Search results for: shifting of global energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15229

Search results for: shifting of global energy security

14659 The Nation as Brand: Postcolonial Construction of National Identity in Late 20th/21st Century Qatar

Authors: Ryunhye Kim

Abstract:

Despite its relatively short history as an independent state, Qatar has emerged as a highly regarded Gulf state and global power. Since its independence in September 1971, the state has employed deliberate policy initiatives designed to put Qatar on the map and distinguish it from other Gulf states. Because Qatar and its neighbors are resource-poor apart from energy, whoever is first to introduce a unique aspect of branding not only takes the lead but assumes what is often an insurmountable advantage. This study examines three specific modes of branding undertaken by Qatar: (1) energy policies to utilize its natural gas to become a dominant supplier; (2) the deliberate construction of a distinct cultural brand utilizing sports, architecture, museums, and media; and (3) ‘niche diplomacy’ to serve as a mediator in regional and intra-national conflicts, especially as interlocutor between the United States and Arab regimes and Muslim groups. Gleaning data from a range of sources, this study analyzes the effectiveness and significance of Qatar’s place branding on the global stage, as well as potential disadvantages and limits in this branding, including problems encountered before and after the ‘Qatar crisis.’

Keywords: national branding, national-identity, Qatar, soft-power

Procedia PDF Downloads 148
14658 Safe and Scalable Framework for Participation of Nodes in Smart Grid Networks in a P2P Exchange of Short-Term Products

Authors: Maciej Jedrzejczyk, Karolina Marzantowicz

Abstract:

Traditional utility value chain is being transformed during last few years into unbundled markets. Increased distributed generation of energy is one of considerable challenges faced by Smart Grid networks. New sources of energy introduce volatile demand response which has a considerable impact on traditional middlemen in E&U market. The purpose of this research is to search for ways to allow near-real-time electricity markets to transact with surplus energy based on accurate time synchronous measurements. A proposed framework evaluates the use of secure peer-2-peer (P2P) communication and distributed transaction ledgers to provide flat hierarchy, and allow real-time insights into present and forecasted grid operations, as well as state and health of the network. An objective is to achieve dynamic grid operations with more efficient resource usage, higher security of supply and longer grid infrastructure life cycle. Methods used for this study are based on comparative analysis of different distributed ledger technologies in terms of scalability, transaction performance, pluggability with external data sources, data transparency, privacy, end-to-end security and adaptability to various market topologies. An intended output of this research is a design of a framework for safer, more efficient and scalable Smart Grid network which is bridging a gap between traditional components of the energy network and individual energy producers. Results of this study are ready for detailed measurement testing, a likely follow-up in separate studies. New platforms for Smart Grid achieving measurable efficiencies will allow for development of new types of Grid KPI, multi-smart grid branches, markets, and businesses.

Keywords: autonomous agents, Distributed computing, distributed ledger technologies, large scale systems, micro grids, peer-to-peer networks, Self-organization, self-stabilization, smart grids

Procedia PDF Downloads 295
14657 Climate Variability on Hydro-Energy Potential: An MCDM and Neural Network Approach

Authors: Apu Kumar Saha, Mrinmoy Majumder

Abstract:

The increase in the concentration of Green House gases all over the World has induced global warming phenomena whereby the average temperature of the world has aggravated to impact the pattern of climate in different regions. The frequency of extreme event has increased, early onset of season and change in an average amount of rainfall all are engrossing the conclusion that normal pattern of climate is changing. Sophisticated and complex models are prepared to estimate the future situation of the climate in different zones of the Earth. As hydro-energy is directly related to climatic parameters like rainfall and evaporation such energy resources will have to sustain the onset of the climatic abnormalities. The present investigation has tried to assess the impact of climatic abnormalities upon hydropower potential of different regions of the World. In this regard multi-criteria, decision making, and the neural network is used to predict the impact of the change cognitively by an index. The results from the study show that hydro-energy potential of Asian region is mostly vulnerable with respect to other regions of the world. The model results also encourage further application of the index to analyze the impact of climate change on the potential of hydro-energy.

Keywords: hydro-energy potential, neural networks, multi criteria decision analysis, environmental and ecological engineering

Procedia PDF Downloads 546
14656 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 263
14655 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 278
14654 Harnessing Renewable Energy as a Strategy to Combating Climate Change in Sub Saharan Africa

Authors: Gideon Nyuimbe Gasu

Abstract:

Sub Saharan Africa is at a critical point, experiencing rapid population growth, particularly in urban areas and young growing force. At the same time, the growing risk of catastrophic global climate change threatens to weaken food production system, increase intensity and frequency of drought, flood, and fires and undermine gains on development and poverty reduction. Although the region has the lowest per capital greenhouse gas emission level in the world, it will need to join global efforts to address climate change, including action to avoid significant increases and to encourage a green economy. Thus, there is a need for the concept of 'greening the economy' as was prescribed at Rio Summit of 1992. Renewable energy is one of the criterions to achieve this laudable goal of maintaining a green economy. There is need to address climate change while facilitating continued economic growth and social progress as energy today is critical to economic growth. Fossil fuels remain the major contributor of greenhouse gas emission. Thus, cleaner technologies such as carbon capture storage, renewable energy have emerged to be commercially competitive. This paper sets out to examine how to achieve a low carbon economy with minimal emission of carbon dioxide and other greenhouse gases which is one of the outcomes of implementing a green economy. Also, the paper examines the different renewable energy sources such as nuclear, wind, hydro, biofuel, and solar voltaic as a panacea to the looming climate change menace. Finally, the paper assesses the different renewable energy and energy efficiency as a propeller to generating new sources of income and jobs and in turn reduces carbon emission. The research shall engage qualitative, evaluative and comparative methods. The research will employ both primary and secondary sources of information. The primary sources of information shall be drawn from the sub Saharan African region and the global environmental organizations, energy legislation, policies and related industries and the judicial processes. The secondary sources will be made up of some books, journal articles, commentaries, discussions, observations, explanations, expositions, suggestions, prescriptions and other material sourced from the internet on renewable energy as a panacea to climate change. All information obtained from these sources will be subject to content analysis. The research result will show that the entire planet is warming as a result of the activities of mankind which is clear evidence that the current development is fundamentally unsustainable. Equally, the study will reveal that a low carbon development pathway in the sub Saharan African region should be embraced to minimize emission of greenhouse gases such as using renewable energy rather than coal, oil, and gas. The study concludes that until adequate strategies are devised towards the use of renewable energy the region will continue to add and worsen the current climate change menace and other adverse environmental conditions.

Keywords: carbon dioxide, climate change, legislation/law, renewable energy

Procedia PDF Downloads 222
14653 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 301
14652 A Comparative Study of the Physicochemical and Structural Properties of Quinoa Protein Isolate and Yellow Squat Shrimp Byproduct Protein Isolate through pH-Shifting Modification

Authors: María José Bugueño, Natalia Jaime, Cristian Castro, Diego Naranjo, Guido Trautmann, Mario Pérez-Won, Vilbett Briones-Labarca

Abstract:

Proteins play a crucial role in various prepared foods, including dairy products, drinks, emulsions, and ready meals. These food proteins are naturally present in food waste and byproducts. The alkaline extraction and acid precipitation method is commonly used to extract proteins from plants and animals due to its product stability, cost-effectiveness, and ease of use. This study aimed to investigate the impact of pH-shifting storage at two different pH levels on the conformational changes affecting the physicochemical and functional properties of quinoa protein isolate (QPI) and yellow shrimp byproduct protein isolate (YSPI). The QPI and YSPI were extracted using the alkaline extraction-isoelectric precipitation method. The dispersions were adjusted to pH 4 or 12, stirred for 2 hours at 20°C to achieve a uniform dispersion, and then freeze-dried. Various analyses were conducted, including flexibility (F), free sulfhydryl content (Ho), emulsifying activity (EA), emulsifying capacity (EC), water holding capacity (WHC), oil holding capacity (OHC), intrinsic fluorescence, ultraviolet spectroscopy, differential scanning calorimetry (DSC), and Fourier transform infrared spectroscopy (FTIR) to assess the properties of the protein isolates. pH-shifting at pH 11 and 12 for QPI and YSPI, respectively, significantly improved protein properties, while property modification of the samples treated under acidic conditions was less pronounced. Additionally, the pH 11 and 12 treatments significantly improved F, Ho, EA, WHC, OHC, intrinsic fluorescence, ultraviolet spectroscopy, DSC, and FTIR. The increase in Ho was due to disulfide bond disruption, which produced more protein sub-units than other treatments for both proteins. This study provides theoretical support for comprehensively elucidating the functional properties of protein isolates, promoting the application of plant proteins and marine byproducts. The pH-shifting process effectively improves the emulsifying property and stability of QPI and YSPI, which can be considered potential plant-based or marine byproduct-based emulsifiers for use in the food industry.

Keywords: quinoa protein, yellow shrimp by-product protein, physicochemical properties, structural properties

Procedia PDF Downloads 35
14651 Digital Media Market, Multimedia, and Computer Graphic Analysis Amidst Fluctuating Global and Local Scale Economy

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study centred on investigating the influence of multimedia systems and computer graphic design on global and local scale economies. Firstly, the study pinpointed the significant participants and top five global digital media distribution in the digital media market. Then, the study investigated whether a tie or variance existed between the digital media vendor and market shares. Also, the paper probed whether the global and local desktop, mobile, and tablet markets differ while assessing the association between the top five digital media and global market shares. Finally, the study explored the extent of growth, economic gains, major setbacks, and opportunities within the industry amidst global and local scale economic flux. A multiple regression analysis method was employed to analyse the significant influence of the top five global digital media on the total market share, and the Analysis of Variance (ANOVA) was used to analyse the global digital media vendor market share data. The findings were intriguing and significant.

Keywords: computer graphics, digital media market, global market share, market size, media vendor, multimedia, social media, systems design

Procedia PDF Downloads 26
14650 Nexus between Energy, Environment and Economic Growth: Sectoral Analysis from Pakistan

Authors: Muhammad Afzal, Muhammad Sajjad

Abstract:

Climate change has become a global environmental challenge and it has affected the world’s economy. Its impact is widespread across all major sectors of the economy i.e. agriculture, industry, and services sectors. This study attempts to measure the long run as well as the short-run dynamic between energy; environment and economic growth by using Autoregressive Distributed Lag (ARDL) bound testing approach at aggregate as well as sectoral level. We measured the causal relationship between electricity consumption, fuel consumption, CO₂ emission, and real Gross Domestic Product (GDP) for the period of 1980 to 2016 for Pakistan. Our co-integration results reveal that all the variables are co-integrated at aggregate as well as at sectoral level. Electricity consumption shows two-way casual relation at for industry, services and aggregate level. The inverted U-Curve hypothesis tested the relationship between greenhouse gas emissions and per capita GDP and results supported the Environment Kuznet Curve (EKC) hypothesis. This study cannot ignore the importance of energy for economic growth but prefers to focus on renewable and green energy to pave on the trajectory of development.

Keywords: climate change, economic growth, energy, environment

Procedia PDF Downloads 162
14649 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 160
14648 Modeling of a Concentrating Photovoltaic Module with and without Cooling System

Authors: Intissar Benrhouma, Marta Victoria, Ignacio Anton, Bechir Chaouachi

Abstract:

Concentrating photovoltaic systems CPV use optical elements, such as Fresnel lenses, to concentrate solar intensity. The concentrated solar energy is delivered to the solar cell from 20 to 100 W/cm². Some of this energy is converted to electricity, while the rest must be disposed of as a residual heat. Solar cells cooling should be a necessary part of CPV modeling because these systems allowed increasing the power received by the cell. This high power can rise the electrons’ potential causing the heating of the cell, which reduces the global module’s efficiency. This work consists of modeling a concentrating photovoltaic module with and without a cooling system. We have established a theoretical model based on energy balances carried out on a photovoltaic module using solar radiation concentration cells. Subsequently, we developed a calculation program on Matlab which allowed us to simulate the functioning of this module. The obtained results show that the addition of a cooling system to the module improves greatly the performance of our CPV system.

Keywords: solar energy, photovoltaic, concentration, cooling, performance improvement

Procedia PDF Downloads 394
14647 Performance of Buildings with Base-Isolation System under Geometric Irregularities

Authors: Firoz Alam Faroque, Ankur Neog

Abstract:

Earthquake causes significant loss of lives and severe damage to infrastructure. Base isolator is one of the most suitable solutions to make a building earthquake resistant. Base isolation consists of installing an isolator along with the steel plates covered with pads of strong material like steel, rubber, etc. In our study, we have used lead rubber bearing (LRB). The basic idea of seismic isolation is based on the reduction of the earthquake-induced inertia forces by shifting the fundamental period of the structure out of dangerous resonance range, and concentration of the deformation and energy dissipation demands at the isolation and energy dissipation systems, which are designed for this purpose. In this paper, RC frame buildings have been modeled and analyzed by response spectrum method using ETABS software. The LRB used in the model is designed as per uniform building code (UBC) 97. It is found that time period for the base isolated structures are higher than that of the fixed base structure and the value of base shear significantly reduces in the case of base-isolated buildings. It has also been found that buildings with vertical irregularities give better performance as compared to building with plan irregularities using base isolators.

Keywords: base isolation, base shear, irregularities in buildings, lead rubber bearing (LRB)

Procedia PDF Downloads 321
14646 Energy Management Techniques in Mobile Robots

Authors: G. Gurguze, I. Turkoglu

Abstract:

Today, the developing features of technological tools with limited energy resources have made it necessary to use energy efficiently. Energy management techniques have emerged for this purpose. As with every field, energy management is vital for robots that are being used in many areas from industry to daily life and that are thought to take up more spaces in the future. Particularly, effective power management in autonomous and multi robots, which are getting more complicated and increasing day by day, will improve the performance and success. In this study, robot management algorithms, usage of renewable and hybrid energy sources, robot motion patterns, robot designs, sharing strategies of workloads in multiple robots, road and mission planning algorithms are discussed for efficient use of energy resources by mobile robots. These techniques have been evaluated in terms of efficient use of existing energy resources and energy management in robots.

Keywords: energy management, mobile robot, robot administration, robot management, robot planning

Procedia PDF Downloads 263
14645 Effects of Irregular Migration from Different Aspects of Security

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.

Keywords: irregular migration, the changing dimensions of security, human security, social security

Procedia PDF Downloads 330
14644 Security Analysis and Implementation of Achterbahn-128 for Images Encryption

Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri

Abstract:

In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.

Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis

Procedia PDF Downloads 310
14643 Prediction-Based Midterm Operation Planning for Energy Management of Exhibition Hall

Authors: Doseong Eom, Jeongmin Kim, Kwang Ryel Ryu

Abstract:

Large exhibition halls require a lot of energy to maintain comfortable atmosphere for the visitors viewing inside. One way of reducing the energy cost is to have thermal energy storage systems installed so that the thermal energy can be stored in the middle of night when the energy price is low and then used later when the price is high. To minimize the overall energy cost, however, we should be able to decide how much energy to save during which time period exactly. If we can foresee future energy load and the corresponding cost, we will be able to make such decisions reasonably. In this paper, we use machine learning technique to obtain models for predicting weather conditions and the number of visitors on hourly basis for the next day. Based on the energy load thus predicted, we build a cost-optimal daily operation plan for the thermal energy storage systems and cooling and heating facilities through simulation-based optimization.

Keywords: building energy management, machine learning, operation planning, simulation-based optimization

Procedia PDF Downloads 319
14642 Impact Analysis of Transportation Modal Shift on Regional Energy Consumption and Environmental Level: Focused on Electric Automobiles

Authors: Hong Bae Kim, Chang Ho Hur

Abstract:

Many governments have tried to reduce CO2 emissions which are believed to be the main cause for global warming. The deployment of electric automobiles is regarded as an effective way to reduce CO2 emissions. The Korean government has planned to deploy about 200,000 electric automobiles. The policy for the deployment of electric automobiles aims at not only decreasing gasoline consumption but also increasing electricity production. However, if an electricity consuming regions is not consistent with an electricity producing region, the policy generates environmental problems between regions. Hence, this paper has established the energy multi-region input-output model to specifically analyze the impacts of the deployment of electric automobiles on regional energy consumption and CO2 emissions. Finally, the paper suggests policy directions regarding the deployment of electric automobiles.

Keywords: electric automobiles, CO2 emissions, regional imbalances in electricity production and consumption, energy multi-region input-output model

Procedia PDF Downloads 297
14641 Verification of Satellite and Observation Measurements to Build Solar Energy Projects in North Africa

Authors: Samy A. Khalil, U. Ali Rahoma

Abstract:

The measurements of solar radiation, satellite data has been routinely utilize to estimate solar energy. However, the temporal coverage of satellite data has some limits. The reanalysis, also known as "retrospective analysis" of the atmosphere's parameters, is produce by fusing the output of NWP (Numerical Weather Prediction) models with observation data from a variety of sources, including ground, and satellite, ship, and aircraft observation. The result is a comprehensive record of the parameters affecting weather and climate. The effectiveness of reanalysis datasets (ERA-5) for North Africa was evaluate against high-quality surfaces measured using statistical analysis. Estimating the distribution of global solar radiation (GSR) over five chosen areas in North Africa through ten-years during the period time from 2011 to 2020. To investigate seasonal change in dataset performance, a seasonal statistical analysis was conduct, which showed a considerable difference in mistakes throughout the year. By altering the temporal resolution of the data used for comparison, the performance of the dataset is alter. Better performance is indicate by the data's monthly mean values, but data accuracy is degraded. Solar resource assessment and power estimation are discuses using the ERA-5 solar radiation data. The average values of mean bias error (MBE), root mean square error (RMSE) and mean absolute error (MAE) of the reanalysis data of solar radiation vary from 0.079 to 0.222, 0.055 to 0.178, and 0.0145 to 0.198 respectively during the period time in the present research. The correlation coefficient (R2) varies from 0.93 to 99% during the period time in the present research. This research's objective is to provide a reliable representation of the world's solar radiation to aid in the use of solar energy in all sectors.

Keywords: solar energy, ERA-5 analysis data, global solar radiation, North Africa

Procedia PDF Downloads 93
14640 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 143
14639 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 329
14638 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 380
14637 Solar-Powered Water Purification Using Ozone and Sand Filtration

Authors: Kayla Youhanaie, Kenneth Dott, Greg Gillis-Smith

Abstract:

Access to clean water is a global challenge that affects nearly one-third of the world’s population. A lack of safe drinking water negatively affects a person’s health, safety, and economic status. However, many regions of the world that face this clean water challenge also have high solar energy potential. To address this worldwide issue and utilize available resources, a solar-powered water purification device was developed that could be implemented in communities around the world that lack access to potable water. The device uses ozone to destroy water-borne pathogens and sand filtration to filter out particulates from the water. To select the best method for this application, a quantitative energy efficiency comparison of three water purification methods was conducted: heat, UV light, and ozone. After constructing an initial prototype, the efficacy of the device was tested using agar petri dishes to test for bacteria growth in treated water samples at various time intervals after applying the device to contaminated water. The results demonstrated that the water purification device successfully removed all bacteria and particulates from the water within three minutes, making it safe for human consumption. These results, as well as the proposed design that utilizes widely available resources in target communities, suggest that the device is a sustainable solution to address the global water crisis and could improve the quality of life for millions of people worldwide.

Keywords: clean water, solar powered water purification, ozonation, sand filtration, global water crisis

Procedia PDF Downloads 71
14636 Defining a Pathway to Zero Energy Building: A Case Study on Retrofitting an Old Office Building into a Net Zero Energy Building for Hot-Humid Climate

Authors: Kwame B. O. Amoah

Abstract:

This paper focuses on retrofitting an old existing office building to a net-zero energy building (NZEB). An existing small office building in Melbourne, Florida, was chosen as a case study to integrate state-of-the-art design strategies and energy-efficient building systems to improve building performance and reduce energy consumption. The study aimed to explore possible ways to maximize energy savings and renewable energy generation sources to cover the building's remaining energy needs necessary to achieve net-zero energy goals. A series of retrofit options were reviewed and adopted with some significant additional decision considerations. Detailed processes and considerations leading to zero energy are well documented in this study, with lessons learned adequately outlined. Based on building energy simulations, multiple design considerations were investigated, such as emerging state-of-the-art technologies, material selection, improvements to the building envelope, optimization of the HVAC, lighting systems, and occupancy loads analysis, as well as the application of renewable energy sources. The comparative analysis of simulation results was used to determine how specific techniques led to energy saving and cost reductions. The research results indicate this small office building can meet net-zero energy use after appropriate design manipulations and renewable energy sources.

Keywords: energy consumption, building energy analysis, energy retrofits, energy-efficiency

Procedia PDF Downloads 217
14635 Usage of Cyanobacteria in Battery: Saving Money, Enhancing the Storage Capacity, Making Portable, and Supporting the Ecology

Authors: Saddam Husain Dhobi, Bikrant Karki

Abstract:

The main objective of this paper is save money, balance ecosystem of the terrestrial organism, control global warming, and enhancing the storage capacity of the battery with requiring weight and thinness by using Cyanobacteria in the battery. To fulfill this purpose of paper we can use different methods: Analysis, Biological, Chemistry, theoretical and Physics with some engineering design. Using this different method, we can produce the special type of battery that has the long life, high storage capacity, and clean environment, save money so on and by using the byproduct of Cyanobacteria i.e. glucose. Cyanobacteria are a special type of bacteria that produces different types of extracellular glucoses and oxygen with the help of little sunlight, water, and carbon dioxide and can survive in freshwater, marine and in the land as well. In this process, O₂ is more in the comparison to plant due to rapid growth rate of Cyanobacteria. The required materials are easily available in this process to produce glucose with the help of Cyanobacteria. Since CO₂, is greenhouse gas that causes the global warming? We can utilize this gas and save our ecological balance and the byproduct (glucose) C₆H₁₂O₆ can be utilized for raw material for the battery where as O₂ escape is utilized by living organism. The glucose produce by Cyanobateria goes on Krebs's Cycle or Citric Acid Cycle, in which glucose is complete, oxidizes and all the available energy from glucose molecule has been release in the form of electron and proton as energy. If we use a suitable anodes and cathodes, we can capture these electrons and protons to produce require electricity current with the help of byproduct of Cyanobacteria. According to "Virginia Tech Bio-battery" and "Sony" 13 enzymes and the air is used to produce nearly 24 electrons from a single glucose unit. In this output power of 0.8 mW/cm, current density of 6 mA/cm, and energy storage density of 596 Ah/kg. This last figure is impressive, at roughly 10 times the energy density of the lithium-ion batteries in your mobile devices. When we use Cyanobacteria in battery, we are able to reduce Carbon dioxide, Stop global warming, and enhancing the storage capacity of battery more than 10 times that of lithium battery, saving money, balancing ecology. In this way, we can produce energy from the Cyanobacteria and use it in battery for different benefits. In addition, due to the mass, size and easy cultivation, they are better to maintain the size of battery. Hence, we can use Cyanobacteria for the battery having suitable size, enhancing the storing capacity of battery, helping the environment, portability and so on.

Keywords: anode, byproduct, cathode, cyanobacteri, glucose, storage capacity

Procedia PDF Downloads 339
14634 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 416
14633 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 293
14632 Development of Mobile Application for Energy Consumption Assessment of University Buildings

Authors: MinHee Chung, BoYeob Lee, Yuri Kim, Eon Ku Rhee

Abstract:

With an increase in the interest in the energy conservation for buildings, and the emergence of many methods and easily-understandable approaches to it, energy conservation has now become the public’s main interest, as compared to in the past when it was only focused upon by experts. This study aims to help the occupants of a building to understand the energy efficiency and consumption of the building by providing them information on the building’s energy efficiency through a mobile application. The energy performance assessment models are proposed on the basis of the actual energy usage and building characteristics such as the architectural scheme and the building equipment. The university buildings in Korea are used as a case to demonstrate the mobile application.

Keywords: energy consumption, energy performance assessment, mobile application, university buildings

Procedia PDF Downloads 541
14631 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 280
14630 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 369