The document describes the Virtual City Simulator (ViCiSi), which dynamically assesses societal costs related to outages in critical infrastructure. ViCiSi creates activity profiles for societies to model how an outage would decrease economic activity. It also contains virtual representations of electrical grids, buildings, streets and other infrastructure to simulate restoration of power and society after an outage. ViCiSi uses real economic and population statistics for EU countries as inputs to make the virtual society representative.
1) The ADDRESS project aims to activate demand and enhance flexibility by developing technical solutions to enable active demand participation at the consumer and grid levels.
2) Distributed intelligence and load flexibility will help achieve secure grid operation while reducing energy bills and supporting sustainable growth.
3) The proposed solutions will be validated in test sites in Spain, Italy, and France and aim to remove barriers to active demand development through new markets and contracts.
Developing A Successful Strategy To Attract Venture Capital FinancingCharged2020
Gerd Goette, Vice President & Investment Partner, Siemens Venture Capital
• What are Venture Capitalists looking for in a business plan?
• How to commercialize new products: go-to-market strategy and partnering
• Living up to your promises: execution and budget control
Internet das Coisas e as Cidades InteligentesCezar Taurion
This document discusses IBM's innovations in smart cities initiatives and the Internet of Things. It notes that IBM was awarded nearly 6,000 patents in 2010, more than any other company. It also discusses challenges facing cities like population growth, resource scarcity, and the growth of connected devices. IBM's smart cities solutions can help with issues like water management, energy use, transportation, and environmental monitoring through the use of sensors, data analysis, and optimization of systems.
Citris smarter planet ict and service 20110505 v1ISSIP
The document discusses how information and communication technologies (ICT) and service innovation can work together to build a smarter planet. It describes ICT growth and challenges related to sustainability. It also discusses the growth of the service economy and challenges related to jobs and skills sustainability. The document advocates that a smarter planet is needed to address issues like environmental sustainability, public sector fiscal challenges, and ensuring jobs and skills sustainability through regional innovation ecosystems and lifelong learning.
Conferencia de Rosa Mora, Manager de Smartgrid Innovation en Siemens España sobre que nos depara el futuro energético, el smartgrid, la electromovilidad, el proyecto Green Emotion, los Edificios Smart ...
The document discusses how the global economy has shifted towards services, the growth of IBM's service business, and how CEOs can lead their organizations by cultivating connections within their organizations, with customers and partners, and through better use of data and insights. It also discusses IBM's University Programs initiative which aims to accelerate regional economic development through connections with universities.
Telkonet is a clean technology company focused on energy management for intermittently occupied spaces. It has two main products: EcoSmart, an energy management system installed in over 200,000 locations, and EthoStream, the largest hospitality WiFi network in the US serving over 4 million users monthly. While Telkonet has experienced losses in recent years due to investment in growth, its innovative technology and expanding customer base in key verticals position it for continued expansion.
1) The ADDRESS project aims to activate demand and enhance flexibility by developing technical solutions to enable active demand participation at the consumer and grid levels.
2) Distributed intelligence and load flexibility will help achieve secure grid operation while reducing energy bills and supporting sustainable growth.
3) The proposed solutions will be validated in test sites in Spain, Italy, and France and aim to remove barriers to active demand development through new markets and contracts.
Developing A Successful Strategy To Attract Venture Capital FinancingCharged2020
Gerd Goette, Vice President & Investment Partner, Siemens Venture Capital
• What are Venture Capitalists looking for in a business plan?
• How to commercialize new products: go-to-market strategy and partnering
• Living up to your promises: execution and budget control
Internet das Coisas e as Cidades InteligentesCezar Taurion
This document discusses IBM's innovations in smart cities initiatives and the Internet of Things. It notes that IBM was awarded nearly 6,000 patents in 2010, more than any other company. It also discusses challenges facing cities like population growth, resource scarcity, and the growth of connected devices. IBM's smart cities solutions can help with issues like water management, energy use, transportation, and environmental monitoring through the use of sensors, data analysis, and optimization of systems.
Citris smarter planet ict and service 20110505 v1ISSIP
The document discusses how information and communication technologies (ICT) and service innovation can work together to build a smarter planet. It describes ICT growth and challenges related to sustainability. It also discusses the growth of the service economy and challenges related to jobs and skills sustainability. The document advocates that a smarter planet is needed to address issues like environmental sustainability, public sector fiscal challenges, and ensuring jobs and skills sustainability through regional innovation ecosystems and lifelong learning.
Conferencia de Rosa Mora, Manager de Smartgrid Innovation en Siemens España sobre que nos depara el futuro energético, el smartgrid, la electromovilidad, el proyecto Green Emotion, los Edificios Smart ...
The document discusses how the global economy has shifted towards services, the growth of IBM's service business, and how CEOs can lead their organizations by cultivating connections within their organizations, with customers and partners, and through better use of data and insights. It also discusses IBM's University Programs initiative which aims to accelerate regional economic development through connections with universities.
Telkonet is a clean technology company focused on energy management for intermittently occupied spaces. It has two main products: EcoSmart, an energy management system installed in over 200,000 locations, and EthoStream, the largest hospitality WiFi network in the US serving over 4 million users monthly. While Telkonet has experienced losses in recent years due to investment in growth, its innovative technology and expanding customer base in key verticals position it for continued expansion.
The document outlines a framework for a research roadmap on trust and security. It discusses establishing a framework to examine changes, vision, challenges, and solutions for trust and security. It also addresses gathering workshop output, key questions around structuring the full roadmap, and next steps.
This document provides an overview of the uTRUSTit project, which aims to develop usable trust in the Internet of Things. It introduces several smart home and office scenarios involving IoT devices. It then describes personas that were developed to represent different types of users. Focus groups were conducted to identify user requirements for trust and privacy. Examples of requirements include providing feedback on third party data access and having consistent user interfaces across devices. The outlook discusses further research needs in complexity reduction, trust modeling, and understanding user mental models of IoT systems.
The document summarizes a workshop on models held by the EFFECTS+ Systems & Networks Cluster. The workshop aimed to identify publicly available models, areas of collaboration between projects, and gaps in existing approaches. Presentations covered various modeling approaches from different projects. Results included plans to classify models, publish a survey, hold follow-up meetings, and initiate specific multilateral cooperations between projects in areas like SCADA systems, privacy, services, and security evaluation.
Engineering for Connected Patients in the IoT EraMongoDB
This document summarizes Anurag Singhal's presentation on engineering for connected patients in the IoT era. Singhal is the director of engineering at Clinical Ink, which provides mobile apps and a platform called CentrosHealth to enable clinical trials to capture data from patients using connected devices and sensors. The presentation discusses how Clinical Ink uses MongoDB to store diverse clinical trial and sensor data, ensuring data security, audit trails, and compliance with regulations. It also describes challenges around processing large volumes of data from wearable sensors and finding solutions to issues like data deduplication and streaming.
- PoSecCo aims to model services for future internet security requirements from a service provider perspective. It takes into account security requirements from customers, laws/regulations, and suppliers.
- The modeling covers business, IT, and infrastructure layers. At the business layer, it models institutions, business processes, services, and information. At the IT layer, it models IT services and their components, interfaces, and relationships. At the infrastructure layer, it models physical and virtual resources, nodes, and the overall landscape topology.
- The goal is to support service providers by allowing reuse of services via standardized models and tools, while ensuring security policies are appropriately applied across customer instantiations.
The document summarizes a workshop organized by the Effectsplus Systems and Networks cluster to discuss different modeling approaches used in projects to assess security and privacy challenges. The workshop aims to identify areas of collaboration, publicly available models, and gaps for future research. The agenda outlines presentations on various modeling techniques from 11 projects on the first day and discussions on collaboration opportunities on the second day.
The document describes SysSec, a 4-year European Network of Excellence working to consolidate research on managing threats and vulnerabilities in the future Internet. SysSec aims to create a proactive research community, advance security research beyond the current reactive state, and establish a virtual center of excellence. Its goals are to anticipate attacks, predict future threats, collaborate with international researchers, and transfer technology to the security industry.
The document describes an approach to analytical attack modeling using two main techniques: analytical modeling through generating multi-level attack graphs and service dependencies, and fine-grained modeling and simulation. It then outlines the key components of an attack modeling architecture, including generators for system specifications, attack graphs, and service dependencies, as well as modules for security evaluation, decision support, and interactive visualization.
This document discusses the development of the Privacy Rules Definition Language (PRDL) to create rules addressing privacy concerns in the ENDORSE project. It aims to make privacy terms transparent to users and provide better data protection guarantees. Key challenges include identifying legal requirements and evaluating privacy rules in organizational systems. Example rules are presented along with choices around rule functionality and requirements gathering. The current meta rule model and progress on PRDL are also outlined.
This document discusses the SECURE CHANGE project which aims to support software evolution while maintaining security. It proposes a change-driven security engineering process where risk assessment interplays with software development phases. Models are the basic unit of change and concepts are mapped between requirements and risk domains. When a change affects an interface concept, the change is propagated to the other domain. An example shows how a new ATM tool introduction leads to identifying new risks and defining security objectives and requirements in the risk and requirements models.
This document discusses visual analytic techniques for representing large datasets to enhance network security. It describes the VIS-SENSE project which involves 6 partners from 4 countries developing tools for analyzing internet threat landscapes. The tools use clustering algorithms and similarity models to group related security events that may share common root causes. Examples are provided of how the tools can analyze rogue antivirus campaigns and relationships between spam botnets.
The document discusses using assessment models to improve the usability and security of wireless sensor networks (WSNs). It proposes a model-based approach involving (1) collecting and mapping user security requirements, (2) describing component properties and how they compose, and (3) defining security models to assess whether requirements are satisfied. The approach aims to bridge the gap between users and technical implementation. An example security model uses attack trees to evaluate if attacks can be prevented or don't apply given the system and requirements.
The document discusses the Trust in Digital Life (TDL) consortium, which aims to stimulate research and development of trustworthy information and communication technology (ICT) solutions. TDL has over 20 members from industry, academia, and government working to set a research agenda. The consortium's goals are to establish an inspiring and self-sustaining community to advance knowledge and collaborative projects, develop an innovative research agenda, enable public funding for related projects, and increase awareness through demonstrations. TDL will measure progress using key performance indicators like adoption rates of e-services and survey scores on consumer trust.
The Aniketos project aims to help establish and maintain trustworthy and secure behavior in dynamically changing environments of composite services. It develops methods and tool support for the design and runtime composition of secure dynamic services. The project addresses challenges of composite security where individual services may be trustworthy but their composition is not clear. It proposes expressing security and trustworthiness requirements through models and generating security agreements. The Aniketos platform supports security definition, evaluation, monitoring, and adaptation for composite services.
The document discusses ontologies in ASSERT4SOA. It aims to use OWL-DL to describe security properties of software services and support comparison of different certificate types. It addresses design questions about the community, domain, and formalism used. An example ontology illustrates representing a certificate, security property, and service model in OWL-DL with properties. Reasoning over the ontology allows mapping certificates to properties, discovering relations, and checking consistency.
Workshop summary software assurance and trustfcleary
This document summarizes a technical workshop on software assurance and trust that was held by the Cloud & Services Cluster. The objectives of the workshop were to identify areas of collaboration between projects, publicly available models that could be reused, and gaps in existing approaches. The agenda included presentations from six European projects on topics like security SLAs, auditing, monitoring, and user-centered approaches to trust. Results included the potential for a joint paper and follow-up inter-project meetings on topics such as security SLAs and auditing.
The document discusses the Cyber Security Modeling Language (CySeMoL) tool developed by the VIKING project. The tool allows users to model their system architecture, visualize potential attacks, and calculate success probabilities of attacks. It consolidates security theory to identify the most important factors that influence attack success. The tool is currently being tested in real-life cases and the developers are seeking collaboration to improve the modeling language, calculation engine, and data collection capabilities.
1. PoSecCo security models provide complete knowledge of an auditee's infrastructure, technologies, policies and configurations.
2. This detailed information can be used to develop standardized, automatable audit programs by mapping auditee policies to technical configurations.
3. During audit execution, technical evidence can be automatically retrieved and checks can be executed to provide assurance and increase efficiency of the audit process.
This document summarizes the objectives and proceedings of the 2nd Effectsplus Cluster event held in Amsterdam on July 4-5, 2011. 22 research projects attended to discuss collaboration opportunities in two parallel workshops on systems/networks models and services/cloud trust and assurance. The event aimed to identify areas for collaboration, publicly available examples, and gaps for future research. Presentations were given on several projects to promote awareness, including the BIC project which coordinates international cooperation on trustworthy ICT between the EU and countries like Brazil, India and South Africa.
The document discusses how electricity systems are changing from "stupid" centralized systems to "smart" decentralized systems. It outlines four stages: 1) the traditional centralized hierarchy; 2) the addition of demand response through aggregators; 3) fully activating demand through peer-to-peer trading and energy communities; and 4) regulators adapting to these changes. While initially wary of disruptions, regulators like Ofgem now recognize flexibility and platforms as key to the new interactive system and transactive energy future.
Economic Footprint of the UK Electronic Systems CommunityIan Phillips
A work of UK Economic Analysis produced as part of the UK-ESCO initiative. The
is document and the supporting spreadsheet is available from http://www.esco.org.uk/economic-footprint/
The document outlines a framework for a research roadmap on trust and security. It discusses establishing a framework to examine changes, vision, challenges, and solutions for trust and security. It also addresses gathering workshop output, key questions around structuring the full roadmap, and next steps.
This document provides an overview of the uTRUSTit project, which aims to develop usable trust in the Internet of Things. It introduces several smart home and office scenarios involving IoT devices. It then describes personas that were developed to represent different types of users. Focus groups were conducted to identify user requirements for trust and privacy. Examples of requirements include providing feedback on third party data access and having consistent user interfaces across devices. The outlook discusses further research needs in complexity reduction, trust modeling, and understanding user mental models of IoT systems.
The document summarizes a workshop on models held by the EFFECTS+ Systems & Networks Cluster. The workshop aimed to identify publicly available models, areas of collaboration between projects, and gaps in existing approaches. Presentations covered various modeling approaches from different projects. Results included plans to classify models, publish a survey, hold follow-up meetings, and initiate specific multilateral cooperations between projects in areas like SCADA systems, privacy, services, and security evaluation.
Engineering for Connected Patients in the IoT EraMongoDB
This document summarizes Anurag Singhal's presentation on engineering for connected patients in the IoT era. Singhal is the director of engineering at Clinical Ink, which provides mobile apps and a platform called CentrosHealth to enable clinical trials to capture data from patients using connected devices and sensors. The presentation discusses how Clinical Ink uses MongoDB to store diverse clinical trial and sensor data, ensuring data security, audit trails, and compliance with regulations. It also describes challenges around processing large volumes of data from wearable sensors and finding solutions to issues like data deduplication and streaming.
- PoSecCo aims to model services for future internet security requirements from a service provider perspective. It takes into account security requirements from customers, laws/regulations, and suppliers.
- The modeling covers business, IT, and infrastructure layers. At the business layer, it models institutions, business processes, services, and information. At the IT layer, it models IT services and their components, interfaces, and relationships. At the infrastructure layer, it models physical and virtual resources, nodes, and the overall landscape topology.
- The goal is to support service providers by allowing reuse of services via standardized models and tools, while ensuring security policies are appropriately applied across customer instantiations.
The document summarizes a workshop organized by the Effectsplus Systems and Networks cluster to discuss different modeling approaches used in projects to assess security and privacy challenges. The workshop aims to identify areas of collaboration, publicly available models, and gaps for future research. The agenda outlines presentations on various modeling techniques from 11 projects on the first day and discussions on collaboration opportunities on the second day.
The document describes SysSec, a 4-year European Network of Excellence working to consolidate research on managing threats and vulnerabilities in the future Internet. SysSec aims to create a proactive research community, advance security research beyond the current reactive state, and establish a virtual center of excellence. Its goals are to anticipate attacks, predict future threats, collaborate with international researchers, and transfer technology to the security industry.
The document describes an approach to analytical attack modeling using two main techniques: analytical modeling through generating multi-level attack graphs and service dependencies, and fine-grained modeling and simulation. It then outlines the key components of an attack modeling architecture, including generators for system specifications, attack graphs, and service dependencies, as well as modules for security evaluation, decision support, and interactive visualization.
This document discusses the development of the Privacy Rules Definition Language (PRDL) to create rules addressing privacy concerns in the ENDORSE project. It aims to make privacy terms transparent to users and provide better data protection guarantees. Key challenges include identifying legal requirements and evaluating privacy rules in organizational systems. Example rules are presented along with choices around rule functionality and requirements gathering. The current meta rule model and progress on PRDL are also outlined.
This document discusses the SECURE CHANGE project which aims to support software evolution while maintaining security. It proposes a change-driven security engineering process where risk assessment interplays with software development phases. Models are the basic unit of change and concepts are mapped between requirements and risk domains. When a change affects an interface concept, the change is propagated to the other domain. An example shows how a new ATM tool introduction leads to identifying new risks and defining security objectives and requirements in the risk and requirements models.
This document discusses visual analytic techniques for representing large datasets to enhance network security. It describes the VIS-SENSE project which involves 6 partners from 4 countries developing tools for analyzing internet threat landscapes. The tools use clustering algorithms and similarity models to group related security events that may share common root causes. Examples are provided of how the tools can analyze rogue antivirus campaigns and relationships between spam botnets.
The document discusses using assessment models to improve the usability and security of wireless sensor networks (WSNs). It proposes a model-based approach involving (1) collecting and mapping user security requirements, (2) describing component properties and how they compose, and (3) defining security models to assess whether requirements are satisfied. The approach aims to bridge the gap between users and technical implementation. An example security model uses attack trees to evaluate if attacks can be prevented or don't apply given the system and requirements.
The document discusses the Trust in Digital Life (TDL) consortium, which aims to stimulate research and development of trustworthy information and communication technology (ICT) solutions. TDL has over 20 members from industry, academia, and government working to set a research agenda. The consortium's goals are to establish an inspiring and self-sustaining community to advance knowledge and collaborative projects, develop an innovative research agenda, enable public funding for related projects, and increase awareness through demonstrations. TDL will measure progress using key performance indicators like adoption rates of e-services and survey scores on consumer trust.
The Aniketos project aims to help establish and maintain trustworthy and secure behavior in dynamically changing environments of composite services. It develops methods and tool support for the design and runtime composition of secure dynamic services. The project addresses challenges of composite security where individual services may be trustworthy but their composition is not clear. It proposes expressing security and trustworthiness requirements through models and generating security agreements. The Aniketos platform supports security definition, evaluation, monitoring, and adaptation for composite services.
The document discusses ontologies in ASSERT4SOA. It aims to use OWL-DL to describe security properties of software services and support comparison of different certificate types. It addresses design questions about the community, domain, and formalism used. An example ontology illustrates representing a certificate, security property, and service model in OWL-DL with properties. Reasoning over the ontology allows mapping certificates to properties, discovering relations, and checking consistency.
Workshop summary software assurance and trustfcleary
This document summarizes a technical workshop on software assurance and trust that was held by the Cloud & Services Cluster. The objectives of the workshop were to identify areas of collaboration between projects, publicly available models that could be reused, and gaps in existing approaches. The agenda included presentations from six European projects on topics like security SLAs, auditing, monitoring, and user-centered approaches to trust. Results included the potential for a joint paper and follow-up inter-project meetings on topics such as security SLAs and auditing.
The document discusses the Cyber Security Modeling Language (CySeMoL) tool developed by the VIKING project. The tool allows users to model their system architecture, visualize potential attacks, and calculate success probabilities of attacks. It consolidates security theory to identify the most important factors that influence attack success. The tool is currently being tested in real-life cases and the developers are seeking collaboration to improve the modeling language, calculation engine, and data collection capabilities.
1. PoSecCo security models provide complete knowledge of an auditee's infrastructure, technologies, policies and configurations.
2. This detailed information can be used to develop standardized, automatable audit programs by mapping auditee policies to technical configurations.
3. During audit execution, technical evidence can be automatically retrieved and checks can be executed to provide assurance and increase efficiency of the audit process.
This document summarizes the objectives and proceedings of the 2nd Effectsplus Cluster event held in Amsterdam on July 4-5, 2011. 22 research projects attended to discuss collaboration opportunities in two parallel workshops on systems/networks models and services/cloud trust and assurance. The event aimed to identify areas for collaboration, publicly available examples, and gaps for future research. Presentations were given on several projects to promote awareness, including the BIC project which coordinates international cooperation on trustworthy ICT between the EU and countries like Brazil, India and South Africa.
The document discusses how electricity systems are changing from "stupid" centralized systems to "smart" decentralized systems. It outlines four stages: 1) the traditional centralized hierarchy; 2) the addition of demand response through aggregators; 3) fully activating demand through peer-to-peer trading and energy communities; and 4) regulators adapting to these changes. While initially wary of disruptions, regulators like Ofgem now recognize flexibility and platforms as key to the new interactive system and transactive energy future.
Economic Footprint of the UK Electronic Systems CommunityIan Phillips
A work of UK Economic Analysis produced as part of the UK-ESCO initiative. The
is document and the supporting spreadsheet is available from http://www.esco.org.uk/economic-footprint/
This document summarizes a presentation about smart communities and Japan's experience with smart grid and smart community projects. It discusses:
1. NEDO's role in coordinating industry, academia and government efforts on national smart energy projects.
2. Examples of leading smart community demonstration projects across Japan targeting reductions in CO2 emissions through integrated energy management systems.
3. Two pioneering projects - the Pal Town project in Ota City, one of Japan's first smart grid projects, and the Sendai Microgrid project, which demonstrated a microgrid's ability to continue supplying different classes of power quality during a grid outage caused by the 2011 earthquake and tsunami.
Electronic Systems permeate our lives to day. They underpin our society and our economy. The UK Electronics Systems Community is a hidden success story, providing technology and know-how throughout their global life-cycles. And in turn making a significant direct and indirect contributing to the UK Economy as it does so.
"Sustainable Economic Ecosystems" will power the transition from the Industrial Era to the Era of Sustainability. Begin here to learn more about the construct and the emergence of Smart Villages.
The document discusses the Industrial Internet Consortium (IIC), an open membership organization with 214 member companies from 26 countries. The IIC aims to accelerate growth of the Industrial Internet by coordinating initiatives for connecting objects, people and processes using open standards. Key areas of focus for the IIC include its Technology Working Group, Security Working Group, and testbeds for driving innovation. Two testbeds highlighted are the International Future Industrial Internet for connecting industries via mobile networks, and a Communication and Control for Microgrid Applications testbed.
The document discusses the use of IoT in the energy industry. It describes how IoT can be applied to remotely monitor energy assets, automate processes, integrate renewable energy sources with the grid, and help consumers reduce energy consumption through smart meters and decision making. Some benefits of IoT include improved reliability, reduced costs and labor, and more eco-friendly measures. Potential challenges involve security, connectivity, integration complexity. Edge computing and infrastructure modernization are proposed as solutions.
Korea UKTI Green Buildings Trade Mission PresentationDavid Wortley
The document discusses smart buildings and how integrating physical and virtual spaces can add value and reduce costs. It describes how ambient devices can deliver increased control and functionality while technology becomes more personalized. Physical spaces are important for building social and economic networks. The Serious Games Institute is an international center applying immersive technologies to serious issues. It explores how smart buildings can satisfy human needs through rich experiences while ensuring efficiency, security, and reliability through automated processes and sensors. Integrating physical and virtual spaces through technologies like visualization, sensors, geotagging, augmented reality and social networking can develop personalized relationships between users and spaces.
The us smart_meter_uprising_august_2011_zpryme_researchdlu5
This document summarizes key findings from a report on the growing US smart meter market between 2009-2011. It finds that among 51 major utilities:
- The number of smart meters installed grew 81% from 2009-2011, reaching over 7 million meters.
- The percentage of total customers with smart meters increased from 18% to 34% over this period.
- Utilities that have deployed smart meters to over 50% of customers are expected to lead in new smart grid products and technologies.
Stimulus grants have been a major driver of large smart meter deployments in the US according to the analysis.
It’s no wonder that smart meter rollouts have skyrocketed with supporting business case findings such as ComEd customers saving potentially $2.8 billion on their electric bills over the 20-year life of the smart meters. Largely due to the aggressive U.S. effort to modernize its electric grid pros and cons (for example PG&E will now offer ‘opt out option’) for smart meters are still aggressively being debated; nonetheless the number of smart meters installed in the U.S. has ballooned over the past several years – with just over fifty utilities deploying the bulk of the investment. Zpryme analyzed data from the EIA in an effort to not only breakdown smart meter deployments by utility but also to zero in on the drivers that will bridge the U.S. energy divide.
InterConnect Project Overview - OPEN DEI 1st Energy Domain WorkshopOPEN DEI
This document provides an overview of the InterConnect Project, which aims to develop an interoperable ecosystem for efficient energy management through demand flexibility integration. The project involves 50 partners across 11 European countries and will receive €30 million in funding plus €6 million in cascade funding. It will develop technologies in energy management systems and smart devices/appliances using ICT approaches like cloud computing, blockchain, and big data. The project expects to achieve impacts like increased adoption of IoT standards, validated concepts for user acceptance and privacy, and contributions to renewable energy and efficiency. It will implement seven large-scale pilots across Europe and provide €4.8 million in funding for additional initiatives through open calls.
This document summarizes a report on smart city activities commissioned by Bristol City Council. It provides an overview of the methodology used in the report to analyze over 100 global cities and provide case studies on 46 cities. The report focuses on how smart technologies can help reduce carbon emissions. It also discusses barriers to smart city deployment and examples of smart grid projects in various cities that enable demand management, improve grid efficiency, and provide energy usage information.
The document describes Watly, a thermodynamic computer that uses solar energy to purify water, generate electricity, and provide internet connectivity. It works autonomously or can be connected to other Watly machines via an "Energy_net" to service larger areas. The document outlines Watly's technical capabilities and purification process. It then discusses Watly's hybrid business model of direct hardware sales and providing ongoing services, and provides projections showing it can become profitable and scale to millions of units serving many people globally.
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...WMG, University of Warwick
Sophie Peachey, Director of Innovation & Insight at Axillium Research Ltd discusses a new funding opportunity through the Advanced Manufacturing Supply Chain Initiative in the area of the Internet of Things.
This document provides an overview of the Internet of Things (IoT). It defines IoT as physical objects embedded with sensors and connectivity to exchange data. The document discusses the history and introduction of IoT, its applications in various fields like transportation and healthcare, challenges around security and privacy, and the promising future of IoT in daily life and industries. It expresses the author's interest in an internship to gain practical knowledge of IoT and help companies grow in this emerging field.
apidays Paris - Are the providers’ sustainability strategies... sustainable?,...apidays
apidays Paris 2022 - APIs the next 10 years: Software, Society, Sovereignty, Sustainability
December 14, 15 & 16, 2022
Are the providers’ sustainability strategies... sustainable ?
Arnaud Gueguen, Sustainability Consultant at DarwinX and Member of Lean ICT and Climate Education Working Group at Shift Project
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Deep dive into the API industry with our reports:
https://www.apidays.global/industry-reports/
Subscribe to our global newsletter:
https://apidays.typeform.com/to/i1MPEW
The document discusses assessment models to improve the usability of security in wireless sensor networks. It presents a model-based approach to security assessment that involves (1) collecting and mapping user requirements, (2) describing component and system attributes, and (3) defining security models. The goal is to bridge the gap between application needs and technological capabilities by enabling non-experts to assess security.
The document discusses collaborative security for protecting financial critical infrastructures. It describes how financial institutions are increasingly exposed to coordinated cyber attacks. It then introduces the CoMiFin platform, which uses semantic rooms to allow financial organizations to collaboratively monitor for threats, detect fraud, and share threat information in real time. Key features of the CoMiFin platform include its use of private and public cloud deployments, its complex event processing capabilities through tools like AGILIS and Esper, and its semantic rooms for detecting specific attacks like stealthy port scanning and correlating fraud events across organizations. The platform has received several awards and has been evaluated positively by major financial organizations for its potential business value.
Jim Clarke from the Waterford Institute of Technology presented on the EU BIC project, which aims to build international cooperation in trustworthy ICT through workshops with countries like Brazil, India, and South Africa to develop research priorities and involve stakeholders. The project seeks to provide input for future research programs, establish an international advisory group, and build an international community through activities over the next 12 months.
This document outlines the goals and structure of the NESSoS Network of Excellence on Engineering Secure Future Internet Software Services and Systems. The key goals are to create a long-lasting research community, integrate partner research agendas and tools, and spread excellence through education and training. The network brings together experts from 13 organizations across Europe to conduct research on secure software engineering, architectures, programming, and risk/cost-aware development processes. Integration activities include a virtual research lab and tool workbench. Research focuses on security requirements, architectures, programming, assurance, and application scenarios. Spread of excellence activities encompass education, training, dissemination and standardization.
The document argues that as homes and vehicles become certified, consumers should also seek out certified services. It suggests that as people's lives involve more certified products and systems, they should be wary of using uncertified services due to security and reliability concerns. Certification provides assurances that certified entities meet standards.
This document proposes a general framework for security-aware analysis of services using semirings. It outlines how business processes can be transformed into trees and then modeled as semirings to analyze them using different security metrics like risk, probability of attacks, trust, and latency. This uniform approach allows selecting the best process, aggregating metric values, and performing various types of analyses. Future work areas include improving the modeling to handle non-deterministic choices, considering additional metrics and analysis types, and investigating interoperability between metrics.
This document outlines the agenda for the Effectsplus 2nd Technical Cluster Meeting held on July 4th and 5th in Amsterdam. The agenda includes welcome remarks, presentations on various Effectsplus clusters, parallel breakout sessions for two clusters, and a wrap-up plenary session. Day 1 focuses on cluster workshops and a strategy board meeting. Day 2 continues the cluster workshops, includes a security roadmapping presentation and a research project analysis, before concluding with closing remarks. The document provides logistical details for the event across its five pages.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
1. ViCiSi -
The Virtual City
Simulator
Dynamic cost assessment related to
outages in critical infrastructure by
assessing Societal Activities
EffectPlus
Amsterdam July 4—5 2011
Tekn. Lic Mats B-O Larsson
MML Analys & Strategi AB
ViCiSi.eu 1
2. Who am I?
Mats B-O Larsson
Consultant, MML Analys & Strategi AB
Chairman of the Board of Directors of Telge Energi Nät AB (A Swedish mid sized
Infrastructure Distribution Company
- Water And Sewage,
- Electrical Grid,
- District Heating,
- Broadband
Chairman of the Board of Directors of Lyckeby Research Foundation
Member of the Board of Directors of Lyckeby Starch AB (a global Starch Producer)
Member of the Board of Directors of Culinar AB (a global Starch Producer)
Tech. Lic. of Engineering, Royal Institute of Technology in Stockholm, 2005
M.Sc., (Engineering Physics), Royal Institute of Technology in Stockholm, 1980
ViCiSi.eu 2
3. “Microorganisms” are
the greatest threats … … to our Critical
1) Microorganisms, such as viruses
infrastructure
and bacteria, which infects our water
distribution systems Electrical Power Grid
Not necessary from antagonists Telecommunications
More probable by carelessness and
Payment systems
lack of hygiene within the water
distribution system Water and sewage
2) Cyberorganisms which infects our
power grid SCADA systems
Antagonist threats by trojans,
viruses, Denial of Service attacks,
etc.
ViCiSi.eu 3
4. Assessment of social costs after an outage
in critical infrastructure
We need methods to assess the costs to the society from
disturbances in the critical infrastructure
To optimize our investments to mitigate outages
The two common ways to measure social outage costs are:
Alt. 1 Assess the consumers preferences:
Ask the customer! Customer surveys are the most common. There are a number of
surveys done in most countries. Many problems!
Alt. 2 Assess the decrease of activity in the society:
Asses the GDP influence
The drawback is that it requires a profile of the activities in the society
ViCiSi.eu 4
5. The Gross Domestic Product (GDP) is a measurement
of economic activities in a society
The economic activity in a society is best described by the Gross Domestic Product
GDP is measured in three alternative perspectives: 1) Production perspective, 2) End-
use (consumption) perspective and 3) Distribution perspective
The cost of an outage in the power supply can be measured as the reduction in one GDP-
perspective
However, it is important to be aware of
which perspective the cost measurement
concerns
Costs from two perspectives can’t be
added to get a total cost.
Business activity is measured in the
Production perspective
Household activity is measured in the
End-use perspective
Thus:
Outage costs ≠ OutageCostBusiness +
CoutageCostHousehold
ViCiSi.eu 5
6. Activity Profiles in a Society
To assess the decrease of activity in the society we need a sum of all economic activities in an
undisturbed society, collected from each individual object, to get an aggregated Activity Profile for a
Society
i.e. a function, b(t), which reflects the societal activity at every a single operation at every moment, such as
∫one year b(t) dt = GDP
EUR/h
One year
There are no publicly available Business profiles!
ViCiSi creates Business Activity Profiles for all EU27 countries + Norway and
Switzerland
ViCiSi.eu 6
7. Restoration after an outage comprises different kinds of
restoration; for example Power Restoration and
Society Restoration
Power
Normal operation Restoration Normal operation
Society Restoration
Power Restoration is the stage where the demand for power is increasing after the grid has
been energized. Some lost energy will also be recovered.
Society Restoration is the stage where the economic activity in the society is increasing after
the grid has been energized. Some lost economic values will also be recovered.
Society Restoration is normally considerably slower than the Power Restoration
ViCiSi.eu 7
8. Why a Virtual society?
Why do we use a virtual society when there are so
many real societies, with real infrastructures?
And moreover when those societies has put lots off
efforts to digitally measure all assets?
A virtual society has a number of advantages:
Not conflicting with national security issues.
The concern of the national security after 9/11 has made it more
or less impossible to use “sharp” geographical and electrical
data!
Especially when we use large scale societies.
We can adapt simulations and results to
various environments and issues
We can adapt simulations and results to other
countries
We don’t need to cooperate with a specific
company to get geographical and electrical
data
ViCiSi.eu 8
9. ViCiSi Static Objects
Assets
Blocks,
Houses,
Apartments and
Locations
Streets and railways
Electrical grid
Water and sewage (not
implemented yet)
Telecommunications (not
implemented yet)
ViCiSi.eu 9
10. ViCiSi Dynamic Objects
Inhabitants Society Activity
Manufacturing
Retai
l
Operations School Hospital
Industries,
Public and private Service,
Utilities,
Load
Agriculture farms factor
(Pmax/
Pmean)
Activity profiles
Society Activity profile
Power Load Profile
ViCiSi.eu 10
11. ViCiSi Geographical Features
All objects in ViCiSi has a
geographical distribution
Plane and Spherical
coordinates (Google earth
coordinates)
Three coordinate systems
Global (Earth)
Local (County)
Block
ViCiSi.eu 11
12. ViCiSi Electrical Features
The electrical grid inside ViCiSi is a simplified
but correct electrical grid
dimensioned from the peak load of every
subscriber,
Taking care of the power coincidence with
other subscribers
Reflecting the geographical structure of
blocks and streets
Handles different voltage levels in the grid
Performs transformation between different
voltage levels
Calculation:
Time resolution 1/100th second
Actual load flow data is calculated at each
arbitrary time point (Active + Reactive power)
The line losses (Active + Reactive power)
Geographical distances, Manhattan length of
lines
The voltage levels inside ViCiSi are
400/220 kV
110 kV
40 kV
10 kV (black)
0.4 kV (yellow)
ViCiSi.eu 12
13. Input to ViCiSi
EU-27 + Norway + Switzerland
Economic statistics from Eurostat
(year 2007) (http://
epp.eurostat.ec.europa.eu)
Gross Domestic Product (GDP)
Energy consumption
Demographic statistics
Employment
Branch statistics
Country Area
Power Load Profiles from TSO’s
(http://www.entsoe.eu)
Hour values of country power
demand (year 2007)
Time Use statistics HETUS
Harmonised European Time Use Surveys
8https://www.h2.scb.se/tus/tus)
ViCiSi.eu 13
14. ViCiSi Output: Business Activity to
Outage Cost Assessment
Actual Business Activity (EUR/h)
are summed for each object
Outage costs after Power Down/
Up (EUR/h) are summed for each
object
Business Restoration and
Business Recovery (slower than
Power Restoration)
ViCiSi.eu 14
16. ViCiSi Output: Maps
Maps of the infrastructure
Blocks, apartments, streets, Electrical grid, etc.
In Euclidic plane three dimensional coordinates (x,y,z) (XML-files)
Or spherical coordinates (longitude, latitude, z) for Google Earth (KML-files). The
kml-files can be imported to Google Earth as an overlay to the Google Earth Maps
ViCiSi.eu 16
17. ViCiSi in the Viking project
Industrial Partners
ABB AG (Germany)
E.ON AG (Germany)
Astron (Hungary)
MML Analysis & Strategy (Sweden)
Academic Partners
Royal Institute of Technology (Sweden)
ETH Zurich (Switzerland)
University of Maryland (USA)
ViCiSi.eu 17
19. ViCiSi is a part of the Viking-Test Bed
ABB Primary SCADA ABB Secondary
2 HV/MV subs. SCADA
Includes 40 busbar model
ICCP
ICCP
IEC IEC
Internal Data
Exchange
WAN emulator
ABB Transmission IEC 104
system simulator (OTS) &
HV model IEC
XML
RTU Test & Monitoring
Data Exchange
as file
IEC
Astron substation simulator (NTS)
Session XML comm.
and MV model
Manager interface IED
2 HV/MV substation
Data Exchange
as file
Penetration and Analysis
XML Tools
Viking Country Simulator
and LV model
VIKING City 1 VIKING City n
(ViCiSi)
ViCiSi.eu 19
20. Possibilities to use ViCiSi in other projects
The scope of ViCiSi is to use a virtual Dependencies between different
society to test the dynamics and resilience infrastructures
of critical infrastructures Electrical grid Telecommunication
Telecommunication Payment system
The dynamics between the individuals and the
society and the dependency of well functioning Electrical grid Water and Sewage
infrastructure Other disturbances will be implemented into
ViCiSi is built bottom up, i.e. from the the micro-level
Presents the costs to the society of different kinds of
the society, such as:
disturbances Poison in the fresh water
Proliferation of infections and diseases
ViCiSi Disturbances in telecommunication and the payment
Can run on different platforms Linux, Windows, Mac) system
Has a well defined xml-interface Disturbances in transportation
New features and other critical New Power profiles in Smart grid
infrastructures will be implemented/ The application of ViCiSi in simulation and
extended, such as real-life applications
Water distribution and sewage removal Cost of cyber attacks (the Viking Project)
Telecommunications To give estimates of outage costs
Payment systems investment planning
Transportation (Railway and buses) For maintenance (cost of planned outages)
Time Use statistics Measurements of the resilience in a society
New customer behavour in Smart Grid Systems
ViCiSi.eu 20