Search results for: electrical power system security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24200

Search results for: electrical power system security

23330 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 430
23329 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 109
23328 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 81
23327 International Peace and Security: a Study in the Light of the Provisions of the Charter of the United Nations

Authors: Djehich Mohamed Yousri

Abstract:

As a result of the destruction and devastation left by the two world wars, the international community worked to establish a global organization based on a contractual basis, in which the Security Council was entrusted with the task of working to maintain international peace and security, and to achieve this, the United Nations Charter assigned the latter a wide authority to adapt everything It would threaten international peace and security, although the examiner of the Charter of the United Nations does not find the slightest definition of the concept of international peace and security, although these two principles are among the basic principles that the Charter stipulated the necessity of achieving, and perhaps this was also what was in the opposite case for them. And by that, we mean cases of a threat to peace, a breach of it, or an act of aggression. These terms were not dealt with in the Charter in explanation and detail, leaving ample room for the Security Council to assess each of these cases separately, and perhaps this is due to the fact that the framers of the Charter intended to set a flexible standard. It does not restrict the authority of the Security Council to carry out the adjustment process on the one hand and, on the other hand, to allow and enable the Security Council to keep pace with new developments and threats to which international peace and security are exposed. There is no doubt that the concept of international peace and security has undergone significant changes during the 70-year period that followed the establishment of the international organization. After the threat to peace and security focused - in the first stage - on cases of war or the threat of war, what distinguishes the post- The new world order is the emergence of other challenges and threats that find their source in economic, social, humanitarian, and environmental instability. Perhaps this is what the member states of the Security Council indicated during the preparation of the Peace Agenda. The expansion of the concept of peace and security is what paved the way for some permanent states to use the Security Council to legitimize and implement their decisions and take the council as a tool to implement their foreign policy and punish states instead of maintaining international peace and security, which prompted some states and jurisprudence to call for the establishment of oversight of the decisions of the Council Security on the one hand, and amending the UN Charter to make it more expressive of the aspirations of the international community, referring to the obstacles that prevent this amendment.

Keywords: peace, security, united nations charter, security council, united nations organization

Procedia PDF Downloads 70
23326 Energy Management System with Temperature Rise Prevention on Hybrid Ships

Authors: Asser S. Abdelwahab, Nabil H. Abbasy, Ragi A. Hamdy

Abstract:

Marine shipping has now become one of the major worldwide contributors to pollution and greenhouse gas emissions. Hybrid ships technology based on multiple energy sources has taken a great scope of research to get rid of ship emissions and cut down fuel expenses. Insufficiency between power generated and the demand load to withstand the transient behavior on ships during severe climate conditions will lead to a blackout. Thus, an efficient energy management system (EMS) is a mandatory scope for achieving higher system efficiency while enhancing the lifetime of the onboard storage systems is another salient EMS scope. Considering energy storage system conditions, both the battery state of charge (SOC) and temperature represent important parameters to prevent any malfunction of the storage system that eventually degrades the whole system. In this paper, a two battery packs ratio fuzzy logic control model is proposed. The overall aim is to control the charging/discharging current while including both the battery SOC and temperature in the energy management system. The full designs of the proposed controllers are described and simulated using Matlab. The results prove the successfulness of the proposed controller in stabilizing the system voltage during both loading and unloading while keeping the energy storage system in a healthy condition.

Keywords: energy storage system, power shipboard, hybrid ship, thermal runaway

Procedia PDF Downloads 194
23325 Reduced Power Consumption by Randomization for DSI3

Authors: David Levy

Abstract:

The newly released Distributed System Interface 3 (DSI3) Bus Standard specification defines 3 modulation levels from which 16 valid symbols are coded. This structure creates power consumption variations depending on the transmitted data of a factor of more than 2 between minimum and maximum. The power generation unit has to consider therefore the worst case maximum consumption all the time and be built accordingly. This paper proposes a method to reduce both the average current consumption and worst case current consumption. The transmitter randomizes the data using several pseudo-random sequences. It then estimates the energy consumption of the generated frames and selects to transmit the one which consumes the least. The transmitter also prepends the index of the pseudo-random sequence, which is not randomized, to allow the receiver to recover the original data using the correct sequence. We show that in the case that the frame occupies most of the DSI3 synchronization period, we achieve average power consumption reduction by up to 13% and the worst case power consumption is reduced by 17.7%.

Keywords: DSI3, energy, power consumption, randomization

Procedia PDF Downloads 533
23324 Grid Tied Photovoltaic Power on School Roof

Authors: Yeong-cheng Wang, Jin-Yinn Wang, Ming-Shan Lin, Jian-Li Dong

Abstract:

To universalize the adoption of sustainable energy, the R.O.C. government encourages public buildings to introduce the PV power station on the building roof, whereas most old buildings did not include the considerations of photovoltaic (PV) power facilities in the design phase. Several factors affect the PV electricity output, the temperature is the key one, different PV technologies have different temperature coefficients. Other factors like PV panel azimuth, panel inclination from the horizontal plane, and row to row distance of PV arrays, mix up at the beginning of system design. The goal of this work is to maximize the annual energy output of a roof mount PV system. Tables to simplify the design work are developed; the results can be used for engineering project quote directly.

Keywords: optimal inclination, array azimuth, annual output

Procedia PDF Downloads 670
23323 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 405
23322 High-Efficiency Comparator for Low-Power Application

Authors: M. Yousefi, N. Nasirzadeh

Abstract:

In this paper, dynamic comparator structure employing two methods for power consumption reduction with applications in low-power high-speed analog-to-digital converters have been presented. The proposed comparator has low consumption thanks to power reduction methods. They have the ability for offset adjustment. The comparator consumes 14.3 μW at 100 MHz which is equal to 11.8 fJ. The comparator has been designed and simulated in 180 nm CMOS. Layouts occupy 210 μm2.

Keywords: efficiency, comparator, power, low

Procedia PDF Downloads 349
23321 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 275
23320 Contractors Perspective on Causes of Delays in Power Transmission Projects

Authors: Goutom K. Pall

Abstract:

At the very heart of the power system, power transmission (PT) acts as an essential link between power generation and distribution. Timely completion of PT infrastructures is therefore crucial to support the development of power system as a whole. Yet despite the importance, studies on PT infrastructure development projects are embryonic and, hence, PT projects undergoing widespread delays worldwide. These delay factors are idiosyncratic and identifying the critical delay factors is essential if the PT industry professionals are to complete their projects efficiently and within the expected timeframes. This study identifies and categorizes 46 causes of PT project delay under ten major groups using six sector expert’s recommendations studied by a preliminary questionnaire survey. Based on the experts’ strong recommendations, two new groups are introduced in the final questionnaire survey: sector specific factors (SSF) and general factors (GF). SSF pertain to delay factors applicable only to the PT projects, while GF represents less biased samples with shared responsibilities of all project parties involved in a project. The study then uses 112 data samples from the contractors to rank the delay factors using relative importance index (RII). The results reveal that SSF, GF and external factors are the most critical groups, while the highest ranked delay factors include the right of way (RoW) problems of transmission lines (TL), delay in payments, frequent changes in TL routes, poor communication and coordination among the project parties and accessibility to TL tower locations. Finally, recommendations are made to minimize the identified delay. The findings are expected to be of substantial benefit to professionals in minimizing time overrun in PT projects implementation, as well as power generation, power distribution, and non-power linear construction projects worldwide.

Keywords: delay, project delay, power transmission projects, time-overruns

Procedia PDF Downloads 174
23319 An Investigation of System and Operating Parameters on the Performance of Parabolic Trough Solar Collector for Power Generation

Authors: Umesh Kumar Sinha, Y. K. Nayak, N. Kumar, Swapnil Saurav, Monika Kashyap

Abstract:

The authors investigate the effect of system and operating parameters on the performance of high temperature solar concentrator for power generation. The effects of system and operating parameters were investigated using the developed mathematical expressions for collector efficiency, heat removal factor, fluid outlet temperature and power, etc. The results were simulated using C++program. The simulated results were plotted for investigation like effect of thermal loss parameter and radiative loss parameters on the collector efficiency, heat removal factor, fluid outlet temperature, rise of temperature and effect of mass flow rate of the fluid outlet temperature. In connection with the power generation, plots were drawn for the effect of (TM–TAMB) on the variation of concentration efficiency, concentrator irradiance on PM/PMN, evaporation temperature on thermal to electric power efficiency (Conversion efficiency) of the plant and overall efficiency of solar power plant.

Keywords: parabolic trough solar collector, radiative and thermal loss parameters, collector efficiency, heat removal factor, fluid outlet and inlet temperatures, rise of temperature, mass flow rate, conversion efficiency, concentrator irradiance

Procedia PDF Downloads 314
23318 Single Pole-To-Earth Fault Detection and Location on the Tehran Railway System Using ICA and PSO Trained Neural Network

Authors: Masoud Safarishaal

Abstract:

Detecting the location of pole-to-earth faults is essential for the safe operation of the electrical system of the railroad. This paper aims to use a combination of evolutionary algorithms and neural networks to increase the accuracy of single pole-to-earth fault detection and location on the Tehran railroad power supply system. As a result, the Imperialist Competitive Algorithm (ICA) and Particle Swarm Optimization (PSO) are used to train the neural network to improve the accuracy and convergence of the learning process. Due to the system's nonlinearity, fault detection is an ideal application for the proposed method, where the 600 Hz harmonic ripple method is used in this paper for fault detection. The substations were simulated by considering various situations in feeding the circuit, the transformer, and typical Tehran metro parameters that have developed the silicon rectifier. Required data for the network learning process has been gathered from simulation results. The 600Hz component value will change with the change of the location of a single pole to the earth's fault. Therefore, 600Hz components are used as inputs of the neural network when fault location is the output of the network system. The simulation results show that the proposed methods can accurately predict the fault location.

Keywords: single pole-to-pole fault, Tehran railway, ICA, PSO, artificial neural network

Procedia PDF Downloads 114
23317 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 80
23316 Utilizing Waste Heat from Thermal Power Plants to Generate Power by Modelling an Atmospheric Vortex Engine

Authors: Mohammed Nabeel Khan, C. Perisamy

Abstract:

Convective vortices are normal highlights of air that ingest lower-entropy-energy at higher temperatures than they dismiss higher-entropy-energy to space. By means of the thermodynamic proficiency, it has been anticipated that the force of convective vortices relies upon the profundity of the convective layer. The atmospheric vortex engine is proposed as a gadget for delivering mechanical energy by methods for artificially produced vortex. The task of the engine is in view of the certainties that the environment is warmed from the base and cooled from the top. By generation of the artificial vortex, it is planned to take out the physical solar updraft tower and decrease the capital of the solar chimney power plants. The study shows the essentials of the atmospheric vortex engine, furthermore, audits the cutting edge in subject. Moreover, the study talks about a thought on using the solar energy as heat source to work the framework. All in all, the framework is attainable and promising for electrical power production.

Keywords: AVE, atmospheric vortex engine, atmosphere, updraft, vortex

Procedia PDF Downloads 154
23315 Modified 'Perturb and Observe' with 'Incremental Conductance' Algorithm for Maximum Power Point Tracking

Authors: H. Fuad Usman, M. Rafay Khan Sial, Shahzaib Hamid

Abstract:

The trend of renewable energy resources has been amplified due to global warming and other environmental related complications in the 21st century. Recent research has very much emphasized on the generation of electrical power through renewable resources like solar, wind, hydro, geothermal, etc. The use of the photovoltaic cell has become very public as it is very useful for the domestic and commercial purpose overall the world. Although a single cell gives the low voltage output but connecting a number of cells in a series formed a complete module of the photovoltaic cells, it is becoming a financial investment as the use of it fetching popular. This also reduced the prices of the photovoltaic cell which gives the customers a confident of using this source for their electrical use. Photovoltaic cell gives the MPPT at single specific point of operation at a given temperature and level of solar intensity received at a given surface whereas the focal point changes over a large range depending upon the manufacturing factor, temperature conditions, intensity for insolation, instantaneous conditions for shading and aging factor for the photovoltaic cells. Two improved algorithms have been proposed in this article for the MPPT. The widely used algorithms are the ‘Incremental Conductance’ and ‘Perturb and Observe’ algorithms. To extract the maximum power from the source to the load, the duty cycle of the convertor will be effectively controlled. After assessing the previous techniques, this paper presents the improved and reformed idea of harvesting maximum power point from the photovoltaic cells. A thoroughly go through of the previous ideas has been observed before constructing the improvement in the traditional technique of MPP. Each technique has its own importance and boundaries at various weather conditions. An improved technique of implementing the use of both ‘Perturb and Observe’ and ‘Incremental Conductance’ is introduced.

Keywords: duty cycle, MPPT (Maximum Power Point Tracking), perturb and observe (P&O), photovoltaic module

Procedia PDF Downloads 173
23314 Advanced Simulation of Power Consumption of Electric Vehicles

Authors: Ilya Kavalchuk, Hayrettin Arisoy, Alex Stojcevski, Aman Maun Than Oo

Abstract:

Electric vehicles are one of the most complicated electric devices to simulate due to the significant number of different processes involved in electrical structure of it. There are concurrent processes of energy consumption and generation with different onboard systems, which make simulation tasks more complicated to perform. More accurate simulation on energy consumption can provide a better understanding of all energy management for electric transport. As a result of all those processes, electric transport can allow for a more sustainable future and become more convenient in relation to the distance range and recharging time. This paper discusses the problems of energy consumption simulations for electric vehicles using different software packages to provide ideas on how to make this process more precise, which can help engineers create better energy management strategies for electric vehicles.

Keywords: electric vehicles, EV, power consumption, power management, simulation

Procedia PDF Downloads 509
23313 Integration of Hybrid PV-Wind in Three Phase Grid System Using Fuzzy MPPT without Battery Storage for Remote Area

Authors: Thohaku Abdul Hadi, Hadyan Perdana Putra, Nugroho Wicaksono, Adhika Prajna Nandiwardhana, Onang Surya Nugroho, Heri Suryoatmojo, Soedibjo

Abstract:

Access to electricity is now a basic requirement of mankind. Unfortunately, there are still many places around the world which have no access to electricity, such as small islands, where there could potentially be a factory, a plantation, a residential area, or resorts. Many of these places might have substantial potential for energy generation such us Photovoltaic (PV) and Wind turbine (WT), which can be used to generate electricity independently for themselves. Solar energy and wind power are renewable energy sources which are mostly found in nature and also kinds of alternative energy that are still developing in a rapid speed to help and meet the demand of electricity. PV and Wind has a characteristic of power depend on solar irradiation and wind speed based on geographical these areas. This paper presented a control methodology of hybrid small scale PV/Wind energy system that use a fuzzy logic controller (FLC) to extract the maximum power point tracking (MPPT) in different solar irradiation and wind speed. This paper discusses simulation and analysis of the generation process of hybrid resources in MPP and power conditioning unit (PCU) of Photovoltaic (PV) and Wind Turbine (WT) that is connected to the three-phase low voltage electricity grid system (380V) without battery storage. The capacity of the sources used is 2.2 kWp PV and 2.5 kW PMSG (Permanent Magnet Synchronous Generator) -WT power rating. The Modeling of hybrid PV/Wind, as well as integrated power electronics components in grid connected system, are simulated using MATLAB/Simulink.

Keywords: fuzzy MPPT, grid connected inverter, photovoltaic (PV), PMSG wind turbine

Procedia PDF Downloads 351
23312 Engine with Dual Helical Crankshaft System Operating at an Overdrive Gear Ratio

Authors: Anierudh Vishwanathan

Abstract:

This paper suggests a new design of the crankshaft system that would help to use a low revving engine for applications requiring the use of a high revving engine operating at the same power by converting the extra or unnecessary torque obtained from a low revving engine into angular velocity of the crankshaft of the engine hence, improve the fuel economy of the vehicle because of the fact that low revving engines run more effectively on lean air fuel mixtures accompanied with less wear and tear of the engine due to lesser rubbing of the piston rings with the cylinder walls. If the crankshaft with the proposed design is used in a low revving engine, then it will give the same torque and speed as that given by a high revving engine operating at the same power but the new engine will give better fuel economy. Hence the new engine will give the benefits of a low revving engine as well as a high revving engine. The proposed crankshaft design will be achieved by changing the design of the crankweb in such a way that it functions both as a counterweight as well as a helical gear that can transfer power to the secondary gear shaft which will be incorporated in the crankshaft system. The crankshaft and the secondary gear shaft will be operating at an overdrive ratio. The crankshaft will now be a two shaft system instead of a single shaft system. The newly designed crankshaft will be mounted on the bearings instead of being connected to the flywheel of the engine. This newly designed crankshaft will transmit power to the secondary shaft which will rotate the flywheel and then the rotary motion will be transmitted to the transmission system as usual. In this design, the concept of power transmission will be incorporated in the crankshaft system. In the paper, the crankshaft and the secondary shafts have been designed in such a way that at any instant of time only half the number of crankwebs will be meshed with the secondary shaft. For example, during one revolution of the crankshaft, if for the first half of revolution; first, second, seventh and eighth crankwebs are meshing with the secondary shaft then for the next half revolution, third, fourth, fifth and sixth crankwebs will mesh with the secondary shaft. This paper also analyses the proposed crankshaft design for safety against fatigue failure. Finite element analysis of the crankshaft has been done and the resultant stresses have been calculated.

Keywords: low revving, high revving, secondary shaft, partial meshing

Procedia PDF Downloads 266
23311 Curbing Abuses of Legal Power in the Society

Authors: Tajudeen Ojo Ibraheem

Abstract:

In a world characterized by greed and the lust for power and its attendant trappings, abuse of legal power is nothing new to most of us. Legal abuses of power abound in all fields of human endeavour. Accounts of such abuses dominate the mass media and for the average individual, no single day goes by without his getting to hear about at least one such occurrence. This paper briefly looks at the meaning of legal power, what legal abuse is all about, its causes, and some of its manifestations in the society. Its consequences will also be discussed and some suggestions for reform will be made. In the course of the paper, references will be made to various jurisdictions around the world.

Keywords: abuse, legal, power, society

Procedia PDF Downloads 439
23310 The Awareness of Computer Science Students Regarding the Security of Location Based Games

Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin

Abstract:

Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.

Keywords: gamer classifications, location based games, location based data, security awareness

Procedia PDF Downloads 289
23309 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 57
23308 A Three Phase Shunt Active Power Filter for Currents Harmonics Elimination and Reactive Power Compensation

Authors: Amar Omeiri

Abstract:

This paper presents a three-phase shunt active power filter for current harmonics suppression and reactive power compensation using the supply current as reference. The proposed APF has a simple control circuit; it consists of detecting the supply current instead of the load current. The advantages of this APF are simplicity of control circuits and low implementation cost. The simulation results show that the proposed APF can compensate the reactive power and suppress current harmonics with two types of non-linear loads.

Keywords: active power filter, current harmonics and reactive power compensation, PWM inverter, Total Harmonic Distortion, power quality

Procedia PDF Downloads 584
23307 Solution to Increase the Produced Power in Micro-Hydro Power Plant

Authors: Radu Pop, Adrian Bot, Vasile Rednic, Emil Bruj, Oana Raita, Liviu Vaida

Abstract:

Our research presents a study concerning optimization of water flow capture for micro-hydro power plants in order to increase the energy production. It is known that the fish ladder whole, were the water is capture is fix, and the water flow may vary with the river flow, this means that on the fish ladder we will have different servitude flows, sometimes more than needed. We propose to demonstrate that the ‘winter intake’ from micro-hydro power plant, could be automated with an intelligent system which is capable to read some imposed data and adjust the flow in to the needed value. With this automation concept, we demonstrate that the performance of the micro-hydro power plant could increase, in some flow operating regimes, with approx. 10%.

Keywords: energy, micro-hydro, water intake, fish ladder

Procedia PDF Downloads 228
23306 Design and Sensitivity Analysis of Photovoltaic/Thermal Solar Collector

Authors: H. M. Farghally, N. M. Ahmed, H. T. El-Madany, D. M. Atia, F. H. Fahmy

Abstract:

Energy is required in almost every aspect of human activities and development of any nation in this world. Increasing fossil fuel price, energy security and climate change have important bearings on sustainable development of any nation. The renewable energy technology is considered one of the drastic approaches taken over the world to reduce the energy problem. The preservation of vegetables by freezing is one of the most important methods of retaining quality in agricultural products over long-term storage periods. Freezing factories show high demand of energy for both heat and electricity; the hybrid Photovoltaic/Thermal (PV/T) systems could be used in order to meet this requirement. This paper presents PV/T system design for freezing factory. Also, the complete mathematical modeling and Matlab Simulink of PV/T collector is introduced. The sensitivity analysis for the manufacturing parameters of PV/T collector is carried out to study their effect on the thermal and electrical efficiency.

Keywords: renewable energy, hybrid PV/T system, sensitivity analysis, ecological sciences

Procedia PDF Downloads 288
23305 Measuring of the Volume Ratio of Two Immiscible Liquids Using Electrical Impedance Tomography

Authors: Jiri Primas, Michal Malik, Darina Jasikova, Michal Kotek, Vaclav Kopecky

Abstract:

Authors of this paper discuss the measuring of volume ratio of two immiscible liquids in the homogenous mixture using the industrial Electrical Impedance Tomography (EIT) system ITS p2+. In the first part of the paper, the principle of EIT and the basic theory of conductivity of mixture of two components are stated. In the next part, the experiment with water and olive oil mixed with Rushton turbine is described, and the measured results are used to verify the theory. In the conclusion, the results are discussed in detail, and the accuracy of the measuring method and its advantages are also mentioned.

Keywords: conductivity, electrical impedance tomography, homogenous mixture, mixing process

Procedia PDF Downloads 395
23304 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 207
23303 Study and Design of Solar Inverter System

Authors: Khaled A. Madi, Abdulalhakim O. Naji, Hassouna A. Aalaoh, Elmahdi Eldeeb

Abstract:

Solar energy is one of the cleanest energy sources with no environmental impact. Due to rapid increase in industrial as well as domestic needs, solar energy becomes a good candidate for safe and easy to handle energy source, especially after it becomes available due to reduction of manufacturing price. The main part of the solar inverter system is the inverter where the DC is inverted to AC, where we try to minimize the loss of power to the minimum possible level by the use of microcontroller. In this work, a deep investigation is made experimentally as well as theoretically for a microcontroller based variable frequency power inverter. The microcontroller will provide the variable frequency Pulse Width Modulation (PWM) signal that will control the switching of the gate of the Insulating Gate Bipolar Transistor (IGBT) with less harmonics at the output of power inverter which can be fed to the public grid at high quality. The proposed work for single phase as well as three phases is also simulated using Matlab/Simulink where we found a good agreement between the simulated and the practical results, even though the experimental work were done in the laboratory of the academy.

Keywords: solar, inverter, PV, solar inverter system

Procedia PDF Downloads 453
23302 Iterative Replanning of Diesel Generator and Energy Storage System for Stable Operation of an Isolated Microgrid

Authors: Jiin Jeong, Taekwang Kim, Kwang Ryel Ryu

Abstract:

The target microgrid in this paper is isolated from the large central power system and is assumed to consist of wind generators, photovoltaic power generators, an energy storage system (ESS), a diesel power generator, the community load, and a dump load. The operation of such a microgrid can be hazardous because of the uncertain prediction of power supply and demand and especially due to the high fluctuation of the output from the wind generators. In this paper, we propose an iterative replanning method for determining the appropriate level of diesel generation and the charging/discharging cycles of the ESS for the upcoming one-hour horizon. To cope with the uncertainty of the estimation of supply and demand, the one-hour plan is built repeatedly in the regular interval of one minute by rolling the one-hour horizon. Since the plan should be built with a sufficiently large safe margin to avoid any possible black-out, some energy waste through the dump load is inevitable. In our approach, the level of safe margin is optimized through learning from the past experience. The simulation experiments show that our method combined with the margin optimization can reduce the dump load compared to the method without such optimization.

Keywords: microgrid, operation planning, power efficiency optimization, supply and demand prediction

Procedia PDF Downloads 430
23301 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 366