{"title":"Energy poverty in Europe: Challenges for energy efficiency","authors":"D. Kolokotsa, M. Santamouris","doi":"10.1109/IISA.2014.6878736","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878736","url":null,"abstract":"Energy and fuel poverty is an increasing problem in the European Union. Although the specific conditions vary from country to country the drivers defining fuel and energy poverty are similar in all Europe. This paper aims to present the characteristics of the low income housing including details on the thermal and environmental quality of houses and the specific energy consumption. Existing energy efficiency and passive solar technologies to improve the energy and environmental quality of low income houses are reviewed and discussed while real projects addressing issues related to the energy performance of poor households are presented.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of metaheuristic algorithms for dartboard design","authors":"Ioannis Trichas, C. Drosos, A. Vlachos","doi":"10.1109/IISA.2014.6878759","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878759","url":null,"abstract":"The problem of optimally locating the numbers around a dartboard is a Combinatorial Optimization problem. In this paper, we're solving this problem using Ant System and Max-Min Ant System (MMAS) algorithm. The algorithm reinforces local search in neighborhood of the best solution found in each iteration while implementing methods to slow convergence and facilitate exploration. Both algorithms have been proved to be very effective in finding optimum solution to hard combinatorial optimization problems.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Conversational Knowledge Management as a lens for Virtual Collaboration in the course of small group activities","authors":"Dionysia Mavraki, D. Akoumianakis","doi":"10.1109/IISA.2014.6878782","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878782","url":null,"abstract":"For several decades scholars from different disciplines explore knowledge management using different theoretical and engineering lenses. This paper focuses on a relatively recent approach to knowledge management and collaborative learning, namely Conversational Knowledge (CK) management. Using empirical data from two different case studies, we identify conversational patterns and assess intrinsic properties of their prominent media types. This helps anchor these patterns as `Dialogue for Action', thus informing the design of portlets (in the Liferay portal) that foster creation of new knowledge through collaborative conversational engagements of peers.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122375950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One approach to the use of the practices of CMMIDEV V1.3 level 2 in a process of development of embedded systems","authors":"Magda Aparecida Silverio Miyashiro, M. Ferreira","doi":"10.1109/IISA.2014.6878772","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878772","url":null,"abstract":"Currently the major concern of software engineering is the quality of Embedded Computing Systems, as they are a classification of software that are strongly present in our daily lives so that often we do not realize. Are composed of hardware and software encapsulated and generally dedicated to a single activity a major characteristic of such systems is the ability to perform very important tasks with little computational resource which represents a high degree of constraints to it is development and operation. It is importance is intensified when they are embedded in aircraft, medical equipment, automobiles, space systems among others that are considered critical, since if it fails, can cause major disasters. The dependence of society, different applications and technological developments are delegating all flexibility of these systems for their part formed by software, which makes it even more critical thus requiring appropriate and specific procedures in their production. The difficulty of software Engineering in meeting this demand is the specificity of each software component to be developed. The use of CMMI-DEV/V1.3 (Process Improvement of Brazilian Software) a model of international reference that directs the execution of practices necessary for the maturity of a software development process may represent a breakthrough in developing such systems one since it is development, we need to use processes with defined procedures to identify and assist in the development of products with these features and thus allow errors can be eliminated or minimized through the activities that must be performed in all stages of development This paper presents part of a study being carried out to develop a process framework that addresses all phases of a development process of embedded systems, organized into phases, activities and document templates that induce developers carrying out the good practices suggested by the level of quality CMMI-DEV/V1.3 model.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creep rupture forecasting for high performance energy systems","authors":"S. Chatzidakis, M. Alamaniotis, L. Tsoukalas","doi":"10.1109/IISA.2014.6878824","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878824","url":null,"abstract":"The non-linear capabilities of artificial neural networks to model the dynamics of creep rupture and failure mechanisms are exploited to achieve failure forecasting in high performance energy systems. The proposed approach forecasts the time to rupture due to creep mechanism and consists of the library construction, the experimental data and measurements necessary for the training process, the measurements gathered during operation and the artificial neural network. The methodology is demonstrated on experimental data gathered for this purpose, for two frequently applied high-temperature/high-load materials, namely Grade 91 steel and Hastelloy XR. The results obtained demonstrate the capability of the proposed methodology to apply artificial neural networks to forecast the time to rupture and improve safety and efficiency of high performance systems.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129621378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised audio segmentation based on Restricted Boltzmann Machines","authors":"A. Pikrakis","doi":"10.1109/IISA.2014.6878838","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878838","url":null,"abstract":"In this paper the Conditional Restricted Boltzmann Machine (CRBM) is employed in the context of unsupervised audio segmentation. The CRBM acts as a temporal modeling method and learns, from a maximum likelihood perspective, the temporal relationships of the feature vectors that have been extracted from a large corpus of training data. After the CRBM has been trained, we quantify the correlation of the activation of the neurons of the hidden layer for successive feature vectors by means of an appropriately defined similarity function. A simple thresholding scheme is then applied on the output of the similarity function to segment automatically the audio recording. Our experiments have been carried out on a large corpus of documentaries. We provide an interpretation of the segmentation results and comment on the segmentation efficiency of the method.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID-tate: Efficient security and privacy protection for active RFID over IEEE 802.15.4","authors":"M. Sadikin, M. Kyas","doi":"10.1109/IISA.2014.6878787","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878787","url":null,"abstract":"The emerging active RFID technology over low-rate wireless IEEE 802.15.4 has become promising standard for large-scale tracking applications. Nevertheless, using of such technology introduces tremendous problems in security and privacy. By taking in to account, the nature of common RFID communication is not mutually authenticated, the RFID system is susceptible from various threats ranging from impersonation, spoofing or data manipulation, to various techniques of man-in-the-middle attacks including denial-of-service and replay attack. In addition, the nature of RFID tag basically can be read without authorization. Such issue makes the RFID system is highly susceptible to privacy threats (e.g. unauthorized tracking, spying, crucial information leakage, etc.). On the other hand, the constrained nature of RFID system makes the security enforcement is more complicated. Indeed, common security and privacy solution, such as using Transport Layer Security method (TLS/SSL) is not feasible for the RFID tag which associates to limited resources. This paper presents RFID-Tate, an efficient privacy protection and mutual authentication using Tate pairing of Identity-based Encryption method. It is tailored to tackle various security and privacy challenges by applying a light-weight cryptographic method with advanced-level 128 bit security protection. In addition, the RFID-Tate maintains the computation overhead as optimally minimum. Thus it is feasible to be implemented in the constrained nature of RFID system.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. J. Alam, S. Kobourov, G. Liotta, S. Pupyrev, S. Veeramoni
{"title":"3D proportional contact representations of graphs","authors":"M. J. Alam, S. Kobourov, G. Liotta, S. Pupyrev, S. Veeramoni","doi":"10.1109/IISA.2014.6878773","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878773","url":null,"abstract":"In 3D contact representations, the vertices of a graph are represented by 3D polyhedra and the edges are realized by non-zero-area common boundaries between corresponding polyhedra. While contact representations with cuboids have been studied in the literature, we consider a novel generalization of the problem in which vertices are represented by axis-aligned polyhedra that are union of two cuboids. In particular, we study the weighted (proportional) version of the problem, where the volumes of the polyhedra and the areas of the common boundaries realize prespecified vertex and edge weights. For some classes of graphs (e.g., outerplanar, planar bipartite, planar, complete), we provide algorithms to construct such representations for arbitrary given weights.We also show that not all graphs can be represented in 3D with axis-aligned polyhedra of constant complexity.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131474168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Athanasios Fevgas, Nikolaos Fraggogiannis, P. Tsompanopoulou, Panayiotis Bozanis
{"title":"The iMuse Virtual Museum: towards a cultural education platform","authors":"Athanasios Fevgas, Nikolaos Fraggogiannis, P. Tsompanopoulou, Panayiotis Bozanis","doi":"10.1109/IISA.2014.6878817","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878817","url":null,"abstract":"In the recent years, there is an extremely growing interest for the digitalization of museums through the utilization of Information and Communication Technologies (ICTs). A virtual museum platform, named iMuse is presented in this paper. The platform aims to enhance museum visits, assist visitors navigate inside the museum and to provide access to multimedia content using the recent advances in Web, RFIDs and communication technologies. In more detail, the iMuse Virtual Museum is based on three components: Mobile Tour, Virtual Presenter and Virtual Wing. The iMuse Mobile Tour application consists of a tour guide system. It utilizes UHF RFID technology to enrich museum visiting experience, through free style tours, pre-defined tours, interactive educational games and a group support service. The iMuse Virtual Presenter application is a web platform for delivering multimedia presentation to groups of visitors. Its objective is to enhance cultural knowledge discovery by increasing access to museums' digital information, using rich media content (text, images, video and sound). The iMuse Virtual Wing comprise a user-aware virtual museum environment that creates and presents a virtual representation of the museum, providing multimedia content through specialized filtering methods. iMuse platform is successfully utilized to enhance educational programs and improve cultural understanding by connecting presentations with interactive games and guided tours.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the elasticity of residential energy consumption","authors":"T. Slini, E. Giama, A. Papadopoulos","doi":"10.1109/IISA.2014.6878821","DOIUrl":"https://doi.org/10.1109/IISA.2014.6878821","url":null,"abstract":"The current paper discusses the analysis of the results that emerged from a field study conducted in two consecutive years, aiming at the assessment of the economic recession's impact on the consumers' behaviour regarding energy consumption and space heating. The field survey was carried out, by means of interviews with questionnaires, in Northern Greece, an area where there is an increased energy demand for space heating compared to Athens and Southern Greece and hence an intensive need for efficient and effective solutions. The results of the field study, which has been carried out between 2011 and 2013, were analysed in order to identify major tendencies, if any, in the consumers' behaviour, with respect to the prevailing energy prices and the disposable household income. In that sense determining the degree of elasticity of residential energy consumption can be determined in a bottom-up approach and compared to the national average values for the same period. A further goal was to capture details that are helpful in order to understand technological choices and behavioural patterns when it comes to coping with a lesser income and increased energy costs.","PeriodicalId":298835,"journal":{"name":"IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}