Search results for: energy security policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14125

Search results for: energy security policy

13345 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 301
13344 The Relationships between Carbon Dioxide (CO2) Emissions, Energy Consumption and GDP for Israel: Time Series Analysis, 1980-2010

Authors: Jinhoa Lee

Abstract:

The relationships between environmental quality, energy use and economic output have created growing attention over the past decades among researchers and policy makers. Focusing on the empirical aspects of the role of CO2 emissions and energy use in affecting the economic output, this paper is an effort to fulfill the gap in a comprehensive case study at a country level using modern econometric techniques. To achieve the goal, this country-specific study examines the short-run and long-run relationships among energy consumption (using disaggregated energy sources: crude oil, coal, natural gas, electricity), carbon dioxide (CO2) emissions and gross domestic product (GDP) for Israel using time series analysis from the year 1980-2010. To investigate the relationships between the variables, this paper employs the Phillips–Perron (PP) test for stationarity, Johansen maximum likelihood method for cointegration and a Vector Error Correction Model (VECM) for both short- and long-run causality among the research variables for the sample. The long-run equilibrium in the VECM suggests significant positive impacts of coal and natural gas consumptions on GDP in Israel. In the short run, GDP positively affects coal consumption. While there exists a positive unidirectional causality running from coal consumption to consumption of petroleum products and the direct combustion of crude oil, there exists a negative unidirectional causality running from natural gas consumption to consumption of petroleum products and the direct combustion of crude oil in the short run. Overall, the results support arguments that there are relationships among environmental quality, energy use and economic output but the associations can to be differed by the sources of energy in the case of Israel over of period 1980-2010.

Keywords: CO2 emissions, energy consumption, GDP, Israel, time series analysis

Procedia PDF Downloads 650
13343 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 206
13342 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 75
13341 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 291
13340 Energy Transition and Investor-State Disputes: Scientific Knowledge as a Solution to the Burden for Climate Policy-Making

Authors: Marina E. Konstantinidi

Abstract:

It is now well-established that the fight against climate change and its consequences, which are a threat to mankind and to life on the planet Earth, requires that global temperature rise be kept under 1,5°C. It is also well-established that this requires humanity to put an end to the use of fossil fuels in the next decades, at the latest. However, investors in the fossil energy sector have brought or threatened to bring investment arbitration claims against States which put an end to their activity for the purpose of reaching their climate change policies’ objectives. Examples of such claims are provided by the cases of WMH v. Canada, Lone Pine v. Canada, Uniper v. Netherlands and RWE v. Netherlands. Irrespective of the outcome of the arbitration proceedings, the risk of being ordered to pay very substantial damages may have a ‘chilling effect’ on States, meaning that they may hesitate to implement the energy transition measures needed to fight climate change and its consequences. Although mitigation action is a relatively recent phenomenon, knowledge about the negative impact of fossil fuels has existed for a long time ago. In this paper, it is argued that structured documentation of evidence of knowledge about climate change may influence the adjudication of investment treaty claims and, consequently, affect the content of energy transition regulations that will be implemented. For example, as concerns investors, evidence that change in the regulatory framework towards environmental protection could have been predicted would refute the argument concerning legitimate expectations for legislative stability. By reference to relevant case law, it attempted to explore how pre-existing knowledge about climate change can be used in the adjudication of investor-State disputes and resulting from green energy transition policies.

Keywords: climate change, energy transition, international investment law, knowledge

Procedia PDF Downloads 99
13339 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 430
13338 Influence of Vacuum Pressure on the Thermal Bonding Energy of Water in Wood

Authors: Aleksandar Dedic, Dusko Salemovic, Milorad Danilovic, Radomir Kuzmanovic

Abstract:

This paper takes into consideration the influence of bonding energy of water on energy demand of vacuum wood drying using the specific method of obtaining sorption isotherms. The experiment was carried out on oak wood at vacuum pressures of: 0.7 bar, 0.5bar and 0.3bar. The experimental work was done to determine a mathematical equation between the moisture content and energy of water-bonding. This equation helps in finding the average amount of energy of water-bonding necessary in calculation of energy consumption by use of the equation of heat balance in real drying chambers. It is concluded that the energy of water-bonding is large enough to be included into consideration. This energy increases at lower values of moisture content, when drying process approaches to the end, and its average values are lower on lower pressure.

Keywords: bonding energy, drying, isosters, oak, vacuum

Procedia PDF Downloads 273
13337 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 330
13336 Evaluating Oman's Green Transition: A Dynamic Stochastic General Equilibrium Analysis of Climate Policy Effects

Authors: Mohamed Chakroun

Abstract:

In this paper, we analyze the macroeconomic impacts of Oman’s strategy to transition to a green economy by 2050. Our objective is to determine the most effective climate policy instrument to facilitate this transition. By utilizing a Dynamic Stochastic General Equilibrium (DSGE) model, we assess the effectiveness of three climate policy tools: a carbon tax, subsidies to green assets, and taxes on brown assets. Our results indicate that a combination of a carbon tax, along with differentiated taxes and subsidies on green and brown assets, proves to the most effective policy in reducing emissions while maintaining macroeconomic stability. The findings of this study demonstrate the need for policymakers to balance the immediate goals of reducing emissions with the economic costs involved. Implementing a gradual transition strategy may be preferable as it allows for mitigating the negative economic impacts while facilitating the shift towards a green economy.

Keywords: green economy, carbon tax, DSGE model, climate policy, sustainable growth

Procedia PDF Downloads 24
13335 Knowledge, Attitude and Compliance of Secondary School Students Towards School Discipline Policy in Ibadan North Local Government Area of Oyo State, Nigeria

Authors: S. Yakubu, E. A. Isah

Abstract:

One of the objectives of the school discipline policy is to instill discipline among students. However, despite the availability of this policy in various secondary schools in Nigeria, there seem to be numerous cases of indiscipline among students, which has become a source of concern to all stakeholders in the education sector. In an attempt to proffer possible solutions to this unending challenge, the study investigated the influence of knowledge and attitude on compliance of secondary school students towards school discipline policy in Ibadan North Local Government Area of Oyo State, Nigeria. The descriptive survey research design was employed to collect the requisite data. The multi-stage sampling procedure was adopted to select 570 respondents as the sample for the study. The data collected were analyzed using statistical measures of Mean, Standard deviation and Pearson Product Moment Correlation. The findings of the study showed that knowledge and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State were significantly related (r =0.330, p<0.05). The study also revealed a significant relationship between attitude and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State (r = 0.593, p<0.05). Based on the findings, it was recommended that school rules and regulations should be emphasized and given more awareness for easy compliance. Also, students should be encouraged to portray a positive attitude towards their respective rules and regulations.

Keywords: knowledge, attitude, compliance, school discipline policy

Procedia PDF Downloads 186
13334 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 153
13333 Rethinking Nigeria's Foreign Policy in the Age of Global Terrorism

Authors: Shuaibu Umar Abdul

Abstract:

This paper examines Nigeria’s foreign policy in the age of global terrorism. It worth saying that the threat of ‘terrorism’ is not peculiar to Western and Middle Eastern countries alone, its tentacles are now spreading all over, Africa inclusive. The issue of domestic terrorism in Nigeria has become pervasive since the return of democratic rule in 1999. This development has never been a witness in any form throughout the year of statehood in Nigeria, the issues of banditry, armed robbery, ritual killing, and criminal activities like kidnapping and pipeline vandalization, the breakdown of law and order, poorly managed infrastructural facilities and corruption remain synonymous to Nigeria. These acts of terrorism no doubt have constituted a challenge that necessitates the paradigm shift in Nigeria’s foreign policy. The study employed the conceptual framework of analysis to lead interrogation; secondary sources were used to generate data while descriptive and content analysis were considered for data presentation and interpretation. In view of the interrogation and discussion on the subject matter, the paper revealed that Nigerian government underrated and underestimated the strength of terrorism within and outside her policy hence, it becomes difficult to address. As a response to the findings and conclusion of the study, the paper recommends among others that Nigeria’s foreign policy has to be rethought, reshaped and remodeled in cognizance to the rising global terrorism for peace, growth and development in the country.

Keywords: foreign policy, globe, Nigeria, rethinking, terrorism

Procedia PDF Downloads 358
13332 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 97
13331 The Impact of Corporate Governance Attributes on Dividends Payouts Policy: Evidence from the Emerging Capital Market of Jordan

Authors: Amneh Alkurdi, Yasean Tahat, Hamzeh Almuali

Abstract:

Purpose: The primary objective of the present paper is to examine the impact of CG attributes, including the board size, independency, separation and managerial ownership) on firm dividend payouts policy; using a sample of 72 Jordanian listed companies for the period of 2007-2013. Methodology: The study does manually review the sample firm’s annual reports for data collection and use OLS regression to carry out this investigation. Findings: The findings indicate that CG attributes have a strong impact on dividend payouts policy. In particular, board size, independency and separation have had significant associations with dividends payouts indicating that such variables matter when determining on dividends which may mitigate the conflicts between stakeholders’ and managers’ interests. The results also indicate that managerial ownership has had no significant impact on the dividends policy suggesting that managers do not use the strength of their position to influence the dividends policy. Finally, the results show that firm size and profitability have had statistically positive associations with dividend payouts, while this was not the case for firm leverage and growth where significant and positive relationships were documented. Originality/implication: The current paper extends the extant literature in this field by investigating the impact of the board composition on dividends and provides some insights for policy makers in emerging markets.

Keywords: corporate governance, dividends payouts policy, jordan, accounting

Procedia PDF Downloads 192
13330 Methodology of Choosing Technology and Sizing of the Hybrid Energy Storage Based on Cost-benefit Analysis

Authors: Krzysztof Rafał, Weronika Radziszewska, Hubert Biedka, Oskar Grabowski, Krzysztof Mik

Abstract:

We present a method to choose energy storage technologies and their parameters for the economic operation of a microgrid. A grid-connected system with local loads and PV generation is assumed, where an energy storage system (ESS) is attached to minimize energy cost by providing energy balancing and arbitrage functionalities. The ESS operates in a hybrid configuration and consists of two unique technologies operated in a coordinated way. Based on given energy profiles and economical data a model calculates financial flow for ESS investment, including energy cost and ESS depreciation resulting from degradation. The optimization strategy proposes a hybrid set of two technologies with their respective power and energy ratings to minimize overall system cost in a given timeframe. Results are validated through microgrid simulations using real-life input profiles.

Keywords: energy storage, hybrid energy storage, cost-benefit analysis, microgrid, battery sizing

Procedia PDF Downloads 219
13329 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security

Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone

Abstract:

One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.

Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden

Procedia PDF Downloads 16
13328 Optimized Renewable Energy Mix for Energy Saving in Waste Water Treatment Plants

Authors: J. D. García Espinel, Paula Pérez Sánchez, Carlos Egea Ruiz, Carlos Lardín Mifsut, Andrés López-Aranguren Oliver

Abstract:

This paper shortly describes three main actuations over a Waste Water Treatment Plant (WWTP) for reducing its energy consumption: Optimization of the biological reactor in the aeration stage by including new control algorithms and introducing new efficient equipment, the installation of an innovative hybrid system with zero Grid injection (formed by 100kW of PV energy and 5 kW of mini-wind energy generation) and an intelligent management system for load consumption and energy generation control in the most optimum way. This project called RENEWAT, involved in the European Commission call LIFE 2013, has the main objective of reducing the energy consumptions through different actions on the processes which take place in a WWTP and introducing renewable energies on these treatment plants, with the purpose of promoting the usage of treated waste water for irrigation and decreasing the C02 gas emissions. WWTP is always required before waste water can be reused for irrigation or discharged in water bodies. However, the energetic demand of the treatment process is high enough for making the price of treated water to exceed the one for drinkable water. This makes any policy very difficult to encourage the re-use of treated water, with a great impact on the water cycle, particularly in those areas suffering hydric stress or deficiency. The cost of treating waste water involves another climate-change related burden: the energy necessary for the process is obtained mainly from the electric network, which is, in most of the cases in Europe, energy obtained from the burning of fossil fuels. The innovative part of this project is based on the implementation, adaptation and integration of solutions for this problem, together with a new concept of the integration of energy input and operative energy demand. Moreover, there is an important qualitative jump between the technologies used and the alleged technologies to use in the project which give it an innovative character, due to the fact that there are no similar previous experiences of a WWTP including an intelligent discrimination of energy sources, integrating renewable ones (PV and Wind) and the grid.

Keywords: aeration system, biological reactor, CO2 emissions, energy efficiency, hybrid systems, LIFE 2013 call, process optimization, renewable energy sources, wasted water treatment plants

Procedia PDF Downloads 352
13327 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
13326 Industrial Policy Directions in Georgia

Authors: Nino Grigolaia

Abstract:

Introduction - The paper discusses the role of industrial policy in the development of the economy in the country. The main challenges on the way to the implementation of industrial policy are analyzed: the long-term period of industrial policy, the risk of changes in priorities, the limited scope and external shocks. Methodology - Various research methods are used in the paper. The methods of induction, deduction, analysis, synthesis, analogy, correlation and statistical observation are used. Main Findings - Based on the analysis of the current situation in Georgia, the obstacles to the country's industrialization and its supporting factors are identified. Also, the challenges of the country's core industrial policies are revealed. Specific industry development strategies, ways of state support and main directions of new industrial policies are identified. Conclusion - The paper concludes that the development of the industrial sector is critical for the future growth and development of the Georgian economy, which will accelerate the industrialization and structural transformation processes, reduce the trade deficit, increase the exports and create more jobs in the country. The listed changes will guarantee the improvement of the socio-economic situation of the population. Accordingly, it is revealed that the study of industrial policy in Georgia is still actual. Based on the analysis, relevant conclusions in the field of industrialization of the country are developed and recommendations are proposed.

Keywords: industrialization , industrial policy, industrialization of the economy, Georgia priorities

Procedia PDF Downloads 191
13325 Research on Energy-Related Occupant Behavior of Residential Air Conditioning Based on Zigbee Intelligent Electronic Equipment

Authors: Dawei Xia, Benyan Jiang, Yong Li

Abstract:

Split-type air conditioners is widely used for indoor temperature regulation in urban residential buildings in summer in China. The energy-related occupant behavior has a great impact on building energy consumption. Obtaining the energy-related occupant behavior data of air conditioners is the research basis for the energy consumption prediction and simulation. Relying on the development of sensing and control technology, this paper selects Zigbee intelligent electronic equipment to monitor the energy-related occupant behavior of 20 households for 3 months in summer. Through analysis of data, it is found that people of different ages in the region have significant difference in the time, duration, frequency, and energy consumption of air conditioners, and form a data model of three basic energy-related occupant behavior patterns to provide an accurate simulation of energy.

Keywords: occupant behavior, Zigbee, split air conditioner, energy simulation

Procedia PDF Downloads 196
13324 Optimization of Energy Consumption with Various Design Parameters on Office Buildings in Chinese Severe Cold Zone

Authors: Yuang Guo, Dewancker Bart

Abstract:

The primary energy consumption of buildings throughout China was approximately 814 million tons of coal equivalents in 2014, which accounts for 19.12% of China's total primary energy consumption. Also, the energy consumption of public buildings takes a bigger share than urban residential buildings and rural residential buildings among the total energy consumption. To improve the level of energy demand, various design parameters were chosen. Meanwhile, a series of simulations by Energy Plus (EP-Launch) is performed using a base case model established in Open Studio. Through the results, 16%-23% of total energy demand reductions can be found in the severe cold zone of China, and it can also provide a reference for the architectural design of other similar climate zones.

Keywords: energy consumption, design parameters, indoor thermal comfort, simulation study, severe cold climate zone

Procedia PDF Downloads 156
13323 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
13322 Fracture Energy Corresponding to the Puncture/Cutting of Nitrile Rubber by Pointed Blades

Authors: Ennouri Triki, Toan Vu-Khanh

Abstract:

Resistance to combined puncture/cutting by pointed blades is an important property of gloves materials. The purpose of this study is to propose an approach derived from the fracture mechanics theory to calculate the fracture energy associated to the puncture/cutting of nitrile rubber. The proposed approach is also based on the application of a sample pre-strained during the puncture/cutting test in order to remove the contribution of friction. It was validated with two different pointed blade angles of 22.5° and 35°. Results show that the applied total fracture energy corresponding to puncture/cutting is controlled by three energies, one is the fracture energy or the intrinsic strength of the material, the other reflects the friction energy between a pointed blade and the material. For an applied pre-strain energy (or tearing energy) of high value, the friction energy is completely removed. Without friction, the total fracture energy is constant. In that case, the fracture contribution of the tearing energy is marginal. Growth of the crack is thus completely caused by the puncture/cutting by a pointed blade. Finally, results suggest that the value of the fracture energy corresponding to puncture/cutting by pointed blades is obtained at a frictional contribution of zero.

Keywords: elastomer, energy, fracture, friction, pointed blades

Procedia PDF Downloads 305
13321 An Analysis of Energy Use and Input Level for Tomato Production in Turkey

Authors: Hasan Vural

Abstract:

The purpose of this study was to determine energy equivalents of inputs and output in tomato production in Bursa province. The data in this study were collected from tomato farms in Bursa province, Karacabey and Mustafakemalpasa district. Questionnaires were administered through face-to-face interview in 2011-2012. The results of the study show that diesel have the highest rate of energy equivalency of all the inputs used in tomato production at 60,07%. The energy equivalent rate of electricity is 4,26% and the energy equivalent rate of water is 0,87%. The energy equivalent rates for human power, machinery, chemicals and water for irrigation were determined to be low in tomato production. According to the output/input ratio calculated, the energy ratio is 1,50 in tomato production in the research area. This ratio implies that the inputs used in tomato production have not been used effectively. Ineffective use of these resources also causes environmental problems.

Keywords: Tomato production, energy ratio, energy input, Turkey

Procedia PDF Downloads 231
13320 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
13319 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 76
13318 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 392
13317 Comparison of Two Maintenance Policies for a Two-Unit Series System Considering General Repair

Authors: Seyedvahid Najafi, Viliam Makis

Abstract:

In recent years, maintenance optimization has attracted special attention due to the growth of industrial systems complexity. Maintenance costs are high for many systems, and preventive maintenance is effective when it increases operations' reliability and safety at a reduced cost. The novelty of this research is to consider general repair in the modeling of multi-unit series systems and solve the maintenance problem for such systems using the semi-Markov decision process (SMDP) framework. We propose an opportunistic maintenance policy for a series system composed of two main units. Unit 1, which is more expensive than unit 2, is subjected to condition monitoring, and its deterioration is modeled using a gamma process. Unit 1 hazard rate is estimated by the proportional hazards model (PHM), and two hazard rate control limits are considered as the thresholds of maintenance interventions for unit 1. Maintenance is performed on unit 2, considering an age control limit. The objective is to find the optimal control limits and minimize the long-run expected average cost per unit time. The proposed algorithm is applied to a numerical example to compare the effectiveness of the proposed policy (policy Ⅰ) with policy Ⅱ, which is similar to policy Ⅰ, but instead of general repair, replacement is performed. Results show that policy Ⅰ leads to lower average cost compared with policy Ⅱ. 

Keywords: condition-based maintenance, proportional hazards model, semi-Markov decision process, two-unit series systems

Procedia PDF Downloads 123
13316 An Empirical Investigation of Uncertainty and the Lumpy Investment Channel of Monetary Policy

Authors: Min Fang, Jiaxi Yang

Abstract:

Monetary policy could be less effective at stimulating investment during periods of elevated volatility than during normal times. In this paper, we argue that elevated volatility leads to a decrease in extensive margin investment incentive so that nominal stimulus generates less aggregate investment. To do this, we first empirically document that high volatility weakens firms’ investment responses to monetary stimulus. Such effects depend on the lumpiness nature of the firm-level investment. The findings are that the channel exists for all of the physical investment, innovation investment, and organization investment.

Keywords: investment, irreversibility, volatility, uncertainty, firm heterogeneity, monetary policy

Procedia PDF Downloads 106