Search results for: Energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10728

Search results for: Energy security

9828 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 215
9827 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?

Authors: Abdoulahad Allamine

Abstract:

The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.

Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data

Procedia PDF Downloads 378
9826 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 846
9825 Central Energy Management for Optimizing Utility Grid Power Exchange with a Network of Smart Homes

Authors: Sima Aznavi, Poria Fajri, Hanif Livani

Abstract:

Smart homes are small energy systems which may be equipped with renewable energy sources, storage devices, and loads. Energy management strategy plays a main role in the efficient operation of smart homes. Effective energy scheduling of the renewable energy sources and storage devices guarantees efficient energy management in households while reducing the energy imports from the grid. Nevertheless, despite such strategies, independently day ahead energy schedules for multiple households can cause undesired effects such as high power exchange with the grid at certain times of the day. Therefore, the interactions between multiple smart home day ahead energy projections is a challenging issue in a smart grid system and if not managed appropriately, the imported energy from the power network can impose additional burden on the distribution grid. In this paper, a central energy management strategy for a network consisting of multiple households each equipped with renewable energy sources, storage devices, and Plug-in Electric Vehicles (PEV) is proposed. The decision-making strategy alongside the smart home energy management system, minimizes the energy purchase cost of the end users, while at the same time reducing the stress on the utility grid. In this approach, the smart home energy management system determines different operating scenarios based on the forecasted household daily load and the components connected to the household with the objective of minimizing the end user overall cost. Then, selected projections for each household that are within the same cost range are sent to the central decision-making system. The central controller then organizes the schedules to reduce the overall peak to average ratio of the total imported energy from the grid. To validate this approach simulations are carried out for a network of five smart homes with different load requirements and the results confirm that by applying the proposed central energy management strategy, the overall power demand from the grid can be significantly flattened. This is an effective approach to alleviate the stress on the network by distributing its energy to a network of multiple households over a 24- hour period.

Keywords: energy management, renewable energy sources, smart grid, smart home

Procedia PDF Downloads 240
9824 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 356
9823 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 300
9822 Development of an Energy Independant DC Building Demonstrator for Insulated Island Site

Authors: Olivia Bory Devisme, Denis Genon-Catalot, Frederic Alicalapa, Pierre-Olivier Lucas De Peslouan, Jean-Pierre Chabriat

Abstract:

In the context of climate change, it is essential that island territories gain energy autonomy. Currently mostly dependent on fossil fuels, the island of Reunion lo- cated in the Indian Ocean nevertheless has a high potential for solar energy. As the market for photovoltaic panels has been growing in recent years, the issues of energy losses linked to the multiple conversions from direct current to alternating current are emerging. In order to quantify these advantages and disadvantages by a comparative study, this document present the measurements carried out on a direct current test bench, particularly for lighting, ventilation, air condi- tioning and office equipment for the tertiary sector. All equipment is supplied with DC power from energy produced by photovoltaic panels. A weather sta- tion, environmental indoor sensors, and drivers are also used to control energy. Self-consumption is encouraged in order to manage different priorities between user consumption and energy storage in a lithium iron phosphate battery. The measurements are compared to a conventional electrical architecture (DC-AC- DC) for energy consumption, equipment overheating, cost, and life cycle analysis.

Keywords: DC microgrids, solar energy, smart buildings, storage

Procedia PDF Downloads 157
9821 Flexible Design of Triboelectric Nanogenerators for Efficient Vibration Energy Harvesting

Authors: Meriam Khelifa

Abstract:

In recent years, many studies have focused on the harvesting of the vibrations energy to produce electrical energy using contact separation (CS) triboelectric nanogenerators (TENG). The simplest design for a TENG consists of a capacitor comprising a single moving electrode. The conversion efficiency of vibration energy into electrical energy can, in principle, reach 100%. But to actually achieve this objective, it is necessary to optimize the parameters of the TENG, such as the dielectric constant and the thickness of the insulator, the load resistance, etc. In particular, the use of a switch which is actioned at optimal times within the TENG cycle is essential. Using numerical modeling and experimental design, we applied a methodology to find the TENG parameters which optimize the energy transfer efficiency (ETE) to almost 100% for any vibration frequency and amplitude. The rather simple design of a TENG is promising as an environment friendly device. It opens the doors for harvesting acoustic vibrations from the environment and to design effective protection against environmental noise.

Keywords: vibrations, CS TENG, efficiency, design of experiments

Procedia PDF Downloads 85
9820 Performance Analysis of ERA Using Fuzzy Logic in Wireless Sensor Network

Authors: Kamalpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the main limitation is generally inimitable energy consumption during processing of the sensor nodes. Cluster head (CH) election is one of the main issues that can reduce the energy consumption. Therefore, discovering energy saving routing protocol is the focused area for research. In this paper, fuzzy-based energy aware routing protocol is presented, which enhances the stability and network lifetime of the network. Fuzzy logic ensures the well-organized selection of CH by taking four linguistic variables that are concentration, energy, centrality, and distance to base station (BS). The results show that the proposed protocol shows better results in requisites of stability and throughput of the network.

Keywords: ERA, fuzzy logic, network model, WSN

Procedia PDF Downloads 273
9819 Behaviours of Energy Spectrum at Low Reynolds Numbers in Grid Turbulence

Authors: Md Kamruzzaman, Lyazid Djenidi, R. A. Antonia

Abstract:

This paper reports an experimental investigation of the energy spectrum of turbulent velocity fields at low Reynolds numbers ( Rλ ) in grid turbulence. Hot wire measurements are carried out in grid turbulence with subjected to a 1.36:1 contraction of the wind tunnel. Three different grids are used: (i) large square perforated grid (mesh size 43.75 mm), (ii) small square perforated grid (mesh size 14 and (iii) woven mesh grid (mesh size 5mm). The results indicate that the energy spectrum at small Rλ does not follow Kolmogorov’s universal scaling. It is further found that the critical Reynolds number,Rλ,ϲ below which the scaling breaks down is around 25.

Keywords: energy spectrum, Taylor microscale, Reynolds number, turbulent kinetic energy, decay exponent

Procedia PDF Downloads 285
9818 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 36
9817 Application Programming Interface Security in Embedded and Open Finance

Authors: Andrew John Zeller, Artjoms Formulevics

Abstract:

Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.

Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management

Procedia PDF Downloads 34
9816 Cooperative Communication of Energy Harvesting Synchronized-OOK IR-UWB Based Tags

Authors: M. A. Mulatu, L. C. Chang, Y. S. Han

Abstract:

Energy harvesting tags with cooperative communication capabilities are emerging as possible infrastructure for internet of things (IoT) applications. This paper studies about the \ cooperative transmission strategy for a network of energy harvesting active networked tags (EnHANTs), that is adapted to the available energy resource and identification request. We consider a network of EnHANT-equipped objects to communicate with the destination either directly or by cooperating with neighboring objects. We formulate the the problem as a Markov decision process (MDP) under synchronised On/Off keying (S-OOK) pulse modulation format. The simulation results are provided to show the the performance of the cooperative transmission policy and compared against the greedy and conservative policies of single-link transmission.

Keywords: cooperative communication, transmission strategy, energy harvesting, Markov decision process, value iteration

Procedia PDF Downloads 487
9815 The System of Uniform Criteria for the Characterization and Evaluation of Elements of Economic Structure: The Territory, Infrastructure, Processes, Technological Chains, the End Products

Authors: Aleksandr A. Gajour, Vladimir G. Merzlikin, Vladimir I. Veselov

Abstract:

This paper refers to the analysis of the characteristics of industrial and lifestyle facilities heat- energy objects as a part of the thermal envelope of Earth's surface for inclusion in any database of economic forecasting. The idealized model of the Earth's surface is discussed. This model gives the opportunity to obtain the energy equivalent for each element of terrain and world ocean. Energy efficiency criterion of comfortable human existence is introduced. Dynamics of changes of this criterion offers the possibility to simulate the possible technogenic catastrophes with the spontaneous industrial development of the certain Earth areas. Calculated model with the confirmed forecast of the Gulf Stream freezing in the polar regions in 2011 due to the heat-energy balance disturbance for the oceanic subsurface oil polluted layer is given. Two opposing trends of human development under limited and unlimited amount of heat-energy resources are analyzed.

Keywords: Earth's surface, heat-energy consumption, energy criteria, technogenic catastrophes

Procedia PDF Downloads 397
9814 Integrated Modeling Approach for Energy Planning and Climate Change Mitigation Assessment in the State of Florida

Authors: K. Thakkar, C. Ghenai

Abstract:

An integrated modeling approach was used in this study to (1) track energy consumption, production, and resource extraction, (2) track greenhouse gases emissions and (3) analyze emissions for local and regional air pollutions. The model was used in this study for short and long term energy and GHG emissions reduction analysis for the state of Florida. The integrated modeling methodology will help to evaluate the alternative energy scenarios and examine emissions-reduction strategies. The mitigation scenarios have been designed to describe the future energy strategies. They consist of various demand and supply side scenarios. One of the GHG mitigation scenarios is crafted by taking into account the available renewable resources potential for power generation in the state of Florida to compare and analyze the GHG reduction measure against ‘Business As Usual’ and ‘Florida State Policy’ scenario. Two more ‘integrated’ scenarios, (‘Electrification’ and ‘Efficiency and Lifestyle’) are crafted through combination of various mitigation scenarios to assess the cumulative impact of the reduction measures such as technological changes and energy efficiency and conservation.

Keywords: energy planning, climate change mitigation assessment, integrated modeling approach, energy alternatives, and GHG emission reductions

Procedia PDF Downloads 437
9813 Analyzing Energy Consumption Behavior of Migrated Population in Turkey Using Bayesian Belief Approach

Authors: Ebru Acuner, Gulgun Kayakutlu, M. Ozgur Kayalica, Sermin Onaygil

Abstract:

In Turkey, emigration, especially from Syria, has been continuously increasing together with rapid urbanization. In parallel to this, total energy consumption has been growing, rapidly. Unfortunately, domestic energy sources could not meet this energy demand. Hence, there is a need for reliable predictions. For this reason, before making a survey study for the migrated people, an informative questionnaire was prepared to take the opinions of the experts on the main drivers that shape the energy consumption behavior of the migrated people. Totally, 17 experts were answered, and they were analyzed by means of Netica program considering Bayesian belief analysis method. In the analysis, factors affecting energy consumption behaviors as well as strategies, institutions, tools and financing methods to change these behaviors towards efficient consumption were investigated. On the basis of the results, it can be concluded that changing the energy consumption behavior of the migrated people is crucial. In order to be successful, electricity and natural gas prices and tariffs in the market should be arranged considering energy efficiency. In addition, support mechanisms by not only the government but also municipalities should be taken into account while preparing related policies. Also, electric appliance producers should develop and implement strategies and action in favor of the usage of more efficient appliances. Last but not least, non-governmental organizations should support the migrated people to improve their awareness on the efficient consumption for the sustainable future.

Keywords: Bayesian belief, behavior, energy consumption, energy efficiency, migrated people

Procedia PDF Downloads 106
9812 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 398
9811 Nanotechnology in Construction as a Building Security

Authors: Hanan Fayez Hussein

Abstract:

‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.

Keywords: nanomaterial, global warming, building security, smart homes

Procedia PDF Downloads 73
9810 Application of Unmanned Aerial Vehicle in Urban Rail Transit Intelligent Inspection

Authors: Xinglu Nie, Feifei Tang, Chuntao Wei, Zhimin Ruan, Qianhong Zhu

Abstract:

Current method of manual-style inspection can not fully meet the requirement of the urban rail transit security in China. In this paper, an intelligent inspection method using unmanned aerial vehicle (UAV) is utilized. A series of orthophoto of rail transit monitored area was collected by UAV, image correction and registration were operated among multi-phase images, then the change detection was used to detect the changes, judging the engineering activities and human activities that may become potential threats to the security of urban rail. Not only qualitative judgment, but also quantitative judgment of changes in the security control area can be provided by this method, which improves the objectives and efficiency of the patrol results. The No.6 line of Chongqing Municipality was taken as an example to verify the validation of this method.

Keywords: rail transit, control of protected areas, intelligent inspection, UAV, change detection

Procedia PDF Downloads 364
9809 Energy Efficient Shading Strategies for Windows of Hospital ICUs in the Desert

Authors: A. Sherif, A. El Zafarany, R. Arafa

Abstract:

Hospitals, everywhere, are considered heavy energy consumers. Hospital Intensive Care Unit spaces pose a special challenge, where design guidelines requires the provision of external windows for day-lighting and external view. Window protection strategies could be employed to reduce energy loads without detriment effect on comfort or health care. This paper addresses the effectiveness of using various window strategies on the annual cooling, heating and lighting energy use of a typical Hospital Intensive Unit space. Series of experiments were performed using the EnergyPlus simulation software for a typical Intensive Care Unit (ICU) space in Cairo, located in the Egyptian desert. This study concluded that the use of shading systems is more effective in conserving energy in comparison with glazing of different types, in the Cairo ICUs. The highest energy savings in the West and South orientations were accomplished by external perforated solar screens, followed by overhangs positioned at a protection angle of 45°.

Keywords: energy, hospital, intensive care units, shading

Procedia PDF Downloads 283
9808 The Channels through Which Energy Tax Can Affect Economic Growth: Panel Data Analysis

Authors: Mahmoud Hassan, Walid Oueslati, Damien Rousseliere

Abstract:

This paper explores the channels through which energy taxes may affect economic growth, using a simultaneous equations model for a balanced panel data of 31 OECD countries over the 1994–2013 period. The empirical results reveal a negative impact of energy taxes on physical investment in the short and long term. This impact is negatively sensitive to the existence and level of public debt. Additionally, the results show that energy taxes have an indirect effect on human capital through their impact on polluting emissions. The taxes on energy products are able to reduce both the flux and the stock of polluting emissions that have a negative impact on human capital skills in the short and long term. Finally, we found that energy taxes could encourage eco-innovation in the short and long term.

Keywords: energy taxes, economic growth, public debt, simultaneous equations model, multiple imputation

Procedia PDF Downloads 227
9807 Drivers of Energy Saving Behaviour: The Relative Influence of Normative, Habitual, Intentional, and Situational Processes

Authors: Karlijn Van Den Broek, Ian Walker, Christian Klöckner

Abstract:

Campaigns aiming to induce energy-saving behaviour among householders use a wide range of approaches that address many different drivers thought to underpin this behaviour. However, little research has compared the relative importance of the different factors that influence energy behaviour, meaning campaigns are not informed about where best to focus resources. Therefore, this study applies the Comprehensive Action Determination Model (CADM) to compare the role of normative, intentional, habitual, and situational processes on energy-saving behaviour. An online survey on a sample of households (N = 247) measured the CADM variables and the data was analysed using structural equation modelling. Results showed that situational and habitual processes were best able to account for energy saving behaviour while normative and intentional processes had little predictive power. These findings suggest that policymakers should move away from motivating householders to save energy and should instead focus their efforts on changing energy habits and creating environments that facilitate energy saving behaviour. These findings add to the wider development in social and environmental psychology that emphasizes the importance of extra-personal variables such as the physical environment in shaping behaviour.

Keywords: energy consumption, behavioural modelling, environmental psychology theory, habits, values

Procedia PDF Downloads 241
9806 Governance of Clean Energy in Rural Northwest Pakistan

Authors: Inayatullah Jan, Sidra Pervez

Abstract:

Effective institutional arrangements at local and national levels are quintessential for promotion of renewable energy in a country. This study attempts to examine the institutional arrangements for development of domestic renewable energy in rural northwest Pakistan. The study describes that very limited number of public and private organizations were working on clean development in the area. Surprisingly, no institutional arrangements exclusively meant for domestic clean energy promotion were observed in the area. The study concludes that the objectives of Kyoto Protocol in Pakistan can be achieved only if the government and non-governmental organizations work together to launch cost-effective renewable energy interventions, particularly in rural areas. The need is to have a coordinated, consistent, and focused cooperation of all stakeholders involved in promotion of domestic renewable energy at all levels. This will not only improve the socioeconomic and environmental conditions in the local context, but will play a key role in achieving the United Nations Millennium Development Goals(MDGs).

Keywords: governance, clean energy, greenhouse gases, CDM, Northwest Pakistan

Procedia PDF Downloads 383
9805 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 314
9804 Study the Relationship amongst Digital Finance, Renewable Energy, and Economic Development of Least Developed Countries

Authors: Fatima Sohail, Faizan Iftikhar

Abstract:

This paper studies the relationship between digital finance, renewable energy, and the economic development of Pakistan and least developed countries from 2000 to 2022. The paper used panel analysis and generalized method of moments Arellano-Bond approaches. The findings show that under the growth model, renewable energy (RE) has a strong and favorable link with fixed broadband and mobile subscribers. However, FB and MD have a strong but negative association with the uptake of renewable energy (RE) in the average and simple model. This paper provides valuable insights for policymakers, investors of the digital economy.

Keywords: digital finance, renewable energy, economic development, mobile subscription, fixed broadband

Procedia PDF Downloads 28
9803 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 101
9802 Investigating the Effect of Refinancing on Financial Behaviour of Energy Efficiency Projects

Authors: Zohreh Soltani, Seyedmohammadhossein Hosseinian

Abstract:

Reduction of energy consumption in built infrastructure, through the installation of energy-efficient technologies, is a major approach to achieving sustainability. In practice, the viability of energy efficiency projects strongly depends on the cost reimbursement and profitability. These projects are subject to failure if the actual cost savings do not reimburse the project cost in a timely manner. In such cases, refinancing could be a solution to benefit from the long-term returns of the project if implemented wisely. However, very little is still known about the effect of refinancing options on financial performance of energy efficiency projects. To fill this gap, the present study investigates the financial behavior of energy efficiency projects with focus on refinancing options, such as Leveraged Loans. A System Dynamics (SD) model is introduced, and the model application is presented using an actual case-study data. The case study results indicate that while high-interest start-ups make using Leveraged Loan inevitable, refinancing can rescue the project and bring about profitability. This paper also presents some managerial implications of refinancing energy efficiency projects based on the case-study analysis. Results of this study help implementing financially viable energy efficiency projects, so the community could benefit from their environmental advantages widely.

Keywords: energy efficiency projects, leveraged loan, refinancing, sustainability

Procedia PDF Downloads 389
9801 Modelling and Optimization of a Combined Sorption Enhanced Biomass Gasification with Hydrothermal Carbonization, Hot Gas Cleaning and Dielectric Barrier Discharge Plasma Reactor to Produce Pure H₂ and Methanol Synthesis

Authors: Vera Marcantonio, Marcello De Falco, Mauro Capocelli, Álvaro Amado-Fierro, Teresa A. Centeno, Enrico Bocci

Abstract:

Concerns about energy security, energy prices, and climate change led scientific research towards sustainable solutions to fossil fuel as renewable energy sources coupled with hydrogen as an energy vector and carbon capture and conversion technologies. Among the technologies investigated in the last decades, biomass gasification acquired great interest owing to the possibility of obtaining low-cost and CO₂ negative emission hydrogen production from a large variety of everywhere available organic wastes. Upstream and downstream treatment were then studied in order to maximize hydrogen yield, reduce the content of organic and inorganic contaminants under the admissible levels for the technologies which are coupled with, capture, and convert carbon dioxide. However, studies which analyse a whole process made of all those technologies are still missing. In order to fill this lack, the present paper investigated the coexistence of hydrothermal carbonization (HTC), sorption enhance gasification (SEG), hot gas cleaning (HGC), and CO₂ conversion by dielectric barrier discharge (DBD) plasma reactor for H₂ production from biomass waste by means of Aspen Plus software. The proposed model aimed to identify and optimise the performance of the plant by varying operating parameters (such as temperature, CaO/biomass ratio, separation efficiency, etc.). The carbon footprint of the global plant is 2.3 kg CO₂/kg H₂, lower than the latest limit value imposed by the European Commission to consider hydrogen as “clean”, that was set to 3 kg CO₂/kg H₂. The hydrogen yield referred to the whole plant is 250 gH₂/kgBIOMASS.

Keywords: biomass gasification, hydrogen, aspen plus, sorption enhance gasification

Procedia PDF Downloads 70
9800 A Study of the Trade-off Energy Consumption-Performance-Schedulability for DVFS Multicore Systems

Authors: Jalil Boudjadar

Abstract:

Dynamic Voltage and Frequency Scaling (DVFS) multicore platforms are promising execution platforms that enable high computational performance, less energy consumption and flexibility in scheduling the system processes. However, the resulting interleaving and memory interference together with per-core frequency tuning make real-time guarantees hard to be delivered. Besides, energy consumption represents a strong constraint for the deployment of such systems on energy-limited settings. Identifying the system configurations that would achieve a high performance and consume less energy while guaranteeing the system schedulability is a complex task in the design of modern embedded systems. This work studies the trade-off between energy consumption, cores utilization and memory bottleneck and their impact on the schedulability of DVFS multicore time-critical systems with a hierarchy of shared memories. We build a model-based framework using Parametrized Timed Automata of UPPAAL to analyze the mutual impact of performance, energy consumption and schedulability of DVFS multicore systems, and demonstrate the trade-off on an actual case study.

Keywords: time-critical systems, multicore systems, schedulability analysis, energy consumption, performance analysis

Procedia PDF Downloads 103
9799 Geographic Information System for District Level Energy Performance Simulations

Authors: Avichal Malhotra, Jerome Frisch, Christoph van Treeck

Abstract:

The utilization of semantic, cadastral and topological data from geographic information systems (GIS) has exponentially increased for building and urban-scale energy performance simulations. Urban planners, simulation scientists, and researchers use virtual 3D city models for energy analysis, algorithms and simulation tools. For dynamic energy simulations at city and district level, this paper provides an overview of the available GIS data models and their levels of detail. Adhering to different norms and standards, these models also intend to describe building and construction industry data. For further investigations, CityGML data models are considered for simulations. Though geographical information modelling has considerably many different implementations, extensions of virtual city data can also be made for domain specific applications. Highlighting the use of the extended CityGML models for energy researches, a brief introduction to the Energy Application Domain Extension (ADE) along with its significance is made. Consequently, addressing specific input simulation data, a workflow using Modelica underlining the usage of GIS information and the quantification of its significance over annual heating energy demand is presented in this paper.

Keywords: CityGML, EnergyADE, energy performance simulation, GIS

Procedia PDF Downloads 163