181,224 research outputs found

    Hydrogen Energy Storage

    Get PDF
    The dominating trend of variable renewable energy sources (RES) continues to underpin the early retirement of baseload power generating sources such as coal, nuclear, and natural gas steam generators; however, the need to maintain system reliability remains the challenge. Implementing energy storage with conventional power plants provides a method for load leveling, peak shaving, and time shifting allowing power quality improvement and reduction in grid energy management issues, implementing energy storage with RES smooth their intermittency, by storing the surplus in their generation for later use during their shortfall, thus enabling their high penetration into the electricity grid. Energy storage technologies (EST) can be classified according to many criteria like their application (permanent or portable), capacity, storage duration (short or long), and size (weight and volume). EST suited for short duration storage and low-to-medium power outputs are seen performing better in improving power quality, while those providing medium-to-high power outputs with long durations are seen better suited for energy management of electrical networks. With the growing deployment of renewable energy systems, EST must be utilized to allow the grid to absorb the increased integration of RES generation. The recent advances in hydrogen energy storage technologies (HEST) have unlocked their potential for use with constrained renewable generation. HEST combines hydrogen production, storage, and end use technologies with the renewable generation either in a directly connected configuration or in an indirectly connected configuration via the existing power network. This chapter introduces the hydrogen energy storage technology and its implementation in conjunction with renewable energy sources. The efficiency of renewable hydrogen energy storage systems (RHESS) will be explored with a techno-economic assessment. A levelized cost (LC) model that identifies the financial competitiveness of HEST in different application scenarios is given, where five scenarios are investigated to demonstrate the most financially competitive configuration. To address the absence of a commercial software tool that can quickly size an energy system incorporating HEST while using limited data, a deterministic modeling approach that enables a quick initial sizing of hybrid renewable hydrogen energy systems (HRHES) is given in this chapter. This modeling approach can achieve the initial sizing of a HRHES using only two input data, namely the available renewable energy resource and the load profile. A modeling of the effect of the electrolyzer thermal transients at start-up, when operated in conjunction with an intermittent renewable generation, on the quantity of hydrogen produced is also given in this chapter

    A New Approach for Quality Management in Pervasive Computing Environments

    Full text link
    This paper provides an extension of MDA called Context-aware Quality Model Driven Architecture (CQ-MDA) which can be used for quality control in pervasive computing environments. The proposed CQ-MDA approach based on ContextualArchRQMM (Contextual ARCHitecture Quality Requirement MetaModel), being an extension to the MDA, allows for considering quality and resources-awareness while conducting the design process. The contributions of this paper are a meta-model for architecture quality control of context-aware applications and a model driven approach to separate architecture concerns from context and quality concerns and to configure reconfigurable software architectures of distributed systems. To demonstrate the utility of our approach, we use a videoconference system.Comment: 10 pages, 10 Figures, Oral Presentation in ECSA 201

    Extracting Build Changes with BUILDDIFF

    Full text link
    Build systems are an essential part of modern software engineering projects. As software projects change continuously, it is crucial to understand how the build system changes because neglecting its maintenance can lead to expensive build breakage. Recent studies have investigated the (co-)evolution of build configurations and reasons for build breakage, but they did this only on a coarse grained level. In this paper, we present BUILDDIFF, an approach to extract detailed build changes from MAVEN build files and classify them into 95 change types. In a manual evaluation of 400 build changing commits, we show that BUILDDIFF can extract and classify build changes with an average precision and recall of 0.96 and 0.98, respectively. We then present two studies using the build changes extracted from 30 open source Java projects to study the frequency and time of build changes. The results show that the top 10 most frequent change types account for 73% of the build changes. Among them, changes to version numbers and changes to dependencies of the projects occur most frequently. Furthermore, our results show that build changes occur frequently around releases. With these results, we provide the basis for further research, such as for analyzing the (co-)evolution of build files with other artifacts or improving effort estimation approaches. Furthermore, our detailed change information enables improvements of refactoring approaches for build configurations and improvements of models to identify error-prone build files.Comment: Accepted at the International Conference of Mining Software Repositories (MSR), 201

    Risk Assessment of the Project to Migrate to the Free Office Suite Under Linux "End-User" Group

    Get PDF
    The penetration and performance of free software is raising issues regarding its true capacities and, particularly, the desirability of choosing it. It is from this perspective that the Linux Migration Project was launched within the Sous-secrétariat à l’inforoute gouvernementale et aux resources informationnelles (SSIGRI). The project, supported by a CIRANO research team, seeks to assess the risks involved in the migration project and to identify the conditions for success. This report describes an assessment of the risk exposure of one of the groups participating in the project: end users. Principal results The risk assessment that was conducted enabled the following observations to be made: The project risk exposure is medium to high. Three objectives, and more particularly the first, are vulnerable to a relatively high level of risk: Operational continuity for the user, Interactional continuity for users, and Technical support. Two risk factors were undervalued in this project because of the very nature of the project: Mismatch between the functionalities of the free office suite/functionalities targeted by the organization; Degree of interdependence with non-project units/persons. This factor is important as a result of the context in which the project is being carried out, particularly the absence of a shared interoperability framework. A review of these risk factors could result in a new positioning on the risk exposure map for four of the five objectives, in particular for the two objectives that are related to the two undervalued factors.

    Advanced Message Routing for Scalable Distributed Simulations

    Get PDF
    The Joint Forces Command (JFCOM) Experimentation Directorate (J9)'s recent Joint Urban Operations (JUO) experiments have demonstrated the viability of Forces Modeling and Simulation in a distributed environment. The JSAF application suite, combined with the RTI-s communications system, provides the ability to run distributed simulations with sites located across the United States, from Norfolk, Virginia to Maui, Hawaii. Interest-aware routers are essential for communications in the large, distributed environments, and the current RTI-s framework provides such routers connected in a straightforward tree topology. This approach is successful for small to medium sized simulations, but faces a number of significant limitations for very large simulations over high-latency, wide area networks. In particular, traffic is forced through a single site, drastically increasing distances messages must travel to sites not near the top of the tree. Aggregate bandwidth is limited to the bandwidth of the site hosting the top router, and failures in the upper levels of the router tree can result in widespread communications losses throughout the system. To resolve these issues, this work extends the RTI-s software router infrastructure to accommodate more sophisticated, general router topologies, including both the existing tree framework and a new generalization of the fully connected mesh topologies used in the SF Express ModSAF simulations of 100K fully interacting vehicles. The new software router objects incorporate the scalable features of the SF Express design, while optionally using low-level RTI-s objects to perform actual site-to-site communications. The (substantial) limitations of the original mesh router formalism have been eliminated, allowing fully dynamic operations. The mesh topology capabilities allow aggregate bandwidth and site-to-site latencies to match actual network performance. The heavy resource load at the root node can now be distributed across routers at the participating sites
    corecore