128,695 research outputs found

    OptEEmAL: Decision-Support Tool for the Design of Energy Retrofitting Projects at District Level

    Get PDF
    Designing energy retrofitting actions poses an elevated number of problems, as the definition of the baseline, selection of indicators to measure performance, modelling, setting objectives, etc. This is time-consuming and it can result in a number of inaccuracies, leading to inadequate decisions. While these problems are present at building level, they are multiplied at district level, where there are complex interactions to analyse, simulate and improve. OptEEmAL proposes a solution as a decision-support tool for the design of energy retrofitting projects at district level. Based on specific input data (IFC(s), CityGML, etc.), the platform will automatically simulate the baseline scenario and launch an optimisation process where a series of Energy Conservation Measures (ECMs) will be applied to this scenario. Its performance will be evaluated through a holistic set of indicators to obtain the best combination of ECMs that complies with user's objectives. A great reduction in time and higher accuracy in the models are experienced, since they are automatically created and checked. A subjective problem is transformed into a mathematical problem; it simplifies it and ensures a more robust decision-making. This paper will present a case where the platform has been tested.This research work has been partially funded by the European Commission though the European Union’s Horizon 2020 Research and Innovation Programme under grant agreement No 680676. All related information to the project is available at https://www.opteemal-project.eu

    Knowledge management support for enterprise distributed systems

    No full text
    Explosion of information and increasing demands on semantic processing web applications have software systems to their limits. To address the problem we propose a semantic based formal framework (ADP) that makes use of promising technologies to enable knowledge generation and retrieval. We argue that this approach is cost effective, as it reuses and builds on existing knowledge and structure. It is also a good starting point for creating an organisational memory and providing knowledge management functions

    Design an engaging interactive experience for people with dementia

    Get PDF
    The population of the world is increasing resulting in a higher number of people dealing with dementia–whether being diagnosed with it or taking care of someone that is diagnosed with it. This master thesis aims to investigate which types of multi-media technology-based experiences can improve the quality of life for people with dementia. To reach the goal of the thesis–investigation will be done through different iterations of a design method; divergence, transformation and convergence. These iterations will include observations, interviews and using personas as a tool to design. The results from the methods were used to create a high fidelity prototype which was evaluated by an expert in the field of dementia

    Threats Management Throughout the Software Service Life-Cycle

    Full text link
    Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE) to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN) and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM) domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Developing a distributed electronic health-record store for India

    Get PDF
    The DIGHT project is addressing the problem of building a scalable and highly available information store for the Electronic Health Records (EHRs) of the over one billion citizens of India
    corecore