A Web Based Data Processing Concept for Building Diagnostics and Performance Evaluation

2019 ◽  
Vol 887 ◽  
pp. 641-649
Author(s):  
Matthias Schuss ◽  
Farhang Tahmasebi ◽  
Ardeshir Mahdavi

Buildings are responsible for a major amount of the annual energy consumption. A detailed recording and evaluation of building data could provide a deeper understanding of building operation schemes and the corresponding performance. This could help building owners and operators to evaluate and better understand the actual situation. Based on this (real-time) data an optimized operation scheme can be designed and implemented for future time steps. Additionally, a more detailed understanding of the impact of previous building systems interactions will be possible. The building automation industry and the related service provider sector are actually providing proprietary solutions for data logging, visualization and energy optimization. Such solutions are regularly integrated into their own specific software of the used proprietary building management solutions. As an alternative, we suggest an Internet of Things (IoT) and web services inspired concept for the implementation of a generic web service for building diagnostics. Our suggestion encompasses a holistic performance evaluation that considers both the energy consumptions and delivered building service. In this contribution, a general design of a web service based solution is presented and the future possibilities for data access from various sources are discussed. Furthermore, details of actually developed and demonstratively implemented software components for data preprocessing are presented. Data processing examples for different types of data are included and highlight the potential of such web-based approaches. Moreover, possibilities for improved building control by the use of web services for operation schedule generation or model predictive control are illustrated and critically debated.

Author(s):  
Yu-Hsiang Wu ◽  
Jingjing Xu ◽  
Elizabeth Stangl ◽  
Shareka Pentony ◽  
Dhruv Vyas ◽  
...  

Abstract Background Ecological momentary assessment (EMA) often requires respondents to complete surveys in the moment to report real-time experiences. Because EMA may seem disruptive or intrusive, respondents may not complete surveys as directed in certain circumstances. Purpose This article aims to determine the effect of environmental characteristics on the likelihood of instances where respondents do not complete EMA surveys (referred to as survey incompletion), and to estimate the impact of survey incompletion on EMA self-report data. Research Design An observational study. Study Sample Ten adults hearing aid (HA) users. Data Collection and Analysis Experienced, bilateral HA users were recruited and fit with study HAs. The study HAs were equipped with real-time data loggers, an algorithm that logged the data generated by HAs (e.g., overall sound level, environment classification, and feature status including microphone mode and amount of gain reduction). The study HAs were also connected via Bluetooth to a smartphone app, which collected the real-time data logging data as well as presented the participants with EMA surveys about their listening environments and experiences. The participants were sent out to wear the HAs and complete surveys for 1 week. Real-time data logging was triggered when participants completed surveys and when participants ignored or snoozed surveys. Data logging data were used to estimate the effect of environmental characteristics on the likelihood of survey incompletion, and to predict participants' responses to survey questions in the instances of survey incompletion. Results Across the 10 participants, 715 surveys were completed and survey incompletion occurred 228 times. Mixed effects logistic regression models indicated that survey incompletion was more likely to happen in the environments that were less quiet and contained more speech, noise, and machine sounds, and in the environments wherein directional microphones and noise reduction algorithms were enabled. The results of survey response prediction further indicated that the participants could have reported more challenging environments and more listening difficulty in the instances of survey incompletion. However, the difference in the distribution of survey responses between the observed responses and the combined observed and predicted responses was small. Conclusion The present study indicates that EMA survey incompletion occurs systematically. Although survey incompletion could bias EMA self-report data, the impact is likely to be small.


Author(s):  
Wasim A Al-Hamdani

Cryptography has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, cryptography started to be part of protected public communication when e-mail became commonly used by the public. Webmail (or Web-based e-mail) is an e-mail service intended to be primarily accessed via a web browser, as opposed to through an e-mail client, such as Microsoft Outlook, Mozilla‘s Thunderbird Mail. Very popular webmail providers include Gmail, Yahoo! Mail, Hotmail and AOL. Web based email has its advantages, especially for people who travel. Email can be collected by simply visiting a website, negating the need for an email client, or to logon from home. Wherever a public terminal with Internet access exists one can check, sends and receive email quickly and easily. Another advantage of web based email is that it provides an alternate address allowing user to reserve his/her ISP address for personal use. If someone would like to subscribe to a newsletter, enter a drawing, register at a website, participate in chats, or send feedback to a site, a web based email address is the perfect answer. It will keep non-personal mail on a server for you to check when you wish, rather than filling up your private email box. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network”. Web services are frequently just Internet application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. Other approaches with nearly the same functionality as web services are Object Management Group‘s (OMG) Common Object Request Broker Architecture (CORBA), Microsoft‘s Distributed Component Object Model (DCOM) or SUN‘s Java/Remote Method Invocation (RMI). Integrating Encryption with web service could be performing in many ways such as: XML Encryption and XML Signature. In this article we present client and Web-based E-mail, next generation E-mail and secure E-mail, followed by cryptography in web service and the last part is the future of web service security. The article start with the integration of cryptography with E-mail client and web base then the integration of cryptography and web service is presented. At the end of the major two sections: e-mail service and web service there is a general prospect vision of encryption future for e-mail service and web service. This section presents our view for the cryptography integration with the second generation of e-mail and web service.


2018 ◽  
Vol 36 (3) ◽  
pp. 518-534 ◽  
Author(s):  
Muhammad Arif ◽  
Kanwal Ameen ◽  
Muhammad Rafiq

Purpose The delivery of information services in higher education is increasingly relying on Web-based systems. The low adoption and underutilization of information systems have been major problems for developing countries such as Pakistan in terms of realizing their full benefits. This study aims to investigate factors affecting student use of Allama Iqbal Open University’s (AIOU) Web-based services by using the Unified Theory of Acceptance and Use of Technology (UTAUT) from the perspective of Pakistani distance education. Design/methodology/approach This study has adopted quantitative research design with the UTAUT model as a theoretical framework. A self-completion structured questionnaire-based survey has been administered to 388 master’s level students, selected through systematic sampling from the target population. The response rate was 82 per cent (318). All statistical tests have been performed using IBM SPSS (version 20.0) and Process macro for SPSS. Findings Findings of the model’s hypotheses reveal that performance expectancy, effort expectancy and social influence are significant predictors of student behavioural intention to use AIOU Web-based services, whereas actual student use is dependent on facilitating conditions and student behavioural intention to use. The impact of moderating variables with respect to age, gender and experience did not influence the actual use of the Web services. However, the research model significantly measured (62.1 per cent) the actual use of AIOU Web-based services by the students. Research limitations/implications This study is delimited to the UTAUT model to investigate the phenomena. Besides this, the context of the study is the voluntary instead of mandatory usage of Web services. A study conducted in mandatory settings, in which students are bound to use Web services, may have different results. Originality/value This is the first attempt to apply the UTAUT model to investigate the factors affecting student use of Web-based services from the perspective of distance education and the findings prove strong support for the model.


Author(s):  
Joshua Shaffer ◽  
Joseph B. Kopena ◽  
William C. Regli

Reuse of design knowledge is an important goal in engineering design, and has received much attention. A substantial set of algorithms, methodology, and developed systems exist which support various aspects of this goal. However, the majority of these systems are built around a particular user interface, often some form of Web-based repository portal. The work described here presents search and other core functionality as web services rather than a monolithic repository system. These services may then be employed by a variety of applications, integrating them into interfaces familiar to the designer, extending functionality, streamlining their use, and enabling them to be employed throughout the design process. This paper demonstrates this approach by wrapping previously developed repository search algorithms as web services, and then using these within a plug-in for an existing commercial CAD environment. Based on issues encountered in developing this demonstration, this paper also discusses the challenges and potential approaches toward a more general, widespread application of web services in engineering design.


2021 ◽  
Author(s):  
Syed Saadat Bokhari

This thesis proposes a single and scalable web-based model for grid resource discovery for the Internet. The proposed resource discovery model contains the metadata and resource finder web services. The information of resource finder web services is kept in the repositories that are distributed in the application layer of [sic] Internet. The resource finder web services will be discovered by sending queries to the repositories in a similar way as the DNS protocol. The underlying technology for implementation of the two architectures of this model is introduced.


2021 ◽  
Author(s):  
Soheila Sadeghiram

<p>Service-oriented architecture (SOA) encourages the creation of modular applications involving Web services as the reusable components. Data-intensive Web services have emerged to manipulate and deal with the massive data emerged from technological advances and their various applications. Distributed Data-intensive Web Service Composition (DWSC) is a core of SOA, which includes the selection of data-intensive Web services from diverse locations on the network and composes them to accomplish a complicated task. As a fundamental challenge for service developers, service compositions must fulfil functional requirements and optimise Quality of Service (QoS), simultaneously. The QoS of a distributed DWSC is not only impacted by the QoS of component services and how the compositions are generated, but also by the locations of services and data transformation between services. However, existing works often neglect the impact of locations and data on service composition. The distributed DWSC has not been sufficiently studied in the literature. In this thesis, we first define the single-objective distributed DWSC that includes communication (e.g. bandwidth), Web service (execution time) and data (data cost) attributes. To this aim, we consider bandwidth information of communication links obtained using the location information of services. Based on the problem formulation, we then address the distributed DWSC problem by developing EC-based approaches. Those EC-based approaches are designed to incorporate domain-knowledge for effectively solving the distributed DWSC problem. Afterwards, we study the multi-objective distributed DWSC to satisfy different QoS requirements. In particular, the QoS-constrained distributed DWSC problem and user preferences are considered. For finding trade-off solutions for those problems, new Multi-objective Evolutionary Algorithms (MOEAs) are proposed based on the current Non-dominated Sorting Genetic Algorithm-II (NSGA-II). Furthermore, a new problem formulation for the dynamic distributed DWSC (D2−DWSC) problem with bandwidth fluctuations is proposed. An EC-based approach is developed to solve the D2-DWSC. Finally, extensive empirical evaluations are conducted that demonstrate the high performance of our proposed methods in finding composite services with good QoS.</p>


2018 ◽  
Vol 7 (4.35) ◽  
pp. 609 ◽  
Author(s):  
Hidayah Sulaiman ◽  
Asma Magaireh ◽  
Rohaini Ramli

With the ever increasing cost of investing in technological innovations and the amount of patient data to be processed on daily basis, healthcare organizations are in dire need for solutions that could provide easy access and better management of real time data with lower cost.  The emerging trend of organizations optimizing cost in investing less on physical hardware has brought about the use of cloud computing technology in various industries including healthcare.  The use of cloud computing technology has brought better efficiency in providing real time data access, bigger storage capacity and reduction of cost in terms of maintenance. Although numerous benefits have been publicized for organizations to adopt the technology, nevertheless the rate of adoption is still at is infancy. Hence, this study explores factors that may affect the adoption of cloud-based technology particularly within the healthcare context. A quantitative study was conducted through the distribution of survey in Jordanian healthcare facilities. The survey was conducted to gauge the understanding of cloud-based EHR concepts identified through literature and validate the factors that could potentially provide an impact towards the cloud-based EHR adoption. The theoretical underpinnings of Technology-Organization-Environment (TOE) were investigated in studying the impact towards the adoption of cloud-based EHR. Results indicate that Technology-Organization-Environment factors such as privacy, reliability, security, top management support, organizational readiness, competition and regulatory environment are critical factors towards the adoption of cloud technology within a healthcare setting.


2019 ◽  
Vol 17 (2) ◽  
pp. 39-48
Author(s):  
V. S. Eremenko ◽  
V. V. Naumova

The study describes an approach for heterogeneous web services cataloguing of geographically distributed computing nodes in the computational and analytical geological environment. The approach of creation of web services monitoring system is proposed. In this study the approach for web services catalogue organization based on SOAP (Simple Object Access Protocol) protocol, with use of UDDI (Universal Description Discovery and Integration) registries is reviewed. The scheme for heterogeneous web services description with an ability of further creation of catalogue is proposed. The catalogue includes functions for searching and receiving of metainformation about every web service in it. The study also describes an approach for computational and analytical geological environment creation. A number of web services for heterogeneous data processing used in geological research is described. The approaches for organization of cataloguing and web services monitoring provide a higher level of reliability of computational and analytical geological environment. They provide an information about web service reliability within environment.


Author(s):  
Liu Hui ◽  
He Xudong ◽  
Gao Fan ◽  
Wang KaiLun ◽  
Yuan Enze

Web services have covered all areas of social life, and various browsers have become necessary software on computers and mobile phones, and they are also the entrances to Web services. All kinds of threats to web data security continue to appear, so web services and browsers have become the focus of security. In response to the requirements of Web service for access entity identification and data access control, this paper proposes a multi-dimensional browser fingerprint detection method based on adversarial learning, and designs a Web service access control framework combined with browser fingerprint detection. Through the joint use of multi-dimensional browser features, adversarial learning is used to improve the accuracy and robustness of browser fingerprint detection; a cross-server and browser-side Web service access control framework is established by creating tags for Web data resources and access entities. Based on the mapping relationship between browser fingerprint detection entities and data resources, fine-grained hierarchical data access control is realized. Through experiments and analysis, the browser fingerprint detection method proposed in this paper is superior to existing machine learning detection methods in terms of accuracy and robustness. Based on the adversarial learning method, good detection results can be obtained in the case of a small number of user samples. At the same time, the open source data set is further used to verify the advantages of the method in this paper. The Web service access control framework can satisfy the requirements of Web data security control, is an effective supplement to user identification technology, and is implementable.


2014 ◽  
Vol 10 (3) ◽  
pp. 275-290 ◽  
Author(s):  
Hoa Khanh Dam

Purpose – The paper aims to address the issue of Web service providers facing a major issue of estimating the potential effects of changing a Web service to other services, especially in large ecosystems of Web services which have become more common nowadays. Web service providers make constant changes to their Web services to meet the ever-changing business requirements. Design/methodology/approach – The paper proposes an approach to predict change impact by mining a version history of a Web service ecosystem. The proposed approach extracts patterns of Web services that have been changed together from the version history by using association rule data mining techniques. The approach then uses this knowledge of co-changed patterns for predicting the impact of future changes based on the assumption that Web services which have been changed together frequently in the past will likely be changed together in future. Findings – An empirical validation based on the Amazon’s ecosystem of 46 Web services indicates the effectiveness of the proposed approach. After an initial change, the proposed approach can correctly predict up to 25 per cent of further Web services to be changed with the precision of up to 82 per cent. Originality/value – Traditional approaches to predict change impact in Web services tend to rely on having a dependency graph between Web services. However, in practice, building and maintaining inter-service dependencies that capture the precise semantics and behaviours of the Web services are challenging and costly. The proposed approach offers a novel alternative which only requires mining the existing version history of Web services.


Sign in / Sign up

Export Citation Format

Share Document