Search results for: energy security
10309 Evaporative Air Coolers Optimization for Energy Consumption Reduction and Energy Efficiency Ratio Increment
Authors: Leila Torkaman, Nasser Ghassembaglou
Abstract:
Significant quota of Municipal Electrical Energy consumption is related to Decentralized Air Conditioning which is mostly provided by evaporative coolers. So the aim is to optimize design of air conditioners to increase their efficiencies. To achieve this goal, results of practical standardized tests for 40 evaporative coolers in different types collected and simultaneously results for same coolers based on one of EER (Energy Efficiency Ratio) modeling styles are figured out. By comparing experimental results of different coolers standardized tests with modeling results, preciseness of used model is assessed and after comparing gained preciseness with international standards based on EER for cooling capacity, aeration and also electrical energy consumption, energy label from A (most effective) to G (less effective) is classified. finally needed methods to optimize energy consumption and cooler's classification are provided.Keywords: cooler, EER, energy label, optimization
Procedia PDF Downloads 34410308 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 24610307 Energy Service Companies as a Facilitator for Implementation of Energy-Environment Conventions
Authors: Bahareh Arghand
Abstract:
The establishment of rules and regulations for more effective energy-environment interactions are essential to achieving sustainable development. Sustainable development requires mechanisms that can promote compliance in energy-environment conventions. There are many binding agreements and non-binding instruments at regional and international levels on energy and the environment. These conventions try to decrease conflicts of interest between energy, environment and economic by legal principles and practical mechanisms. The major core of conventions is their implementations because the poor implementation and enforcement power affect their success. In this regard, the main goal of this study is proposing the effective implementation mechanisms. Energy service companies' (ESCOs) activities can improve energy efficiency and decrease the environmental degradations. Therefore, it can be proposed and assessed the merit mechanism of ESCO performance as a facilitator to implement energy-environment conventions. An assessment of ESCO performance, including its potentials, problems, and limitations, as a facilitator for effective implementation of the energy-environment convention, is included. This study is oriented towards effective development and application of laws and the function of ESCOs as appropriate economic instruments and facilitator for implementation of energy-environment conventions. The resulting system of close cooperation between the energy-environment conventions and ESCOs is geared toward advancing environmental protection and economic factors by the transfer of environmentally-sound technologies that meet sustainable development objectives.Keywords: energy-environment conventions, energy service company, facilitator mechanism, sustainable development
Procedia PDF Downloads 18210306 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 37610305 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 11510304 Condition for Plasma Instability and Stability Approaches
Authors: Ratna Sen
Abstract:
As due to very high temperature of Plasma it is very difficult to confine it for sufficient time so that nuclear fusion reactions to take place, As we know Plasma escapes faster than the binary collision rates. We studied the ball analogy and the ‘energy principle’ and calculated the total potential energy for the whole Plasma. If δ ⃗w is negative, that is decrease in potential energy then the plasma will be unstable. We also discussed different approaches of stability analysis such as Nyquist Method, MHD approximation and Vlasov approach of plasma stability. So that by using magnetic field configurations we can able to create a stable Plasma in Tokamak for generating energy for future generations.Keywords: jello, magnetic field configuration, MHD approximation, energy principle
Procedia PDF Downloads 44210303 Multi-Dimensional Energy Resource Evaluation in Climate Change beyond the 21st Century
Authors: Hameed Alshammari
Abstract:
The decarbonisation of the energy sector beyond the 21ˢᵗ century is akin to establishing morally responsible mechanisms that can propagate sustainable livelihoods (Denina et al., 2021). It implies that Kuwait undertakes a re-evaluation of energy generation gaps so as to tap the potential to reduce overreliance on fossil fuel (Si et al., 2020) and align with global views on sustainable energy generation and consumption.(Herrero, Pineda, Villar, & Zambrano, 2020). Without the economic pressure to switch to alternative sources of energy, Kuwait requires a multi-dimensional analysis the energy policies andsources of energy other than fossil fuels (Alsaad, 2021).Currently, Kuwait has an energy system that is highly skewed towards fossil fuels (Alsaad, 2021); hence, the reliance on burning fossil fuels forms part of the core elements of the general inefficient energy systems that have negative consequences to global environmental and economic systems (Kang et al., 2020). This paper undertakes a detailed literature review on factors needed for the development of a framework for the multi-dimensional energy resource analysis in Kuwait. The framework aims aligning the current energy policies in Kuwait with the global decarbonisation drive, to promote sustainable energy strategies.Keywords: decarbonisation, energy, fossil fuels, multi-dimensional analysis, sustainability
Procedia PDF Downloads 8610302 Data Security in Cloud Storage
Authors: Amir Rashid
Abstract:
Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key
Procedia PDF Downloads 29410301 Smart-Textile Containers for Urban Mobility
Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang
Abstract:
Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor
Procedia PDF Downloads 31510300 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance
Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz
Abstract:
The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor
Procedia PDF Downloads 6910299 Evaluating the Nexus between Energy Demand and Economic Growth Using the VECM Approach: Case Study of Nigeria, China, and the United States
Authors: Rita U. Onolemhemhen, Saheed L. Bello, Akin P. Iwayemi
Abstract:
The effectiveness of energy demand policy depends on identifying the key drivers of energy demand both in the short-run and the long-run. This paper examines the influence of regional differences on the link between energy demand and other explanatory variables for Nigeria, China and USA using the Vector Error Correction Model (VECM) approach. This study employed annual time series data on energy consumption (ED), real gross domestic product (GDP) per capita (RGDP), real energy prices (P) and urbanization (N) for a thirty-six-year sample period. The utilized time-series data are sourced from World Bank’s World Development Indicators (WDI, 2016) and US Energy Information Administration (EIA). Results from the study, shows that all the independent variables (income, urbanization, and price) substantially affect the long-run energy consumption in Nigeria, USA and China, whereas, income has no significant effect on short-run energy demand in USA and Nigeria. In addition, the long-run effect of urbanization is relatively stronger in China. Urbanization is a key factor in energy demand, it therefore recommended that more attention should be given to the development of rural communities to reduce the inflow of migrants into urban communities which causes the increase in energy demand and energy excesses should be penalized while energy management should be incentivized.Keywords: economic growth, energy demand, income, real GDP, urbanization, VECM
Procedia PDF Downloads 31210298 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 1310297 Energy Analysis of Sugarcane Production: A Case Study in Metehara Sugar Factory in Ethiopia
Authors: Wasihun Girma Hailemariam
Abstract:
Energy is one of the key elements required for every agricultural activity, especially for large scale agricultural production such as sugarcane cultivation which mostly is used to produce sugar and bioethanol from sugarcane. In such kinds of resource (energy) intensive activities, energy analysis of the production system and looking for other alternatives which can reduce energy inputs of the sugarcane production process are steps forward for resource management. The purpose of this study was to determine input energy (direct and indirect) per hectare of sugarcane production sector of Metehara sugar factory in Ethiopia. Total energy consumption of the production system was 61,642 MJ/ha-yr. This total input energy is a cumulative value of different inputs (direct and indirect inputs) in the production system. The contribution of these different inputs is discussed and a scenario of substituting the most influential input by other alternative input which can replace the original input in its nutrient content was discussed. In this study the most influential input for increased energy consumption was application of organic fertilizer which accounted for 50 % of the total energy consumption. Filter cake which is a residue from the sugar production in the factory was used to substitute the organic fertilizer and the reduction in the energy consumption of the sugarcane production was discussedKeywords: energy analysis, organic fertilizer, resource management, sugarcane
Procedia PDF Downloads 15810296 How to Capitalize on BioCNG at a Wastewater Plant
Authors: William G. "Gus" Simmons
Abstract:
Municipal and industrial wastewater plants across our country utilize anaerobic digestion as either primary treatment or as a means of waste sludge treatment and reduction. The emphasis on renewable energy and clean energy over the past several years, coupled with increasing electricity costs and increasing consumer demands for efficient utility operations has led to closer examination of the potential for harvesting the energy value of the biogas produced by anaerobic digestion. Although some facilities may have already come to the belief that harvesting this energy value is not practical or a top priority as compared to other capital needs and initiatives at the wastewater plant, we see that many are seeing biogas, and an opportunity for additional revenues, go up in flames as they continue to flare. Conversely, few wastewater plants under progressive and visionary leadership have demonstrated that harvesting the energy value from anaerobic digestion is more than “smoke and hot air”. From providing thermal energy to adjacent or on-campus operations to generating electricity and/or transportation fuels, these facilities are proving that energy harvesting can not only be profitable, but sustainable. This paper explores ways in which wastewater treatment plants can increase their value and import to the communities they serve through the generation of clean, renewable energy; also presented the processes in which these facilities moved from energy and cost sinks to sparks of innovation and pride in the communities in which they operate.Keywords: anaerobic digestion, harvesting energy, biogas, renewable energy, sustainability
Procedia PDF Downloads 31710295 Assessment of Green Finance, Financial Technology and Financial Inclusion on Green Energy Efficiency in Pakistan
Authors: Muhammad Irfan
Abstract:
The UN General Assembly has advocated improving energy efficiency by SDG criteria to promote global economic growth. Pakistan is confronted with financial obstacles when it comes to acquiring energy efficiency because of the COVID-19 pandemic, economic and political instability, budgetary strains, and poor financial circumstances. The study examines how cutting-edge financing approaches like FinTech, financial inclusion, and green financing affect Pakistan's energy consumption. It finds noteworthy outcomes. The study's results have demonstrated the important impact of these funding methods on energy conservation. The best and most helpful finance tool for energy efficiency is green financing; yet, because of differences in characteristics, workings, and financial institutions, FinTech, and financial inclusion play a smaller role in Pakistan. The researchers propose that to achieve energy efficiency, FinTech activities and funding criteria such as green bonds should be reviewed. It also advised authorities to create energy system-friendly regulations for green finance in Pakistan.Keywords: green finance, FinTech, financial inclusion, energy efficiency, Pakistan
Procedia PDF Downloads 5110294 Remote Sensing Study of Wind Energy Potential in Agsu District
Authors: U. F. Mammadova
Abstract:
Natural resources is the main self-supplying way which is being studied in the paper. Ecologically clean and independent clean energy stock is wind one. This potential is first studied by applying remote sensing way. In any coordinate of the district, wind energy potential has been determined by measuring the potential by applying radar technique which gives a possibility to reveal 2 D view. At several heights, including 10,50,100,150,200 ms, the measurements have been realized. The achievable power generation for m2 in the district was calculated. Daily, hourly, and monthly wind energy potential data were graphed and schemed in the paper. The energy, environmental, and economic advantages of wind energy for the Agsu district were investigated by analyzing radar spectral measurements after the remote sensing process.Keywords: wind potential, spectral radar analysis, ecological clean energy, ecological safety
Procedia PDF Downloads 8610293 Challenges and Opportunities in Modelling Energy Behavior of Household in Malaysia
Authors: Zuhaina Zakaria, Noraliza Hamzah, Siti Halijjah Shariff, Noor Aizah Abdul Karim
Abstract:
The residential sector in Malaysia has become the single largest energy sector accounting for 21% of the entire energy usage of the country. In the past 10 years, a number of energy efficiency initiatives in the residential sector had been undertaken by the government including. However, there is no clear evidence that the total residential energy consumption has been reduced substantially via these strategies. Household electrical appliances such as air conditioners, refrigerators, lighting and televisions are used depending on the consumers’ activities. The behavior of household occupants played an important role in energy consumption and influenced the operation of the physical devices. Therefore, in order to ensure success in energy efficiency program, it requires not only the technological aspect but also the consumers’ behaviors component. This paper focuses on the challenges and opportunities in modelling residential consumer behavior in Malaysia. A field survey to residential consumers was carried out and responses from the survey were analyzed to determine the consumers’ level of knowledge and awareness on energy efficiency. The analyses will be used in determining a right framework to explain household energy use intentions and behavior. These findings will be beneficial to power utility company and energy regulator in addressing energy efficiency related issues.Keywords: consumer behavior theories, energy efficiency, household occupants, residential consumer
Procedia PDF Downloads 33310292 Food Waste Utilization: A Contemporary Prospect of Meeting Energy Crisis Using Microbial Fuel Cell
Authors: Bahareh Asefi, Fereidoun Farzaneh, Ghazaleh Asefi, Chang-Ping Yu
Abstract:
Increased production of food waste (FW) is a global issue that is receiving more attention due to its environmental and economic impacts. The generation of electricity from food waste, known as energy recovery, is one of the effective solutions in food waste management. Food waste has high energy content which seems ideal to achieve dual benefits in terms of energy recovery and waste stabilization. Microbial fuel cell (MFC) is a promising technology for treating food waste and generate electricity. In this work, we will review energy utilization from different kind of food waste using MFC and factors which affected the process. We have studied the key technology of energy generated from food waste using MFC to enhance the food waste management. The power density and electricity production by each kind of food waste and challenges were identified. This work explored the conversion of FW into energy from different type of food waste, which aim to provide a theoretical analysis for energy utilization of food waste.Keywords: energy generation, food waste, microbial fuel cell, power density
Procedia PDF Downloads 22910291 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 29910290 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16410289 Maximaxing the Usage of Solar Energy in an Area of Low Peak Sunlight Hours
Authors: Ohabuiro John Uwabunkeonye
Abstract:
Source of green energy is becoming a concern in developing countries where most energy source in use emits high level of carbon (IV) oxide which contributes to global warming. More so, even with the generation of energy from fossil fuel, the electricity supply is still very inadequate. Therefore, this paper examines different ways of designing and installing photovoltaic (PV) system in terms of optimal sizing of PV array and battery storage in an area of very low peak sunlight hours (PSH) and inadequate supply of electricity from utility companies. Different sample of Peak sunlight hour for selected areas in Nigeria are considered and the lowest of it all is taken. Some means of ensuring that the available solar energy is harnessed properly and converted into electrical energy are discussed for usage in such areas as mentioned above.Keywords: green energy, fossil fuel, peak sunlight hour, photovoltaic
Procedia PDF Downloads 64210288 Fuelwood Heating, Felling, Energy Renewing in Total Fueling of Fuelwood, Renewable Technologies
Authors: Adeiza Matthew, Oluwamishola Abubakar
Abstract:
In conclusion, Fuelwood is a traditional and renewable source of energy that can have both positive and negative impacts. Adopting sustainable practices for its collection, transportation, and use and investing in renewable technologies can help mitigate the negative effects and provide a clean and reliable source of energy, improve living standards and support economic development. For example, solar energy can be used to generate electricity, heat homes and water, and can even be used for cooking. Wind energy can be used to generate electricity, and geothermal energy can be used for heating and cooling. Biogas can be produced from waste products such as animal manure, sewage, and organic kitchen waste and can be used for cooking and lighting.Keywords: calorific, BTU, wood moisture content, density of wood
Procedia PDF Downloads 10710287 The Impact of Undocumented Migration on Human Security in Northern Nigeria
Authors: Targba Aondowase
Abstract:
Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.Keywords: human security, impact, migration, undocumented
Procedia PDF Downloads 33410286 Energy Consumption Modeling for Strawberry Greenhouse Crop by Adaptive Nero Fuzzy Inference System Technique: A Case Study in Iran
Authors: Azar Khodabakhshi, Elham Bolandnazar
Abstract:
Agriculture as the most important food manufacturing sector is not only the energy consumer, but also is known as energy supplier. Using energy is considered as a helpful parameter for analyzing and evaluating the agricultural sustainability. In this study, the pattern of energy consumption of strawberry greenhouses of Jiroft in Kerman province of Iran was surveyed. The total input energy required in the strawberries production was calculated as 113314.71 MJ /ha. Electricity with 38.34% contribution of the total energy was considered as the most energy consumer in strawberry production. In this study, Neuro Fuzzy networks was used for function modeling in the production of strawberries. Results showed that the best model for predicting the strawberries function had a correlation coefficient, root mean square error (RMSE) and mean absolute percentage error (MAPE) equal to 0.9849, 0.0154 kg/ha and 0.11% respectively. Regards to these results, it can be said that Neuro Fuzzy method can be well predicted and modeled the strawberry crop function.Keywords: crop yield, energy, neuro-fuzzy method, strawberry
Procedia PDF Downloads 38110285 Impact of Social Transfers on Energy Poverty in Turkey
Authors: Julide Yildirim, Nadir Ocal
Abstract:
Even though there are many studies investigating the extent and determinants of poverty, there is paucity of research investigating the issue of energy poverty in Turkey. The aim of this paper is threefold: First to investigate the extend of energy poverty in Turkey by using Household Budget Survey datasets belonging to 2005 - 2016 period. Second, to examine the risk factors for energy poverty. Finally, to assess the impact of social assistance program participation on energy poverty. Existing literature employs alternative methods to measure energy poverty. In this study energy poverty is measured by employing expenditure approach, where people are considered as energy poor if they disburse more than 10 per cent of their income to meet their energy requirements. Empirical results indicate that energy poverty rate is around 20 per cent during the time period under consideration. Since Household Budget Survey panel data is not available for 2005 - 2016 period, a pseudo panel has been constructed. Panel logistic regression method is utilized to determine the risk factors for energy poverty. The empirical results demonstrate that there is a statistically significant impact of work status and education level on energy poverty likelihood. In the final part of the paper the impact of social transfers on energy poverty has been examined by utilizing panel biprobit model, where social transfer participation and energy poverty incidences are jointly modeled. The empirical findings indicate that social transfer program participation reduces energy poverty. The negative association between energy poverty and social transfer program participation is more pronounced in urban areas compared with the rural areas.Keywords: energy poverty, social transfers, panel data models, Turkey
Procedia PDF Downloads 14210284 Energy Saving Stove for Stew Coconut Sugar
Authors: Ruedee Niyomrath
Abstract:
The purposes of this research is aim to build the energy saving stove for stew coconut sugar. The research started from explores ceramic raw materials in local area, create the appropriate mixture of ceramic raw materials for construction material of stove, and make it by ceramic process. It includes design and build the energy saving stove, experiment the efficiency of energy saving stove as to thermal efficiency, energy saving, performance of time, and energy cost efficiency, transfer the knowledge for community, stove manufacturers, and technicians. The findings must be useful to the coconut sugar enterprises producing, to reduce the cost of production, preserve natural resources, and environments.Keywords: ceramic raw material, energy saving stove, stove design, performance of stove, stove for stew coconut sugar
Procedia PDF Downloads 36110283 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 28410282 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 43710281 A Review of Sustainable Energy-Saving Solutions in Active and Passive Solar Systems of Zero Energy Buildings Based on the Internet of Things
Authors: Hanieh Sadat Jannesari, Hoori Jannesar, Alireza Hajian HosseinAbadi
Abstract:
In general, buildings are responsible for a considerable share of consumed energy and carbon emissions worldwide and play a significant role in formulating sustainable development strategies. Therefore, a lot of effort is put into the design and construction of zero-energy buildings (ZEBs) to help eliminate the problems associated with the reduction of energy resources and environmental degradation. Two strategies are significant in designing ZEBs: minimizing the need for energy utilization in buildings (particularly for cooling and heating) through highly energy-efficient designs and using renewable energies and other technologies to meet the remaining energy needs. This paper reviews the works related to these two strategies concerning sustainable energy-saving solutions using renewable energy technologies and the Internet of Things in ZEBs. Drawing on the theories and recently implemented projects of energy engineers in ZEBs, we have reported the required technologies within the framework of this paper’s objectives. Overall, solutions based on renewable and sustainable technologies such as photovoltaic (PV) modules, thermal collectors, Phase Change Material (PCM) techniques, etc., are used in active and passive systems designed for various applications in such buildings as cooling, heating, lighting, cooking, etc. The results obtained from examining these projects show that it is possible to minimize the amount of energy required to be produced for and consumed by these buildings.Keywords: active and passive renewable energy systems, internet of things, storage, zero energy buildings
Procedia PDF Downloads 2910280 Performance of Environmental Efficiency of Energy Iran and Other Middle East Countries
Authors: Bahram Fathi, Mahdi Khodaparast Mashhadi, Masuod Homayounifar
Abstract:
According to 1404 forecasting documentation, among the most fundamental ways of Iran’s success in competition with other regional countries are innovations, efficiency enhancements and domestic productivity. Therefore, in this study, the energy consumption efficiency of Iran and the neighbor countries has been measured in the period between 2007-2012 considering the simultaneous economic activities, CO2 emission, and consumption of energy through data envelopment analysis of undesirable output. The results of the study indicated that the energy efficiency changes in both Iran and the average neighbor countries has been on a descending trend and Iran’s energy efficiency status is not desirable compared to the other countries in the region.Keywords: energy efficiency, environmental, undesirable output, data envelopment analysis
Procedia PDF Downloads 448