13,360 research outputs found
Load Hiding of Household's Power Demand
With the development and introduction of smart metering, the energy
information for costumers will change from infrequent manual meter readings to
fine-grained energy consumption data. On the one hand these fine-grained
measurements will lead to an improvement in costumers' energy habits, but on
the other hand the fined-grained data produces information about a household
and also households' inhabitants, which are the basis for many future privacy
issues. To ensure household privacy and smart meter information owned by the
household inhabitants, load hiding techniques were introduced to obfuscate the
load demand visible at the household energy meter. In this work, a
state-of-the-art battery-based load hiding (BLH) technique, which uses a
controllable battery to disguise the power consumption and a novel load hiding
technique called load-based load hiding (LLH) are presented. An LLH system uses
an controllable household appliance to obfuscate the household's power demand.
We evaluate and compare both load hiding techniques on real household data and
show that both techniques can strengthen household privacy but only LLH can
increase appliance level privacy
A Comparison of some recent Task-based Parallel Programming Models
The need for parallel programming models that are simple to use and at the same time efficient for current ant future parallel platforms has led to recent attention to task-based models such as Cilk++, Intel TBB and the task concept in OpenMP version 3.0. The choice of model and implementation can have a major impact on the final performance and in order to understand some of the trade-offs we have made a quantitative study comparing four implementations of OpenMP (gcc, Intel icc, Sun studio and the research compiler Mercurium/nanos mcc), Cilk++ and Wool, a high-performance task-based library developed at SICS.
Abstract. We use microbenchmarks to characterize costs for task-creation and stealing and the Barcelona OpenMP Tasks Suite for characterizing application performance. By far Wool and Cilk++ have the lowest overhead in both spawning and stealing tasks. This is reflected in application performance when many tasks with small granularity are spawned where Cilk++ and, in particular, has the highest performance. For coarse granularity applications, the OpenMP implementations have quite similar performance as the more light-weight Cilk++ and Wool except for one application where mcc is superior thanks to a superior task scheduler.
Abstract. The OpenMP implemenations are generally not yet ready for use when the task granularity becomes very small. There is no inherent reason for this, so we expect future implementations of OpenMP to focus on this issue
Policy-based techniques for self-managing parallel applications
This paper presents an empirical investigation of policy-based self-management techniques for parallel applications executing in loosely-coupled environments. The dynamic and heterogeneous nature of these environments is discussed and the special considerations for parallel applications are identified. An adaptive strategy for the run-time deployment of tasks of parallel applications is presented. The strategy is based on embedding numerous policies which are informed by contextual and environmental inputs. The policies govern various aspects of behaviour, enhancing flexibility so that the goals of efficiency and performance are achieved despite high levels of environmental variability. A prototype self-managing parallel application is used as a vehicle to explore the feasibility and benefits of the strategy. In particular, several aspects of stability are investigated. The implementation and behaviour of three policies are discussed and sample results examined
Numeral Understanding in Financial Tweets for Fine-grained Crowd-based Forecasting
Numerals that contain much information in financial documents are crucial for
financial decision making. They play different roles in financial analysis
processes. This paper is aimed at understanding the meanings of numerals in
financial tweets for fine-grained crowd-based forecasting. We propose a
taxonomy that classifies the numerals in financial tweets into 7 categories,
and further extend some of these categories into several subcategories. Neural
network-based models with word and character-level encoders are proposed for
7-way classification and 17-way classification. We perform backtest to confirm
the effectiveness of the numeric opinions made by the crowd. This work is the
first attempt to understand numerals in financial social media data, and we
provide the first comparison of fine-grained opinion of individual investors
and analysts based on their forecast price. The numeral corpus used in our
experiments, called FinNum 1.0 , is available for research purposes.Comment: Accepted by the 2018 IEEE/WIC/ACM International Conference on Web
Intelligence (WI 2018), Santiago, Chil
Hill of Banchory Geothermal Energy Project Feasibility Study Report
This feasibility study explored the potential for a deep geothermal heat project at Hill of Banchory, Aberdeenshire. The geology of the Hill of Fare, to the north of Banchory, gives cause to believe it has good geothermal potential, while the Hill of Banchory heat network, situated on the northern side of the town, offers a ready-made heat customer.
The partners in the consortium consisted of academics and developers with relevant expertise in deep geothermal energy, heat networks, and financial analysis, together with representatives of local Government. They conducted geological fieldwork around the Hill of Fare, engaged with local residents to establish their attitudes to geothermal energy, and built business models to predict the conditions under which the heat network at Hill of Banchory would be commercial if it utilised heat from the proposed geothermal well. They also estimated the potential carbon emission reductions that could be achieved by using deep geothermal energy, both at Hill of Banchory and more widely
Network layer access control for context-aware IPv6 applications
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements
- …