395 research outputs found
Modeling and Real-Time Scheduling of DC Platform Supply Vessel for Fuel Efficient Operation
DC marine architecture integrated with variable speed diesel generators (DGs)
has garnered the attention of the researchers primarily because of its ability
to deliver fuel efficient operation. This paper aims in modeling and to
autonomously perform real-time load scheduling of dc platform supply vessel
(PSV) with an objective to minimize specific fuel oil consumption (SFOC) for
better fuel efficiency. Focus has been on the modeling of various components
and control routines, which are envisaged to be an integral part of dc PSVs.
Integration with photovoltaic-based energy storage system (ESS) has been
considered as an option to cater for the short time load transients. In this
context, this paper proposes a real-time transient simulation scheme, which
comprises of optimized generation scheduling of generators and ESS using dc
optimal power flow algorithm. This framework considers real dynamics of dc PSV
during various marine operations with possible contingency scenarios, such as
outage of generation systems, abrupt load changes, and unavailability of ESS.
The proposed modeling and control routines with real-time transient simulation
scheme have been validated utilizing the real-time marine simulation platform.
The results indicate that the coordinated treatment of renewable based ESS with
DGs operating with optimized speed yields better fuel savings. This has been
observed in improved SFOC operating trajectory for critical marine missions.
Furthermore, SFOC minimization at multiple suboptimal points with its treatment
in the real-time marine system is also highlighted
Context Protecting Privacy Preservation in Ubiquitous Computing
In ubiquitous computing domain context awareness is an important issue. So,
in ubiquitous computing, mere protection of message confidentiality is not
sufficient for most of the applications where context-awareness can lead to
near deterministic ideas. An adversary might deduce sensitive information by
observing the contextual data, which when correlated with prior information
about the people and the physical locations that are being monitored by a set
of sensors can reveal most of the sensitive information. So, it is obvious that
for security and privacy preservation in ubiquitous computing context
protection is of equal importance. In this paper, we propose a scheme which
provides two layer privacy protection of user's or application's context data.
Our proposed context protecting privacy preservation scheme focuses on
protecting spatial and temporal contextual information. We consider the
communication part of ubiquitous computing consists of tiny sensor nodes
forming Wireless Sensor Networks (WSNs). Through simulation we show the
efficacy of our scheme. We also demonstrate the capability of our scheme to
overcome the constraints of WSNs.Comment: 6 pages, 7 Figures, IEEE CISIM 201
- …