Closing event invitation

We would like to invite you to the closing event of DiSSeCt. The event is themed “Health in the City” and is co-organized with the Smart City Chair.

Participation is free, but registration is required through this link:

When: 22 October 13h30 – 17h30
Location: Room “Blauwe Vogel”, De Krook, Miriam Makebaplein 1, 9000 Ghent

The program:
13h30: Registration
14h00: DiSSeCt: context, challenges and designed algorithms, methodologies and software solutions
14h30: Demonstration of 3 Proof-of-Concept demonstrators within the eHealth & Smart Mobility (more information about these demos at the end of this post)
15h30: Debate: How can Big Data & AI support cross-organizational collaboration in a smart city?
17h00: Reception

See you there!

About DiSSeCt:

DiSSeCt was set up because of a very clear demand of various companies to research  distributed semantic algorithms, software techniques and solutions enabling the exchange of large streams of data and knowledge between different services in order to intelligently compose reliable, dynamic and secure workflows that provide personalized and context-aware solutions to end-users. As such DiSSeCt performed the necessary research into the required algorithms, software solutions and end-user guidelines to make the leap from “Big Data” to “Big Service” solutions. Key research challenges of DiSSeCt were thus:

  • Study, design and inception of scalable, performant & robust algorithms, software techniques, models, methods and guidelines to
    • expose and compose raw data semantically as intelligent services,
    • (semi-)automatically generate dynamic workflows based on these services,
    • cope with the rapid & timely processing of high volumes of data (stream reasoning) by these services and workflows, and
    • enable self-learning capabilities for these services and workflows.
  • Ensuring that these research results are:
    • secure and trustworthy systems in terms of both data processing and data access in order to guarantee reliable outcomes for the end-users, and
    • easily manageable by end-user developers.
  • Resulting in research prototypes that can be further developed and validated in economically viable software solutions for specific application domains.

More information about these challenges can be found on the Objectives page.

This research is supported by an Advisory Board of companies and mainly focused on two valorization application domains, namely eHealth and Transport.

3 Demonstrators

The software components designed within DiSSeCt were applied within 3 Proof-of-Concepts to demonstrate their added value to society and industry:

  • Smart Health: An increasing collaboration can be noticed between different actors in the healthcare sector (homecare, hospital, residential care, service flats, volunteers, GPs, etc.). This demonstrator shows how the software components of DiSSeCt can be used to align the communication and workflows between these actors. As use case a scenario is shown in which a patient is diagnosed with a long-term disease. The patient is followed up at home and by his/her GP, but also has regular appointments at the hospital. The necessary communication and coordination about the treatment plan of the patient between the actors is supported by the DiSSeCt components and as such easily adjusted to his/her current needs and status.
  • Smart Mobility: People more and more rely on multi-modal (car, train, bus, e-bike, etc.) transport. In this demonstrator it is shown how the software components of DiSSeCt can be used to automatically construct an optimal multi-modal routing, personalized to the needs and wished of the end-user. Moreover, the routing is dynamically reconfigured based on incoming information, e.g., train delays, broken bikes, etc.
  • Security: Security is a crucial component to take into account when exchanging data between actors. This demonstrator focuses on the combination of workflows with security policies. As motivating scenario a healthcare case is used in which the core activities are modeled as a composition of business processes within a workflow. Authorization is implemented by means of access control policies defining various security and privacy access constraints. One of the main contributions is the ability to model access control policies as workflows rather than atomic rules. Following this paradigm, our demonstrator will illustrate how access control policies not only influence the execution of the business processes
    within a healthcare workflow, but also how the access control policies themselves are implemented and evaluated as a workflow. Key to the interplay between both types of workflows is the capability of late binding within workflows to dynamically customize the execution of the workflows at run-time.