The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time,...
Decision support systems play an increasingly important role in disaster management research. Coordination of rescue units during disaster response is one of the many areas which may benefit from this development. Time pressure, resource shortages, different capabilities of rescue units and the interdependence of scheduling and allocation tasks belong to the key challenges which emergency operation...
While crises may appear to be event-driven, post-mortem accounts often identify factors that accumulate over time and increase the likelihood of failure. These factors are particularly difficult to anticipate when multiple organizations are involved in crisis preparation and event detection. Through the development of a systems-based model of crisis management, we learned that knowledge sharing can...
Technology is a catalyst for communication and collaboration, and the use of information systems for these applications is prevalent. While there are countless benefits associated with communication and collaboration tools, detriments do exist. One pitfall is the prevalence of deviant behaviors online which can jeopardize the effectiveness of these tools. This paper presents the results of a study...
The nature of the training experience a person is exposed to is an important contextual element influencing technology acceptance, but little research has explored the differences in technology acceptance for different types of training experiences. This research investigates the difference in technology acceptance for individuals experiencing different types of training. Our work builds on prior...
An integrated assessment model is being developed and tested to explore possible future trends of Canadian agriculture in response to projected global scenarios in the ecological, economic, and social dimensions. Although many studies suggest more favorable growing conditions for Canada due to rising temperature and CO2 concentration, the agricultural sector will likely face challenges of water scarcity...
Service systems consider the co-creation of values in a process between provider and con¬sumer with a win-win situation for both. Service-Dominant Logic demands a new view on eco¬nomic activities where competences of provider and consumer are the most important re¬source for value creation. Given these assumptions, we investigate whether costs in a service system shall be accounted in a different...
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards...
In order to optimally schedule energy, consumers need to understand their energy utility function. The traditional utility function must be modified when consumers acquire production capabilities and become prosumers. This paper presents a formal economic model for prosumers, appropriately integrating distributed generation, storage and demand response capabilities. We identify the limitations of...
Power system analysis results are based on a model of the system. The model is often assumed known, yet it may contain errors. Model errors can impact the accuracy of the results. This paper utilizes historical data over time to extract the transmission line model parameters. The focus is on application of line parameter estimation techniques for real data from a North American utility. The approach...
We present a novel selection algorithm for N-2 contingency analysis problem. The algorithm is based on the iterative bounding of line outage distribution factors and successive pruning of the set of contingency pair candidates. The selection procedure is non-heuristic, and is certified to identify all events that lead to thermal constraints violations in DC approximation. The complexity of the algorithm...
In this paper, an approach based on the concept of Model Predictive Control (MPC) is used to control transmission voltages and prevent long-term voltage instability. The MPC model is based on a linearized steady-state system model derived from power flow equations. Simulation results are presented for the case of Nordic32 test system.
The incorporation of sophisticated sensing technology, notably the phasor measurement units (PMUs), offers tremendous opportunities toward real-time dynamic state monitoring in the smart grid. With a view to effectively exploiting the potentials of these advanced and non-conventional sensing resources, this paper is concerned with the design of PMU placement and sampling methodologies that optimize...
A new protection scheme is proposed that does not require settings or the settings are simple and the need to coordinate with other protective devices has been removed. The approach can be viewed as a generalization of differential protection and it is enabled with dynamic state estimation. Specifically, the proposed protection scheme is based on continuously monitoring terminal voltages and currents...
The digitization is posing great challenges to the European book industry. While some national markets show a fair diffusion of electronic book (ebook) technology, others are still resisting the digital trend. The lack of differentiated knowledge about the reasons for individual differences in ebook acceptance brings about uncertainties for industry players such as publishers or retailers. Technology...
Freemium seems a promising solution for content providers to earn money in times of the free mentality of Web 2.0 users. Freemium services can be used both for free or with a paid subscription to obtain premium content. Nevertheless, freemium's success is limited. Especially Music as a Service (MaaS) providers, that provide music via streaming over the internet as a service, still make no profits,...
While the importance of customer satisfaction and purchase intention has been recognized in the marketing literature, the development and empirical validation of a model which specifically depicts the determinants of satisfaction and purchase intention with regard to virtual products has not been undertaken. Consequently, this study, by adopting the expectancy disconfirmation model and symbolic consumption...
This study aims to look beyond the quantitative summary to provide a more comprehensive view of online user-generated content. We obtain a unique and extensive dataset of online user reviews for hotels across various review sites and over a long time periods. We use the sentiment analysis technique to decompose user reviews into five dimensions to measure hotel service quality. Those dimensions are...
Millions of young people engage themselves in virtual worlds. Due to intensifying competition, retaining the existing users is a key business challenge. Prior research has shown that network externalities play a focal role in the adoption of communication technologies. However, very limited research has examined the role of network externalities in continued IT usage in general or with respect to...
The creation of an ontology for a particular business domain has advantages for application development, interoperability, reusability, and integration. Agent systems with an underlying ontology can exploit these advantages by providing semantically-aware applications. However, there is a lack of support for ontology development in existing methodologies for designing and building multi-agent systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.