Search results for: electrical power system security
23693 Pragmatic Analysis of the Effectiveness of a Power Conditioning Device (DC-DC Converters) in a Simple Photovoltaics System
Authors: Asowata Osamede
Abstract:
Solar radiation provides the largest renewable energy potential on earth and photovoltaics (PV) are considered a promising technological solution to support the global transformation to a low-carbon economy and reduce dependence on fossil fuels. The aim of this paper is to evaluate the efficiency of power conditioning devices with a focus on the Buck and Boost DC-DC converters (12 V, 24 V and 48 V) in a basic off grid PV system with a varying load profile. This would assist in harnessing more of the available solar energy. The practical setup consists of a PV panel that is set to an orientation angle of 0º N, with corresponding tilt angles. Preliminary results, which include data analysis showing the power loss in the system and efficiency, indicate that the 12V DC-DC converter coupled with the load profile had the highest efficiency for a latitude of 26º S throughout the year.Keywords: poly-crystalline PV panels, DC-DC converters, tilt and orientation angles, direct solar radiation, load profile
Procedia PDF Downloads 16223692 Effect of Parameters for Exponential Loads on Voltage Transmission Line with Compensation
Authors: Benalia Nadia, Bensiali Nadia, Zerzouri Noura
Abstract:
This paper presents an analysis of the effects of parameters np and nq for exponential load on the transmission line voltage profile, transferred power and transmission losses for different shunt compensation size. For different values for np and nq in which active and reactive power vary with it is terminal voltages as in exponential form, variations of the load voltage for different sizes of shunt capacitors are simulated with a simple two-bus power system using Matlab SimPowerSystems Toolbox. It is observed that the compensation level is significantly affected by the voltage sensitivities of loads.Keywords: static load model, shunt compensation, transmission system, exponentiel load model
Procedia PDF Downloads 36823691 Optimal Wind Based DG Placement Considering Monthly Changes Modeling in Wind Speed
Authors: Belal Mohamadi Kalesar, Raouf Hasanpour
Abstract:
Proper placement of Distributed Generation (DG) units such as wind turbine generators in distribution system are still very challenging issue for obtaining their maximum potential benefits because inappropriate placement may increase the system losses. This paper proposes Particle Swarm Optimization (PSO) technique for optimal placement of wind based DG (WDG) in the primary distribution system to reduce energy losses and voltage profile improvement with four different wind levels modeling in year duration. Also, wind turbine is modeled as a DFIG that will be operated at unity power factor and only one wind turbine tower will be considered to install at each bus of network. Finally, proposed method will be implemented on widely used 69 bus power distribution system in MATLAB software environment under four scenario (without, one, two and three WDG units) and for capability test of implemented program it is supposed that all buses of standard system can be candidate for WDG installing (large search space), though this program can consider predetermined number of candidate location in WDG placement to model financial limitation of project. Obtained results illustrate that wind speed increasing in some months will increase output power generated but this can increase / decrease power loss in some wind level, also results show that it is required about 3MW WDG capacity to install in different buses but when this is distributed in overall network (more number of WDG) it can cause better solution from point of view of power loss and voltage profile.Keywords: wind turbine, DG placement, wind levels effect, PSO algorithm
Procedia PDF Downloads 44823690 The Effects of Microstructure of Directionally Solidified Al-Si-Fe Alloys on Micro Hardness, Tensile Strength, and Electrical Resistivity
Authors: Sevda Engin, Ugur Buyuk, Necmettin Marasli
Abstract:
Directional solidification of eutectic alloys attracts considerable attention because of microhardness, tensile strength, and electrical resistivity influenced by eutectic structures. In this research, we examined processing of Al–Si–Fe (Al–11.7wt.%Si–1wt.%Fe) eutectic by directional solidification. The alloy was prepared by vacuum furnace and directionally solidified in Bridgman-type equipment. During the directional solidification process, the growth rates utilized varied from 8.25 m/s to 164.80 m/s. The Al–Si–Fe system showed an eutectic transformation, which resulted in the matrix Al, Si and Al5SiFe plate phases. The eutectic spacing between (λ_Si-λ_Si, λ_(Al_5 SiFe)-λ_(Al_5 SiFe)) was measured. Additionally, the microhardness, tensile strength, and electrical resistivity of the alloy were determined using directionally solidified samples. The effects of growth rates on microhardness, tensile strength, and electrical resistivity for directionally solidified Al–Si–Fe eutectic alloy were investigated, and the relationships between them were experimentally obtained. It was found that the microhardness, tensile strength, and electrical resistivity were affected by both eutectic spacing and the solidification parameter.Keywords: directional solidification, aluminum alloy, microstructure, electrical properties, tensile test, hardness test
Procedia PDF Downloads 29523689 Research on Malware Application Patterns of Using Permission Monitoring System
Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim
Abstract:
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.Keywords: malware patterns, application permission, application analysis, security
Procedia PDF Downloads 52323688 An Adder with Novel PMOS and NMOS for Ultra Low Power Applications in Deep Submicron Technology
Authors: Ch. Ashok Babu, J. V. R. Ravindra, K. Lalkishore
Abstract:
Power has became a burning issue in modern VLSI design. As the technology advances especially below 45nm, technology of leakage power became a big problem apart of the dynamic power. This paper presents a full adder with novel PMOS and NMOS which consume less power compare to conventional full adder, DTMOS full adder. This paper shows different types of adders and their power consumption, area, and delay. All the experiments have been carried out using Cadence® Virtuoso® design lay out editor which shows power consumption of different types of adders.Keywords: average power, leakage power, delay, DTMOS, PDP
Procedia PDF Downloads 38923687 Off-Policy Q-learning Technique for Intrusion Response in Network Security
Authors: Zheni S. Stefanova, Kandethody M. Ramachandran
Abstract:
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.Keywords: cyber security, intrusion prevention, optimal policy, Q-learning
Procedia PDF Downloads 23623686 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 16823685 The Transient Reactive Power Regulation Capability of SVC for Large Scale WECS Connected to Distribution Networks
Authors: Y. Ates, A. R. Boynuegri, M. Uzunoglu, A. Karakas
Abstract:
The recent interest in alternative and renewable energy systems results in increased installed capacity ratio of such systems in total energy production of the world. Specifically, wind energy conversion systems (WECS) draw significant attention among possible alternative energy options, recently. On the contrary of the positive points of penetrating WECS in all over the world in terms of environment protection, energy independence of the countries, etc., there are significant problems to be solved for the grid connection of large scale WECS. The reactive power regulation, voltage variation suppression, etc. can be presented as major issues to be considered in this regard. Thus, this paper evaluates the application of a Static VAr Compensator (SVC) unit for the reactive power regulation and operation continuity of WECS during a fault condition. The system is modeled employing the IEEE 13 node test system. Thus, it is possible to evaluate the system performance with an overall grid simulation model close to real grid systems. The overall simulation model is developed in MATLAB/Simulink/SimPowerSystems® environments and the obtained results effectively match the target of the provided study.Keywords: IEEE 13 bus distribution system, reactive power regulation, static VAr compensator, wind energy conversion system
Procedia PDF Downloads 73423684 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 25123683 Inter-Area Oscillation Monitoring in Maghrebian Power Grid Using Phasor Measurement Unit
Authors: M. Tsebia, H. Bentarzi
Abstract:
In the inter-connected power systems, a phenomenon called inter-area oscillation may be caused by several defects. In this paper, a study of the Maghreb countries inter-area power networks oscillation has been investigated. The inter-area oscillation monitoring can be enhanced by integrating Phasor Measurement Unit (PMU) technology installed in different places. The data provided by PMU and recorded by PDC will be used for the monitoring, analysis, and control purposes. The proposed approach has been validated by simulation using MATLAB/Simulink.Keywords: PMU, inter-area oscillation, Maghrebian power system, Simulink
Procedia PDF Downloads 36223682 Design and Implementation of the Embedded Control System for the Electrical Motor Based Cargo Vehicle
Authors: Syed M. Rizvi, Yiqing Meng, Simon Iwnicki
Abstract:
With an increased demand in the land cargo industry, it is predicted that the freight trade will rise to a record $1.1 trillion in revenue and volume in the following years to come. This increase is mainly driven by the e-commerce model ever so popular in the consumer market. Many innovative ideas have stemmed from this demand and change in lifestyle likes of which include e-bike cargo and drones. Rural and urban areas are facing air quality challenges to keep pollution levels in city centre to a minimum. For this purpose, this paper presents the design and implementation of a non-linear PID control system, employing a micro-controller and low cost sensing technique, for controlling an electrical motor based cargo vehicle with various loads, to follow a leading vehicle (bike). Within using this system, the cargo vehicle will have no load influence on the bike rider on different gradient conditions, such as hill climbing. The system is being integrated with a microcontroller to continuously measure several parameters such as relative displacement between bike and the cargo vehicle and gradient of the road, and process these measurements to create a portable controller capable of controlling the performance of electrical vehicle without the need of a PC. As a result, in the case of carrying 180kg of parcel weight, the cargo vehicle can maintain a reasonable spacing over a short length of sensor travel between the bike and itself.Keywords: cargo, e-bike, microcontroller, embedded system, nonlinear pid, self-adaptive, inertial measurement unit (IMU)
Procedia PDF Downloads 20723681 Wind Farm Power Performance Verification Using Non-Parametric Statistical Inference
Authors: M. Celeska, K. Najdenkoski, V. Dimchev, V. Stoilkov
Abstract:
Accurate determination of wind turbine performance is necessary for economic operation of a wind farm. At present, the procedure to carry out the power performance verification of wind turbines is based on a standard of the International Electrotechnical Commission (IEC). In this paper, nonparametric statistical inference is applied to designing a simple, inexpensive method of verifying the power performance of a wind turbine. A statistical test is explained, examined, and the adequacy is tested over real data. The methods use the information that is collected by the SCADA system (Supervisory Control and Data Acquisition) from the sensors embedded in the wind turbines in order to carry out the power performance verification of a wind farm. The study has used data on the monthly output of wind farm in the Republic of Macedonia, and the time measuring interval was from January 1, 2016, to December 31, 2016. At the end, it is concluded whether the power performance of a wind turbine differed significantly from what would be expected. The results of the implementation of the proposed methods showed that the power performance of the specific wind farm under assessment was acceptable.Keywords: canonical correlation analysis, power curve, power performance, wind energy
Procedia PDF Downloads 33623680 Comparison of Electrical Parameters of Oil-Immersed and Dry-Type Transformer Using Finite Element Method
Authors: U. Amin, A. Talib, S. A. Qureshi, M. J. Hossain, G. Ahmad
Abstract:
The choice evaluation between oil-immersed and dry-type transformers is often controlled by cost, location, and application. This paper compares the electrical performance of liquid- filled and dry-type transformers, which will assist the customer to choose the right and efficient ones for particular applications. An accurate assessment of the time-average flux density, electric field intensity and voltage distribution in an oil-insulated and a dry-type transformer have been computed and investigated. The detailed transformer modeling and analysis has been carried out to determine electrical parameter distributions. The models of oil-immersed and dry-type transformers are developed and solved by using the finite element method (FEM) to compare the electrical parameters. The effects of non-uniform and non-coherent voltage gradient, flux density and electric field distribution on the power losses and insulation properties of transformers are studied in detail. The results show that, for the same voltage and kilo-volt-ampere (kVA) rating, oil-immersed transformers have better insulation properties and less hysteresis losses than the dry-type.Keywords: finite element method, flux density, transformer, voltage gradient
Procedia PDF Downloads 29023679 A Review of Food Security Policy Research in Central Asia
Authors: Mergen Dyussenov
Abstract:
Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.Keywords: food security, central Asia, the role of actors, policy analysis
Procedia PDF Downloads 32623678 Effect of Al Contents on Magnetic Domains of {100} Grains in Electrical Steels
Authors: Hyunseo Choi, Jaewan Hong, Seil Lee, Yang Mo Koo
Abstract:
Non-oriented (NO) electrical steel is one of the most important soft magnetic materials for rotating machines. Si has usually been added to electrical steels to reduce eddy current loss by increasing the electrical resistivity. Si content more than 3.5 wt% causes cracks during cold rolling due to increase of brittleness. Al also increases the electrical resistivity of the materials as much as Si. In addition, cold workability of Fe-Al is better than Fe-Si, so that Al can be added up to 6.0 wt%. However, the effect of Al contents on magnetic properties of electrical steels has not been studied in detail. Magnetic domains of {100} grains in electrical steels, ranging from 1.85 to 6.54 wt% Al, were observed by magneto-optic Kerr microscopy. Furthermore, the correlation of magnetic domains with magnetic properties was investigated. As Al contents increased, the magnetic domain size of {100} grains decreased due to lowered domain wall energy. Reorganization of magnetic domain structure became more complex as domain size decreased. Therefore, the addition of Al to electrical steel caused hysteresis loss to increase. Anomalous loss decreased and saturated after 4.68% Al.Keywords: electrical steel, magnetic domain structure, Al addition, core loss, rearrangement of domains
Procedia PDF Downloads 24323677 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach
Authors: J. Waldon
Abstract:
The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.Keywords: safety, security, passengers, cargo
Procedia PDF Downloads 6723676 A Review Paper on Data Security in Precision Agriculture Using Internet of Things
Authors: Tonderai Muchenje, Xolani Mkhwanazi
Abstract:
Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.Keywords: precision agriculture, security, IoT, EIDE
Procedia PDF Downloads 9023675 Power Energy Management For A Grid-Connected PV System Using Rule-Base Fuzzy Logic
Authors: Nousheen Hashmi, Shoab Ahmad Khan
Abstract:
Active collaboration among the green energy sources and the load demand leads to serious issues related to power quality and stability. The growing number of green energy resources and Distributed-Generators need newer strategies to be incorporated for their operations to keep the power energy stability among green energy resources and micro-grid/Utility Grid. This paper presents a novel technique for energy power management in Grid-Connected Photovoltaic with energy storage system under set of constraints including weather conditions, Load Shedding Hours, Peak pricing Hours by using rule-based fuzzy smart grid controller to schedule power coming from multiple Power sources (photovoltaic, grid, battery) under the above set of constraints. The technique fuzzifies all the inputs and establishes fuzzify rule set from fuzzy outputs before defuzzification. Simulations are run for 24 hours period and rule base power scheduler is developed. The proposed fuzzy controller control strategy is able to sense the continuous fluctuations in Photovoltaic power generation, Load Demands, Grid (load Shedding patterns) and Battery State of Charge in order to make correct and quick decisions.The suggested Fuzzy Rule-based scheduler can operate well with vague inputs thus doesn’t not require any exact numerical model and can handle nonlinearity. This technique provides a framework for the extension to handle multiple special cases for optimized working of the system.Keywords: photovoltaic, power, fuzzy logic, distributed generators, state of charge, load shedding, membership functions
Procedia PDF Downloads 47923674 Protecting Privacy and Data Security in Online Business
Authors: Bilquis Ferdousi
Abstract:
With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.Keywords: privacy, data security, legislation, online business
Procedia PDF Downloads 10623673 Numerical Analysis of a Pilot Solar Chimney Power Plant
Authors: Ehsan Gholamalizadeh, Jae Dong Chung
Abstract:
Solar chimney power plant is a feasible solar thermal system which produces electricity from the Sun. The objective of this study is to investigate buoyancy-driven flow and heat transfer through a built pilot solar chimney system called 'Kerman Project'. The system has a chimney with the height and diameter of 60 m and 3 m, respectively, and the average radius of its solar collector is about 20 m, and also its average collector height is about 2 m. A three-dimensional simulation was conducted to analyze the system, using computational fluid dynamics (CFD). In this model, radiative transfer equation was solved using the discrete ordinates (DO) radiation model taking into account a non-gray radiation behavior. In order to modelling solar irradiation from the sun’s rays, the solar ray tracing algorithm was coupled to the computation via a source term in the energy equation. The model was validated with comparing to the experimental data of the Manzanares prototype and also the performance of the built pilot system. Then, based on the numerical simulations, velocity and temperature distributions through the system, the temperature profile of the ground surface and the system performance were presented. The analysis accurately shows the flow and heat transfer characteristics through the pilot system and predicts its performance.Keywords: buoyancy-driven flow, computational fluid dynamics, heat transfer, renewable energy, solar chimney power plant
Procedia PDF Downloads 26223672 Technical and Vocational Education and Technology Transfer: Departments of Electrical Engineering at the Public Authority for Applied Education and Training, PAAE&T, Kuwait, a case Study
Authors: Salah Al-Ali
Abstract:
The role of technology transfer in technical and vocational education is significant since lecturers, trainers, and students can obtain the updated knowledge, skills, and attitudes that are currently being practiced by local and international businesses and industries. Technology transfer can indeed close the gap between what is being learned and practiced in technical and vocational institutions and the world of work. However, the success of technology transfer in technical and vocational education perspectives would depend entirely on the quality of management. It is their responsibility when signing an agreement with internal or external providers of technology, to include calluses that enable academic staff in related specialty to interact positively and freely with the supplier of technology. In other terms, ensuring no clear or hidden restriction is imposed by the supplier of technology to acquire the know-how and know-why that are embedded in the agreement. In this paper, I present some of the empirical results and observations which describe the interactions between the supplier of technology (Electrical Engineering System) and the recipient of the technology (PAAE&T) in the field of technology transfer. In another word, whether the PAAE&T have taken the opportunity while building its new headquarter, the transfer of technology from the supplier of an electrical engineering system to its academic staff in its various Electrical Engineering Academic Departments at the PAAE&T colleges and institutions. The paper argues that, for effective and efficient transfer of technology, the recipient (PAAE&T) must ensure that the agreement with the supplier of the Electrical Engineering System must include calluses that would allow the PAAE&T academic staff in its various Electrical Engineering Academic Departments in its various colleges and institutions to acquire the technology embedded in the agreement. The paper concludes that the transfer of technology and the building of a local scientific and technical infrastructure must be viewed by Kuwaiti decision-makers as complementary to one another. Thus, reducing, to great extent, the level of dependence on expatriates, particularly in the essential sectors of the economy.Keywords: vocational and technical education, technology transfer, enhancing indigenous capabilities, Kuwait
Procedia PDF Downloads 13723671 Transfigurative Changes of Governmental Responsibility
Authors: Ákos Cserny
Abstract:
The unequivocal increase of the area of operation of the executive power can happen with the appearance of new areas to be influenced and its integration in the power, or at the expense of the scopes of other organs with public authority. The extension of the executive can only be accepted within the framework of the rule of law if parallel with this process we get constitutional guarantees that the exercise of power is kept within constitutional framework. Failure to do so, however, may result in the lack, deficit of democracy and democratic sense, and may cause an overwhelming dominance of the executive power. Therefore, the aim of this paper is to present executive power and responsibility in the context of different dimensions.Keywords: confidence, constitution, executive power, liabiliy, parliamentarism
Procedia PDF Downloads 40223670 Adjustable Counter-Weight for Full Turn Rotary Systems
Authors: G. Karakaya, C. Türker, M. Anaklı
Abstract:
It is necessary to test to see if optical devices such as camera, night vision devices are working properly. Therefore, a precision biaxial rotary system (gimbal) is required for mounting Unit Under Test, UUT. The Gimbal systems can be utilized for precise positioning of the UUT; hence, optical test can be performed with high accuracy. The weight of UUT, which is placed outside the axis of rotation, causes an off-axis moment to the mounting armature. The off-axis moment can act against the direction of movement for some orientation, thus the electrical motor, which rotates the gimbal axis, has to apply higher level of torque to guide and stabilize the system. Moreover, UUT and its mounting fixture to the gimbal can be changed, which causes change in applied resistance moment to the gimbals electrical motor. In this study, a preloaded spring is added to the gimbal system for minimizing applied off axis moment with the help of four bar mechanism. Two different possible methods for preloading spring are introduced and system optimization is performed to eliminate all moment which is created by off axis weight.Keywords: adaptive, balancing, gimbal, mechanics, spring
Procedia PDF Downloads 12123669 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019
Authors: Anas Abdulrahman A. Almiman
Abstract:
In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic
Procedia PDF Downloads 19623668 Foucault and Governmentality: International Organizations and State Power
Authors: Sara Dragisic
Abstract:
Using the theoretical analysis of the birth of biopolitics that Foucault performed through the history of liberalism and neoliberalism, in this paper we will try to show how, precisely through problematizing the role of international institutions, the model of governance differs from previous ways of objectifying body and life. Are the state and its mechanisms still a Leviathan to fight against, or can it be even the driver of resistance against the proponents of modern governance and the biopolitical power? Do paradigmatic examples of biopolitics still appear through sovereignty and (international) law, or is it precisely this sphere that shows a significant dose of incompetence and powerlessness in relation to, not only the economic sphere (Foucault’s critique of neoliberalism) but also the new politics of freedom? Have the struggle for freedom and human rights, as well as the war on terrorism, opened a new spectrum of biopolitical processes, which are manifested precisely through new international institutions and humanitarian discourse? We will try to answer these questions, in the following way. On the one hand, we will show that the views of authors such as Agamben and Hardt and Negri, in whom the state and sovereignty are seen as enemies to be defeated or overcome, fail to see how such attempts could translate into the politicization of life like it is done in many examples through the doctrine of liberal interventionism and humanitarianism. On the other hand, we will point out that it is precisely the humanitarian discourse and the defense of the right to intervention that can be the incentive and basis for the politicization of the category of life and lead to the selective application of human rights. Zizek example of the killing of United Nations workers and doctors in a village during the Vietnam War, who were targeted even before police or soldiers, because they were precisely seen as a powerful instrument of American imperialism (as they were sincerely trying to help the population), will be focus of this part of the analysis. We’ll ask the question whether such interpretation is a kind of liquidation of the extreme left of the political (Laclau) or on this basis can be explained at least in part the need to review the functioning of international organizations, ranging from those dealing with humanitarian aid (and humanitarian military interventions) to those dealing with protection and the security of the population, primarily from growing terrorism. Based on the above examples, we will also explain how the discourse of terrorism itself plays a dual role: it can appear as a tool of liberal biopolitics, although, more superficially, it mostly appears as an enemy that wants to destroy the liberal system and its values. This brings us to the basic problem that this paper will tackle: do the mechanisms of institutional struggle for human rights and freedoms, which is often seen as opposed to the security mechanisms of the state, serve the governance of citizens in such a way that the latter themselves participate in producing biopolitical governmental practices? Is the freedom today "nothing but the correlative development of apparatuses of security" (Foucault)? Or, we can continue this line of Foucault’s argumentation and enhance the interpretation with the important question of what precisely today reflects the change in the rationality of governance in which society is transformed from a passive object into a subject of its own production. Finally, in order to understand the skills of biopolitical governance in modern civil society, it is necessary to pay attention to the status of international organizations, which seem to have become a significant place for the implementation of global governance. In this sense, the power of sovereignty can turn out to be an insufficiently strong power of security policy, which can go hand in hand with freedom policies, through neoliberal governmental techniques.Keywords: neoliberalism, Foucault, sovereignty, biopolitics, international organizations, NGOs, Agamben, Hardt&Negri, Zizek, security, state power
Procedia PDF Downloads 20623667 Estimation of Carbon Losses in Rice: Wheat Cropping System of Punjab, Pakistan
Authors: Saeed Qaisrani
Abstract:
The study was conducted to observe carbon and nutrient loss by burning of rice residues on rice-wheat cropping system The rice crop was harvested to conduct the experiment in a randomized complete block design (RCBD) with factors and 4 replications with a net plot size of 10 m x 20 m. Rice stubbles were managed by two methods i.e. Incorporation & burning of rice residues. Soil samples were taken to a depth of 30 cm before sowing & after harvesting of wheat. Wheat was sown after harvesting of rice by three practices i.e. Conventional tillage, Minimum tillage and Zero tillage to observe best tillage practices. Laboratory and field experiments were conducted on wheat to assess best tillage practice and residues management method with estimation of carbon losses. Data on the following parameters; establishment count, plant height, spike length, number of grains per spike, biological yield, fat content, carbohydrate content, protein content, and harvest index were recorded to check wheat quality & ensuring food security in the region. Soil physico-chemical analysis i.e. pH, electrical conductivity, organic matter, nitrogen, phosphorus, potassium, and carbon were done in soil fertility laboratory. Substantial results were found on growth, yield and related parameters of wheat crop. The collected data were examined statistically with economic analysis to estimate the cost-benefit ratio of using different tillage techniques and residue management practices. Obtained results depicted that Zero tillage method have positive impacts on growth, yield and quality of wheat, Moreover, it is cost effective methodology. Similarly, Incorporation is suitable and beneficial method for soil due to more nutrients provision and reduce the need of fertilizers. Burning of rice stubbles has negative impact including air pollution, nutrient loss, microbes died and carbon loss. Recommended the zero tillage technology to reduce carbon losses along with food security in Pakistan.Keywords: agricultural agronomy, food security, carbon sequestration, rice-wheat cropping system
Procedia PDF Downloads 27723666 Evolution of Floating Photovoltaic System Technology and Future Prospect
Authors: Young-Kwan Choi, Han-Sang Jeong
Abstract:
Floating photovoltaic system is a technology that combines photovoltaic power generation with floating structure. However, since floating technology has not been utilized in photovoltaic generation, there are no standardized criteria. It is separately developed and used by different installation bodies. This paper aims to discuss the change of floating photovoltaic system technology based on examples of floating photovoltaic systems installed in Korea.Keywords: floating photovoltaic system, floating PV installation, ocean floating photovoltaic system, tracking type floating photovoltaic system
Procedia PDF Downloads 56023665 Wind Generator Control in Isolated Site
Authors: Glaoui Hachemi
Abstract:
Wind has been proven as a cost effective and reliable energy source. Technological advancements over the last years have placed wind energy in a firm position to compete with conventional power generation technologies. Algeria has a vast uninhabited land area where the south (desert) represents the greatest part with considerable wind regime. In this paper, an analysis of wind energy utilization as a viable energy substitute in six selected sites widely distributed all over the south of Algeria is presented. In this presentation, wind speed frequency distributions data obtained from the Algerian Meteorological Office are used to calculate the average wind speed and the available wind power. The annual energy produced by the Fuhrlander FL 30 wind machine is obtained using two methods. The analysis shows that in the southern Algeria, at 10 m height, the available wind power was found to vary between 160 and 280 W/m2, except for Tamanrasset. The highest potential wind power was found at Adrar, with 88 % of the time the wind speed is above 3 m/s. Besides, it is found that the annual wind energy generated by that machine lie between 33 and 61 MWh, except for Tamanrasset, with only 17 MWh. Since the wind turbines are usually installed at a height greater than 10 m, an increased output of wind energy can be expected. However, the wind resource appears to be suitable for power production on the south and it could provide a viable substitute to diesel oil for irrigation pumps and electricity generation. In this paper, a model of the wind turbine (WT) with permanent magnet generator (PMSG) and its associated controllers is presented. The increase of wind power penetration in power systems has meant that conventional power plants are gradually being replaced by wind farms. In fact, today wind farms are required to actively participate in power system operation in the same way as conventional power plants. In fact, power system operators have revised the grid connection requirements for wind turbines and wind farms, and now demand that these installations be able to carry out more or less the same control tasks as conventional power plants. For dynamic power system simulations, the PMSG wind turbine model includes an aerodynamic rotor model, a lumped mass representation of the drive train system and generator model. In this paper, we propose a model with an implementation in MATLAB / Simulink, each of the system components off-grid small wind turbines.Keywords: windgenerator systems, permanent magnet synchronous generator (PMSG), wind turbine (WT) modeling, MATLAB simulink environment
Procedia PDF Downloads 33723664 Steady State Analysis of Distribution System with Wind Generation Uncertainity
Authors: Zakir Husain, Neem Sagar, Neeraj Gupta
Abstract:
Due to the increased penetration of renewable energy resources in the distribution system, the system is no longer passive in nature. In this paper, a steady state analysis of the distribution system has been done with the inclusion of wind generation. The modeling of wind turbine generator system and wind generator has been made to obtain the average active and the reactive power injection into the system. The study has been conducted on a IEEE-33 bus system with two wind generators. The present research work is useful not only to utilities but also to customers.Keywords: distributed generation, distribution network, radial network, wind turbine generating system
Procedia PDF Downloads 405