Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436696
Hiroshi Sanada, T. Fujii, Reina Aizawa, T. Kawata
Ahstract-U-Bus Air is a wireless communication standard for metering systems, targeting gas supplies with a multi-hop network function. As a multi-hop wireless network, U-Bus Air gathers meter reading information connected to a monitoring center. The terminal with the function of connecting to a monitoring center is called a gateway (GW). The multi-hop function is used to connect GWs; this reduces the cost of connecting wide-area wireless networks. However, the order of installing a new terminal is random because it is determined by timing of replacement on meter in individual homes on meters in individual homes. As a result, the installing location of GWs cannot be specified in advance. Consequently, any created network topology will exhibit redundancies, such as unnecessary GWs, or generate many small networks. In this paper, we propose two different redundancy reducing methods that use information of terminals on cloud to reconstruct a network topology. The proposed methods consists of three steps: gathering information, emulating the topology to reduce redundancy using cloud, and providing feedback to rebuild information of each smart meter. We perform a computer simulation to evaluate the packet delivery ratio (PDR) and the reduction ratio of the number of GWs. We confirm that the redundancy can be reduced by using the proposed methods without affecting the performance of the network topology.
u - bus Air是一种用于计量系统的无线通信标准,针对具有多跳网络功能的气体供应。作为一个多跳无线网络,U-Bus Air收集连接到监控中心的抄表信息。具有连接监控中心功能的终端称为网关(GW)。多跳功能用于连接gw;这降低了连接广域无线网络的成本。然而,安装新终端的顺序是随机的,因为它是由个别家庭更换电表的时间决定的。因此,无法提前确定gw的安装位置。因此,任何创建的网络拓扑都会出现冗余,例如不必要的gw,或者生成许多小型网络。本文提出了两种不同的冗余减少方法,利用云上终端的信息重构网络拓扑结构。提出的方法包括三个步骤:收集信息,利用云模拟拓扑以减少冗余,提供反馈以重建每个智能电表的信息。我们进行了计算机模拟,以评估分组传输率(PDR)和GWs数量的减少率。我们证实,使用所提出的方法可以在不影响网络拓扑性能的情况下减少冗余。
{"title":"Routing Redundancy Reducing Method for U-Bus Air Using Cloud Cooperation","authors":"Hiroshi Sanada, T. Fujii, Reina Aizawa, T. Kawata","doi":"10.1109/ICUFN.2018.8436696","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436696","url":null,"abstract":"Ahstract-U-Bus Air is a wireless communication standard for metering systems, targeting gas supplies with a multi-hop network function. As a multi-hop wireless network, U-Bus Air gathers meter reading information connected to a monitoring center. The terminal with the function of connecting to a monitoring center is called a gateway (GW). The multi-hop function is used to connect GWs; this reduces the cost of connecting wide-area wireless networks. However, the order of installing a new terminal is random because it is determined by timing of replacement on meter in individual homes on meters in individual homes. As a result, the installing location of GWs cannot be specified in advance. Consequently, any created network topology will exhibit redundancies, such as unnecessary GWs, or generate many small networks. In this paper, we propose two different redundancy reducing methods that use information of terminals on cloud to reconstruct a network topology. The proposed methods consists of three steps: gathering information, emulating the topology to reduce redundancy using cloud, and providing feedback to rebuild information of each smart meter. We perform a computer simulation to evaluate the packet delivery ratio (PDR) and the reduction ratio of the number of GWs. We confirm that the redundancy can be reduced by using the proposed methods without affecting the performance of the network topology.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436992
Besfort Shala, U. Trick, A. Lehmann, B. Ghita, S. Shiaeles
The end-user integration for M2M application service creation and the decentralisation of M2M application service platforms are creating new possibilities for different application fields in the M2M domain. However, besides several advantages, these improvements inherit several security-related issues such as intentionally or accidentally misconfigured M2M application services harming other end-users in the M2M community. This research focuses on evaluating the trustworthiness of new joining decentralised M2M application services provided by end-users. Therefore, this publication presents a novel concept for trust evaluation by combining several model-based testing techniques. Moreover, it defines an approach for trust-based M2M application service selection and composition for end-user consumption. Finally, the overall framework for functional verification and trust evaluation is optimised by full decentralisation of all involved entities.
{"title":"Trust-Based Composition of M2M Application Services","authors":"Besfort Shala, U. Trick, A. Lehmann, B. Ghita, S. Shiaeles","doi":"10.1109/ICUFN.2018.8436992","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436992","url":null,"abstract":"The end-user integration for M2M application service creation and the decentralisation of M2M application service platforms are creating new possibilities for different application fields in the M2M domain. However, besides several advantages, these improvements inherit several security-related issues such as intentionally or accidentally misconfigured M2M application services harming other end-users in the M2M community. This research focuses on evaluating the trustworthiness of new joining decentralised M2M application services provided by end-users. Therefore, this publication presents a novel concept for trust evaluation by combining several model-based testing techniques. Moreover, it defines an approach for trust-based M2M application service selection and composition for end-user consumption. Finally, the overall framework for functional verification and trust evaluation is optimised by full decentralisation of all involved entities.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436953
Nematullo Rahmatov, Hyeonwoo Kim, Meryam Essaid, Shuhration Qurbonov, Hongtaek Ju, Wooguil Pak
End-to-end Internet Quality of Service (QoS) is likely to rely on the hop count, the number of traversed routers. In this paper, we pose the results of the measurements of hop count from a source at Keimyung University towards several destinations spread over the world by using both active and passive measurements. In case of active data, we used traceroute base inferring to measure hops between host IP-addresses, while for passive data, we utilise shortest path approach from BGPview AS graph to infer exact hop count between ASes.
{"title":"Hop Count Measurement Between Autonomous Systems Using a Combination of Active and Passive Monitoring","authors":"Nematullo Rahmatov, Hyeonwoo Kim, Meryam Essaid, Shuhration Qurbonov, Hongtaek Ju, Wooguil Pak","doi":"10.1109/ICUFN.2018.8436953","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436953","url":null,"abstract":"End-to-end Internet Quality of Service (QoS) is likely to rely on the hop count, the number of traversed routers. In this paper, we pose the results of the measurements of hop count from a source at Keimyung University towards several destinations spread over the world by using both active and passive measurements. In case of active data, we used traceroute base inferring to measure hops between host IP-addresses, while for passive data, we utilise shortest path approach from BGPview AS graph to infer exact hop count between ASes.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436988
J. Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee
In this paper, we proposes a novel drowsiness detection algorithm using a camera near the dashboard. The proposed algorithm detects the driver's face in the image and estimates the landmarks in the face region. In order to detect the face, the proposed algorithm uses an AdaBoost classifier based on the Modified Census Transform features. And the proposed algorithm uses regressing Local Binary Features for face landmark detection. Eye states (closed, open) is determined by the value of Eye Aspect Ratio which is easily calculated by the landmarks in eye region. The proposed algorithm provides realtime performance that can be run on the embedded device. We obtained the dataset using video records from the infrared camera which is used the real-field. The proposed algorithm tested in the target board (i.mx6q). The result shows that the proposed algorithm outperformed in the speed and accuracy.
{"title":"Real-Time Drowsiness Detection Algorithm for Driver State Monitoring Systems","authors":"J. Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee","doi":"10.1109/ICUFN.2018.8436988","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436988","url":null,"abstract":"In this paper, we proposes a novel drowsiness detection algorithm using a camera near the dashboard. The proposed algorithm detects the driver's face in the image and estimates the landmarks in the face region. In order to detect the face, the proposed algorithm uses an AdaBoost classifier based on the Modified Census Transform features. And the proposed algorithm uses regressing Local Binary Features for face landmark detection. Eye states (closed, open) is determined by the value of Eye Aspect Ratio which is easily calculated by the landmarks in eye region. The proposed algorithm provides realtime performance that can be run on the embedded device. We obtained the dataset using video records from the infrared camera which is used the real-field. The proposed algorithm tested in the target board (i.mx6q). The result shows that the proposed algorithm outperformed in the speed and accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437008
Hyeonsu Kim, Sunhyo Kim, Kang-Hoon Choi, J. Choi, H. Bae
In October 1999 a long-range underwater acoustic communication experiment was conducted in East Sea of Korea. In this experiment, horizontal distance between a transmitter and receiving array was 559.25 km. The transmitted signals were 511-digit m sequence with a center frequency of 366 Hz and a bandwidth of 45.75 Hz, and the modulation type was binary phase shift keying. In order to compensate inter-symbol interference, maximal ratio combining and equalization are adopted sequentially. As a result, 0.01 of uncoded bit error rate is obtained at a data rate of 37.2 bit per second.
{"title":"Maximal Ratio Combining for Long-Range Underwater Acoustic Communication in East Sea","authors":"Hyeonsu Kim, Sunhyo Kim, Kang-Hoon Choi, J. Choi, H. Bae","doi":"10.1109/ICUFN.2018.8437008","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437008","url":null,"abstract":"In October 1999 a long-range underwater acoustic communication experiment was conducted in East Sea of Korea. In this experiment, horizontal distance between a transmitter and receiving array was 559.25 km. The transmitted signals were 511-digit m sequence with a center frequency of 366 Hz and a bandwidth of 45.75 Hz, and the modulation type was binary phase shift keying. In order to compensate inter-symbol interference, maximal ratio combining and equalization are adopted sequentially. As a result, 0.01 of uncoded bit error rate is obtained at a data rate of 37.2 bit per second.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437031
Junho Jeong, Yunsik Son, Yangsun Lee
Though the use of internet of things (IoT) technology is increasing, it is difficult to reuse application program once implemented because of various kinds of device and platform. In order to solve these problems, a method of using a virtual machine in an IoT device has been proposed. However, there is a disadvantage that the execution speed of the application program is very slow compared to the native code due to the characteristics of the virtual machine. Ahead-of-Time (AoT) compilation is a technique that precompiles bytecodes into native code to speed up execution of virtual machines. In this paper, we design the AoT compilation system for IoT-Cloud virtual machine system. The designed system is suitable for the convergence environment of the IoT and the cloud. Since only a portion of the bytecode is compiled into native code, the memory load of the virtual machine required for loading native code is reduced.
{"title":"An Ahead-of-Time Compiler System for the IoT-Cloud Virtual Machine","authors":"Junho Jeong, Yunsik Son, Yangsun Lee","doi":"10.1109/ICUFN.2018.8437031","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437031","url":null,"abstract":"Though the use of internet of things (IoT) technology is increasing, it is difficult to reuse application program once implemented because of various kinds of device and platform. In order to solve these problems, a method of using a virtual machine in an IoT device has been proposed. However, there is a disadvantage that the execution speed of the application program is very slow compared to the native code due to the characteristics of the virtual machine. Ahead-of-Time (AoT) compilation is a technique that precompiles bytecodes into native code to speed up execution of virtual machines. In this paper, we design the AoT compilation system for IoT-Cloud virtual machine system. The designed system is suitable for the convergence environment of the IoT and the cloud. Since only a portion of the bytecode is compiled into native code, the memory load of the virtual machine required for loading native code is reduced.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436732
Woong Son, B. Jung, Choul‐Young Kim, Jong Min Kim
In this paper, we propose a novel pseudo-random beamforming technique with beam selection for improving physical-layer security (PLS) in a downlink cellular network where consists of a base station (BS) with Nt antennas, NMS legitimate mobile stations (MSs), and NE eavesdroppers. In the proposed technique, the BS generates multiple candidates of beamforming matrix each of which consists of orthogonal beamforming vectors in a pseudo-random manner. Each legitimate MS opportunistically feeds back the received signal-to-interference-and-noise ratio (SINR) value for all beamforming vectors to the BS. The BS transmits data to the legitimate MSs with the optimal beamforming matrix among multiple beam forming matrices that maximizes the secrecy sum-rate. Simulation results show that the proposed technique outperforms the conventional random beamforming technique in terms of the achievable secrecy sum-rate.
{"title":"Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security","authors":"Woong Son, B. Jung, Choul‐Young Kim, Jong Min Kim","doi":"10.1109/ICUFN.2018.8436732","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436732","url":null,"abstract":"In this paper, we propose a novel pseudo-random beamforming technique with beam selection for improving physical-layer security (PLS) in a downlink cellular network where consists of a base station (BS) with Nt antennas, NMS legitimate mobile stations (MSs), and NE eavesdroppers. In the proposed technique, the BS generates multiple candidates of beamforming matrix each of which consists of orthogonal beamforming vectors in a pseudo-random manner. Each legitimate MS opportunistically feeds back the received signal-to-interference-and-noise ratio (SINR) value for all beamforming vectors to the BS. The BS transmits data to the legitimate MSs with the optimal beamforming matrix among multiple beam forming matrices that maximizes the secrecy sum-rate. Simulation results show that the proposed technique outperforms the conventional random beamforming technique in terms of the achievable secrecy sum-rate.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436985
Kwang-Wook Yun, Hyeong-Geon Kim, Joonho Kwon, Han-You Jeong, Yoon-Ho Choi
The highway junction point, where the ramp is merged with the mainstream, is the main traffic congestion point in the highway when handling transport demands. A vehicle driving on the ramp generally attempts to enter the highway without predicting the traffic condition, and commonly causes traffic congestion on highways. Traffic congestion in the highway junction is defined as the traffic situation that the transport demand in the conjunction point exceeds the bottleneck capacity and the accumulated demand remains to the bottleneck. Under traffic congestion, vehicles driving on the ramp cannot efficiently enter the highway. As a result, the waiting time of the vehicle on the ramp becomes long, and fuel consumption and CO2 emission increase due to the frequent acceleration and deceleration. In this paper, we propose a vehicular speed acceleration advisory algorithm for the vehicle on the ramp at the junction point. By recognizing the traffic condition on highways using V2V (Vehicle-to-Vehicle) communication, the proposed algorithm helps to reduce the frequent acceleration and deceleration by drivers. From the simulation results, compared to the conventional driving on the ramp, we show that the proposed algorithm can decrease fuel consumption, CO2 emission under various vehicle densities.
{"title":"Vehicular Acceleration Advisory Algorithm Using V2V Communication in Highway Junction Point","authors":"Kwang-Wook Yun, Hyeong-Geon Kim, Joonho Kwon, Han-You Jeong, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436985","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436985","url":null,"abstract":"The highway junction point, where the ramp is merged with the mainstream, is the main traffic congestion point in the highway when handling transport demands. A vehicle driving on the ramp generally attempts to enter the highway without predicting the traffic condition, and commonly causes traffic congestion on highways. Traffic congestion in the highway junction is defined as the traffic situation that the transport demand in the conjunction point exceeds the bottleneck capacity and the accumulated demand remains to the bottleneck. Under traffic congestion, vehicles driving on the ramp cannot efficiently enter the highway. As a result, the waiting time of the vehicle on the ramp becomes long, and fuel consumption and CO2 emission increase due to the frequent acceleration and deceleration. In this paper, we propose a vehicular speed acceleration advisory algorithm for the vehicle on the ramp at the junction point. By recognizing the traffic condition on highways using V2V (Vehicle-to-Vehicle) communication, the proposed algorithm helps to reduce the frequent acceleration and deceleration by drivers. From the simulation results, compared to the conventional driving on the ramp, we show that the proposed algorithm can decrease fuel consumption, CO2 emission under various vehicle densities.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116371276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436674
Kwang-Man Ko, Ali Mohammed Mansoor, Rodina Ahmed, Soon-Gohn Kim
SDN and NFV provide the underlying cloud-centric operational infrastructure necessary to drive new revenue streams and exploit new market opportunities, such as IoT and M2M. In this paper, we introduce an in-progress a new dynamic fine-grained (two-layer) functions placement and migration mechanism for SDN/NFV-enabled network in IoT/5G infrastructure that considers load balancing and fault tolerance and congestion avoidance while respecting the specific requirements of the IoT application and utilizing the network resources.
{"title":"Efficient Deployment of Service Function Chains (SFCs) in a Self-Organizing SDN-NFV Networking Architecture to Support IOT","authors":"Kwang-Man Ko, Ali Mohammed Mansoor, Rodina Ahmed, Soon-Gohn Kim","doi":"10.1109/ICUFN.2018.8436674","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436674","url":null,"abstract":"SDN and NFV provide the underlying cloud-centric operational infrastructure necessary to drive new revenue streams and exploit new market opportunities, such as IoT and M2M. In this paper, we introduce an in-progress a new dynamic fine-grained (two-layer) functions placement and migration mechanism for SDN/NFV-enabled network in IoT/5G infrastructure that considers load balancing and fault tolerance and congestion avoidance while respecting the specific requirements of the IoT application and utilizing the network resources.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436753
Tai-Yeon Ku, Wan-ki Park, Hoon Choi
Energy management system should predict the future energy use and generation amount for the optimal operation of ESS based on the measured energy amount, renewable energy production amount and energy usage, and establish the operation plan. In this paper, we describe the technologies that can be saved through the analysis of big data of energy resources for renewable energy and present Demand Response Operation Method through big data analysis. Through this technology, it is possible to find new information by discovering patterns and correlations hidden in data, and to respond appropriately when issuing DR.
{"title":"Demand Response Operation Method on Energy Big Data Platform","authors":"Tai-Yeon Ku, Wan-ki Park, Hoon Choi","doi":"10.1109/ICUFN.2018.8436753","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436753","url":null,"abstract":"Energy management system should predict the future energy use and generation amount for the optimal operation of ESS based on the measured energy amount, renewable energy production amount and energy usage, and establish the operation plan. In this paper, we describe the technologies that can be saved through the analysis of big data of energy resources for renewable energy and present Demand Response Operation Method through big data analysis. Through this technology, it is possible to find new information by discovering patterns and correlations hidden in data, and to respond appropriately when issuing DR.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132895334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}