Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Authors = Isabel Praça ORCID = 0000-0002-2519-9859

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 1259 KiB  
Article
PharmiTech: Addressing Polypharmacy Challenges through AI-Driven Solutions
by Andreia Martins, João Vitorino, Eva Maia and Isabel Praça
Appl. Sci. 2024, 14(19), 8838; https://doi.org/10.3390/app14198838 - 1 Oct 2024
Viewed by 1934
Abstract
Due to the rising prevalence of polypharmacy, pharmacists face more challenges in ensuring patient safety and optimizing medication management. This paper introduces PharmiTech, a Clinical Decision Support System that leverages Artificial Intelligence (AI) to tackle the growing need for efficient tools to assist [...] Read more.
Due to the rising prevalence of polypharmacy, pharmacists face more challenges in ensuring patient safety and optimizing medication management. This paper introduces PharmiTech, a Clinical Decision Support System that leverages Artificial Intelligence (AI) to tackle the growing need for efficient tools to assist pharmacists. The primary focus of the tool is to identify possible herb-drug interactions and instances of prescription drug abuse, combining an expert knowledge base with a supervised classification model and providing user-friendly alerts to pharmacists. To demonstrate the capabilities of the developed tool, this paper presents its functionalities through a case study involving simulated scenarios using de-identified information to maintain the confidentiality of real patients’ personal data. Tested in Portuguese pharmacies, PharmiTech enhances pharmaceutical care, safeguards patient data, and aids pharmacists in informed decision-making, making it a valuable resource for healthcare professionals. Full article
Show Figures

Figure 1

15 pages, 8782 KiB  
Article
Empowering Preventive Care with GECA Chatbot
by Eva Maia, Pedro Vieira and Isabel Praça
Healthcare 2023, 11(18), 2532; https://doi.org/10.3390/healthcare11182532 - 13 Sep 2023
Cited by 6 | Viewed by 2639
Abstract
Chatbots have become increasingly popular in the healthcare industry. In the area of preventive care, chatbots can provide personalized and timely solutions that aid individuals in maintaining their well-being and forestalling the development of chronic conditions. This paper presents GECA, a chatbot [...] Read more.
Chatbots have become increasingly popular in the healthcare industry. In the area of preventive care, chatbots can provide personalized and timely solutions that aid individuals in maintaining their well-being and forestalling the development of chronic conditions. This paper presents GECA, a chatbot designed specifically for preventive care, that offers information, advice, and monitoring to patients who are undergoing home treatment, providing a cost-effective, personalized, and engaging solution. Moreover, its adaptable architecture enables extension to other diseases and conditions seamlessly. The chatbot’s bilingual capabilities enhance accessibility for a wider range of users, including those with reading or writing difficulties, thereby improving the overall user experience. GECA’s ability to connect with external resources offers a higher degree of personalization, which is a crucial aspect in engaging users effectively. The integration of standards and security protocols in these connections allows patient privacy, security and smooth adaptation to emerging healthcare information sources. GECA has demonstrated a remarkable level of accuracy and precision in its interactions with the diverse features, boasting an impressive 97% success rate in delivering accurate responses. Presently, preparations are underway for a pilot project at a Portuguese hospital that will conduct exhaustive testing and evaluate GECA, encompassing aspects such as its effectiveness, efficiency, quality, goal achievability, and user satisfaction. Full article
Show Figures

Figure 1

26 pages, 1187 KiB  
Review
Knowledge and Beliefs about Herb/Supplement Consumption and Herb/Supplement–Drug Interactions among the General Population, including Healthcare Professionals and Pharmacists: A Systematic Review and Guidelines for a Smart Decision System
by Artemisa R. Dores, Miguel Peixoto, Maria Castro, Catarina Sá, Irene P. Carvalho, Andreia Martins, Eva Maia, Isabel Praça and António Marques
Nutrients 2023, 15(10), 2298; https://doi.org/10.3390/nu15102298 - 13 May 2023
Cited by 23 | Viewed by 8254
Abstract
The increased consumption of a variety of herbs/supplements has been raising serious health concerns. Owing to an inadequate understanding of herb/supplement–drug interactions, the simultaneous consumption of these products may result in deleterious effects and, in extreme cases, even fatal outcomes. This systematic review [...] Read more.
The increased consumption of a variety of herbs/supplements has been raising serious health concerns. Owing to an inadequate understanding of herb/supplement–drug interactions, the simultaneous consumption of these products may result in deleterious effects and, in extreme cases, even fatal outcomes. This systematic review is aimed at understanding the knowledge and beliefs about the consumption of herbs/supplements and herb/drug–supplement interactions (HDIs). The study follows the PRISMA guidelines. Four online databases (Web of Science; PubMed; Cochrane; and EBSCOhost) were searched, and a total of 44 studies were included, encompassing 16,929 participants. Herb and supplement consumption is explained mostly by the reported benefits across multiple conditions and ease of use. Regarding HDIs, most people take both herbs/supplements and prescription drugs simultaneously. Only a small percentage of participants have knowledge about their interaction effects, and many reported adverse interactions or side effects. Nevertheless, the main reason for stopping the prescribed drug intake is the perceived lack of its effect, and not due to interactions. Therefore, it is important to increase the knowledge about supplement use so that further strategies can be elaborated to better detect or be alert for whenever a potentially dangerous reaction and/or interaction may occur. This paper raises awareness regarding the need for developing a decision support system and ends with some considerations about the development of a technological solution capable of detecting HDIs and, thereby, aiding in the improvement of pharmacy services. Full article
Show Figures

Figure 1

25 pages, 7321 KiB  
Article
Holistic Security and Safety for Factories of the Future
by Eva Maia, Sinan Wannous, Tiago Dias, Isabel Praça and Ana Faria
Sensors 2022, 22(24), 9915; https://doi.org/10.3390/s22249915 - 16 Dec 2022
Cited by 7 | Viewed by 3842
Abstract
The accelerating transition of traditional industrial processes towards fully automated and intelligent manufacturing is being witnessed in almost all segments. This major adoption of enhanced technology and digitization processes has been originally embraced by the Factories of the Future and Industry 4.0 initiatives. [...] Read more.
The accelerating transition of traditional industrial processes towards fully automated and intelligent manufacturing is being witnessed in almost all segments. This major adoption of enhanced technology and digitization processes has been originally embraced by the Factories of the Future and Industry 4.0 initiatives. The overall aim is to create smarter, more sustainable, and more resilient future-oriented factories. Unsurprisingly, introducing new production paradigms based on technologies such as machine learning (ML), the Internet of Things (IoT), and robotics does not come at no cost as each newly incorporated technique poses various safety and security challenges. Similarly, the integration required between these techniques to establish a unified and fully interconnected environment contributes to additional threats and risks in the Factories of the Future. Accumulating and analyzing seemingly unrelated activities, occurring simultaneously in different parts of the factory, is essential to establish cyber situational awareness of the investigated environment. Our work contributes to these efforts, in essence by envisioning and implementing the SMS-DT, an integrated platform to simulate and monitor industrial conditions in a digital twin-based architecture. SMS-DT is represented in a three-tier architecture comprising the involved data and control flows: edge, platform, and enterprise tiers. The goal of our platform is to capture, analyze, and correlate a wide range of events being tracked by sensors and systems in various domains of the factory. For this aim, multiple components have been developed on the basis of artificial intelligence to simulate dominant aspects in industries, including network analysis, energy optimization, and worker behavior. A data lake was also used to store collected information, and a set of intelligent services was delivered on the basis of innovative analysis and learning approaches. Finally, the platform was tested in a textile industry environment and integrated with its ERP system. Two misuse cases were simulated to track the factory machines, systems, and people and to assess the role of SMS-DT correlation mechanisms in preventing intentional and unintentional actions. The results of these misuse case simulations showed how the SMS-DT platform can intervene in two domains in the first scenario and three in the second one, resulting in correlating the alerts and reporting them to security operators in the multi-domain intelligent correlation dashboard. Full article
(This article belongs to the Special Issue Emerging Technologies in Edge Computing and Networking)
Show Figures

Figure 1

28 pages, 5900 KiB  
Article
SMS-I: Intelligent Security for Cyber–Physical Systems
by Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Information 2022, 13(9), 403; https://doi.org/10.3390/info13090403 - 25 Aug 2022
Cited by 3 | Viewed by 3397
Abstract
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber–physical nature of these infrastructures makes them more vulnerable to cyber–physical threats and makes the detection, investigation, and remediation of security [...] Read more.
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber–physical nature of these infrastructures makes them more vulnerable to cyber–physical threats and makes the detection, investigation, and remediation of security attacks more difficult. Therefore, improving cyber–physical correlations, forensics investigations, and Incident response tasks is of paramount importance. This work describes the SMS-I tool that allows the improvement of these security aspects in critical infrastructures. Data from heterogeneous systems, over different time frames, are received and correlated. Both physical and logical security are unified and additional security details are analysed to find attack evidence. Different Artificial Intelligence (AI) methodologies are used to process and analyse the multi-dimensional data exploring the temporal correlation between cyber and physical Alerts and going beyond traditional techniques to detect unusual Events, and then find evidence of attacks. SMS-I’s Intelligent Dashboard supports decision makers in a deep analysis of how the breaches and the assets were explored and compromised. It assists and facilitates the security analysts using graphical dashboards and Alert classification suggestions. Therefore, they can more easily identify anomalous situations that can be related to possible Incident occurrences. Users can also explore information, with different levels of detail, including logical information and technical specifications. SMS-I also integrates with a scalable and open Security Incident Response Platform (TheHive) that enables the sharing of information about security Incidents and helps different organizations better understand threats and proactively defend their systems and networks. Full article
(This article belongs to the Special Issue Digital Privacy and Security)
Show Figures

Figure 1

17 pages, 778 KiB  
Article
Machine Reading at Scale: A Search Engine for Scientific and Academic Research
by Norberto Sousa, Nuno Oliveira and Isabel Praça
Systems 2022, 10(2), 43; https://doi.org/10.3390/systems10020043 - 5 Apr 2022
Cited by 6 | Viewed by 4379
Abstract
The Internet, much like our universe, is ever-expanding. Information, in the most varied formats, is continuously added to the point of information overload. Consequently, the ability to navigate this ocean of data is crucial in our day-to-day lives, with familiar tools such as [...] Read more.
The Internet, much like our universe, is ever-expanding. Information, in the most varied formats, is continuously added to the point of information overload. Consequently, the ability to navigate this ocean of data is crucial in our day-to-day lives, with familiar tools such as search engines carving a path through this unknown. In the research world, articles on a myriad of topics with distinct complexity levels are published daily, requiring specialized tools to facilitate the access and assessment of the information within. Recent endeavors in artificial intelligence, and in natural language processing in particular, can be seen as potential solutions for breaking information overload and provide enhanced search mechanisms by means of advanced algorithms. As the advent of transformer-based language models contributed to a more comprehensive analysis of both text-encoded intents and true document semantic meaning, there is simultaneously a need for additional computational resources. Information retrieval methods can act as low-complexity, yet reliable, filters to feed heavier algorithms, thus reducing computational requirements substantially. In this work, a new search engine is proposed, addressing machine reading at scale in the context of scientific and academic research. It combines state-of-the-art algorithms for information retrieval and reading comprehension tasks to extract meaningful answers from a corpus of scientific documents. The solution is then tested on two current and relevant topics, cybersecurity and energy, proving that the system is able to perform under distinct knowledge domains while achieving competent performance. Full article
(This article belongs to the Special Issue Frontiers of Agents and Multiagent Systems)
Show Figures

Figure 1

18 pages, 3711 KiB  
Article
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by João Vitorino, Nuno Oliveira and Isabel Praça
Future Internet 2022, 14(4), 108; https://doi.org/10.3390/fi14040108 - 29 Mar 2022
Cited by 26 | Viewed by 9689
Abstract
Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a domain with tabular data must be [...] Read more.
Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a domain with tabular data must be realistic within that domain. This work establishes the fundamental constraint levels required to achieve realism and introduces the adaptative perturbation pattern method (A2PM) to fulfill these constraints in a gray-box setting. A2PM relies on pattern sequences that are independently adapted to the characteristics of each class to create valid and coherent data perturbations. The proposed method was evaluated in a cybersecurity case study with two scenarios: Enterprise and Internet of Things (IoT) networks. Multilayer perceptron (MLP) and random forest (RF) classifiers were created with regular and adversarial training, using the CIC-IDS2017 and IoT-23 datasets. In each scenario, targeted and untargeted attacks were performed against the classifiers, and the generated examples were compared with the original network traffic flows to assess their realism. The obtained results demonstrate that A2PM provides a scalable generation of realistic adversarial examples, which can be advantageous for both adversarial training and attacks. Full article
(This article belongs to the Topic Cyber Security and Critical Infrastructures)
Show Figures

Graphical abstract

16 pages, 1105 KiB  
Article
Extending a Trust model for Energy Trading with Cyber-Attack Detection
by Rui Andrade, Sinan Wannous, Tiago Pinto and Isabel Praça
Electronics 2021, 10(16), 1975; https://doi.org/10.3390/electronics10161975 - 17 Aug 2021
Cited by 5 | Viewed by 2842
Abstract
This paper explores the concept of the local energy markets and, in particular, the need for trust and security in the negotiations necessary for this type of market. A multi-agent system is implemented to simulate the local energy market, and a trust model [...] Read more.
This paper explores the concept of the local energy markets and, in particular, the need for trust and security in the negotiations necessary for this type of market. A multi-agent system is implemented to simulate the local energy market, and a trust model is proposed to evaluate the proposals sent by the participants, based on forecasting mechanisms that try to predict their expected behavior. A cyber-attack detection model is also implemented using several supervised classification techniques. Two case studies were carried out, one to evaluate the performance of the various classification methods using the IoT-23 cyber-attack dataset; and another one to evaluate the performance of the developed trust mode. Full article
Show Figures

Figure 1

11 pages, 604 KiB  
Communication
Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System
by Hoon Ko, Kwangcheol Rim and Isabel Praça
Sensors 2021, 21(12), 4237; https://doi.org/10.3390/s21124237 - 21 Jun 2021
Cited by 5 | Viewed by 2823
Abstract
The biggest problem with conventional anomaly signal detection using features was that it was difficult to use it in real time and it requires processing of network signals. Furthermore, analyzing network signals in real-time required vast amounts of processing for each signal, as [...] Read more.
The biggest problem with conventional anomaly signal detection using features was that it was difficult to use it in real time and it requires processing of network signals. Furthermore, analyzing network signals in real-time required vast amounts of processing for each signal, as each protocol contained various pieces of information. This paper suggests anomaly detection by analyzing the relationship among each feature to the anomaly detection model. The model analyzes the anomaly of network signals based on anomaly feature detection. The selected feature for anomaly detection does not require constant network signal updates and real-time processing of these signals. When the selected features are found in the received signal, the signal is registered as a potential anomaly signal and is then steadily monitored until it is determined as either an anomaly or normal signal. In terms of the results, it determined the anomaly with 99.7% (0.997) accuracy in f(4)(S0) and in case f(4)(REJ) received 11,233 signals with a normal or 171anomaly judgment accuracy of 98.7% (0.987). Full article
(This article belongs to the Collection Intelligent Security Sensors in Cloud Computing)
Show Figures

Figure 1

21 pages, 595 KiB  
Article
Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems
by Nuno Oliveira, Isabel Praça, Eva Maia and Orlando Sousa
Appl. Sci. 2021, 11(4), 1674; https://doi.org/10.3390/app11041674 - 13 Feb 2021
Cited by 97 | Viewed by 10634
Abstract
With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are shared continuously across the network, making it susceptible to an attack that can compromise data confidentiality, integrity, and availability. Intrusion Detection Systems (IDS) are important [...] Read more.
With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are shared continuously across the network, making it susceptible to an attack that can compromise data confidentiality, integrity, and availability. Intrusion Detection Systems (IDS) are important security mechanisms that can perform the timely detection of malicious events through the inspection of network traffic or host-based logs. Many machine learning techniques have proven to be successful at conducting anomaly detection throughout the years, but only a few considered the sequential nature of data. This work proposes a sequential approach and evaluates the performance of a Random Forest (RF), a Multi-Layer Perceptron (MLP), and a Long-Short Term Memory (LSTM) on the CIDDS-001 dataset. The resulting performance measures of this particular approach are compared with the ones obtained from a more traditional one, which only considers individual flow information, in order to determine which methodology best suits the concerned scenario. The experimental outcomes suggest that anomaly detection can be better addressed from a sequential perspective. The LSTM is a highly reliable model for acquiring sequential patterns in network traffic data, achieving an accuracy of 99.94% and an f1-score of 91.66%. Full article
Show Figures

Figure 1

10 pages, 1136 KiB  
Article
The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models
by Rui Andrade, Isabel Praça, Sinan Wannous and Sergio Ramos
Processes 2021, 9(2), 314; https://doi.org/10.3390/pr9020314 - 8 Feb 2021
Cited by 3 | Viewed by 2256
Abstract
In recent years Local Energy Markets (LEM) have emerged as an innovative and versatile energy trade solution. They bring benefits when renewable energy sources are used and are more flexible for consumers. There are, however, security concerns that put the feasibility of the [...] Read more.
In recent years Local Energy Markets (LEM) have emerged as an innovative and versatile energy trade solution. They bring benefits when renewable energy sources are used and are more flexible for consumers. There are, however, security concerns that put the feasibility of the local energy market at risk. One of these security challenges is the integrity of data in the smart-grid that supports the local market. In this article the LEM and the types of attacks that can have a negative impact on it are presented, and a security mechanism based on a trust model is proposed. A case study is elaborated using a multi-agent system called Local Energy Market Multi-Agent System (LEMMAS), capable of simulating the LEM and testing the proposed security mechanism. Full article
Show Figures

Figure 1

11 pages, 736 KiB  
Article
Design of a Secure Energy Trading Model Based on a Blockchain
by Hoon Ko and Isabel Praça
Sustainability 2021, 13(4), 1634; https://doi.org/10.3390/su13041634 - 3 Feb 2021
Cited by 4 | Viewed by 2754
Abstract
This study proposes a Secure Energy Trading Model design based on a Blockchain is an attempt to overcome the weak security and instability of the current energy trading system. The focal point of the design lies in the user-security features of the model, [...] Read more.
This study proposes a Secure Energy Trading Model design based on a Blockchain is an attempt to overcome the weak security and instability of the current energy trading system. The focal point of the design lies in the user-security features of the model, such as user authentication and identification, and the blockchain that every transaction goes through. The user-security feature provides a safer system for peer-to-peer energy trade, and the blockchain technology ensures the reliability of the trading system. Furthermore, the Secure Energy Trading Model supports a decentralized data control mechanism as a future measure for handling vast amounts of data created by IoT. Full article
(This article belongs to the Special Issue Human-Centric Urban Services)
Show Figures

Figure 1

31 pages, 3546 KiB  
Article
A New Concept of Digital Twin Supporting Optimization and Resilience of Factories of the Future
by Adrien Bécue, Eva Maia, Linda Feeken, Philipp Borchers and Isabel Praça
Appl. Sci. 2020, 10(13), 4482; https://doi.org/10.3390/app10134482 - 28 Jun 2020
Cited by 142 | Viewed by 21819
Abstract
In the context of Industry 4.0, a growing use is being made of simulation-based decision-support tools commonly named Digital Twins. Digital Twins are replicas of the physical manufacturing assets, providing means for the monitoring and control of individual assets. Although extensive research on [...] Read more.
In the context of Industry 4.0, a growing use is being made of simulation-based decision-support tools commonly named Digital Twins. Digital Twins are replicas of the physical manufacturing assets, providing means for the monitoring and control of individual assets. Although extensive research on Digital Twins and their applications has been carried out, the majority of existing approaches are asset specific. Little consideration is made of human factors and interdependencies between different production assets are commonly ignored. In this paper, we address those limitations and propose innovations for cognitive modeling and co-simulation which may unleash novel uses of Digital Twins in Factories of the Future. We introduce a holistic Digital Twin approach, in which the factory is not represented by a set of separated Digital Twins but by a comprehensive modeling and simulation capacity embracing the full manufacturing process including external network dependencies. Furthermore, we introduce novel approaches for integrating models of human behavior and capacities for security testing with Digital Twins and show how the holistic Digital Twin can enable new services for the optimization and resilience of Factories of the Future. To illustrate this approach, we introduce a specific use-case implemented in field of Aerospace System Manufacturing. Full article
(This article belongs to the Special Issue Cyber Factories – Intelligent and Secure Factories of the Future)
Show Figures

Figure 1

20 pages, 6183 KiB  
Article
Decision Support Application for Energy Consumption Forecasting
by Aria Jozi, Tiago Pinto, Isabel Praça and Zita Vale
Appl. Sci. 2019, 9(4), 699; https://doi.org/10.3390/app9040699 - 18 Feb 2019
Cited by 11 | Viewed by 3357
Abstract
Energy consumption forecasting is crucial in current and future power and energy systems. With the increasing penetration of renewable energy sources, with high associated uncertainty due to the dependence on natural conditions (such as wind speed or solar intensity), the need to balance [...] Read more.
Energy consumption forecasting is crucial in current and future power and energy systems. With the increasing penetration of renewable energy sources, with high associated uncertainty due to the dependence on natural conditions (such as wind speed or solar intensity), the need to balance the fluctuation of generation with the flexibility from the consumer side increases considerably. In this way, significant work has been done on the development of energy consumption forecasting methods, able to deal with different forecasting circumstances, e.g., the prediction time horizon, the available data, the frequency of data, or even the quality of data measurements. The main conclusion is that different methods are more suitable for different prediction circumstances, and no method can outperform all others in all situations (no-free-lunch theorem). This paper proposes a novel application, developed in the scope of the SIMOCE project (ANI|P2020 17690), which brings together several of the most relevant forecasting methods in this domain, namely artificial neural networks, support vector machines, and several methods based on fuzzy rule-based systems, with the objective of providing decision support for energy consumption forecasting, regardless of the prediction conditions. For this, the application also includes several data management strategies that enable training of the forecasting methods depending on the available data. Results show that by this application, users are endowed with the means to automatically refine and train different forecasting methods for energy consumption prediction. These methods show different performance levels depending on the prediction conditions, hence, using the proposed approach, users always have access to the most adequate methods in each situation. Full article
(This article belongs to the Section Energy Science and Technology)
Show Figures

Figure 1

21 pages, 1536 KiB  
Article
Multi-Agent Decision Support Tool to Enable Interoperability among Heterogeneous Energy Systems
by Brígida Teixeira, Tiago Pinto, Francisco Silva, Gabriel Santos, Isabel Praça and Zita Vale
Appl. Sci. 2018, 8(3), 328; https://doi.org/10.3390/app8030328 - 26 Feb 2018
Cited by 27 | Viewed by 4593
Abstract
Worldwide electricity markets are undergoing a major restructuring process. One of the main reasons for the ongoing changes is to enable the adaptation of current market models to the new paradigm that arises from the large-scale integration of distributed generation sources. In order [...] Read more.
Worldwide electricity markets are undergoing a major restructuring process. One of the main reasons for the ongoing changes is to enable the adaptation of current market models to the new paradigm that arises from the large-scale integration of distributed generation sources. In order to deal with the unpredictability caused by the intermittent nature of the distributed generation and the large number of variables that contribute to the energy sector balance, it is extremely important to use simulation systems that are capable of dealing with the required complexity. This paper presents the Tools Control Center (TOOCC), a framework that allows the interoperability between heterogeneous energy and power simulation systems through the use of ontologies, allowing the simulation of scenarios with a high degree of complexity, through the cooperation of the individual capacities of each system. A case study based on real data is presented in order to demonstrate the interoperability capabilities of TOOCC. The simulation considers the energy management of a microgrid of a real university campus, from the perspective of the network manager and also of its consumers/producers, in a projection for a typical day of the winter of 2050. Full article
(This article belongs to the Section Energy Science and Technology)
Show Figures

Figure 1

Back to TopTop