Search results for " computing"
showing 10 items of 2075 documents
Charging Electric Vehicles Using Opportunistic Stopovers
2017
The diffusion of electric vehicles asks for efficient energy replenishment, which requires geographical and temporal coordination of shared charging resources. We introduce a novel charging methodology that exploits users’ opportunistic mobility. This paper focuses on vehicle stopovers detecting potential charg- ing opportunities. Our mobility-assisted methodology protects users privacy and permits a hybrid centralized/distributed ap- proach avoiding clashes with other potential users. A preliminary analysis on our charging system, obtained with mobility data from the field, shows that among the available charging stations, some are more relevant and have a key role in serving electric vehi…
An optimization location scheme for electric charging stations
2013
International audience; Due to environmental issues, electric mobility is one of the mobility alternatives that are receiving a huge attention nowadays. In fact, in the last few years electric vehicles have entered the world's car market. This revolutionary technology requires a fast deployment of electric charging stations since the key issue in this system is recharging the batteries. In this work, we propose an optimized algorithm to locate electric-vehicles charging stations. Different factors and limitations are considered and a real case study is given as an application. We first determine the appropriate strict constraints and cost of charging stations' location; and then we propose …
IT Technology Implications Analysis on the Occupational Risk: Cloud Computing Architecture
2014
Abstract The present paper is divided into three major areas: the analysis of occupational risk implications at national and international level, the European priorities in terms of occupational risk and the existing cloud computing services. Since human resource is present within each organization, it is required a comprehensive and actual assessment of the processes in which they participate. Like in any daily activity, processes and people contribute to the emergence of risks. If each organization creates healthy and safe workplaces that means that it contributes to the sustainable development of the area in which it operates. It can be said that occupational risk assessment and occupati…
A multi-agent system reinforcement learning based optimal power flow for islanded microgrids
2016
In this paper, a distributed intelligence algorithm is used to manage the optimal power flow problem in islanded microgrids. The methodology provides a suboptimal solution although the error is limited to a few percent as compared to a centralized approach. The solution algorithm is multi-agent based. According to the method, couples of agents communicate with each other only if the buses where they are located are electrically connected. The overall prizing system required for learning uses a feedback from an approximated model of the network. Based on the latter, a distributed reiforcement learning algorithm is implemented to minimize the joule losses while meeting operational constraints…
A CAN Fieldbus Based Architecture for Distributed Control Systems Implementation
2003
Abstract The application of distributed systems theory to the implementation of industrial control systems is one of the best options to develop simple, scalable and physically distributed control systems. Following this line, our group has proposed a new architecture based on Rule Nets (RN) as an HLP over CAN fieldbus for the implementation of Distributed Systems. This architecture has been applied to several control applications, obtaining excellent results. The most outstanding feature of the architecture was its simplicity in the control systems design, without any efficiency loss. New capabilities have been added to improve its features and develop new analysis tools, in order to incre…
Fifth Generation Networking Principles for a Service Driven Future Internet Architecture
2010
Published version of an article published in Wireless Personal Communications, vol. 57:393-411. Also available from the publisher at: http://dx.doi.org/10.1007/s11277-010-0076-7 The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to the architecture. This is evident from the increasingly numerous and complex engineering solutions and optimizations required to accommodate essential qualities like mobility, security, realtime communication support etc or to mitigate the shortcomings inherent in the 'traditional Internet' architec…
A New HLA-Based Distributed Control Architecture for Agricultural Teams of Robots in Hybrid Applications with Real and Simulated Devices or Environme…
2011
The control architecture is one of the most important part of agricultural robotics and other robotic systems. Furthermore its importance increases when the system involves a group of heterogeneous robots that should cooperate to achieve a global goal. A new control architecture is introduced in this paper for groups of robots in charge of doing maintenance tasks in agricultural environments. Some important features such as scalability, code reuse, hardware abstraction and data distribution have been considered in the design of the new architecture. Furthermore, coordination and cooperation among the different elements in the system is allowed in the proposed control system. By integrating …
An Application of Ant Colony Optimization to Decision Making on Affective Virtual Entities
2007
Learning is a never ending activity for humans; it takes place everywhere and even when we do not realize. However, current learning environments make students deal with lectures, mostly associated with low control of the situation and implicit motivation. In contrast, previous researches have shown that sports, games or hobbies are activities that make people reach optimal experiences where self-motivation, control of the situation, high level of concentration and enjoyment are present. Some current efforts to design next generation of learning environments make use of ubiquitous systems to encourage students to perform learning activities everywhere and at anytime. However, those approach…
Discovering and creating business opportunities for cloud services
2016
This study focuses on how the opportunities for cloud services are detected.The study develops a framework to detect and exploit cloud-based opportunities.This study incorporates entrepreneurship theories to extend and enrich IS research. Cloud computing provides new business opportunities for firms selling or using cloud services. However, little is known about how software firms detect and exploit these opportunities. Based on in-depth qualitative case studies, this study identified two different pathways followed by software firms when they detect and exploit opportunities. In the first pathway, the opportunity is based on an existing problem and need in the market. In the case firms, th…
Improved GNSS positioning exploiting a vehicular P2P infrastructure
2010
This paper considers the possibility to exploit external altitude measurements to improve the performance of a Kalman based GNSS receiver. The altitude measurements are provided by means of a peer to peer network, that is supposed to be based on the evolution of the 802.11 standard for the vehicular environment, namely the WAVE (802.11p). The performance of such a system are investigated for different characteristics of the aiding measurement and for a different number and disposals of the aiding peers. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that…