With the shortages of resources,environmental pollution,climate change,and other issues becoming more and more serious,it is extremely urgent to vigorously develop new energy vehicles.As the cost of batteries decrease...With the shortages of resources,environmental pollution,climate change,and other issues becoming more and more serious,it is extremely urgent to vigorously develop new energy vehicles.As the cost of batteries decrease year by year,the production and quantity of sales of electric vehicles(EVs)in the world,especially in China,increased substantially.In order to make vehicles to grid(V2G)technology better developed and applied in China.The brief introduction to V2G is given at first.Then the development status and specific cases of V2G at home and abroad are summarized.Finally,the problems that V2G may encounter during promotion and application in China are analyzed.Based on the development of the United States and Japan,specific policy recommendations are given in line with the basic national conditions of China.展开更多
The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG...The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.展开更多
Incorporating electric vehicles into smart grid,vehicle-to-Grid(V2G) makes it feasible to charge for large-scale electric vehicles,and in turn support electric vehicles,as mobile and distributed storage units,to disch...Incorporating electric vehicles into smart grid,vehicle-to-Grid(V2G) makes it feasible to charge for large-scale electric vehicles,and in turn support electric vehicles,as mobile and distributed storage units,to discharge to smart grid.In order to provide reliable and efficient services,the operator of V2 G networks needs to monitor realtime status of every plug-in electric vehicle(PEV) and then evaluate current electricity storage capability.Anonymity,aggregation and dynamic management are three basic but crucial characteristics of which the services of V2 G networks should be.However,few of existing authentication schemes for V2 G networks could satisfy them simultaneously.In this paper,we propose a secure and efficient authentication scheme with privacy-preserving for V2 G networks.The scheme makes the charging/discharging station authenticate PEVs anonymously and manage them dynamically.Moreover,the monitoring data collected by the charging/discharging station could be sent to a local aggregator(LAG)in batch mode.In particular,time overheads during verification stage are independent with the number of involved PEVs,and there is no need to update the membership certificate and key pair before PEV logs out.展开更多
In order to overcome the zigzag grids generated by conventional finite difference method on complicated casting boundaries in the simulation of casting process, the generation program for 2-D boundary-fitted coordinat...In order to overcome the zigzag grids generated by conventional finite difference method on complicated casting boundaries in the simulation of casting process, the generation program for 2-D boundary-fitted coordinate grid has been developed by solving a set of partial differential equations (PDE) numerically. The STL format files were treated as input data for 2-D physical regions. The equipartition method for boundary points was used to improve the self-adaptability of grid according to the characteristic of the STL format files. The program was demonstrated through some examples. The comparison between the conventional finite difference method and the proposed method shows that this program is effective and flexible for generation of boundary-fitted grid in any arbitrary 2-D complex domain, and the grid is in accordance with the variety of boundary curvature finely. The program also provides two types of boundary-fitted grids for double-connected region, O-type and C-type. The limitation of the step-like boundary with the rectangle grid could be avoided effectively. Therefore, the computational accuracy and efficiency would be improved and the computational time would be saved significantly by the application of boundary-fitted grids.展开更多
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties en...In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.展开更多
A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a res...A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.展开更多
基金Natural Science Foundation of Shanghai,China(No.17ZR1411200)Shanghai International Automobile City(Group)Co.,Ltd.,China,(No.H2017-032)
文摘With the shortages of resources,environmental pollution,climate change,and other issues becoming more and more serious,it is extremely urgent to vigorously develop new energy vehicles.As the cost of batteries decrease year by year,the production and quantity of sales of electric vehicles(EVs)in the world,especially in China,increased substantially.In order to make vehicles to grid(V2G)technology better developed and applied in China.The brief introduction to V2G is given at first.Then the development status and specific cases of V2G at home and abroad are summarized.Finally,the problems that V2G may encounter during promotion and application in China are analyzed.Based on the development of the United States and Japan,specific policy recommendations are given in line with the basic national conditions of China.
基金Supported by the National High-Technology Re-search and Development Program of China(2003AA414210) the National Natural Science Foundation of China (60573090)
文摘The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.
基金the Natural Science Foundation of China(61102056,61201132)Fundamental Research Funds for the Central Universities of China(K5051301013)the 111 Project of China(B08038)
文摘Incorporating electric vehicles into smart grid,vehicle-to-Grid(V2G) makes it feasible to charge for large-scale electric vehicles,and in turn support electric vehicles,as mobile and distributed storage units,to discharge to smart grid.In order to provide reliable and efficient services,the operator of V2 G networks needs to monitor realtime status of every plug-in electric vehicle(PEV) and then evaluate current electricity storage capability.Anonymity,aggregation and dynamic management are three basic but crucial characteristics of which the services of V2 G networks should be.However,few of existing authentication schemes for V2 G networks could satisfy them simultaneously.In this paper,we propose a secure and efficient authentication scheme with privacy-preserving for V2 G networks.The scheme makes the charging/discharging station authenticate PEVs anonymously and manage them dynamically.Moreover,the monitoring data collected by the charging/discharging station could be sent to a local aggregator(LAG)in batch mode.In particular,time overheads during verification stage are independent with the number of involved PEVs,and there is no need to update the membership certificate and key pair before PEV logs out.
基金supported by State Key Laboratory of Materials Processing and Die&Mould Technology,Huazhong University of Science and Technology(09-04)National Natural Science Foundation of China(No.50775050)
文摘In order to overcome the zigzag grids generated by conventional finite difference method on complicated casting boundaries in the simulation of casting process, the generation program for 2-D boundary-fitted coordinate grid has been developed by solving a set of partial differential equations (PDE) numerically. The STL format files were treated as input data for 2-D physical regions. The equipartition method for boundary points was used to improve the self-adaptability of grid according to the characteristic of the STL format files. The program was demonstrated through some examples. The comparison between the conventional finite difference method and the proposed method shows that this program is effective and flexible for generation of boundary-fitted grid in any arbitrary 2-D complex domain, and the grid is in accordance with the variety of boundary curvature finely. The program also provides two types of boundary-fitted grids for double-connected region, O-type and C-type. The limitation of the step-like boundary with the rectangle grid could be avoided effectively. Therefore, the computational accuracy and efficiency would be improved and the computational time would be saved significantly by the application of boundary-fitted grids.
基金Supported by the Open Research Foundation of National Key Laboratory (SKLSE04-018)National Social Science Foundation of China (06BTQ024)the Science and Technical Key Project of Hubei Province (2005AA101C43)
文摘In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2012R1A1A4A0105777)supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H030113-4007) supervised by the NIPA (National IT Industry Promotion Agency)
文摘A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.