5,013 research outputs found

    Mobile heritage practices. Implications for scholarly research, user experience design, and evaluation methods using mobile apps.

    Get PDF
    Mobile heritage apps have become one of the most popular means for audience engagement and curation of museum collections and heritage contexts. This raises practical and ethical questions for both researchers and practitioners, such as: what kind of audience engagement can be built using mobile apps? what are the current approaches? how can audience engagement with these experience be evaluated? how can those experiences be made more resilient, and in turn sustainable? In this thesis I explore experience design scholarships together with personal professional insights to analyse digital heritage practices with a view to accelerating thinking about and critique of mobile apps in particular. As a result, the chapters that follow here look at the evolution of digital heritage practices, examining the cultural, societal, and technological contexts in which mobile heritage apps are developed by the creative media industry, the academic institutions, and how these forces are shaping the user experience design methods. Drawing from studies in digital (critical) heritage, Human-Computer Interaction (HCI), and design thinking, this thesis provides a critical analysis of the development and use of mobile practices for the heritage. Furthermore, through an empirical and embedded approach to research, the thesis also presents auto-ethnographic case studies in order to show evidence that mobile experiences conceptualised by more organic design approaches, can result in more resilient and sustainable heritage practices. By doing so, this thesis encourages a renewed understanding of the pivotal role of these practices in the broader sociocultural, political and environmental changes.AHRC REAC

    Organizing sustainable development

    Get PDF
    The role and meaning of sustainable development have been recognized in the scientific literature for decades. However, there has recently been a dynamic increase in interest in the subject, which results in numerous, in-depth scientific research and publications with an interdisciplinary dimension. This edited volume is a compendium of theoretical knowledge on sustainable development. The context analysed in the publication includes a multi-level and multi-aspect analysis starting from the historical and legal conditions, through elements of the macro level and the micro level, inside the organization. Organizing Sustainable Development offers a systematic and comprehensive theoretical analysis of sustainable development supplemented with practical examples, which will allow obtaining comprehensive knowledge about the meaning and its multi-context application in practice. It shows the latest state of knowledge on the topic and will be of interest to students at an advanced level, academics and reflective practitioners in the fields of sustainable development, management studies, organizational studies and corporate social responsibility

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Information actors beyond modernity and coloniality in times of climate change:A comparative design ethnography on the making of monitors for sustainable futures in Curaçao and Amsterdam, between 2019-2022

    Get PDF
    In his dissertation, Mr. Goilo developed a cutting-edge theoretical framework for an Anthropology of Information. This study compares information in the context of modernity in Amsterdam and coloniality in Curaçao through the making process of monitors and develops five ways to understand how information can act towards sustainable futures. The research also discusses how the two contexts, that is modernity and coloniality, have been in informational symbiosis for centuries which is producing negative informational side effects within the age of the Anthropocene. By exploring the modernity-coloniality symbiosis of information, the author explains how scholars, policymakers, and data-analysts can act through historical and structural roots of contemporary global inequities related to the production and distribution of information. Ultimately, the five theses propose conditions towards the collective production of knowledge towards a more sustainable planet

    Inovação na diplomacia cultural: o caso da China

    Get PDF
    This study focuses on the innovation of China’s cultural diplomacy (CCD) by means of the Confucius Institute (CI). The main contents revolve around the following research goals: 1) to understand the strategic framework and practical path of CCD, and to clarify the context of its inheritance and innovation; 2) to analyze whether the CI, epitomized as a crucial innovation of CCD, has improved China’s national image in Portuguese-speaking countries (PSCs) and enhanced the attraction and international competitiveness of Chinese culture; and 3) to explore how China can better formulate its CD strategy in line with the exigencies of the modern era. The study combines the methods of literature review, case study, and questionnaire research to explore the topics from different perspectives to strengthen the scientific nature of the research results. In addition to the introduction and conclusion, the thesis is divided into five chapters. Chapter 1 discusses the connotation and value of CD. Chapter 2 expounds the development and innovation of CCD. Chapter 3 systematically summarizes China’s cultural interaction in its diplomatic process with PSCs. Chapter 4 elaborates on the CI in terms of its operation mode and diplomatic means. Chapter 5 forms the core of the study and involves empirical analysis of case-study and questionnaire data. It aims to investigate the functions, public image, influence, and practical means of CIs in the process of CD. Major findings indicate that CIs in PSCs have achieved ideal social feedback and play a positive role in shaping the image of China. However, according to the different continents where CIs are located, the survey results show distinct characteristics which are closely related to China’s different foreign policies towards Latin America, Europe, and Africa and are determined by the historical experiences and national conditions of the various countries. The future task for CCD is to clarify China’s institutional roots and the cultural genes behind its development by using cultural exchanges and China’s fluid culture to convey a message of China’s pursuit of peace, development, and cooperation.Este estudo tem como foco a inovação da Diplomacia Cultural da China (DCC) através do Instituto Confúcio (IC). Os principais conteúdos giram em torno dos seguintes objetivos de investigação: 1) compreender o enquadramento estratégico e o percurso prático da Diplomacia Cultural da China e clarificar o contexto da sua herança e inovação; 2) analisar se o IC, exemplo de inovação crucial da Diplomacia Cultural da China, melhorou a imagem nacional da China nos Países de Língua Oficial Portuguesa (PALOP) e aumentou a atração e competitividade internacional da cultura chinesa; e 3) explorar como a China pode formular melhor a sua estratégia de Diplomacia Cultural, de acordo com as exigências da era moderna. O estudo combina os métodos de revisão de literatura, estudo de caso e pesquisa de questionário para explorar os tópicos de diferentes perspetivas com o objetivo de fortalecer a natureza científica dos resultados de investigação. Além da introdução e da conclusão, a tese está dividida em cinco capítulos. O Capítulo 1 discute a conotação e o valor de Diplomacia Cultural (DC). O Capítulo 2 expõe o desenvolvimento e a inovação da Diplomacia Cultural da China (DCC). O Capítulo 3 resume sistematicamente a interação cultural da China no seu processo diplomático com os Países de Língua Oficial Portuguesa (PALOP). O Capítulo 4 discorre sobre o papel do IC em termos do seu modo de operar e dos seus meios diplomáticos. O Capítulo 5 constitui o núcleo da tese e envolve a análise empírica dos dados do estudo de caso e do questionário. Tem como objetivo investigar as funções, a imagem pública, a influência e os meios práticos dos IC no processo de Diplomacia Cultural (DC). As principais descobertas indicam que os IC nos PALOP alcançaram o feedback social ideal e desempenham um papel positivo na formação da imagem da China. No entanto, de acordo com os diferentes continentes onde os IC estão situados, os resultados da pesquisa apresentam caraterísticas distintas que estão intimamente relacionadas com as diferentes políticas externas da China para a América Latina, a Europa e a África e são determinadas pelas experiências históricas e pelas condições nacionais dos vários países. A futura tarefa da Diplomacia Cultural da China (DCC) será a de esclarecer as raízes institucionais da China e os genes culturais por trás do seu desenvolvimento, usando intercâmbios culturais e a cultura fluida da China para transmitir uma mensagem de busca de paz, de desenvolvimento e de cooperação por parte da China.Programa Doutoral em Políticas Pública

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    Accurate Battery Modelling for Control Design and Economic Analysis of Lithium-ion Battery Energy Storage Systems in Smart Grid

    Get PDF
    Adoption of lithium-ion battery energy storage systems (Li-ion BESSs) as a flexible energy source (FES) has been rapid, particularly for active network management (ANM) schemes to facilitate better utilisation of inverter based renewable energy sources (RES) in power systems. However, Li-ion BESSs display highly nonlinear performance characteristics, which are based on parameters such as state of charge (SOC), temperature, depth of discharge (DOD), charge/discharge rate (C-rate), and battery-aging conditions. Therefore, it is important to include the dynamic nature of battery characteristics in the process of the design and development of battery system controllers for grid applications and for techno-economic studies analyzing the BESS economic profitability. This thesis focuses on improving the design and development of Li-ion BESS controllers for ANM applications by utilizing accurate battery performance models based on the second-order equivalent-circuit dynamic battery modelling technique, which considers the SOC, C-rate, temperature, and aging as its performance affecting parameters. The proposed ANM scheme has been designed to control and manage the power system parameters within the limits defined by grid codes by managing the transients introduced due to the intermittence of RESs and increasing the RES penetration at the same time. The validation of the ANM scheme and the effectiveness of controllers that manage the flexibilities in the power system, which are a part of the energy management system (EMS) of ANM, has been validated with the help of simulation studies based on an existing real-life smart grid pilot in Finland, Sundom Smart Grid (SSG). The studies were performed with offline (short-term transient-stability analysis) and real-time (long-term transient analysis) simulations. In long-term simulation studies, the effect of battery aging has also been considered as part of the Li-ion BESS controller design; thus, its impact on the overall power system operation can be analyzed. For this purpose, aging models that can determine the evolving peak power characteristics associated with aging have been established. Such aging models are included in the control loop of the Li-ion BESS controller design, which can help analyse battery aging impacts on the power system control and stability. These analyses have been validated using various use cases. Finally, the impact of battery aging on economic profitability has been studied by including battery-aging models in techno-economic studies.Aurinkosähköjärjestelmien ja tuulivoiman laajamittainen integrointi sähkövoimajärjestelmän eri jännitetasoille on lisääntynyt nopeasti. Uusiutuva energia on kuitenkin luonteeltaan vaihtelevaa, joka voi aiheuttaa nopeita muutoksia taajuudessa ja jännitteessä. Näiden vaihteluiden hallintaan tarvitaan erilaisia joustavia energiaresursseja, kuten energiavarastoja, sekä niiden tehokkaan hyödyntämisen mahdollistaviea älykkäitä ja aktiivisia hallinta- ja ohjausjärjestelmiä. Litiumioniakkuihin pohjautuvien invertteriliitäntäisten energian varastointijärjestelmien käyttö joustoresursseina aktiiviseen verkonhallintaan niiden pätö- ja loistehon ohjauksen avulla on lisääntynyt nopeasti johtuen niiden kustannusten laskusta, modulaarisuudesta ja teknisistä ominaisuuksista. Litiumioniakuilla on erittäin epälineaariset ominaisuudet joita kuvaavat parametrit ovat esimerkiksi lataustila, lämpötila, purkaussyvyys, lataus/ purkausnopeus ja akun ikääntyminen. Akkujen ominaisuuksien dynaaminen luonne onkin tärkeää huomioida myös akkujen sähköverkkoratkaisuihin liittyvien säätöjärjestelmien kehittämisessä sekä teknis-taloudellisissa kannattavuusanalyyseissa. Tämä väitöstutkimus keskittyy ensisijaisesti aktiiviseen verkonhallintaan käytettävien litiumioniakkujen säätöratkaisuiden parantamiseen hyödyntämällä tarkkoja, dynaamisia akun suorituskykymalleja, jotka perustuvat toisen asteen ekvivalenttipiirien akkumallinnustekniikkaan, jossa otetaan huomioon lataustila, lataus/purkausnopeus ja lämpötila. Työssä kehitetyn aktiivisen verkonhallintajärjestelmän avulla tehtävät akun pätö- ja loistehon ohjausperiaatteet on validoitu laajamittaisten simulointien avulla, esimerkiksi paikallista älyverkkopilottia Sundom Smart Gridiä simuloimalla. Simuloinnit tehtiin sekä lyhyen aikavälin offline-simulaatio-ohjelmistoilla että pitkän aikavälin simulaatioilla hyödyntäen reaaliaikasimulointilaitteistoa. Pitkän aikavälin simulaatioissa akun ikääntymisen vaikutus otettiin huomioon litiumioniakun ohjauksen suunnittelussa jotta sen vaikutusta sähköjärjestelmän kokonaistoimintaan voitiin analysoida. Tätä tarkoitusta varten luotiin akun ikääntymismalleja, joilla on mahdollista määrittää akun huipputehon muutos sen ikääntyessä. Akun huipputehon muutos taas vaikuttaa sen hyödynnettävyyteen erilaisten pätötehon ohjaukseen perustuvien joustopalveluiden tarjoamiseen liittyen. Lisäksi väitöstutkimuksessa tarkasteltiin akkujen ikääntymisen vaikutusta niiden taloudelliseen kannattavuuteen sisällyttämällä akkujen ikääntymismalleja teknis-taloudellisiin tarkasteluihin.fi=vertaisarvioitu|en=peerReviewed

    Adaptive Microarchitectural Optimizations to Improve Performance and Security of Multi-Core Architectures

    Get PDF
    With the current technological barriers, microarchitectural optimizations are increasingly important to ensure performance scalability of computing systems. The shift to multi-core architectures increases the demands on the memory system, and amplifies the role of microarchitectural optimizations in performance improvement. In a multi-core system, microarchitectural resources are usually shared, such as the cache, to maximize utilization but sharing can also lead to contention and lower performance. This can be mitigated through partitioning of shared caches.However, microarchitectural optimizations which were assumed to be fundamentally secure for a long time, can be used in side-channel attacks to exploit secrets, as cryptographic keys. Timing-based side-channels exploit predictable timing variations due to the interaction with microarchitectural optimizations during program execution. Going forward, there is a strong need to be able to leverage microarchitectural optimizations for performance without compromising security. This thesis contributes with three adaptive microarchitectural resource management optimizations to improve security and/or\ua0performance\ua0of multi-core architectures\ua0and a systematization-of-knowledge of timing-based side-channel attacks.\ua0We observe that to achieve high-performance cache partitioning in a multi-core system\ua0three requirements need to be met: i) fine-granularity of partitions, ii) locality-aware placement and iii) frequent changes. These requirements lead to\ua0high overheads for current centralized partitioning solutions, especially as the number of cores in the\ua0system increases. To address this problem, we present an adaptive and scalable cache partitioning solution (DELTA) using a distributed and asynchronous allocation algorithm. The\ua0allocations occur through core-to-core challenges, where applications with larger performance benefit will gain cache capacity. The\ua0solution is implementable in hardware, due to low computational complexity, and can scale to large core counts.According to our analysis, better performance can be achieved by coordination of multiple optimizations for different resources, e.g., off-chip bandwidth and cache, but is challenging due to the increased number of possible allocations which need to be evaluated.\ua0Based on these observations, we present a solution (CBP) for coordinated management of the optimizations: cache partitioning, bandwidth partitioning and prefetching.\ua0Efficient allocations, considering the inter-resource interactions and trade-offs, are achieved using local resource managers to limit the solution space.The continuously growing number of\ua0side-channel attacks leveraging\ua0microarchitectural optimizations prompts us to review attacks and defenses to understand the vulnerabilities of different microarchitectural optimizations. We identify the four root causes of timing-based side-channel attacks: determinism, sharing, access violation\ua0and information flow.\ua0Our key insight is that eliminating any of the exploited root causes, in any of the attack steps, is enough to provide protection.\ua0Based on our framework, we present a systematization of the attacks and defenses on a wide range of microarchitectural optimizations, which highlights their key similarities.\ua0Shared caches are an attractive attack surface for side-channel attacks, while defenses need to be efficient since the cache is crucial for performance.\ua0To address this issue, we present an adaptive and scalable cache partitioning solution (SCALE) for protection against cache side-channel attacks. The solution leverages randomness,\ua0and provides quantifiable and information theoretic security guarantees using differential privacy. The solution closes the performance gap to a state-of-the-art non-secure allocation policy for a mix of secure and non-secure applications

    Tools for efficient Deep Learning

    Get PDF
    In the era of Deep Learning (DL), there is a fast-growing demand for building and deploying Deep Neural Networks (DNNs) on various platforms. This thesis proposes five tools to address the challenges for designing DNNs that are efficient in time, in resources and in power consumption. We first present Aegis and SPGC to address the challenges in improving the memory efficiency of DL training and inference. Aegis makes mixed precision training (MPT) stabler by layer-wise gradient scaling. Empirical experiments show that Aegis can improve MPT accuracy by at most 4\%. SPGC focuses on structured pruning: replacing standard convolution with group convolution (GConv) to avoid irregular sparsity. SPGC formulates GConv pruning as a channel permutation problem and proposes a novel heuristic polynomial-time algorithm. Common DNNs pruned by SPGC have maximally 1\% higher accuracy than prior work. This thesis also addresses the challenges lying in the gap between DNN descriptions and executables by Polygeist for software and POLSCA for hardware. Many novel techniques, e.g. statement splitting and memory partitioning, are explored and used to expand polyhedral optimisation. Polygeist can speed up software execution in sequential and parallel by 2.53 and 9.47 times on Polybench/C. POLSCA achieves 1.5 times speedup over hardware designs directly generated from high-level synthesis on Polybench/C. Moreover, this thesis presents Deacon, a framework that generates FPGA-based DNN accelerators of streaming architectures with advanced pipelining techniques to address the challenges from heterogeneous convolution and residual connections. Deacon provides fine-grained pipelining, graph-level optimisation, and heuristic exploration by graph colouring. Compared with prior designs, Deacon shows resource/power consumption efficiency improvement of 1.2x/3.5x for MobileNets and 1.0x/2.8x for SqueezeNets. All these tools are open source, some of which have already gained public engagement. We believe they can make efficient deep learning applications easier to build and deploy.Open Acces
    corecore