Regulation of electricity markets with ubiquitous computing

被引:0
作者
Roehr, Daniel [1 ]
Beigl, Michael [1 ]
Beuster, Monty [1 ]
Riedel, Till [2 ]
Decker, Christian [2 ]
机构
[1] TU Braunschweig, Distributed & Ubiquitous Syst Grp, Braunschweig, Germany
[2] Univ Karlsruhe, Telecooperat Off TecO, Karlsruhe, Germany
来源
INSS 07: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON NETWORKED SENSING SYSTEMS | 2007年
关键词
ubiquitous computing; pervasive computing; energy markets; energy consumption; decision support;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a system that helps energy suppliers to smoothen the total peak load by generating price incentives for consumers. Consumers in turn get fine grained cost sensitive control of energy consumption of the past, present and future with a precise real-time overview of all devices in their household, company or industry. Pricing information of the energy provider and external sources is processed by our system and will help customers minimizing their energy costs. Sensor nodes are basis of the system enabling the collection of power consumption and other (e.g. temperature) information. They are involved in the decision support (e.g. delay activities for a certain time). Moreover the energy supplier can use the system to cut off certain devices that were negotiated and accepted by the consumer. The system is focussed on the demand side but benefits both.
引用
收藏
页码:298 / 298
页数:1
相关论文
共 50 条
  • [21] Ubiquitous and Pervasive Computing: Architectures and Protocols for Applications Design
    Bakhouya, Mohamed
    3RD ACM WORKSHOP ON AGENT-ORIENTED SOFTWARE ENGINEERING CHALLENGES FOR UBIQUITOUS AND PERVASIVE COMPUTING - AUPC 09, 2009, : 1 - 1
  • [22] Trustworthiness and Authentication in Ubiquitous Computing
    Xiao, Hannan
    Malcolm, James
    Christianson, Bruce
    Zhang, Ying
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2012, : 135 - 138
  • [23] Researches to the Trusted Ubiquitous Computing
    Sun, Daoqing
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 433 - 437
  • [24] Convergent Design in Ubiquitous Computing
    Segall, Zary
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 95 - 99
  • [25] Survey of Ubiquitous Computing Security
    Li Y.
    Chen Y.
    Zhao J.
    Yue X.
    Zheng C.
    Wu Y.
    Wu G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [26] A taxonomy of ubiquitous computing applications
    Nam Joo Jeon
    Choon Seong Leem
    Min Hyung Kim
    Hyoun Gyu Shin
    Wireless Personal Communications, 2007, 43 : 1229 - 1239
  • [27] Dynamic context aware system for ubiquitous computing environment
    Lee, Seungkeun
    Lee, Junghyun
    AGENT COMPUTING AND MULTI-AGENT SYSTEMS, 2006, 4088 : 409 - 419
  • [28] Software Engineering Challenges for Ubiquitous Computing in Various Applications
    Ashraf, Muhammad Usman
    Khan, Naveed Ahmed
    2013 11TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2013, : 78 - 82
  • [29] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [30] Cryptanalysis of ubiquitous computing systems
    Hernandez-Castro, Julio
    Avoine, Gildas
    PROCEEDINGS OF THE 18TH MEDITERRANEAN ELECTROTECHNICAL CONFERENCE MELECON 2016, 2016,