In this paper, we focus on demand side management in consumer collectives with community owned renewable energy generation and storage facilities for effective integration of renewable energy with the existing fossil ...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
In this paper, we focus on demand side management in consumer collectives with community owned renewable energy generation and storage facilities for effective integration of renewable energy with the existing fossil fuel-based power supply system. The collective buys energy as a group through a central coordinator who also decides about the storage and usage of renewable energy produced by the collective. Our objective is to design coordination algorithms to minimize the cost of electricity consumption of the consumer collective while allowing the consumers to make their own consumption decisions based on their private consumption constraints and preferences. Minimizing the cost is not only of interest to the consumers but is also socially desirable because it reduces the consumption at times of peak demand. We develop an iterative coordination algorithm in which the coordinator makes the storage decision and shapes the demands of the consumers by designing a virtual price signal for the agents. We prove that our algorithm converges, and it achieves the optimal solution under realistic conditions. We also present simulation results based on real world consumption data to quantify the performance of our algorithm.
During the long-term period of a nuclear disaster, people living in contaminated territories need to gain knowledge in order to take protective actions. While existing representations of this knowledge are designed fo...
详细信息
ISBN:
(纸本)9783319243993;9783319243986
During the long-term period of a nuclear disaster, people living in contaminated territories need to gain knowledge in order to take protective actions. While existing representations of this knowledge are designed for experts, we propose a thesaurus of radiation safety built for the lay people. We present a methodology to extract such a thesaurus from a set of documents addressed to non-experts. Extension of the corpus and implementation of more automated processes are still required to improve the resulting thesaurus.
Data warehouses (DW) and OLAP systems are technologies allowing the on-line analysis of huge volume of data according to decision-makers' needs. Designing DW involves taking into account functional requirements an...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Data warehouses (DW) and OLAP systems are technologies allowing the on-line analysis of huge volume of data according to decision-makers' needs. Designing DW involves taking into account functional requirements and data sources (mixed design methodology) [1]. But, for complex applications, existing automatic design methodologies seem inefficient. In some cases, decision-makers need querying, as a dimension, data which have been defined as facts by actual automatic mixed approachs. Therefore, in this paper, we offer a new mixed refinement methodology relevant to constellation multidimensional schema. The proposed methodolgy allows to decision-makers to enrich a dimension with factual data. In order to validate our theoretical proposals, we have implemented an enrichment tool and we have tested it on a real case study from bird biodiversity.
For decision making in a community, a set of alternatives needs to be identified. The set of alternatives should be consistent with recognition in a community (Social context). In this study, we define "social co...
详细信息
ISBN:
(数字)9783319215365
ISBN:
(纸本)9783319215365;9783319215358
For decision making in a community, a set of alternatives needs to be identified. The set of alternatives should be consistent with recognition in a community (Social context). In this study, we define "social context" as typical wording in community. Such wording appears in newspaper articles. We focus on the issue of bicycle riding in Japan and clarify the change of social context by using newspaper article. We show that wording in newspaper articles on bicycle riding in Japan has been changed during the past 11 years.
The Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations w...
详细信息
ISBN:
(纸本)9783319258973;9783319258966
The Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations without relating them to the requirements of the system's components. We propose a belief-based trust approach based on an extended version of Secure Tropos, where social relations are modeled and analyzed along with beliefs concerning capabilities and motivations of system's components. An example concerning US stock market crash (the Flash Crash) is used to illustrate our approach.
Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without bein...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without being aware of it. Social networks and search engines make these images easier accessible due to the available meta-data and the tagging and linking functionality provided by these services. Facial recognition amplifies the privacy implications for the individuals in these pictures. Overall there exist three main classes of wearable picture-related Privacy Enhancing Technologies (PETs). As they need different prerequisites to operate and become effective they have unique time frames in the future where they can be effective even if introduced today. The group of face pattern destroying picture PETs work directly against current face detection algorithms and is the choice for immediate usage. These PETs destroy face patterns and inhibit the detection and automated processing and meta-data enrichment of individuals. This unconditionally visual destructive behavior can be a major obstacle in transition to other PETs. In this paper, we describe how to master a smooth transition between these classes including the restoration of the visual damage some of these methods entail. Furthermore, we propose the Smart Privacy Visor, a PET which combines the previously published Privacy Visor and the Picture Privacy Policy Framework. The overall goal of this transition is to create a PET that avoids identifiable and linkable properties which contradicts the goals of picture PETs in the first place and offer a visually appealing photographic result at the same time.
As the interest in DevOps continues to grow, there is an increasing need for software organizations to understand how to adopt it successfully. This study has as objective to clarify the concept and provide insight in...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
As the interest in DevOps continues to grow, there is an increasing need for software organizations to understand how to adopt it successfully. This study has as objective to clarify the concept and provide insight into existing challenges of adopting DevOps. First, the existing literature is reviewed. A definition of DevOps is then formed based on the literature by breaking down the concept into its defining characteristics. We interview 13 subjects in a software company adopting DevOps and, finally, we present 11 impediments for the company's DevOps adoption that were identified based on the interviews.
Portable devices have been experimented for data acquisition in different domains, e.g., logistics and census data acquisition. Nevertheless, their large-scale adoption depends on the development of effective applicat...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Portable devices have been experimented for data acquisition in different domains, e.g., logistics and census data acquisition. Nevertheless, their large-scale adoption depends on the development of effective applications with a careful interaction design. In this work, we revisit existing strategies for mobile application design and evaluation and use the Semiotic Ladder from Organizational Semiotics as an artifact to organize a set of guidelines. We propose a set of semiotic-informed guidelines with questions for evaluation of mobile application interfaces. We also propose a methodology for the evaluation of mobile application interfaces based on the proposed guidelines set. We demonstrate the use of the proposed methodology in the evaluation of four mobile application interfaces designed for phenological data acquisition in the field.
The fields of long-term digital preservation (DP) and enterprise content management (ECM) have remained, until recently, rather separated. Along with increasing amounts of digital content and evolving DP services, the...
详细信息
ISBN:
(纸本)9783319217833;9783319217826
The fields of long-term digital preservation (DP) and enterprise content management (ECM) have remained, until recently, rather separated. Along with increasing amounts of digital content and evolving DP services, there is a need for maximal automation of preservation processes from ECM systems instead of continuing current resource-consuming practices. This paper aims at a design problem definition on the integration of ECM and DP solutions. In order to motivate and to define the problem in more detail, we conducted a review on ECM and DP literatures touching the issue. The review reveals a research gap addressing a need for designing new middleware solutions for interactive processes between ECM and DP. We suggest a general-level model of three such processes between ECM and DP: preservation administration, pre-ingest, and access. The article concludes with avenues for future research on novel solutions for integrating DP with contemporary ECM and other information systems in organizations.
The field of humanitarian logistics has evolved rapidly over the past decade, drawing on contributions from the areas of operations research, business engineering, supply chain management, information systems, and com...
详细信息
ISBN:
(纸本)9783319243993;9783319243986
The field of humanitarian logistics has evolved rapidly over the past decade, drawing on contributions from the areas of operations research, business engineering, supply chain management, information systems, and computer sciences. Even more varied are the specific problems that are modeled and addressed, ranging monitoring of the supply chain as a whole to decision support for specific sourcing or distribution decisions. While recently, few studies have presented taxonomies and identified research gaps, there is to this date not yet a clear understanding of how the different methodologies and domains shall be combined to achieve a consistent mix of methods and tools. In this paper, we present a start towards this aim comparing two distinct perspectives and related research approaches, methods and tools: business engineering and operations research. Our findings indicate that there are real opportunities for interdisciplinary research to improve the overall performance of the humanitarian supply chain.
暂无评论