595,473 research outputs found

    Energy-storage technologies and electricity generation

    Get PDF
    As the contribution of electricity generated from renewable sources (wind, wave, solar) grows, the inherent intermittency of supply from such generating technologies must be addressed by a step-change in energy storage. Furthermore, the continuously developing demands of contemporary applications require the design of versatile energy-storage/power-supply systems offering wide ranges of power density and energy density. As no single energy-storage technology has this capability, systems will comprise of combinations of technologies such as electrochemical supercapacitors, flow batteries, Lithium-ion batteries, superconducting magnetic energy storage (SMES) and kinetic energy storage. The evolution of the electrochemical supercapacitor is largely dependent on the development of optimised electrode materials (tailored to the chosen electrolyte) and electrolytes. Similarly, the development of Lithium-ion battery technology requires fundamental research in materials science aimed at delivering new electrodes and electrolytes; Lithium-ion technology has significant potential and a step-change is required in order to promote the technology from the portable electronics market into high-duty applications. Flow-battery development is largely concerned with safety and operability. However, opportunities exist to improve electrode technology yielding larger power densities. The main barriers to overcome in terms of the development of SMES technology are those related to high-temperature superconductors in terms of their granular, anisotropic nature. Materials development is essential for the successful evolution of flywheel technology. Given the appropriate research effort, the key scientific advances required in order to successfully develop energy-storage technologies generally represent realistic goals which may be achieved by 2050

    Massive Quantum Memories by Periodically Inverted Dynamic Evolutions

    Full text link
    We introduce a general scheme to realize perfect quantum state reconstruction and storage in systems of interacting qubits. This novel approach is based on the idea of controlling the residual interactions by suitable external controls that, acting on the inter-qubit couplings, yield time-periodic inversions in the dynamical evolution, thus cancelling exactly the effects of quantum state diffusion. We illustrate the method for spin systems on closed rings with XY residual interactions, showing that it enables the massive storage of arbitrarily large numbers of local states, and we demonstrate its robustness against several realistic sources of noise and imperfections.Comment: 10 pages, 3 figures. Contribution to the Proceedings of the Workshop on "Quantum entanglement in physical and information sciences", held in Pisa, December 14-18, 200

    Engineering massive quantum memories by topologically time-modulated spin rings

    Full text link
    We introduce a general scheme to realize perfect storage of quantum information in systems of interacting qubits. This novel approach is based on {\it global} external controls of the Hamiltonian, that yield time-periodic inversions in the dynamical evolution, allowing a perfect periodic quantum state recontruction. We illustrate the method in the particularly interesting and simple case of spin systems affected by XY residual interactions with or without static imperfections. The global control is achieved by step time-inversions of an overall topological phase of the Aharonov-Bohm type. Such a scheme holds both at finite size and in the thermodynamic limit, thus enabling the massive storage of arbitrarily large numbers of local states, and is stable against several realistic sources of noise and imperfections.Comment: 12 pages, 9 figure

    Ancillary Services in Hybrid AC/DC Low Voltage Distribution Networks

    Get PDF
    In the last decade, distribution systems are experiencing a drastic transformation with the advent of new technologies. In fact, distribution networks are no longer passive systems, considering the current integration rates of new agents such as distributed generation, electrical vehicles and energy storage, which are greatly influencing the way these systems are operated. In addition, the intrinsic DC nature of these components, interfaced to the AC system through power electronics converters, is unlocking the possibility for new distribution topologies based on AC/DC networks. This paper analyzes the evolution of AC distribution systems, the advantages of AC/DC hybrid arrangements and the active role that the new distributed agents may play in the upcoming decarbonized paradigm by providing different ancillary services.Ministerio de Economía y Competitividad ENE2017-84813-RUnión Europea (Programa Horizonte 2020) 76409

    Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

    Full text link
    With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing quick access to such data wherever the user is. Such practicality brings with it a concern, precisely the confidentiality of the data which is delivered to third parties for storage. In the home environment, disk encryption tools have gained special attention from users, being used on personal computers and also having native options in some smartphone operating systems. The present work uses the data sealing, feature provided by the Intel Software Guard Extensions (Intel SGX) technology, for file encryption. A virtual file system is created in which applications can store their data, keeping the security guarantees provided by the Intel SGX technology, before send the data to a storage provider. This way, even if the storage provider is compromised, the data are safe. To validate the proposal, the Cryptomator software, which is a free client-side encryption tool for cloud files, was integrated with an Intel SGX application (enclave) for data sealing. The results demonstrate that the solution is feasible, in terms of performance and security, and can be expanded and refined for practical use and integration with cloud synchronization services

    Co-evolution of Information Systems in Fast-Growing Small Firms

    Get PDF
    The paper examines the co-evolution of different dimensions of information systems for a sample of fast-growing small firms. The investigation uses primary source longitudinal empirical evidence. The data are taken from a large database on the lifecycle experience of one-hundred-and-fifty new business starts over a four-year period. They were collected by face to face interviews with owner-managers of small entrepreneurial firms. Interviews were conducted using an administered questionnaire that covered the agenda of markets, finance, costs, business strategy, the development of a management information system, human capital, organisation and technical change. This work uses primarily the data on management information systems. The basic approach used is to compare the attributes of the fastest and slowest paced firms, as identified by their growth rates. We then examine the evolution of these firms' management information systems. The measures used to identify changes in systems include: capital investment techniques, such as return on investment, residual income, net present value, internal rate of return and payback period; methods for managing costs, like just-in-time management, activity-based costing, quantitative risk analysis, value analysis, strategic pricing and transfer pricing; and using computer applications for storing information, project appraisal, financial modelling, forecasting and sensitivity analysis. 'Time lines' are graphed to show the points at which various features of information systems are introduced (e.g. data storage, forecasting, sensitivity analysis), and derived techniques (e.g. ROI, ABC) implemented. Firms are dichotomised into highgrowth and low-growth groups. Comparisons are made within firms and across firms in terms of the co-evolution of different aspects of their accounting information systems

    Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems

    Get PDF
    The recent advances in cloud services technology are fueling a plethora of information technology innovation, including networking, storage, and computing. Today, various flavors have evolved of IoT, cloud computing, and so-called fog computing, a concept referring to capabilities of edge devices and users' clients to compute, store, and exchange data among each other and with the cloud. Although the rapid pace of this evolution was not easily foreseeable, today each piece of it facilitates and enables the deployment of what we commonly refer to as a smart scenario, including smart cities, smart transportation, and smart homes. As most current cloud, fog, and network services run simultaneously in each scenario, we observe that we are at the dawn of what may be the next big step in the cloud computing and networking evolution, whereby services might be executed at the network edge, both in parallel and in a coordinated fashion, as well as supported by the unstoppable technology evolution. As edge devices become richer in functionality and smarter, embedding capacities such as storage or processing, as well as new functionalities, such as decision making, data collection, forwarding, and sharing, a real need is emerging for coordinated management of fog-to-cloud (F2C) computing systems. This article introduces a layered F2C architecture, its benefits and strengths, as well as the arising open and research challenges, making the case for the real need for their coordinated management. Our architecture, the illustrative use case presented, and a comparative performance analysis, albeit conceptual, all clearly show the way forward toward a new IoT scenario with a set of existing and unforeseen services provided on highly distributed and dynamic compute, storage, and networking resources, bringing together heterogeneous and commodity edge devices, emerging fogs, as well as conventional clouds.Peer ReviewedPostprint (author's final draft
    • …
    corecore