Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098725
Dineshkumar Singh, A. Pande, S. Kulkarni, S. Kimbahune, Tushar Hanwate, Ankush D. Sawarkar
The focus of Indian agriculture so far has been on meeting the national demand, however it is going through a steady transformation phase to address the global requirement and is being driven by consumers and markets. According to APEDA Agriexchange portal, every year our country suffers more than 17000 Cr losses because consignments get rejected [1]. There is a growing concern for the food quality and scrutiny of the food supply chain [2] due to increased use of pesticides and its impact on health [3]. As a result, awareness of the importance of safe food is rapidly increasing among the consumers worldwide. Global standards like Global GAP (Good Agriculture Practices) [4], Better Cotton Initiative, RTRS (Round Table Responsible Soy) etc. have evolved with the collaborative efforts of growers, industry experts, researchers and retailers around the globe. These certifications contain standardized processes for producing fresh food resulting in good quality and environment sustainability. These mostly involve audit and documentation processes, in English, with Site Inspectors and Auditors visiting the field and recording their observations on paper. Hence the scalability is a challenge and the adoption is low.
{"title":"Innovation for crop quality certification using ICT","authors":"Dineshkumar Singh, A. Pande, S. Kulkarni, S. Kimbahune, Tushar Hanwate, Ankush D. Sawarkar","doi":"10.1109/COMSNETS.2015.7098725","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098725","url":null,"abstract":"The focus of Indian agriculture so far has been on meeting the national demand, however it is going through a steady transformation phase to address the global requirement and is being driven by consumers and markets. According to APEDA Agriexchange portal, every year our country suffers more than 17000 Cr losses because consignments get rejected [1]. There is a growing concern for the food quality and scrutiny of the food supply chain [2] due to increased use of pesticides and its impact on health [3]. As a result, awareness of the importance of safe food is rapidly increasing among the consumers worldwide. Global standards like Global GAP (Good Agriculture Practices) [4], Better Cotton Initiative, RTRS (Round Table Responsible Soy) etc. have evolved with the collaborative efforts of growers, industry experts, researchers and retailers around the globe. These certifications contain standardized processes for producing fresh food resulting in good quality and environment sustainability. These mostly involve audit and documentation processes, in English, with Site Inspectors and Auditors visiting the field and recording their observations on paper. Hence the scalability is a challenge and the adoption is low.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098720
Anirban Sen, Koustav Rudra, Saptarshi Ghosh
Microblogging sites such as Twitter and Weibo are increasingly being used to enhance situational awareness during various natural and man-made disaster events such as floods, earthquakes, and bomb blasts. During any such event, thousands of microblogs (tweets) are posted in short intervals of time. Typically, only a small fraction of these tweets contribute to situational awareness, while the majority merely reflect the sentiment or opinion of people. Real-time extraction of tweets that contribute to situational awareness is especially important for relief operations when time is critical. However, automatically differentiating such tweets from those that reflect opinion / sentiment is a non-trivial challenge, mainly because of the very small size of tweets and the informal way in which tweets are written (frequent use of emoticons, abbreviations, and so on). This study applies Natural Language Processing (NLP) techniques to address this challenge. We extract low-level syntactic features from the text of tweets, such as the presence of specific types of words and parts-of-speech, to develop a classifier to distinguish between tweets which contribute to situational awareness and tweets which do not. Experiments over tweets related to four diverse disaster events show that the proposed features identify situational awareness tweets with significantly higher accuracy than classifiers based on standard bag-of-words models.
{"title":"Extracting situational awareness from microblogs during disaster events","authors":"Anirban Sen, Koustav Rudra, Saptarshi Ghosh","doi":"10.1109/COMSNETS.2015.7098720","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098720","url":null,"abstract":"Microblogging sites such as Twitter and Weibo are increasingly being used to enhance situational awareness during various natural and man-made disaster events such as floods, earthquakes, and bomb blasts. During any such event, thousands of microblogs (tweets) are posted in short intervals of time. Typically, only a small fraction of these tweets contribute to situational awareness, while the majority merely reflect the sentiment or opinion of people. Real-time extraction of tweets that contribute to situational awareness is especially important for relief operations when time is critical. However, automatically differentiating such tweets from those that reflect opinion / sentiment is a non-trivial challenge, mainly because of the very small size of tweets and the informal way in which tweets are written (frequent use of emoticons, abbreviations, and so on). This study applies Natural Language Processing (NLP) techniques to address this challenge. We extract low-level syntactic features from the text of tweets, such as the presence of specific types of words and parts-of-speech, to develop a classifier to distinguish between tweets which contribute to situational awareness and tweets which do not. Experiments over tweets related to four diverse disaster events show that the proposed features identify situational awareness tweets with significantly higher accuracy than classifiers based on standard bag-of-words models.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098726
V. Srivastav, Britty Baby, Natesan Damodaran, A. Suri
The medical and technological sciences have grown rapidly over the last decade. Delivering these advances to the medical students and practitioners has been a challenge in developing nations like India. The quality of training of residents during post-graduation greatly affects the health care system. Interaction between the residents and the training faculty is pertinent for good quality of training. Specialties like neurosurgery deal with critical patients with high morbidity. Neuroradiology based on Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) scans play vital role in diagnosis and treatment. In this paper we propose a framework for annotation based interactive quizzes for neuroradiology and its integration with an e-learning platform to assist the trainee to improve diagnostic skills and pre-surgical planning capabilities.
{"title":"Internet-enabled Skills Training Platform for neurosurgical training","authors":"V. Srivastav, Britty Baby, Natesan Damodaran, A. Suri","doi":"10.1109/COMSNETS.2015.7098726","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098726","url":null,"abstract":"The medical and technological sciences have grown rapidly over the last decade. Delivering these advances to the medical students and practitioners has been a challenge in developing nations like India. The quality of training of residents during post-graduation greatly affects the health care system. Interaction between the residents and the training faculty is pertinent for good quality of training. Specialties like neurosurgery deal with critical patients with high morbidity. Neuroradiology based on Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) scans play vital role in diagnosis and treatment. In this paper we propose a framework for annotation based interactive quizzes for neuroradiology and its integration with an e-learning platform to assist the trainee to improve diagnostic skills and pre-surgical planning capabilities.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098692
Xuhang Ying, Chang Wook Kim, Sumit Roy
Per FCC rules, secondary users in TV White Spaces must operate only within spectrum subject to a no-harmful-interference condition to existing primary receivers. In effect, this translates into a protection region around every TV transmitter, wherein secondary nodes must not transmit (on the same channel). This is implemented by requiring secondary users to consult a database prior to any channel access so as to obtain the local prohibited channels/spatial zones (or equivalently the free channels or White Spaces). Construction of such protection regions for a transmitter within a database has been done, mainly based on empirical propagation models that estimate the received signal strength at a location. Clearly, such model-based prediction is always of limited accuracy and should be supplemented by measurement based approaches that help validate and improve the database predictions. In this work, we present results based on applying spatial interpolation techniques (Kriging) to measurement data obtained in Seattle, WA. Our results have shown that empirical DBA models tend to over-estimate received signal strengths by not explicitly accounting for local obstructions, while measurement-based Kriging achieves consistently good performance. Furthermore, boundary estimation via Kriging achieves a type I error rate 46.1% lower than comparable DBA approach while keeping type II error rate under a low limit (5%) for a given service threshold (i.e., -84 dBm/6 MHz); this is also an improvement over a method using k-Nearest Neighbor for such estimation.
{"title":"Revisiting TV coverage estimation with measurement-based statistical interpolation","authors":"Xuhang Ying, Chang Wook Kim, Sumit Roy","doi":"10.1109/COMSNETS.2015.7098692","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098692","url":null,"abstract":"Per FCC rules, secondary users in TV White Spaces must operate only within spectrum subject to a no-harmful-interference condition to existing primary receivers. In effect, this translates into a protection region around every TV transmitter, wherein secondary nodes must not transmit (on the same channel). This is implemented by requiring secondary users to consult a database prior to any channel access so as to obtain the local prohibited channels/spatial zones (or equivalently the free channels or White Spaces). Construction of such protection regions for a transmitter within a database has been done, mainly based on empirical propagation models that estimate the received signal strength at a location. Clearly, such model-based prediction is always of limited accuracy and should be supplemented by measurement based approaches that help validate and improve the database predictions. In this work, we present results based on applying spatial interpolation techniques (Kriging) to measurement data obtained in Seattle, WA. Our results have shown that empirical DBA models tend to over-estimate received signal strengths by not explicitly accounting for local obstructions, while measurement-based Kriging achieves consistently good performance. Furthermore, boundary estimation via Kriging achieves a type I error rate 46.1% lower than comparable DBA approach while keeping type II error rate under a low limit (5%) for a given service threshold (i.e., -84 dBm/6 MHz); this is also an improvement over a method using k-Nearest Neighbor for such estimation.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098665
L. Zhan, D. Chiu, Youwei Hua, Zirong Zhu
There is an increasing demand for mobile video streaming. In order to improve the QoE of mobile video streaming, it is important to understand the user interest, user behavior, and current QoE achieved in mobile video streaming systems. Past studies have compared mobile video streaming with that for non-mobile end systems (PCs). In this paper, we report the differences in user interest, user behavior and QoE for different mobile device types (phone versus tablets, and Android versus iOS). Our study is based on a large data set collected from a real world mobile video streaming service operated by our collaborator. Besides reporting the differences for these device types, we also report the extent the streamed video is wasted (not viewed). It shows that there is a lot of room for improving the service QoE and efficiency.
{"title":"A measurement study of mobile video streaming by different types of devices","authors":"L. Zhan, D. Chiu, Youwei Hua, Zirong Zhu","doi":"10.1109/COMSNETS.2015.7098665","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098665","url":null,"abstract":"There is an increasing demand for mobile video streaming. In order to improve the QoE of mobile video streaming, it is important to understand the user interest, user behavior, and current QoE achieved in mobile video streaming systems. Past studies have compared mobile video streaming with that for non-mobile end systems (PCs). In this paper, we report the differences in user interest, user behavior and QoE for different mobile device types (phone versus tablets, and Android versus iOS). Our study is based on a large data set collected from a real world mobile video streaming service operated by our collaborator. Besides reporting the differences for these device types, we also report the extent the streamed video is wasted (not viewed). It shows that there is a lot of room for improving the service QoE and efficiency.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129884536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-04DOI: 10.1109/COMSNETS.2015.7098668
HyunYong Lee, A. Nakao
In this paper, we study the impacts of user's content request and upload strategies on the user-assisted content distribution performance in named data networking (NDN). Through extensive simulations based on real a BitTorrent trace, we show that content request strategy affects the aggregate user upload throughput and the efficiency of in-network caching and multicast, while content upload strategy affects traffic localization by influencing the content availability in the same network domain. In other words, user strategies have noticeable impact on the content distribution (e.g., the best case reduces the download completion time by 50.6% compared to the worst case) even though most P2P content distribution functions are supported by NDN. This means that elaborate design for user strategies is also required in addition to current research on NDN architecture itself.
{"title":"A study of user-assisted content distribution performance in named data networking","authors":"HyunYong Lee, A. Nakao","doi":"10.1109/COMSNETS.2015.7098668","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098668","url":null,"abstract":"In this paper, we study the impacts of user's content request and upload strategies on the user-assisted content distribution performance in named data networking (NDN). Through extensive simulations based on real a BitTorrent trace, we show that content request strategy affects the aggregate user upload throughput and the efficiency of in-network caching and multicast, while content upload strategy affects traffic localization by influencing the content availability in the same network domain. In other words, user strategies have noticeable impact on the content distribution (e.g., the best case reduces the download completion time by 50.6% compared to the worst case) even though most P2P content distribution functions are supported by NDN. This means that elaborate design for user strategies is also required in addition to current research on NDN architecture itself.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132011483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-06DOI: 10.1109/COMSNETS.2015.7098687
Christian Vitale, V. Mancuso, G. Rizzo
This paper presents a first fully analytical approach to performance evaluation of D2D communication systems, which does not assume the system to be in saturated conditions. We adopt a Coupled Processors model to describe a cellular scenario with D2D users sharing radio resources with cellular users, i.e., adopting in-band underlay D2D schemes. We derive sufficient conditions for stability of such system, characterizing the effect of D2D transmissions on cellular user performance. Moreover, we present a computationally feasible method for the determination of a proportionally fair allocation of resources. We show that, in non-saturated networks, such an allocation sensibly improves the one derived under the assumption of saturation. Our results show the importance of accurately modelling the interdependence in users performance in the design and evaluation of a D2D cellular system.
{"title":"Modelling D2D communications in cellular access networks via Coupled Processors","authors":"Christian Vitale, V. Mancuso, G. Rizzo","doi":"10.1109/COMSNETS.2015.7098687","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098687","url":null,"abstract":"This paper presents a first fully analytical approach to performance evaluation of D2D communication systems, which does not assume the system to be in saturated conditions. We adopt a Coupled Processors model to describe a cellular scenario with D2D users sharing radio resources with cellular users, i.e., adopting in-band underlay D2D schemes. We derive sufficient conditions for stability of such system, characterizing the effect of D2D transmissions on cellular user performance. Moreover, we present a computationally feasible method for the determination of a proportionally fair allocation of resources. We show that, in non-saturated networks, such an allocation sensibly improves the one derived under the assumption of saturation. Our results show the importance of accurately modelling the interdependence in users performance in the design and evaluation of a D2D cellular system.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.1109/COMSNETS.2015.7098738
Swati Agarwal, A. Sureka
Word obfuscation or substitution means replacing one word with another word in a sentence to conceal the textual content or communication. Word obfuscation is used in adversarial communication by terrorist or criminals for conveying their messages without getting red-flagged by security and intelligence agencies intercepting or scanning messages (such as emails and telephone conversations). ConceptNet is a freely available semantic network represented as a directed graph consisting of nodes as concepts and edges as assertions of common sense about these concepts. We present a solution approach exploiting vast amount of semantic knowledge in ConceptNet for addressing the technically challenging problem of word substitution in adversarial communication. We frame the given problem as a textual reasoning and context inference task and utilize ConceptNet's natural-language-processing tool-kit for determining word substitution. We use ConceptNet to compute the conceptual similarity between any two given terms and define a Mean Average Conceptual Similarity (MACS) metric to identify out-of-context terms. The test-bed to evaluate our proposed approach consists of Enron email dataset (having over 600000 emails generated by 158 employees of Enron Corporation) and Brown corpus (totaling about a million words drawn from a wide variety of sources). We implement word substitution techniques used by previous researches to generate a test dataset.We conduct a series of experiments consisting of word substitution methods used in the past to evaluate our approach. Experimental results reveal that the proposed approach is effective.
{"title":"Using common-sense knowledge-base for detecting word obfuscation in adversarial communication","authors":"Swati Agarwal, A. Sureka","doi":"10.1109/COMSNETS.2015.7098738","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098738","url":null,"abstract":"Word obfuscation or substitution means replacing one word with another word in a sentence to conceal the textual content or communication. Word obfuscation is used in adversarial communication by terrorist or criminals for conveying their messages without getting red-flagged by security and intelligence agencies intercepting or scanning messages (such as emails and telephone conversations). ConceptNet is a freely available semantic network represented as a directed graph consisting of nodes as concepts and edges as assertions of common sense about these concepts. We present a solution approach exploiting vast amount of semantic knowledge in ConceptNet for addressing the technically challenging problem of word substitution in adversarial communication. We frame the given problem as a textual reasoning and context inference task and utilize ConceptNet's natural-language-processing tool-kit for determining word substitution. We use ConceptNet to compute the conceptual similarity between any two given terms and define a Mean Average Conceptual Similarity (MACS) metric to identify out-of-context terms. The test-bed to evaluate our proposed approach consists of Enron email dataset (having over 600000 emails generated by 158 employees of Enron Corporation) and Brown corpus (totaling about a million words drawn from a wide variety of sources). We implement word substitution techniques used by previous researches to generate a test dataset.We conduct a series of experiments consisting of word substitution methods used in the past to evaluate our approach. Experimental results reveal that the proposed approach is effective.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.1109/COMSNETS.2015.7098715
Mithileysh Sathiyanarayanan, N. Burlutskiy
At present, the complexity and scale of modern social networks is at its highest level but there is a gap in how to represent these networks and their relationships to a user. As a result, it is often hard for a user to understand the relationships in the social networks and make an informed decision over it. Network diagrams has become a standard for social networks visualisation and analysis. However, in this paper, two alternative visualisation types for social network representation and analysis were considered. An Euler diagram and treemap were evaluated for visualising social networks and conveying information on people in a network, their relationships and common interests. Then two new visualisations for social network representation based on these two types of visualisation were proposed. An Euler diagram augmented by a network diagram and a treemap combined with a network diagram were designed and then compared in an evaluation. The visualisations were evaluated by twenty participants for appropriateness and usefulness of the two visualisations in comparison to each other. Finally, the results of the evaluation, limitations and usefulness of the proposed diagrams were discussed.
{"title":"Design and evaluation of euler diagram and treemap for social network visualisation","authors":"Mithileysh Sathiyanarayanan, N. Burlutskiy","doi":"10.1109/COMSNETS.2015.7098715","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098715","url":null,"abstract":"At present, the complexity and scale of modern social networks is at its highest level but there is a gap in how to represent these networks and their relationships to a user. As a result, it is often hard for a user to understand the relationships in the social networks and make an informed decision over it. Network diagrams has become a standard for social networks visualisation and analysis. However, in this paper, two alternative visualisation types for social network representation and analysis were considered. An Euler diagram and treemap were evaluated for visualising social networks and conveying information on people in a network, their relationships and common interests. Then two new visualisations for social network representation based on these two types of visualisation were proposed. An Euler diagram augmented by a network diagram and a treemap combined with a network diagram were designed and then compared in an evaluation. The visualisations were evaluated by twenty participants for appropriateness and usefulness of the two visualisations in comparison to each other. Finally, the results of the evaluation, limitations and usefulness of the proposed diagrams were discussed.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.1109/COMSNETS.2015.7098701
S. Chaudhary, Minal Bhise, Asim Banerjee, Aakash Goyal, Chetan Moradiya
In the agricultural domain, the main challenge is to present the new information and research to the farmers so that they can leverage the power of ICT to improve their agricultural practices and thereby the production. Huge amount of agriculture related data like weather data, soil health records, cropping pattern, location specific crop disease and pest are collected from different sources like services, remote satellites, and network of sensors. An agro advisory system presented in this paper helps to bridge the gap between farmers and the agriculture domain experts and developed for the cotton farmers in Gujarat region of India. The system consists of three basic components; Cotton Ontology, Web Services, and Mobile Application Development. The cotton ontology maintains domain knowledge required for answering farmer queries. The ontology contains information regarding crop, soil, cultivation process, disease, pest, and other relevant information. Protégé ontology development tool is used to develop this ontology. Appropriate Web services were built which help interactions with different data sources. The RESTful Web services are programmed in Java using the JAX-RS/Jersey API and the Eclipse EE IDE. The services are developed and deployed on a cloud based application server provided by Heroku. The Web services are invoked from the mobile device and in turn they connect to various data sources like Open Weather API, SQL database and the Ontologies. The farmers can use this application based on very simple android mobile interfaces. The prototype is developed using Java, Android SDK - v14 and Eclipse IDE.
{"title":"Agro advisory system for cotton crop","authors":"S. Chaudhary, Minal Bhise, Asim Banerjee, Aakash Goyal, Chetan Moradiya","doi":"10.1109/COMSNETS.2015.7098701","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098701","url":null,"abstract":"In the agricultural domain, the main challenge is to present the new information and research to the farmers so that they can leverage the power of ICT to improve their agricultural practices and thereby the production. Huge amount of agriculture related data like weather data, soil health records, cropping pattern, location specific crop disease and pest are collected from different sources like services, remote satellites, and network of sensors. An agro advisory system presented in this paper helps to bridge the gap between farmers and the agriculture domain experts and developed for the cotton farmers in Gujarat region of India. The system consists of three basic components; Cotton Ontology, Web Services, and Mobile Application Development. The cotton ontology maintains domain knowledge required for answering farmer queries. The ontology contains information regarding crop, soil, cultivation process, disease, pest, and other relevant information. Protégé ontology development tool is used to develop this ontology. Appropriate Web services were built which help interactions with different data sources. The RESTful Web services are programmed in Java using the JAX-RS/Jersey API and the Eclipse EE IDE. The services are developed and deployed on a cloud based application server provided by Heroku. The Web services are invoked from the mobile device and in turn they connect to various data sources like Open Weather API, SQL database and the Ontologies. The farmers can use this application based on very simple android mobile interfaces. The prototype is developed using Java, Android SDK - v14 and Eclipse IDE.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}