Page 66 - ITU Journal - ICT Discoveries - Volume 1, No. 2, December 2018 - Second special issue on Data for Good
P. 66

ITU JOURNAL: ICT Discoveries, Vol. 1(2), December 2018




                                                               metadata used  in the scenario  analysis and
                                                               implementations  is  provided  in  the  form  of  a
                                                               pseudo code to describe the execution workflows.
                                                               4.1   Scenario analysis


                                                               A scenario analysis in a smart-home environment
                                                               is  provided  to  validate  the  applicability  of  the
                                                               procedural  metadata  concept.  This  scenario
                                                               describes how metatags and procedural metadata
                                                               can be used for automatic electricity consumption
                                                               pattern estimation.
                                                               4.1.1 System environment

                                                               The system environment is designed to have data
                                                               storage  (database),  a  convergence  system  (data
                                                               analyzer and organizer), and actors (smart home,
                                                               system  services,  and  3  party  service  providers).
                                                                                     rd
                                                               Connected  devices  in  the  smart  home  generate
                                                               data,  which  is transferred to a database and data
                                                               analyzer  according  to  procedural  metadata.  The
             Fig. 4 – Example of procedural metadata embedment   data  analyzer  processes  the  metatags  and  their
                                                               values,  with  raw  data  if  needed,  to  examines  the
                                                               relations,  rules,  and  policies  as  described  in  the
                                                               procedural  metadata.  Based  on  data  analysis
                                                               results  and  procedural  metadata,  the  data
                                                               organizer  creates,  updates,  and  manages  the
                                                               metatags,  then  it  makes  decisions  on  the  current
                                                               conditions.  According  to  analyzed  contexts,  the
                                                               system service and 3  party service providers take
                                                                                   rd
                                                               proper actions with up-to-date descriptions of the
           Fig. 5 – Example of security ensuring procedural metadata   current situations.
                                                               4.1.2 Consumption pattern estimation scenario
          needs to be already affiliated with and registered
          in  the  secured  and  trusted  domain,  then  it  can   For the electricity consumption pattern estimation
          access  the  system  according  to  its  clear  level.   task,  it  is  assumed  that  an  advanced  metering
          Otherwise,  that  object  must  go  through  security   infrastructure  (AMI)  device  exists  in  the
          and  trust  appreciations  according  to  appropriate   smart-home  environment  and  that  it  periodically
          procedural  metadata.  By  denying  unsecured  or    collects the electricity consumption data.
          untrusted  access,  the  data,  devices,  and  systems
          can ensure their security.                           With the collected data, the data analyzer performs
                                                               estimation  tasks  according  to  the  procedural
          4.   PROOF OF CONCEPT                                metadata as follows:
                                                               –     Retrieve pattern and peak time tag data for
          The  proof  of  concept  is  implemented  in  Matlab       the past 7 days.
          based  on  a  scenario  analysis  in  a  smart-home
          environment.  The  feasibility  of  the  proposed    –     Organize the tag data into a sequence.
          metadata  to  be  applied  to  the  web  are  shown  as   –   Search the top 5 similar sequences in the da-
          well.  Self-defined  metatags  are  used  to  ease  the    tabase.
          implementation process. However, different types     –     Choose the pattern value of the day after the
          of  data  formats,  models,  languages,  vocabularies,     end of each sequence as a candidate pattern.
          ontologies,  etc.  can  be  used  for  procedural
          metadata  as  long  as  they  support  a  micro-
          formatted  tag  structure.  Hence,  the  procedural




            44                               © International Telecommunication Union, 2018
   61   62   63   64   65   66   67   68   69   70   71