and configure the digital kiosk. This system is not presented as an ad-hoc solution for one specific purpose but instead, it becomes a platform that can accommodate and solve the needs of every kind of user that populates urban shared-use spaces.


Sign in / Sign up

Export Citation Format

Share Document