-
Research for a more livable city
- /en/blog/research-for-a-more-livable-city
Big Data and augmented reality (AR) that holistically simulates mobility in urban planning for existing and new buildings. "Currently, simulations are rarely used to assess the impact of urban planning [...] Transportation Systems" at AIT. The AIT's City Intelligence Lab can be used, among other things, to simulate the changes that urban planning measures will have on the mobility of residents and the accessibility [...] (CIL) at AIT with partners from Giraffe Technologies. For example, mobility and accessibility simulations can ensure that a new city district is designed in such a way that citizens* can do everything
-
Putting people at the center
- /en/blog/putting-people-at-the-center
health cannot be separated from that of animals, plants and the environment, to the definition and simulation of scenarios for the future development of the global climate, to the necessary transformations
-
An electric vehicle of a very different kind: EMPA-Trac
- /en/blog/an-electric-vehicle-of-a-very-different-kind-empa-trac
for innovative batteries. Components for power electronics, new methods for energy management and simulation systems for electric vehicles are also being developed. A key aspect for increasing efficiency
-
Light metals for more climate protection
- /en/blog/light-metals-for-more-climate-protection
explains Martin Schnall, process engineer in the Additive Manufacturing Laboratory at LKR. Numerical simulation is used to optimize the properties of wire-AM components and the manufacturing processes. ©LKR [...] addition to experimental welding and wire-AM developments, related topics such as material and process simulation based on the finite element method, online monitoring, data management, CAD-CAM interface and inline [...] design principles for wire AM components. In particular, online measurement methods and numerical simulations for targeted process monitoring are being developed to promote their use in industrial practice:
-
Training for the defense against cyber attacks
- /en/blog/training-for-the-defense-against-cyber-attacks
developed in which real facilities are simulated. In these systems, the defense against cyber attacks can be trained. Threat simulation In the course of the simulation, you go through various situations step [...] the first time, such a threat was simulated on a large scale in a simulation game organized by the Austrian Security Council (KSÖ): The objective was to detect simulated cyberattacks on critical infrastructures [...] out very realistically in a simulation game organized by the Kuratorium Sicheres Österreich (KSÖ): In the "Cyberrange" developed by AIT, several teams had to detect simulated cyber attacks on critical
-
Automation technology
- /en/blog/automation-technology
autonomous driving system is exposed to a critical situation with other cars or pedestrians in a simulation environment, for example, and can thus be tested under precisely defined conditions to determine
-
What drives young female researchers
- /en/blog/what-drives-young-female-researchers
on the web. CAROLIN MONSBERGER Junior Research Engineer, Energy Engineer My Impact: to set up simulation and calculation models to evaluate energy systems in order to contribute to 100% renewable electricity
-
AIT at the Long Night of Research
- /en/blog/ait-at-the-long-night-of-research
such as the climate situation in city districts or the optimization of people flows can be vividly simulated and acted out. This is an essential building block for the planning of resilient cities. https:
-
Wir die Dekarbonisierung der Industrie in Österreich gelingen kann
- /en/blog/transform-industry
Kohlenwasserstoffen und Wasserstoff. Die Zusammenhänge sind durchaus verwickelt: So zeigt eine Simulation, dass die – absolut sinnvolle – Nutzung von Abwärme und Umgebungswärme zwar zu einer Reduktion
-
Blog
- /en/blog
affected individuals. Cybersecurity Training for the defense against cyber attacks 18.01.2021 Modern simulation systems enable realistic testing of measures against cyberattacks. Often, it is not until you play [...] through virtual cooperation between all participants. Mobilität Social Distancing 14.04.2020 By simulating the flow of people in public spaces, the effects of access restrictions, one-way systems or the
-
Circular Building Solutions
- /en/solutions/circular-building-solutions
industry. We rely on innovative approaches such as pop-up labs on construction sites and real-time simulations in the City Intelligence Lab to tackle the complex challenges of the circular economy. These i [...] innovative solutions in sustainable construction. With interdisciplinary research approaches, advanced simulation methods, and practice-oriented projects, we work together with companies, municipalities, and the
-
MERCURIUS
- /en/research-topics/cyber-security/projects/mercurius
analyses, potential weaknesses in the value chains can be identified and the effects of disruptions simulated. This allows the vulnerability of the population at different levels (municipality, state, federal [...] and demographic aspects and including irrational behavior (e.g., panic buying). Based on these simulation results, different resilience factors for FMCG supply can be defined; at the same time, action
-
Open QKD
- /en/research-topics/cyber-security/projects/open-qkd
called “Testbed Simulator” web interface has been developed to simulate a test bed using a map to get a rough idea how a testbed for ones use case could look like. The testbed simulator, which is also a [...] would be using the keys. OPENQKD also developed an QKD network simulator, available for download at the OPENQKD website. The QKDNetSim simulator has been updated with ETSI standards 004 and 014. Now, it is [...] infrastructure and more. In addition to the actually implemented use-cases a series of use-case simulation was performed mainly for locations without direct fibre access as well as for satellite QKD use-cases
-
SOPHIE
- /en/research-topics/cyber-security/projects/sophie
create models for exercises and simulations of cyber incidents, (2) responding quickly and effectively to IT security incidents in the context of exercises and simulations, ultimately (3) minimizing the [...] and resilience of systems. To this end, SOPHIE will use the processes for analysis, modeling, and simulation in training programs and cyber security exercises to raise awareness. This should help to reflect [...] management measures, and coordinate between actors and their responsibilities. In addition, the simulation models also serve to identify critical processes and detect any resource and capacity bottlenecks
-
CONTAIN
- /en/research-topics/cyber-security/projects/contain
and validate crisis management, and coordinate actors and their responsibilities. The resulting simulation model ultimately serves to identify critical processes and any resource and capacity bottlenecks
-
FEDERATES
- /en/research-topics/cyber-security/projects/federates
readiness in the EU. Distributed simulation and training are key enablers for current and future training needs. FEDERATES proposes an European Modelling and Simulation as a Service solution for Distributed [...] FEDERATES FEDERATES FEDerated Ecosystem of euRopean simulation Assets for Training and decision Support Enhanced EU military training and decision-making capabilities across all Member States are crucial [...] and decision-making, using existing MS assets, leading to new training opportunities, pooling of simulation resources, access to training, reduced set-up times, reduced costs and faster development of future
-
TestCat
- /en/research-topics/cyber-security/projects/testcat
perpetual adaptation for continuously changing system landscapes and attack techniques, sophisticated simulation of user behavior, selection of relevant attack vectors, and an integration interface for OT components
-
HARMONIC
- /en/research-topics/cyber-security/projects/harmonic
being: -to provide automatic support for spot analysis and particularly resolution, using what-if simulations that can find optimal solutions with most appropriate combinations of airspace configurations,
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
dynamic data on the dependencies and their potential effects are used to carry out stochastic simulations and statistical analyses in order to obtain the most accurate and realistic estimate possible of
-
ODYSSEUS
- /en/research-topics/cyber-security/projects/odysseus
ODYSSEUS ODYSSEUS Simulation and analysis of critical network infrastructures in cities Cities and their agglomerations are home to a large number of critical infrastructures (CI) that provide essential [...] available). Based on this model, potential threats (both natural disasters and man-made incidents) are simulated. In contrast to existing solutions from literature and practice, ODYSSEUS focuses on the dynamic [...] entire network of critical supply infrastructures, taking into account the urban population. The simulations describe which potential compensation and displacement mechanisms can be expected within the m
Searched for "simulation".
Found 538 results in 21 milliseconds.
Displaying results 381 to 400 of 538.