Professional Documents
Culture Documents
Controlling Real World Pervasive Environments With Knowledge Bases
Controlling Real World Pervasive Environments With Knowledge Bases
1 Introduction
The vision of pervasive computing is to have a wealth of embedded processors and
applications serving user needs in an imperceptible way [1]. Computing power
is now abundantly available but a large gap still exists between user needs and
software fulfilling those needs.
Knowledge bases using ontologies are an attractive choice to model the perva-
sive environment: an ontology’s flexible structure can best represent the dynamic
environment that has changing data and relationships. In addition, the formal
basis of an ontology makes it amenable to automated reasoning. Such robust
modelling also expresses the desired functionality in a device-independent way.
In general, an ontology is used as a domain model to share, reuse, analyse and
better engineer knowledge [2]. A particularly useful benefit is the separation of
R. Setchi et al. (Eds.): KES 2010, Part IV, LNAI 6279, pp. 576–585, 2010.
c Springer-Verlag Berlin Heidelberg 2010
Controlling Real World Pervasive Environments with Knowledge Bases 577
Information
Systems Manager
is the set of properties or roles of classes, and R is the set of relations between
classes, e.g., isA, subClassOf, sameClass. Within a Campus domain, we can have a
class Location with an instance Courtyard that has the property hasAccessPoint.
We are mainly concerned with two reasoning tasks for our ontological
knowledge base:
The next rule, rule 2, restricts the bandwidth available to students while in
class to nil by assigning 0 to the hasBW relation, which denotes the currently
available bandwidth to the student.
Student(?s) ∧ ClassRoom(?c) ∧ hasLocation(?s, ?c) → hasBW(?s, 0) (2)
Next, we define a rule to assert that if several students are in a classroom and
viewing the same lecture on Panopto, they should be able to share an annotation
tool to see each other’s annotations:
Student(?s) ∧ ClassRoom(?c) ∧ hasLocation(?s, ?c)
∧ VideoLecture(?v) ∧ usingPanopto(?s, ?v) (3)
→ shareAnnotation(?s, true)
Rule 4 below is used to suggest to a user a location where higher bandwidth
is available as compared to the available bandwidth in the user’s present lo-
cation. Here, the SWRL built-in greaterThan is used to compare the available
bandwidths c and b.
User(?u) ∧ hasBW(?u, ?b) ∧ hasLocation(?u, ?x)
∧ Location(?y) ∧ hasBW(?y, ?c)
(4)
∧ swrlb : greaterThan(?c, ?b)
→ suggestLocation(?u, ?y)
This is a dynamic optimisation problem and we are working on a predictive control
methodology to inform users beforehand where congestion is likely to occur.
References
1. Weiser, M.: The computer for the 21st century. SIGMOBILE Mob. Comput. Com-
mun. Rev. 3(3), 3–11 (1999)
2. Jones, D., Bench-Capon, T., Visser, P.: Methodologies for ontology develop-
ment. In: Proceedings of the IT&KNOWS Conference, XV IFIP World Computer
Congress (1998)
3. Foundations. In: Grimm, S., Volz, R. (eds.) Semantics At Work, Ontology Man-
agement Tools and Techniques (June 2007)
4. Liu, L., Özsu, M.T. (eds.): Encyclopedia of Database Systems. Springer, New York
(2009)
5. OWL Web Ontology Language overview, W3C recommendation (2004),
http://www.w3.org/TR/owl-features/
6. Knowledge Interchange Format, KIF (1992),
http://www.ksl.stanford.edu/knowledge-sharing/kif/
7. RIF use cases and requirements, W3C working draft (2006),
http://www.w3.org/TR/rif-ucr/
8. SWRL: A semantic web rule language combining OWL and RuleML, W3C member
submission (2004), http://www.w3.org/Submission/SWRL/
9. Cobcroft, R.S., Towers, S., Smith, J., Bruns, A.: Mobile learning in review: Oppor-
tunities and challenges for learners, teachers, and institutions. In: Online Learning
and Teaching (OLT) Conference, pp. 21–30 (2006)
10. Motiwalla, L.F.: Mobile learning: A framework and evaluation. Comput.
Educ. 49(3), 581–596 (2007)
11. Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. Com-
puter 34(8), 57–66 (2001)
12. Wi-Fi Based Real-Time Location Tracking: Solutions and Technology. White pa-
per, Cisco Systems (2006) (available online)
13. Alvi, A., Greaves, D.J.: Checkable domain management with ontology and rules.
In: ICIW 2008: Proceedings of the 3rd International Conference on Internet and
Web Applications and Services, Athens, Greece, June 8-13, pp. 142–149 (2008)
14. O’Connor, M.J., Knublauch, H., Tu, S.W., Grosof, B.N., Dean, M., Grosso, W.E.,
Musen, M.A.: Supporting rule system interoperability on the semantic web with
SWRL. In: Gil, Y., Motta, E., Benjamins, V.R., Musen, M.A. (eds.) ISWC 2005.
LNCS, vol. 3729, pp. 974–986. Springer, Heidelberg (2005)
Controlling Real World Pervasive Environments with Knowledge Bases 585
15. O’Connor, M.J., Tu, S.W., Nyulas, C., Das, A.K., Musen, M.A.: Querying the
semantic web with SWRL. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007.
LNCS, vol. 4824, pp. 155–159. Springer, Heidelberg (2007)
16. Keck, D.O., Kuehn, P.J.: The feature and service interaction problem in telecom-
munications systems: A survey. IEEE Trans. Softw. Eng. 24(10), 779–796 (1998)
17. Bouma, W.: Feature interactions. In: Kent, A., Williams, J.G. (eds.) Encyclopedia
of Computer Science and Technology, vol. 40, pp. 1–23. Marcel Dekker, Inc., New
York (1999)
18. SWRLLanguageFAQ, Protégé wiki (2010),
http://protege.cim3.net/cgi-bin/wiki.pl?SWRLLanguageFAQ
19. Berners-Lee, T., Kagal, L.: The fractal nature of the semantic web. AI Maga-
zine 29(3), 29–34 (2008)
20. Alvi, A., Greaves, D.J.: A logical approach to home automation. In: IE 2006:
Proceedings of the 2nd IET International Conference on Intelligent Environments,
Athens, Greece, July 5-6, vol. 2, pp. 45–50. IET (2006)
21. Greaves, D.J., Gordon, D., Alvi, A., Omitola, T.: Using a .net checkability pro-
file to limit interactions between embedded controllers. In: SENSORCOMM 2008:
Proceedings of the 2008 Second International Conference on Sensor Technologies
and Applications, Washington, DC, USA, pp. 555–561. IEEE Computer Society,
Los Alamitos (2008)
22. Mehmood, R.: Disk-based techniques for efficient solution of large Markov chains.
PhD thesis, University of Birmingham (2004)
23. Mehmood, R., Crowcroft, J.: Parallel iterative solution method for large sparse
linear equation systems. Technical Report 650 UCAM-CL-TR-650, Computer Lab-
oratory, University of Cambridge, UK (2005)
24. Thomas, R.K., Russello, G., Tsang, S.: Realizing the cdl cross-domain language
in the ponder2 policy framework: Experiences and research directions. In: POL-
ICY 2009: Proceedings of the 2009 IEEE International Symposium on Policies
for Distributed Systems and Networks, Washington, DC, USA, pp. 76–83. IEEE
Computer Society, Los Alamitos (2009)
25. Adamson, M.K., Mehmood, R.: Developing event based hierarchical middleware for
e-learning. In: IADIS International Conference e-Learning 2007 (part of MCCSIS
2007), pp. 284–291 (2007)
26. Ayres, G., Mehmood, R., Mitchell, K., Race, N.J.P.: Localization to enhance secu-
rity and services in wi-fi networks under privacy constraints. In: Communications
Infrastructure. Systems and Applications in Europe, EuropeComm 2009, London,
UK, August 11-13 (2009), Revised Selected Papers, LNICST, vol. 16, 175–188
(2009)
27. Mehmood, R., Crowcroft, J., Hand, S., Smith, S.: Grid-level computing needs per-
vasive debugging. In: GRID 2005: Proceedings of the 6th IEEE/ACM International
Workshop on Grid Computing, Washington, DC, USA, pp. 186–193. IEEE Com-
puter Society, Los Alamitos (2005)