271,096 research outputs found
Recommended from our members
A robust scalable demand-side management based on diffusion-ADMM strategy for smart grid
Demand-side management (DSM) involves a group of programs, initiatives, and technologies designed to encourage consumers to modify their level and pattern of electricity usage. This is performed following methods such as financial incentives and behavioral change through education. While the objective of the DSM is to achieve a balance between energy production and demand, effective and efficient implementation of the program rests within effective use of emerging Internet of things (IoT) concept for online interactions. Here, a novel DSM framework based on diffusion and alternating direction method of multipliers (ADMM) strategies, repeated under a model predictive control (MPC) protocol, is proposed. On the demand side, the customers autonomously and by cooperation with their immediate neighbors estimate the baseline price in real time. Based on the estimated price signal, the customers schedule their energy consumption using the ADMM cost-sharing strategy to minimize their incommodity level. On the supply side, the utility company determines the price parameters based on the customers real-time behavior to make a profit and prevent the infrastructure overload. The proposed mechanism is capable of tracking drifts in the optimal solution resulting from the changes in supply/demand sides. Moreover, it considers all classes of appliances by formulating the DSM problem as a mixed-integer programming (MIP) problem. Numerical examples are provided to show the effectiveness of the proposed framework
Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things
In this paper we address the issue of gathering the "informed consent" of an
end user in the Internet of Things. We start by evaluating the legal importance
and some of the problems linked with this notion of informed consent in the
specific context of the Internet of Things. From this assessment we propose an
approach based on a semi-autonomous, rule based agent that centralize all
authorization decisions on the personal data of a user and that is able to take
decision on his behalf. We complete this initial agent by integrating
context-awareness, behavior modeling and community based reputation system in
the algorithm of the agent. The resulting system is a "smart" application, the
"privacy butler" that can handle data operations on behalf of the end-user
while keeping the user in control. We finally discuss some of the potential
problems and improvements of the system.Comment: This work is currently supported by the BUTLER Project co-financed
under the 7th framework program of the European Commission. published in
Internet of Things (WF-IoT), 2014 IEEE World Forum, 6-8 March 2014, Seoul,
P411-416, DOI: 10.1109/WF-IoT.2014.6803201, INSPEC: 1425565
Profiles of social networking sites users in the Netherlands
Online social networking has become a reality and integral part of the daily personal, social and business life. The extraordinary increase of the user numbers of Social Networking Sites (SNS) and the rampant creation of online communities presents businesses with many challenges and opportunities. From the commercial perspective, the SNS are an interesting and promising field: online social networks are important sources of market intelligence and also offer interesting options for co-operation, networking and marketing. For SMEs especially the Social Networking Sites represent a simple and low cost solution for listening the customer’s voice, reaching potential customers and creating extensive business networks. This paper presents the results of a national survey mapping the demographic, social and behavioral characteristics of the Dutch users of SNS. The study identifies four different user profiles and proposes a segmentation framework as basis for better understanding the nature and behavior of the participants in online communities. The findings present new insights to marketing strategists eager to use the communication potential of such communities; the findings are also interesting for businesses willing to explore the potential of online networking as a low cost yet very efficient alternative to physical, traditional networking
Asegúrate: an intervention program against cyberbullying based on teachers' commitment and on design of its instructional materials
This article presents the impact on cyberbullying of the Asegúrate program. This educational program is based on the theory of normative social behavior, self-regulation skills,and the beliefs held by adolescents and consists in a whole package of strategies and resources to help teachers to include in the ordinary curricula. The evaluation of Asegúrate was carried out with a sample of 4779 students (48.9% girls) in 5th and 6th grade in primary education and compulsory secondary education (M = 12.76; SD = 1.67) through a quasi-experimental methodology, with two measures over time. The instrument used was the European Cyberbullying Intervention Project Questionnaire. The results show that the involvement in cyberbullying as cyber-victim,cyber-aggressor, and cyber-bully-victim increase without intervention, whereas it diminishes when intervention is carried out by the teachers who have received specific training and have used the didactic Asegúrate package. Additionally, the impact of the intervention on the different types of behaviors was analyzed, and the results show that Asegúrate is more effective with some forms than with others. Consequently, the Asegúrate program is effective for decreasing the prevalence of cyberbullying, but some modifications need to be made to impact on all the different forms it can take.Gobierno de España PSI2017-86723-RGobierno de España PSI2016-74871-
Distributed Hybrid Simulation of the Internet of Things and Smart Territories
This paper deals with the use of hybrid simulation to build and compose
heterogeneous simulation scenarios that can be proficiently exploited to model
and represent the Internet of Things (IoT). Hybrid simulation is a methodology
that combines multiple modalities of modeling/simulation. Complex scenarios are
decomposed into simpler ones, each one being simulated through a specific
simulation strategy. All these simulation building blocks are then synchronized
and coordinated. This simulation methodology is an ideal one to represent IoT
setups, which are usually very demanding, due to the heterogeneity of possible
scenarios arising from the massive deployment of an enormous amount of sensors
and devices. We present a use case concerned with the distributed simulation of
smart territories, a novel view of decentralized geographical spaces that,
thanks to the use of IoT, builds ICT services to manage resources in a way that
is sustainable and not harmful to the environment. Three different simulation
models are combined together, namely, an adaptive agent-based parallel and
distributed simulator, an OMNeT++ based discrete event simulator and a
script-language simulator based on MATLAB. Results from a performance analysis
confirm the viability of using hybrid simulation to model complex IoT
scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
- …