947 research outputs found

    Smart charging strategies for electric vehicle charging stations

    Get PDF
    Although the concept of transportation electrification holds enormous prospects in addressing the global environmental pollution problem, consumer concerns over the limited availability of charging stations and long charging/waiting times are major contributors to the slow uptake of plug-in electric vehicles (PEVs) in many countries. To address the consumer concerns, many countries have undertaken projects to deploy a network of both fast and slow charging stations, commonly known as electric vehicle charging networks. While a large electric vehicle charging network will certainly be helpful in addressing PEV owners\u27 concerns, the full potential of this network cannot be realised without the implementation of smart charging strategies. For example, the charging load distribution in an EV charging network would be expected to be skewed towards stations located in hotspot areas, instigating longer queues and waiting times in these areas, particularly during afternoon peak traffic hours. This can also lead to a major challenge for the utilities in the form of an extended PEV charging load period, which could overlap with residential evening peak load hours, increasing peak demand and causing serious issues including network instability and power outages. This thesis presents a smart charging strategy for EV charging networks. The proposed smart charging strategy finds the optimum charging station for a PEV owner to ensure minimum charging time, travel time and charging cost. The problem is modelled as a multi-objective optimisation problem. A metaheuristic solution in the form of ant colony optimisation (ACO) is applied to solve the problem. Considering the influence of pricing on PEV owners\u27 behaviour, the smart charging strategy is then extended to address the charging load imbalance problem in the EV network. A coordinated dynamic pricing model is presented to reduce the load imbalance, which contributes to a reduction in overlaps between residential and charging loads. A constraint optimization problem is formulated and a heuristic solution is introduced to minimize the overlap between the PEV and residential peak load periods. In the last part of this thesis, a smart management strategy for portable charging stations (PCSs) is introduced. It is shown that when smartly managed, PCSs can play an important role in the reduction of waiting times in an EV charging network. A new strategy is proposed for dispatching/allocating PCSs during various hours of the day to reduce waiting times at public charging stations. This also helps to decrease the overlap between the total PEV demand and peak residential load

    Indoor and Outdoor Location Estimation in Large Areas Using Received Signal Strength

    Get PDF
    PhDLocation estimation when deployed on wireless networks supports a range of services including user tracking and monitoring, health care support and push and pull marketing. The main subject of this thesis is improving indoor and outdoor location estimation accuracy using received signal strength (RSS) from neighbouring base stations (BSs) or access points (APs), without using the global positioning system (GPS) or triangulation methods. For the outdoor environment, state-of-the-art deterministic and probabilistic algorithms are adapted to exploit principal components (PCs) and clustering. The accuracy is compared with K-nearest neighbour (KNN) algorithms using different partitioning models. The proposed scheme clusters the RSS tuples based on deviations from an estimated RSS attenuation model and then transforms the raw RSS in each cluster into new uncorrelated dimensions, using PCs. As well as simple global dimensionality reduction using PCs, the data reduction and rotation within each cluster improves estimation accuracy because a) each cluster can model the different local RSS distributions and b) it efficiently preserves the RSS correlations that are observed (some of which are substantial) in local regions and which independence approximations ignore. Different simulated and real environments are used for the comparisons. Experimental results show that positioning accuracy is significantly improved and fewer training samples are needed compared with traditional methods. Furthermore, a technique to adjust RSS data so that radio maps collected in different environmental conditions can be used together to enhance accuracy is also demonstrated. Additionally, in the radio coverage domain, a non-parametric probability approach is used for the radio reliability estimation and a semi-supervised learning model is proposed for the monitoring model training and evolution according to real-time mobile users’ RSS feedback. For the indoor environment, an approach for a large multi-story indoor location estimaiii tion using clustering and rank order matching is described. The accuracies using WiFi RSS alone, cellular GSM RSS alone and integrated WiFi and GSM RSS are presented. The methods were tested on real indoor environments. A hierarchical clustering method is used to partition the RSS space, where a cluster is defined as a set of mobile users who share exactly the same strongest RSS ranking set of transmitters. The experimental results show that while integrating of WiFi RSS with GSM RSS creates a marginal improvement, the GSM data can be used to ameliorate the loss of accuracy when AP

    Digital forensics trends and future

    Get PDF
    Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area

    CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines

    Get PDF
    Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective. The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines. From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research

    Learning preferences for personalisation in a pervasive environment

    Get PDF
    With ever increasing accessibility to technological devices, services and applications there is also an increasing burden on the end user to manage and configure such resources. This burden will continue to increase as the vision of pervasive environments, with ubiquitous access to a plethora of resources, continues to become a reality. It is key that appropriate mechanisms to relieve the user of such burdens are developed and provided. These mechanisms include personalisation systems that can adapt resources on behalf of the user in an appropriate way based on the user's current context and goals. The key knowledge base of many personalisation systems is the set of user preferences that indicate what adaptations should be performed under which contextual situations. This thesis investigates the challenges of developing a system that can learn such preferences by monitoring user behaviour within a pervasive environment. Based on the findings of related works and experience from EU project research, several key design requirements for such a system are identified. These requirements are used to drive the design of a system that can learn accurate and up to date preferences for personalisation in a pervasive environment. A standalone prototype of the preference learning system has been developed. In addition the preference learning system has been integrated into a pervasive platform developed through an EU research project. The preference learning system is fully evaluated in terms of its machine learning performance and also its utility in a pervasive environment with real end users

    Supervisory Control System Architecture for Advanced Small Modular Reactors

    Full text link
    This technical report was generated as a product of the Supervisory Control for Multi-Modular SMR Plants project within the Instrumentation, Control and Human-Machine Interface technology area under the Advanced Small Modular Reactor (SMR) Research and Development Program of the U.S. Department of Energy. The report documents the definition of strategies, functional elements, and the structural architecture of a supervisory control system for multi-modular advanced SMR (AdvSMR) plants. This research activity advances the state-of-the art by incorporating decision making into the supervisory control system architectural layers through the introduction of a tiered-plant system approach. The report provides a brief history of hierarchical functional architectures and the current state-of-the-art, describes a reference AdvSMR to show the dependencies between systems, presents a hierarchical structure for supervisory control, indicates the importance of understanding trip setpoints, applies a new theoretic approach for comparing architectures, identifies cyber security controls that should be addressed early in system design, and describes ongoing work to develop system requirements and hardware/software configurations

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Architecture and optimization for a peer-to-peer content management system

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2004.Includes bibliographical references (leaves 87-88).This thesis will explore the design and optimization of a peer-to-peer network application as a solution to complex content management problems. Currently, most content management systems are expensive, cumbersome and inflexible custom solutions that require knowledge workers to change their work habits. Peer-to-peer offers a uniquely decentralized and, potentially, scalable solution for knowledge workers by providing a simple and visual tool for file management, meta-data description and collaboration. This thesis will reference a client beta designed and developed by the author. Additionally, this thesis will address the need for content management solutions, the state of current solutions and a requirements document for a solution. Subsequently, the thesis will explore the design aspects of a peer-to-peer content management solution. As well as designing and developing a P2P client as proof of concept, this thesis will mathematically explore the implications of scaling the client to many users and methods to optimize performance. The last few chapters will cover the implementation of the client, proposed next steps for development and analysis of alternative architectures.by Dion M. Edge.S.M
    corecore