29 May 2020

feedPlanet RDF

Cloud Cipher Capabilities

… or, the lack of it. A recent discussion at a customer made me having a closer look around support for encryption in the context of XaaS cloud service offerings as well as concerning Hadoop. In general, this can be broken down into over-the-wire (cf. SSL/ TLS ) and back-end encryption. While the former is widely used, the latter is rather seldom to find. Different reasons might exits why one wants to encrypt her data, ranging from preserving a competitive advantage to end-user privacy issues. No matter why someone wants to encrypt the data, the question is do systems support ...

29 May 2020 4:06am GMT

27 May 2020

feedPlanet RDF

Removing rivets

I wanted to stay away from the computer during a week off work so I had a plan to fix up some garden chairs whose wooden slats had gone rotten: Looking more closely I realised the slats were riveted on. How do you get rivets off? I asked my hackspace buddies and Barney suggested drilling them out. They have an indentation in the back and you don't have to drill very far to get them out. The first chair took me two hours to drill out 15 rivets, and was a frustrating and sweaty experience. I checked YouTube to make ...

27 May 2020 9:06pm GMT

26 May 2020

feedPlanet RDF

Cooking up a new approach to supporting purposeful use of data

In my last post I explored how we might better support the use of datasets . To do that I applied the BASEDEF framework to outline the ways in which communities might collaborate to help unlock more value from individual datasets. But what if we changed our focus from supporting discovery and use of datasets and instead focused on helping people explore specific types of problems or questions? Our paradigm around data discovery is based on helping people find individual datasets. But unless a dataset has been designed to answer the specific question you have in mind, then it's unlikely ...

26 May 2020 7:05pm GMT

24 May 2020

feedPlanet RDF

talk: Design and Implementation of an Attribute Based Access Controller using OpenStack Services

Design and Implementation of an Attribute Based Access Controller using OpenStack Services Sharad Dixit, Graduate Student, UMBC 10:30am Monday, 24 September 2018, ITE346 With the advent of cloud computing, industries began a paradigm shift from the traditional way of computing towards cloud computing as it fulfilled organizations present requirements such as on-demand resource allocation, lower capital expenditure, scalability and flexibility but with that it brought a variety of security and user data breach issues. To solve the issues of user data and security breach, organizations have started to implement hybrid cloud where underlying cloud infrastructure is set by the organization ...

24 May 2020 5:05pm GMT

talk: Automated Knowledge Extraction from the Federal Acquisition Regulations System

In this week's meeting, Srishty Saha, Michael Aebig and Jiayong Lin will talk about their work on extracting knowledge from the US FAR System. Automated Knowledge Extraction from the Federal Acquisition Regulations System Srishty Saha, Michael Aebig and Jiayong Lin 11am-12pm Monday, 25 September 2017, ITE346, UMBC The Federal Acquisition Regulations System (FARS) within the Code of Federal Regulations (CFR) includes facts and rules for individuals and organizations seeking to do business with the US Federal government. Parsing and extracting knowledge from such lengthy regulation documents is currently done manually and is time and human intensive. Hence, developing a cognitive ...

24 May 2020 5:05pm GMT

paper: Early Detection of Cybersecurity Threats Using Collaborative Cognition

The CCS Dashboard's sections provide information on sources and targets of network events, file operations monitored and sub-events that are part of the APT kill chain. An alert is generated when a likely complete APT is detected after reasoning over events. Early Detection of Cybersecurity Threats Using Collaborative Cognition Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi and Tim Finin, Early detection of Cybersecurity Threats using Collaborative Cognition , 4th IEEE International Conference on Collaboration and Internet Computing, Philadelphia, October. 2018. The early detection of cybersecurity events such as attacks is challenging given the constantly evolving threat ...

24 May 2020 5:05pm GMT

paper: Automated Knowledge Extraction from the Federal Acquisition Regulations System

Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS) Srishty Saha and Karuna Pande Joshi, Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS) , 2nd International Workshop on Enterprise Big Data Semantic and Analytics Modeling, IEEE Big Data Conference, December 2017. With increasing regulation of Big Data, it is becoming essential for organizations to ensure compliance with various data protection standards. The Federal Acquisition Regulations System (FARS) within the Code of Federal Regulations (CFR) includes facts and rules for individuals and organizations seeking to do business with the US Federal government. Parsing and gathering knowledge from such ...

24 May 2020 5:05pm GMT

paper: Attribute Based Encryption for Secure Access to Cloud Based EHR Systems

Attribute Based Encryption for Secure Access to Cloud Based EHR Systems Maithilee Joshi, Karuna Joshi and Tim Finin, Attribute Based Encryption for Secure Access to Cloud Based EHR Systems , IEEE International Conference on Cloud Computing, San Francisco CA, July 2018 Medical organizations find it challenging to adopt cloud-based electronic medical records services, due to the risk of data breaches and the resulting compromise of patient data. Existing authorization models follow a patient centric approach for EHR management where the responsibility of authorizing data access is handled at the patients' end. This however creates a significant overhead for the ...

24 May 2020 5:05pm GMT

Why does Google think Raymond Chandler starred in Double Indemnity?

In my knowledge graph class yesterday we talked about the SPARQL query language and I illustrated it with DBpedia queries, including an example getting data about the movie Double Indemnity. I had brought a google assistant device and used it to compare its answers to those from DBpedia. When I asked the Google assistant "Who starred in the film Double Indemnity", the first person it mentioned was Raymond Chandler . I knew this was wrong, since he was one of its screenwriters, not an actor, and shared an Academy Award for the screenplay. DBpedia's data was correct and did not ...

24 May 2020 5:05pm GMT

W3C Recommendation: Time Ontology in OWL

W3C Recommendation: Time Ontology in OWL The Spatial Data on the Web Working Group has published a W3C Recommendation of the Time Ontology in OWL specification. The ontology provides a vocabulary for expressing facts about relations among instants and intervals, together with information about durations, and about temporal position including date-time information. Time positions and durations may be expressed using either the conventional Gregorian calendar and clock, or using another temporal reference system such as Unix-time, geologic time, or different calendars. The post W3C Recommendation: Time Ontology in OWL appeared first on UMBC ebiquity .

24 May 2020 5:05pm GMT

Videos of ISWC 2017 talks

Videos of almost all of the talks from the 16th International Semantic Web Conference (ISWC) held in Vienna in 2017 are online at videolectures.net . They include 89 research presentations, two keynote talks, the one-minute madness event and the opening and closing ceremonies. The post Videos of ISWC 2017 talks appeared first on UMBC ebiquity .

24 May 2020 5:05pm GMT

Agniva Banerjee on Managing Privacy Policies through Blockchain

Link before you Share: Managing Privacy Policies through Blockchain Agniva Banerjee 11:00am Monday, 16 October 2017 An automated access-control and audit mechanism that enforces users' data privacy policies when sharing their data across third parties, by utilizing privacy policy ontology instances with the properties of blockchain. The post Agniva Banerjee on Managing Privacy Policies through Blockchain appeared first on UMBC ebiquity .

24 May 2020 5:05pm GMT

2018 Ontology Summit: Ontologies in Context

2018 Ontology Summit: Ontologies in Context The OntologySummit is an annual series of online and in-person events that involves the ontology community and communities related to each year's topic. The topic chosen for the 2018 Ontology Summit will be Ontologies in Context , which the summit describes as follows. "In general, a context is defined to be the circumstances that form the setting for an event, statement, or idea, and in terms of which it can be fully understood and assessed. Some examples of synonyms include circumstances, conditions, factors, state of affairs, situation, background, scene, setting, and frame of reference. ...

24 May 2020 5:05pm GMT

23 May 2020

feedPlanet RDF

How can you help support the use of a dataset?

Getting the most value from data, whilst minimising its harmful impacts, is a community activity. Datasets need to be governed and published well. Most of that responsibility falls on the data publisher. Because the choices they make shapes data ecosystems . But other people have a role to play too. Being a good data user means engaging with that process. Helping others to find data and find the value in it, feels particularly important at the moment. During the pandemic there are many new datasets becoming available. And there are lots of questions to be answered. Some of them can ...

23 May 2020 8:05am GMT

22 May 2020

feedPlanet RDF

Pi / openCV / Tensorflow again

Cat detector code updated for Raspian Buster. I used lite. A few things have changed since the last time. The code is here . Download Raspian I got Raspbian Buster Lite (from https://www.raspberrypi.org/downloads/raspbian/ ) Burn it onto a SD card. touch /boot/ssh Add the wifi nano /boot/wpa_supplicant.conf The file should containing something like: country=GB ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 network={ ssid="foo" psk="bar" } then eject the card and put it in the pi. ssh into it from your laptop pi@raspberrypi.local password: raspberry sudo nano /etc/hosts sudo nano /etc/hostname Reboot sudo reboot Set up a virtualenv for python ssh in again, then: sudo ...

22 May 2020 8:06am GMT

Cat detector with Tensorflow on a Raspberry Pi 3B+

Like this Edit: code is now here . These are more recent instructions. Download Raspian Stretch with Desktop Burn a card with Etcher. (Assuming a Mac) Enable ssh touch /Volumes/boot/ssh Put a wifi password in nano /Volumes/boot/wpa_supplicant.conf country=GB ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 network={ ssid="foo" psk="bar" } Connect the Pi camera, attach a dial to GPIO pin 12 and ground, boot up the Pi, ssh in, then sudo apt-get update sudo apt-get upgrade sudo raspi-config # and enable camera; reboot install tensorflow sudo apt install python3-dev python3-pip sudo apt install libatlas-base-dev pip3 install --user --upgrade tensorflow Test it python3 -c ...

22 May 2020 8:06am GMT