better experience by decreasing the annoyance and
also increasing energy savings at the same time.
Thus, the contributions of this paper are: 1) A
software architecture to monitor PC usage, energy
consumption and apply savings policies. 2) A
behavior-centered dynamic energy saving policy. 3)
A user location-based energy saving policy that
accommodates to user location to improve both
savings and user satisfaction.
The rest of the paper is divided as follows.
Section 2 summarizes the related work, Section 3
describes the EnergyAware architecture. In Section
4 the location-based energy saving policy is
designed. In Section 5 the implementation and
evaluation is shown, and the paper is concluded with
a discussion of future work.
2 RELATED WORK
Computers in n offices can achieve substantial
savings in energy consumption. In a report from
EMA, 2008, the authors conducted a survey among
hundreds of professionals where they responded that
their computers work were kept On during 43% of
the total non working hours or the equivalent of 55
hours of consumption during a week. This equates to
an additional cost and unnecessary $73 per computer
annually. Although computers have the ability to be
configured to sleep or hibernate, it does not always
take advantage of it. In the survey it was found that
from the people who did the survey including
teachers, secretaries, assistants and administrative
staff, only 12% of them have ever changed their
energy savings on their computers (specifically
suspend and hibernate). This shows that even if
companies have the option, energy saving policies
are not mandatory in all companies, and users are
left with the choice of saving energy or not.
In (Lin et al., 2011) the authors explained several
methods with which they could generate energy
savings in computers. The most interesting was
RFID. RFID is used to save energy in the computers
that are used in classrooms. When the computer is
not in use, it turns Off or suspends automatically,
avoiding energy waste. To implement this
technology, a sensor that identifies when a person
leaves should be installed at the entrance of the
office or room. It will automatically send a signal to
the computer and thus start sleeping. The authors
used a server that retrieves data using an RFID
reader. It allows knowing when a user is close to or
away from the computer. The server decides to put
the computer to sleep if the user is away for 10
minutes, or decides to turn it off if the user spends
more than 30 minutes away from the computer.
In (Korn et al., 2004) the authors show a
framework for energy savings on computers. They
proposed the creation of profiles for each computer
or group of computers and in turn make them have
Off-time schedules depending on the profile
assigned to it. The authors did however not take into
account how the users will handle the decision of
turning off the computer in the case he/she needs to
leave it on to complete long-running tasks.
The Engineering Department of the Samsung
Institute of Technology has a system that allows you
to suspend the device when not in use. They
managed to implement it using a hardware that
recognizes when the user gets up from his chair. It
orders the device to go to a suspended state, and
when the user returns to his/her desk, it resumes the
operating system (Reilly et al., 2011). This however
restricts its use by requiring a piece of hardware.
The Department of Electrical Engineering and
Computer Science at the University of Fukuoka in
Japan proposed a technology similar to the one
Samsung proposed, but differs in the presence
verification process. Instead of verifying if the user
is present or not in his/her desk, the University of
Fukuoka checks whether the user is currently
looking at the computer screen (Kim, J.-Y., 2011) or
not. This is done by means of a webcam, a presence
sensor/vision and an algorithm called EYE-
TRACKING. In this way if the person comes
completely out of the camera range, it means that it
is not in front of the computer and therefore is not
using it. The implementation turns off the screen and
suspends the computer to achieve energy savings.
This also depends on hardware.
Mobile phones are used as an authentication
mechanism and could be used to determine if the
computer owner is close to it. One of the
authentication methods most difficult to control is
that which uses tokens or any mechanism created to
store security passwords. An example is the proposal
made in (Jaros and Kuchta, 2010), where the authors
performed a token-based authentication through
mobile devices. The communication between the
mobile and the computer is done via Bluetooth.
Another proposal tries to overcome the problems
with GPS by using Bluetooth and Wi-Fi to improve
location calculation accuracy (Almuairfi et al.,
2013).
In this article, we like to combine several of the
technologies used in other applications. We will use
the mobile phone as an authentication token. We
will propose an energy saving mechanism that relies
SMARTGREENS2014-3rdInternationalConferenceonSmartGridsandGreenITSystems
142