Why Semantic Models

This post is inspired by an article from IBM regarding the advantage of Semantic Models compared to traditional relational databases.

Smantic models are a way of representing data and information in a way that is different from relational data bases. The advantages of using Semantic models can be the basis of differentiated products and services that use large and complex data.

→

Policy Based QoS Framework

The disparity of the technologies used for managing the quality of service (DiffServ, IntServ/RSVP, 802.11e, WiMAX QoS, 802.15.4 TDMA scheduling) makes it difficult to think of the management of quality of service in heterogeneous infrastructures in terms of technologies. For this reason, a conceptual model that allows us to think about quality of service management systems independently of underlying technologies and vendors would be more adapted.

→

Market Research Methodology

This publication titled “END MARKET RESEARCH TOOLKIT: UPGRADING VALUE CHAIN COMPETITIVENESS WITH INFORMED CHOICE” from the United States Agency for International Development provides a very neat and useful framework/methodology for planning and carrying out market research.

→

Value factor analysis applied to literature review

We often find our selves doing a literature review with the goal of validating the superiority of our approach. But sometimes, we are faced with dozens of papers to sort out. Analyzing each paper separately could become confusing for the reader and may not be efficient/convincing way of demonstrating the problems in existing works.

→

Example of proprietary wireless technologies for Industrial Automation

DataLink group is a provider of wireless and wired communication solutions for the industrial automation market. This article gives an overview of their offer.

→

OPC based Wireless FR management System for Industrial Automation

Prosoft technology explores the suitability of OPC as platform for managing wireless RF monitoring data in industrial wireless infrastructures.

→

The Hidden and Exposed Terminal problem in wireless CSMA/CA

Extract from a paper that illustrates in details the problem of hidden terminal and exposed terminal in wireless networks that rely on CSMA/CA method for medium access control (MAC).

→

Creating an OWL Ontology with Protege: Howto Guide

Ontologies consist of three main things: Classes, Individuals (instances) and properties (relationships) between individuals. To create an ontology, one first has to created calsses.

For each class, a set of Assertions (restrictions) are defined. The assertions specify the conditions that individuals have to have in order to belong to the class. A class hierarchy is also specified by creating sub-classes (using the GUI). The Protege editor will add automatically inherited assertions from parent classes.

The flow for creating ontologies should be as follows : Create class hierarchy → Create properties → Create Assertions based on the newly created properties. This article overviews the important notions (mainly universal and existential assertions) that need to be understood for performing each of these steps using the editor Protege.

→

Getting Software Patents Right

Information regarding the proper way for formulating software patent claims.

→

The Market Segmentation Process

Market segmentation allows companies to target their products and communications in an efficient way. This article identifies the main steps involved in performing a market segmentation. This process is independent of whether the company is addressing the consumer or B2B markets, however, we will use the B2B context to illustrate the steps.

→

Older entries >>

Wireless Internet Security Performance RADIUS server Wireless Internet Security Performance RADIUS server