Modeling and Simulation of Secure Automatic Energy Meter Reading and Management Systems using Mobile Agents

نویسندگان

  • Radwan Tahboub
  • Dan Lazarescu
  • Vasile Lazarescu
چکیده

The current energy saving technologies rely on conventional data logging systems, where the current methods in retrieving the energy data is not convenient, and the cost of the data logging systems is high. The Automatic energy Meter Reading (AMR) technology is network-based applications used by electric/energy companies to increase performance and reliability of their energy meter reading and management systems. A mobile agent is a program (code and data) that can autonomously migrate from host to host in a network of heterogeneous computer systems and fulfill a task specified by its owner. Intelligent and secure Automatic Meter Reading and Management using Mobile Agents can be of great importance for municipalities and energy distribution companies so as to minimize the number of traditional visits required by the distribution company, hence decreasing the number of employees used in performing this traditional time consuming and high cost work. In this work we will start by surveying the current technologies and techniques used in handling remote meter reading and management. New modeling and simulation results for different configurations and techniques of automatic energy meter reading and management systems using mobile agents will be presented and compared to traditional client server techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simulation Results for Secure Automatic Energy Meter Reading Using Mobile Agents - Part 1-

Intelligent and secure automatic energy meters reading and management using mobile agents can be of great importance for municipalities and energy distribution companies so as to efficiently read these meters and to decrease the number of traditional visits required by the energy company, and decreasing the number of employees used in performing this traditional time consuming and high cost wor...

متن کامل

Detailed Modeling and Novel Scheduling of Plug-in Electric Vehicle Energy Storage Systems for Energy Management of Multi-microgrids Considering the Probability of Fault Occurrence

As an effective means of displacing fossil fuel consumption and reducing greenhouse gas emissions, plug-in electric vehicles (PEVs) and plug-in hybrid electric vehicles (PHEVs) have attracted more and more attentions. From the power grid perspective, PHEVs and PEVs equipped with batteries can also be used as energy storage facilities, due to the fact that, these vehicles are parked most of the ...

متن کامل

Pic Microcontroller-Based Automatic Meter Reading (AMR) System Using the Low Voltage (LV) Power Line Network (TECHNICAL NOTE)

Automatic Meter Reading (AMR) is the remote collection of consumption data from customer’s utility meters over telecommunications, radio, power line and other links. AMR provides water, electric and gas utility service companies the opportunity to streamline metering, billing and collection activities, increase operational efficiency and improve customer service. The AMR system consists of thre...

متن کامل

A Reliable and Economically Feasible Automatic Meter Reading System Using Power Line Distribution Network (TECHNICAL NOTE)

Automatic Meter Reading (AMR) is the remote collection of consumption data from customer’s utility meters over telecommunications, radio, power line and other links. AMR provides water, electric and gas utility−service companies the opportunities to streamline metering, billing and collection activities, increase operational efficiency and improve customer service. Utility company uses technolo...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007